Review: Getting Started with Docker and Containers

What makes a good conference so special? With vast amounts of information available virtually on any topic imaginable at a click’s distance, would it not be more efficient to spend time in comfortable home setting learning new technology?

Review: Setting Up CI/CD Piplelines

I’ve taken a lot of classes in my several years attending LISA, and over that time, I’ve gotten to see a lot of different teaching styles and techniques. My least favorite style (and probably yours, too) is a strict lecture, where the instructor occasionally flips through slides, but mostly reads from notes, and has no engagement, no interaction, and no interest in whether the people in attendance are getting anything from the talk.

Terraform: More Infrastructure, More Orchestration

I write this while looking out over Treasure Island and the beautiful San Francisco Bay that surrounds it. Off in the distance, a veritable armada of ships hauls millions of containers under the Bay Bridge, into and out of the Port of Oakland.

It is not lost on me that I’m watching the physical manifestation of the classes I’ve been going to for the past couple of days: the literal orchestration of containers and pods.

Review: Hands-On Intro to Kubernetes

It’s 2017. Containers are “a thing.” For real. A few years ago, we were kind of wondering if they were, or if they were just a passing fad. Those of us who were busy Getting Things Done(™) don’t have time for all of the fly-by-night technologies that show up on HackerNews for a week, only to fall by the wayside. That’s the cheap excuse I’m using to justify my lack of experience with Docker, Kubernetes, and the whole containerization movement that has crept up in the past few years.

Welcome to LISA17!

I’ve been coming to LISA since 2009, and I’ve always wondered why the official conference opening was on Wednesday, when the party really starts on the Saturday prior. This year’s LISA in San Francisco is no different.

Interview with Chastity Blackwell on Her Upcoming LISA17 Talk on Documentation

I’m a fan of documentation. I have been, ever since I first inherited an infrastructure and had to try to figure out what the previous admin had done. I try to write decent documentation—documentation that I wish had been was there when I first tried to learn about a particular system. I also find myself doing so much that what I can keep in cache in my brain is limited, and stuff I’ve worked on tends to “page out,” so to speak. Writing good docs is an excellent way to do your future self a favor.

Interview with Eben Freeman on His Upcoming LISA17 Talk on Queuing Theory

Working in IT operations these days can be challenging as it seems like there’s an ever-increasing curve in terms of the knowledge you need to have. Fortunately, there are tools that help simplify what we need to do. Rather than constantly observe workloads and manually respond by building the services we think we'll need, pretty much all production-ready cloud providers and services offer autoscaling and demand-driven resources. But what are the implications of handing off this decision-making?

SREcon17 Americas Program Selection Process

The following post has been collaboratively written by the co-chairs for the SREcon17 Americas conference (Liz Fong-Jones and Kurt Andersen) and several of the program committee members (Murali Suriar and Betsy Beyer). It is intended to provide greater insight into the selection process which we used for this conference and may not entirely match the strategies which other conference committees employ.

USENIX Reaction to Presidential Executive Order “Protecting The Nation From Foreign Terrorist Entry To The United States”

USENIX, the Advanced Computing Systems Association, strongly objects to President Trump’s Executive Order “Protecting The Nation From Foreign Terrorist Entry To The United States,” signed on January 27, 2017, which suspends the issuance of visas and other immigration benefits—including entry into the United States—to nationals of “countries of particular concern.”

LISA16—You've Been Hacked! (Entirely in Safety)

“You’ve been hacked!” The cry echoes around the ballroom. A couple of dozen bemused and anxious faces turn to Branson on the podium as he grins and nods. The members of the four teams turn back to each other and their laptops and begin trying to find out what just happened.


Subscribe to USENIX Update