Language Selection

English French German Italian Portuguese Spanish

Server: Google, Docker, MontaVista, LF, Glusterfs vs. Ceph, Kubebuilder and SUSE

Filed under
Server
  • Google Cloud Sandbox Environments On Demand with Playground

    We’ve been talking about it for a while now during our Weekly Updates, and we’re finally ready to reveal our Google Sandbox Environment! Like our AWS environments, our Google environments are created on demand and allow you to work in a hassle-free, and compliance-friendly environment. These Google Playground Cloud Sandbox environments are available for all of our individual and business accounts!

  • Rob Bearden To Replace Steve Singh As Docker CEO

    Steve Singh is stepping down as Docker CEO after two years at the helm. Hortonworks CEO Rob Bearden will be taking over to lead the company. Bearden is said to have been working closely with Singh over the last several months as a potential candidate to join the board and as a consultant to the executive team.

    In his new role at Docker, Rob will accelerate Docker’s enterprise go-to-market strategy while continuing to fuel innovation in the technologies and products that drive digital transformation in an increasingly hybrid cloud world. Rob will also serve on Docker’s board of directors.

  • MontaVista Software Announces Commercial Support For Clear Linux OS
  • LF Edge Momentum Continues with Project EVE Seed Code, Project Demonstrations at IoT World and New Members

    LF Edge, an umbrella organization within the Linux Foundation that aims to establish an open, interoperable framework for edge computing independent of hardware, silicon, cloud, or operating system, today announced continued project momentum. Project Edge Virtualization Engine (EVE) receives initial seed code from LF Edge founding member ZEDEDA, as the community showcases a range of edge/IoT application demonstrations, from connected cars to wind turbines, on-site at IoT World.

    Additionally, LF Edge welcomes new Associate and Liaison member organizations Industrial Internet Consortium (IIC), the LIONS Center at the Pennsylvania State University, OTAinfo, and University of New Hampshire’s Interoperability Lab (UNH-IOL).

    “We are excited to see the LF community continue to collaborate on building unified edge solutions,” said Arpit Joshipura, general manager,  Networking, IoT and Edge Computing, the Linux Foundation. “We appreciate ZEDEDA’s leadership in helping us advance On-Prem Edge IoT with initiatives like Project EVE, and are eager to showcase the broad capabilities of LF Edge onsite in Santa Clara while welcoming our newest members.”

  • OPNFV Hunter Delivers Test Tools, CI/CD Framework to Enable Common NFVI for Verifying VNFs

    LF Networking (LFN), which facilitates collaboration and operational excellence across open networking projects, today announced the availability of OPNFV ?Hunter,? the platform?s eighth release. Hunter advances OPNFV?s system level integration, deployment, and testing to collaboratively build a common industry Network Functions Virtualization Infrastructure (NFVI) that will reduce Communication Service Provider (CSP) and Virtual Network Function (VNF) vendor efforts to verify VNFs against different NFVI platforms.

    Open Platform for NFV (OPNFV) is a project and community that facilitates a common NFVI, continuous integration (CI) with upstream projects, stand-alone testing toolsets, and a compliance and verification program for industry-wide testing and integration to accelerate the transformation of enterprise and service provider networks.  

    ?The latest OPNFV release sets the stage for a real turning point in the maturity of the platform,? said Heather Kirksey, vice president, Community & Ecosystem Development, the Linux Foundation. ?With continued evolution in areas of testing, verification, and CI/CD, OPNFV is on its way to enable a common NFVI stack that will meet the needs of operators. We are working  in collaboration with both global operators as well as the GSMA, and I am incredibly excited to see the community work to provide the resources needed to accelerate network transformation across the ecosystem.?

  • Glusterfs vs. Ceph: Which Wins the Storage War?

    Storing data at scale isn?t like saving a file on your hard drive. It requires a software manager to keep track of all the bits that make up your company?s files. That?s where distributed storage management packages like Ceph and Gluster come into place.

    Ceph and Gluster are both systems used for managing distributed storage. Both are considered software-defined storage, meaning they?re largely hardware-agnostic. They organize the bits that make up your data using their own underlying infrastructure, which is what defines this choice: what underlying framework do you want supporting your data?

    That?s a decision you want to make based on the type of data you?re storing, how that data is accessed, and where that data lives. Ceph and GlusterFS are both good choices, but their ideal applications are subtly different.

  • Developing Kubernetes API Extensions And Operators - Kubebuilder Vs Operator Kit Vs Metacontroller

    As more teams adopt Kubernetes in production, specific use cases and needs have emerged that build on the core feature set of the project. Rather than attempt to fit every requirement in Kubernetes itself, the community has worked towards building an extension framework to enable developers to build support for these different scenarios. Examples of customizing Kubernetes include configuring different network or storage plugins, restricting what container images can be run inside Pods and other admission policies, or creating API extensions for automating common cluster operations. Let?s take a deeper look at the latter type of extension.

  • eCube Systems Announces NXTera 7.1 Cloud-Enabled Entera RPC Middleware Certified on Suse Linux Enterprise 12

    eCube Systems, a leading provider of middleware modernization, integration and management solutions, announced the release of NXTera™ 7.1 High Performance RPC Middleware for SUSE Linux Enterprise 12. NXTera 7.1 is the official Borland sanctioned replacement middleware for Entera and includes modern tools for DevOps, advanced naming services with NAT support, JDBC database access for Entera servers, Eclipse workbench for COBOL, FORTRAN, C and C# language integration; and webservice enhancements to its generation of C, C# and JAVA services interfaces and clients.

More in Tux Machines

Security Leftovers

  • Why Are Cryptographers Being Denied Entry into the US?

    Is there some cryptographer blacklist? Is something else going on? A lot of us would like to know.

  • Security Engineering: Third Edition

    Today I put online a chapter on Who is the Opponent, which draws together what we learned from Snowden and others about the capabilities of state actors, together with what we’ve learned about cybercrime actors as a result of running the Cambridge Cybercrime Centre. Isn’t it odd that almost six years after Snowden, nobody’s tried to pull together what we learned into a coherent summary?

    There’s also a chapter on Surveillance or Privacy which looks at policy. What’s the privacy landscape now, and what might we expect from the tussles over data retention, government backdoors and censorship more generally?

  • Google halts some business with China's Huawei: report

    Huawei will reportedly no longer be able to access Android updates, the Gmail app, the Google Play store and new versions of Google phones outside of China.

  • Google restricts Huawei's use of Android

    Existing Huawei smartphone users will be able to update apps and push through security fixes, as well as update Google Play services.

    But when Google launches the next version of Android later this year, it may not be available on Huawei devices.

    Future Huawei devices may no longer have apps such as YouTube and Maps.

  • Forget Huawei, The Internet Of Things Is The Real Security Threat
    We've noted for a while how a lot of the US protectionist security hysteria surrounding Huawei isn't supported by much in the way of hard data. And while it's certainly possible that Huawei helps the Chinese government spy, the reality is that Chinese (or any other) intelligence services don't really need to rely on Huawei to spy on the American public. Why? Because people around the world keep connecting millions of internet of broken things devices to their home and business networks that lack even the most rudimentary of security and privacy protections. Week after week we've documented how these devices are being built with both privacy and security as a distant afterthought, resulting in everything from your television to your refrigerator creating both new attack vectors and wonderful new surveillance opportunities for hackers and state actors.

today's howtos

Android Leftovers

A Look At The MDS Cost On Xeon, EPYC & Xeon Total Impact Of Affected CPU Vulnerabilities

This weekend I posted a number of benchmarks looking at the performance impact of the new MDS/Zombieload vulnerabilities that also included a look at the overall cost of Spectre/Meltdown/L1TF/MDS on Intel desktop CPUs and AMD CPUs (Spectre). In this article are similar benchmarks but turning the attention now to Intel Xeon hardware and also comparing those total mitigation costs against AMD EPYC with its Spectre mitigations. This article offers a look at the MDS/Zombieload mitigations on a 1st Gen Skylake Xeon Scalable server as well as a Kabylake Xeon E3 server for reference. Following that is a look at the total CPU vulnerability mitigation costs for 1st Gen Xeon Scalable, 2nd Gen Xeon Scalable (Cascade Lake), and an AMD EPYC 2P server as well for its Spectre mitigations. As expected given Intel's guidance last week of their latest Xeon processors being mitigated for MDS, indeed, the dual Xeon Platinum 8280 Cascade Lake server reported it was not affected by the MDS mitigations and thus not enabled. So for the MDS tests up first it's just some reference results using a dual Xeon Gold 6138 Skylake server running Ubuntu 19.04 with the Linux 5.0 patched kernel and reference results side-by-side for a separate Xeon E3-1275 v6 server. Read more