Language Selection

English French German Italian Portuguese Spanish

Servers: Concurrency, Purism, InSpec, Kubernetes, Docker/Containers

Filed under
Server
  • Thinking Concurrently: How Modern Network Applications Handle Multiple Connections

    The idea behind a process is fairly simple. A running program consists of not only executing code, but also data and some context. Because the code, data and context all exist in memory, the operating system can switch from one process to another very quickly. This combination of code + data + context is known as a "process", and it's the basis for how Linux systems work.

    When you start your Linux box, it has a single process. That process then "forks" itself, such that two identical processes are running. The second ("child") process reads new code, data and context ("exec"), and thus starts running a new process. This continues throughout the time that a system is running. When you execute a new program on the command line with & at the end of the line, you're forking the shell process and then exec'ing your desired program in its place.

  • New Purist Services – Standard Web Services Done Ethically

    When you sign up for a communication service, you are typically volunteering to store your personal, unencrypted data on someone else’s remote server farm. You have no way of ensuring that your data is safe or how it is being used by the owner of the server. However, online services are incredibly convenient especially when you have multiple devices.

  • Automated compliance testing with InSpec

    Don't equate compliance through certification with security, because compliance and security are not the same. We look at automated compliance testing with InSpec for the secure operation of enterprise IT.

  • How the Kubernetes Certification Ensures Interoperability

    Dan Kohn, executive director of the Cloud Native Computing Foundation, has called the launch of the new Kubernetes service provider certification program the most significant announcement yet made by the Foundation around the open source container orchestration engine.

    On this new episode of The New Stack Makers from KubeCon + CloudNativeCon 2017, we’ll learn more from Kohn and William Denniss, a product manager at Google, about how the program can help ensure interoperability and why that’s so important.

  • Container Structure Tests: Unit Tests for Docker Images

    Usage of containers in software applications is on the rise, and with their increasing usage in production comes a need for robust testing and validation. Containers provide great testing environments, but actually validating the structure of the containers themselves can be tricky. The Docker toolchain provides us with easy ways to interact with the container images themselves, but no real way of verifying their contents. What if we want to ensure a set of commands runs successfully inside of our container, or check that certain files are in the correct place with the correct contents, before shipping?

  • Prometheus vs. Heapster vs. Kubernetes Metrics APIs

    In this blog post, I will try to explain the relation between Prometheus, Heapster, as well as the Kubernetes metrics APIs and conclude with the recommended way how to autoscale workloads on Kubernetes.

  • Google Introduces Open Source Framework For Testing Docker Images

    Google has announced a new framework designed to help developers conduct unit tests on Docker container images. 

    The Container Structure Test gives enterprises a way to verify the structure and contents of individual containers to ensure that everything is as it should be before shipping to production, the company said in the company’s Open Source blog Jan. 9. 

    Google has been using the framework to test containers internally for more than a year and has released it publicly because it offers an easier way to validate the structure of Docker containers than other approaches, the company said.

More in Tux Machines

today's howtos

Kraft Version 0.82

A new release of Kraft, the Qt- and KDE based software to help to organize business docs in small companies, has arrived. A couple of days ago version 0.82 was released. It mainly is a bugfix release, but it also comes with a few new features. Users were asking for some new functions that they needed to switch to Kraft with their business communication, and I am always trying to make that a priority. The most visible feature is a light rework of the calculation dialog that allows users to do price calculations for templates. It was cleared up, superflous elements were finally removed and the remaining ones now work as expected. The distinction between manual price and calculated price should be even more clear now. Time calculations can now not only done in the granularity of minutes, as this was to coarse for certain usecases. The unit for a time slice can now be either seconds, minutes or hours. Read more

Ubuntu 18.10 is Released. Here’s What’s New

Ubuntu 18.10 code named ‘Cosmic Cuttlefish’ is released after 6 months of development efforts. The latest release of Ubuntu comes with some major feature updates and latest software. This release is a short term release and would be receiving updates and security fixes till July 2019. Read more

Security: ZDNet/CBS FUD, WiFi4EU, and Krack Wi-Fi

  • Open source web hosting software compromised with DDoS malware [Ed: CBS hired Catalin Cimpanu for him to have a broader platform with which to associate "Open Source" with security issues (does he say "proprietary" when it's proprietary, too?). Microsoft has long financed efforts to associate FOSS/copyleft with security issues and stigmatise it with licensing terror.]
  • Commission tried to hide details of 'WiFi4EU' glitch

    The European Commission has tried to hide information related to technical problems its free wifi fund portal suffered, by claiming that it was "out of scope".

    It released documents to EUobserver following an access to documents request - but heavily redacted some of the key papers.

    However, one of the documents has been leaked and published online. A comparison between the leaked version and the one released by the commission clearly shows that the commission went too far with its redactions.

  • The Flawed System Behind the Krack Wi-Fi Meltdown

    "If there is one thing to learn from this, it's that standards can't be closed off from security researchers," says Robert Graham, an analyst for the cybersecurity firm Erratasec. "The bug here is actually pretty easy to prevent, and pretty obvious. It's the fact that security researchers couldn't get their hands on the standards that meant that it was able to hide."

    The WPA2 protocol was developed by the Wi-Fi Alliance and the Institute of Electrical and Electronics Engineers (IEEE), which acts as a standards body for numerous technical industries, including wireless security. But unlike, say, Transport Layer Security, the popular cryptographic protocol used in web encryption, WPA2 doesn't make its specifications widely available. IEEE wireless security standards carry a retail cost of hundreds of dollars to access, and costs to review multiple interoperable standards can quickly add up to thousands of dollars.