SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
CUNY Information Managers Forum
Red Hat, Inc
2
Introductions
 Shawn Wells <swells@redhat.com>
Federal Solutions Architect
 Mark St. Laurent <mstlaure@redhat.com>
Federal Solutions Architect / Security SME / Forensics Expert
 Michael Brown <mbrown@redhat.com>
Federal Solutions Architect / Identity Management SME
3
Agenda
Mike
Certificate Management15:30 – 16:00
MikeEnterprise Directory Server14:30 - 15:30
MarkSecuring the Infrastructure, Continud (Incident Response)12:45 - 14:30
Red HatLunch & Learn – (SELinux Live Lab: Designing your own Policies) (OPTIONAL)12:00 - 12:45
Dave, RichardRHEL & SELinux11:00 - 12:00
ShawnRHEL5 Overview10:00 - 11:00
AllMeet and Greet - Breakfast9:30 – 10:00
SpeakerTopicTime
4
 Headquarters: Raleigh, NC
 Founded 1993
 Public 1999 (NYSE: RHT)
 Operating in 27 countries
 Over 2200 Employees worldwide
 Over 50% are engineers
 80% Government/Commercial
Linux Market Share
 40+% Year over Year Growth
(For 23 straight quarters)
Red Hat, Inc
5
Veritas
VMWare
EMC Powerpath
SUN Solaris
Veritas
BEA WebLogic
6
Red Hat Development Model
7
Open Source as a Security Innovation
1. More eyes on the code, therefore less
security bugs
2. Red Hat’s rapid response to any
vulnerabilities
Time from a critical issue being known to the public until
the day that a fix is available via RHN
Red Hat Enterprise Linux 4, Feb 2005-Feb 2006
8
9
10Visit http://www.redhat.com/promo/vendor for more information
Red Hat Technology Update
- Virtualization
- Security/MLS/Common Criteria
12
The Xen Hypervisor
● Flexible IT Services
● Disaster Tolerance
● Life Cycle Management
● Live Migration
13
Virtualization Architecture
14
Introduction to libvirt API
 Hypervisor agnostic
 Stable API for tool/app development
 CIM providers; Python, C bindings, scriptable
 Allows authenticated/encrypted
sessions to remote hypervisors
 Current support for
 Xen Hypervisor
 KVM Hypervisor
 QEMU Hypervisor
15
Red Hat Security Certifications
● NIAP/Common Criteria: The most evaluated operating system platform
● Red Hat Enterprise Linux 2.1 – EAL 2 (Completed: February 2004)
● Red Hat Enterprise Linux 3 EAL 3+/CAPP (Completed: August 2004)
● Red Hat Enterprise Linux 4 EAL 4+/CAPP (Completed: February 2006)
● Red Hat Enterprise Linux 5 EAL4+/CAPP/LSPP/RBAC (Completed: June
2007)
● DII-COE
● Red Hat Enterprise Linux 3 (Self-Certification Completed: October 2004)
● Red Hat Enterprise Linux: First Linux platform certified by DISA
● DCID 6/3
● Currently PL3/PL4: ask about kickstarts.
● Often a component in PL5 systems
● DISA SRRs / STIGs
● Ask about kickstarts.
● FIPS 140-2
● Red Hat / NSS Cryptography Libraries certified Level 2
16
RHEL5 SELinux Enhancements
 ExecShield
This enhancement can prevent any memory that was writable from becoming
executable. This prevents an attacker from writing his code into memory and
then executing it
 Stack Smashing protection (Canary values)
The system will place a canary value at a randomized point above the stack. This
canary value is verified during normal operation. If the stack has been smashed,
the canary value will have been overwritten, indicating that the stack has been
smashed. This is a method to detect buffer overflows early.
 FORTIFY_SOURCE GCC option
When the compiler knows the size of a buffer, functions operate on the buffer to
make sure it will not overflow at runtime. This works to help catch format string
flaws as well as buffer overflows.
17
LVM Host-Based Synchronous Mirroring
 Each write is simultaneously written to 2 or more local or SAN disks (RAID1)
 LVM automatically detects failure, uses the identical, mirrored disks or LUN
 Upon restoration, recovery
process begins in background
 If minor outage, transaction
log rapidly replays missed
I/O
18
Device Mapper Multipath IO (MPIO)
 Connects & manages multiple paths through SAN to storage array
 Upon component failure, MPIO redirects traffic via redundant pathing
 Active/Active array support
 Bundled into RHEL
19
20
MRG Realtime
 Determinism
Ability to schedule high priority tasks predictably and
consistently
 Priority
Ensure that highest priority applications are not blocked by
low priority
 Quality Of Service (QoS)
Trustworthy, consistent response times
 Proven results
 Average of 38% improvement over stock RHEL5
 Timer event precision enhanced to µs level, rather than
ms
21
MRG: Messaging
 Provides messaging that is up to 100-fold faster than before
 Spans fast messaging, reliable messaging, large-file messaging
 Implements AMQP, the industry's first open messaging standard, for
unprecedented interoperability that is cross-language, cross-platform, multi-
vendor, spans hardware and software, and extends down to the wire level
 Uses Linux-specific optimizations to achieve optimal performance on Red Hat
Enterprise Linux and MRG Realtime
 Takes advantage of RHEL clustering, IO, kernel, and more
 Includes new high-performance AIO Journal for durable messaging
 Provides native infiniband support for transient messaging
22
About AMQP
 AMQP is an open specification for messaging
 It is a complete specification
 Anyone may use the AMQP specification to create useful
implementations without being charged for the IP rights to do so
 AMQP aims to be technology and language-neutral
 Available in C, C++, Java, JMS, .NET, C#, Ruby, Python, etc.
 Requires IP, and can be used with TCP, UDP, SCTP, Infiniband, etc.
 Products complying with AMQP are inter-operable
 AMQP is a Wire-Level protocol based on the ubiquitous IP
 Wire-level compatibility means it can be embedded in the network
 Applications written to Product X will plug into servers running Product Y
 Red Hat is a founding member of the AMQP Working Group
23
MRG: Realtime
 Enables applications and
transactions to run predictably, with
guaranteed response times
 Provides microsecond accuracy
 Provides competitive advantage &
meets SLA's
 Travel web site: missed booking
 Program trading: missed trades
 Command & Control: life &
death
 Provides replacement kernel for
RHEL 5.1+; x86/x86_64
 Preserves RHEL Application
Compatibility
Red Hat Confidential
Detail zoom-in of RHEL5 vs MRG Realtime
25
MRG: Realtime Tools
 MRG includes a new MRG Realtime Latency Tracer
 Runtime trace capture of longest latency codepaths – both kernel
and application. Peak detector
 Selectable triggers for threshold tracing
 Detailed kernel profiles based on latency triggers
 Existing standard RHEL5 based performance monitoring
tools remain relevant
 Gdb, OProfile Frysk – source level debuggers & profiler
 SystemTap, kprobe – kernel event tracing and dynamic data
collection
 kexec/kdump standard kernel dump/save core capabilities
26
Red Hat Enterprise MRG Availability
 MRG Announcement & Beta Launch: December 2007
 Public beta
 MRG v1.0: Early 2008
 RHEL-only support for MRG Messaging broker
 MRG Grid Technology Preview
 MRG v1.1: Late 2008
 Multi-platform support for MRG Messaging Java-based broker
 AMQP support updated to newly available AMQP version (1.0)
 MRG Grid support available
http://www.redhat.com/mrg/
27
MRG: Grid based off Condor
 MRG Grid is based on the Condor Project created and hosted by the University
of Wisconsin, Madison
 Red Hat and the University of Wisconsin have signed a strategic partnership
around Condor:
 University of Wisconsin makes Condor source code available under OSI-
approved open source license
 Red Hat & University of Wisconsin jointly fund and staff Condor
development on-campus at the University of Wisconsin
 Red Hat and the University of Wisconsin's partnership will:
 Add enhanced enterprise features, management, and supportability to
Condor and MRG Grid
 Add High Throughput Computing capabilities to Linux
Apache Security
29
Worker Thread
Config Example:
ServerLimit 2
StartServers 2
ThreadsPerChild 3
MinSpareThreads 2
MaxSpareThreads 4
MaxClients 6
- Large number of requests
- Less system resources
30
Prefork Threading
- Need to avoid threading (legacy)
- Problem with request will not effect others
31
suEXEC
 Problem
When running virtual hosts all files executed as same user
 Vulnerability
Malicious user may inject code into Apache to see other files on the system
 Solution
Utilize suEXEC, allowing virtual hosts to be ran as alternate users
32
Using suEXEC
 SuexecUserGroup
Sets executing process to run as alternate user
<VirtualHost www.example.com>
DocumentRoot /var/www/example.com
ServerName www.example.com
......
SuexecUserGroup {web_user} {web_group}
......
</VirtualHost>
33
mod_proxy
clientclient
client
client
client
Proxy
Cache
Web
Web
Reverse
Proxy
client
client
client
34
mod_ssl
 Supports SSLv2, SSLv3, TLSv1
 Supports RSA ciphers
 128-bit strong encryption, world wide
Client
ServerProtocol Negotiation
Server Sends Certificate
Verification
Session Key Gen
Encrypts Session Key Sends Encrypted KeyEncrypts Session Key Decrypts Session Key
Secure Comm
Encrypted Traffic
Secure Comm
Open Discussion

Weitere ähnliche Inhalte

Was ist angesagt?

LF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK
 
2009-09-24 Get the Hype on System z Webinar with IBM, Current & Future Linux ...
2009-09-24 Get the Hype on System z Webinar with IBM, Current & Future Linux ...2009-09-24 Get the Hype on System z Webinar with IBM, Current & Future Linux ...
2009-09-24 Get the Hype on System z Webinar with IBM, Current & Future Linux ...Shawn Wells
 
In-kernel Analytics and Tracing with eBPF for OpenStack Clouds
In-kernel Analytics and Tracing with eBPF for OpenStack CloudsIn-kernel Analytics and Tracing with eBPF for OpenStack Clouds
In-kernel Analytics and Tracing with eBPF for OpenStack CloudsPLUMgrid
 
2014 carlos gzlez florido nksip the erlang sip application server
2014 carlos gzlez florido nksip the erlang sip application server2014 carlos gzlez florido nksip the erlang sip application server
2014 carlos gzlez florido nksip the erlang sip application serverVOIP2DAY
 
Rina acc-icc16-stein
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-steinICT PRISTINE
 
LF_DPDK17_Flexible and Extensible support for new protocol processing with DP...
LF_DPDK17_Flexible and Extensible support for new protocol processing with DP...LF_DPDK17_Flexible and Extensible support for new protocol processing with DP...
LF_DPDK17_Flexible and Extensible support for new protocol processing with DP...LF_DPDK
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSICT PRISTINE
 
eProsima RPC over DDS - Connext Conf London October 2015
eProsima RPC over DDS - Connext Conf London October 2015 eProsima RPC over DDS - Connext Conf London October 2015
eProsima RPC over DDS - Connext Conf London October 2015 Jaime Martin Losa
 
LF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK17_Accelerating Packet Processing with FPGA NICsLF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK17_Accelerating Packet Processing with FPGA NICsLF_DPDK
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterICT PRISTINE
 
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Linaro
 
Summit 16: The Hitchhiker/Hacker's Guide to NFV Benchmarking
Summit 16: The Hitchhiker/Hacker's Guide to NFV BenchmarkingSummit 16: The Hitchhiker/Hacker's Guide to NFV Benchmarking
Summit 16: The Hitchhiker/Hacker's Guide to NFV BenchmarkingOPNFV
 
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Linaro
 
LF_DPDK_DPDK as microservices in ZTE Paas
LF_DPDK_DPDK as microservices in  ZTE PaasLF_DPDK_DPDK as microservices in  ZTE Paas
LF_DPDK_DPDK as microservices in ZTE PaasLF_DPDK
 
LF_DPDK17_Integrating and using DPDK with Open vSwitch
LF_DPDK17_Integrating and using DPDK with Open vSwitchLF_DPDK17_Integrating and using DPDK with Open vSwitch
LF_DPDK17_Integrating and using DPDK with Open vSwitchLF_DPDK
 
BKK16-100K2 ARM Research - Sensors to Supercomputers
BKK16-100K2 ARM Research - Sensors to SupercomputersBKK16-100K2 ARM Research - Sensors to Supercomputers
BKK16-100K2 ARM Research - Sensors to SupercomputersLinaro
 
DDS over Low Bandwidth Data Links - Connext Conf London October 2014
DDS over Low Bandwidth Data Links - Connext Conf London October 2014DDS over Low Bandwidth Data Links - Connext Conf London October 2014
DDS over Low Bandwidth Data Links - Connext Conf London October 2014Jaime Martin Losa
 
Dpdk Validation - Liu, Yong
Dpdk Validation - Liu, YongDpdk Validation - Liu, Yong
Dpdk Validation - Liu, Yongharryvanhaaren
 

Was ist angesagt? (20)

LF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver model
 
2009-09-24 Get the Hype on System z Webinar with IBM, Current & Future Linux ...
2009-09-24 Get the Hype on System z Webinar with IBM, Current & Future Linux ...2009-09-24 Get the Hype on System z Webinar with IBM, Current & Future Linux ...
2009-09-24 Get the Hype on System z Webinar with IBM, Current & Future Linux ...
 
In-kernel Analytics and Tracing with eBPF for OpenStack Clouds
In-kernel Analytics and Tracing with eBPF for OpenStack CloudsIn-kernel Analytics and Tracing with eBPF for OpenStack Clouds
In-kernel Analytics and Tracing with eBPF for OpenStack Clouds
 
2014 carlos gzlez florido nksip the erlang sip application server
2014 carlos gzlez florido nksip the erlang sip application server2014 carlos gzlez florido nksip the erlang sip application server
2014 carlos gzlez florido nksip the erlang sip application server
 
Rina acc-icc16-stein
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-stein
 
LF_DPDK17_Flexible and Extensible support for new protocol processing with DP...
LF_DPDK17_Flexible and Extensible support for new protocol processing with DP...LF_DPDK17_Flexible and Extensible support for new protocol processing with DP...
LF_DPDK17_Flexible and Extensible support for new protocol processing with DP...
 
HPC Network Stack on ARM
HPC Network Stack on ARMHPC Network Stack on ARM
HPC Network Stack on ARM
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
eProsima RPC over DDS - Connext Conf London October 2015
eProsima RPC over DDS - Connext Conf London October 2015 eProsima RPC over DDS - Connext Conf London October 2015
eProsima RPC over DDS - Connext Conf London October 2015
 
LF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK17_Accelerating Packet Processing with FPGA NICsLF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK17_Accelerating Packet Processing with FPGA NICs
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
 
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
 
Summit 16: The Hitchhiker/Hacker's Guide to NFV Benchmarking
Summit 16: The Hitchhiker/Hacker's Guide to NFV BenchmarkingSummit 16: The Hitchhiker/Hacker's Guide to NFV Benchmarking
Summit 16: The Hitchhiker/Hacker's Guide to NFV Benchmarking
 
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
 
LF_DPDK_DPDK as microservices in ZTE Paas
LF_DPDK_DPDK as microservices in  ZTE PaasLF_DPDK_DPDK as microservices in  ZTE Paas
LF_DPDK_DPDK as microservices in ZTE Paas
 
LF_DPDK17_Integrating and using DPDK with Open vSwitch
LF_DPDK17_Integrating and using DPDK with Open vSwitchLF_DPDK17_Integrating and using DPDK with Open vSwitch
LF_DPDK17_Integrating and using DPDK with Open vSwitch
 
State of ARM-based HPC
State of ARM-based HPCState of ARM-based HPC
State of ARM-based HPC
 
BKK16-100K2 ARM Research - Sensors to Supercomputers
BKK16-100K2 ARM Research - Sensors to SupercomputersBKK16-100K2 ARM Research - Sensors to Supercomputers
BKK16-100K2 ARM Research - Sensors to Supercomputers
 
DDS over Low Bandwidth Data Links - Connext Conf London October 2014
DDS over Low Bandwidth Data Links - Connext Conf London October 2014DDS over Low Bandwidth Data Links - Connext Conf London October 2014
DDS over Low Bandwidth Data Links - Connext Conf London October 2014
 
Dpdk Validation - Liu, Yong
Dpdk Validation - Liu, YongDpdk Validation - Liu, Yong
Dpdk Validation - Liu, Yong
 

Andere mochten auch

Rio Info 2015 - Salão da Inovação - Paraíba - Luiz Maurício Fraga martins
Rio Info 2015 - Salão da Inovação - Paraíba - Luiz Maurício Fraga martinsRio Info 2015 - Salão da Inovação - Paraíba - Luiz Maurício Fraga martins
Rio Info 2015 - Salão da Inovação - Paraíba - Luiz Maurício Fraga martinsRio Info
 
Literacy practices in the classroom
Literacy practices in  the classroomLiteracy practices in  the classroom
Literacy practices in the classroomEsmeralda Sisa Nobsa
 
Dallas Erwin CV- 2015
Dallas Erwin CV- 2015Dallas Erwin CV- 2015
Dallas Erwin CV- 2015Dallas Erwin
 
2008-06-25 Marist System z Summer Professors Series
2008-06-25 Marist System z Summer Professors Series2008-06-25 Marist System z Summer Professors Series
2008-06-25 Marist System z Summer Professors SeriesShawn Wells
 
Continuous Delivery for Mobile platforms (iOS and a bit of Android)
Continuous Delivery for Mobile platforms (iOS and a bit of Android)Continuous Delivery for Mobile platforms (iOS and a bit of Android)
Continuous Delivery for Mobile platforms (iOS and a bit of Android)Rami Rantala
 
My app is secure... I think
My app is secure... I thinkMy app is secure... I think
My app is secure... I thinkWim Godden
 
WordPressCafe - Deploying WordPress using Kontena
WordPressCafe - Deploying WordPress using KontenaWordPressCafe - Deploying WordPress using Kontena
WordPressCafe - Deploying WordPress using KontenaKontena, Inc.
 
Production Issues
Production IssuesProduction Issues
Production Issuesmscuttle
 
Introduction to Ansible
Introduction to AnsibleIntroduction to Ansible
Introduction to AnsibleMichael Bahr
 
ContainerDays NYC 2016: "Securing Your Docker Image Registry for Production" ...
ContainerDays NYC 2016: "Securing Your Docker Image Registry for Production" ...ContainerDays NYC 2016: "Securing Your Docker Image Registry for Production" ...
ContainerDays NYC 2016: "Securing Your Docker Image Registry for Production" ...DynamicInfraDays
 
Patterns & Antipatterns in Docker Image Lifecycle
Patterns & Antipatterns in Docker Image LifecyclePatterns & Antipatterns in Docker Image Lifecycle
Patterns & Antipatterns in Docker Image Lifecycleyoavl
 
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...OCCIware
 
Deploying Containers with Rancher
Deploying Containers with RancherDeploying Containers with Rancher
Deploying Containers with RancherChris Tankersley
 
Building Ext JS Using HATEOAS - Jeff Stano
Building Ext JS Using HATEOAS - Jeff StanoBuilding Ext JS Using HATEOAS - Jeff Stano
Building Ext JS Using HATEOAS - Jeff StanoSencha
 

Andere mochten auch (19)

Git as NoSQL
Git as NoSQLGit as NoSQL
Git as NoSQL
 
CodeShip
CodeShipCodeShip
CodeShip
 
EMILIO CANESSA 3-2016
EMILIO CANESSA 3-2016EMILIO CANESSA 3-2016
EMILIO CANESSA 3-2016
 
Rio Info 2015 - Salão da Inovação - Paraíba - Luiz Maurício Fraga martins
Rio Info 2015 - Salão da Inovação - Paraíba - Luiz Maurício Fraga martinsRio Info 2015 - Salão da Inovação - Paraíba - Luiz Maurício Fraga martins
Rio Info 2015 - Salão da Inovação - Paraíba - Luiz Maurício Fraga martins
 
Literacy practices in the classroom
Literacy practices in  the classroomLiteracy practices in  the classroom
Literacy practices in the classroom
 
Dallas Erwin CV- 2015
Dallas Erwin CV- 2015Dallas Erwin CV- 2015
Dallas Erwin CV- 2015
 
2008-06-25 Marist System z Summer Professors Series
2008-06-25 Marist System z Summer Professors Series2008-06-25 Marist System z Summer Professors Series
2008-06-25 Marist System z Summer Professors Series
 
Continuous Delivery for Mobile platforms (iOS and a bit of Android)
Continuous Delivery for Mobile platforms (iOS and a bit of Android)Continuous Delivery for Mobile platforms (iOS and a bit of Android)
Continuous Delivery for Mobile platforms (iOS and a bit of Android)
 
My app is secure... I think
My app is secure... I thinkMy app is secure... I think
My app is secure... I think
 
WordPressCafe - Deploying WordPress using Kontena
WordPressCafe - Deploying WordPress using KontenaWordPressCafe - Deploying WordPress using Kontena
WordPressCafe - Deploying WordPress using Kontena
 
Production Issues
Production IssuesProduction Issues
Production Issues
 
Introduction to Ansible
Introduction to AnsibleIntroduction to Ansible
Introduction to Ansible
 
ContainerDays NYC 2016: "Securing Your Docker Image Registry for Production" ...
ContainerDays NYC 2016: "Securing Your Docker Image Registry for Production" ...ContainerDays NYC 2016: "Securing Your Docker Image Registry for Production" ...
ContainerDays NYC 2016: "Securing Your Docker Image Registry for Production" ...
 
Patterns & Antipatterns in Docker Image Lifecycle
Patterns & Antipatterns in Docker Image LifecyclePatterns & Antipatterns in Docker Image Lifecycle
Patterns & Antipatterns in Docker Image Lifecycle
 
Registered Nurse
Registered NurseRegistered Nurse
Registered Nurse
 
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
 
Deploying Containers with Rancher
Deploying Containers with RancherDeploying Containers with Rancher
Deploying Containers with Rancher
 
Building Ext JS Using HATEOAS - Jeff Stano
Building Ext JS Using HATEOAS - Jeff StanoBuilding Ext JS Using HATEOAS - Jeff Stano
Building Ext JS Using HATEOAS - Jeff Stano
 
Unit 2a Budgets
Unit 2a BudgetsUnit 2a Budgets
Unit 2a Budgets
 

Ähnlich wie 2008-01-23 Red Hat Overview to CUNY Information Managers Forum

2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security SeminarShawn Wells
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edgeJohn Archer
 
2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source DayShawn Wells
 
Pacemaker+DRBD
Pacemaker+DRBDPacemaker+DRBD
Pacemaker+DRBDDan Frincu
 
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreAdvanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreinside-BigData.com
 
Leveraging IoT as part of your digital transformation
Leveraging IoT as part of your digital transformationLeveraging IoT as part of your digital transformation
Leveraging IoT as part of your digital transformationJohn Archer
 
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...Mullaiselvan Mohan
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robotsJaime Martin Losa
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Peter Gervais
 
Red Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftRed Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftKangaroot
 
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...HostedbyConfluent
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_AppajiAppaji K
 
2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users GroupShawn Wells
 
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersDeploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersRadisys Corporation
 
The Why and How of HPC-Cloud Hybrids with OpenStack - Lev Lafayette, Universi...
The Why and How of HPC-Cloud Hybrids with OpenStack - Lev Lafayette, Universi...The Why and How of HPC-Cloud Hybrids with OpenStack - Lev Lafayette, Universi...
The Why and How of HPC-Cloud Hybrids with OpenStack - Lev Lafayette, Universi...OpenStack
 
Fiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPSFiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPSJaime Martin Losa
 

Ähnlich wie 2008-01-23 Red Hat Overview to CUNY Information Managers Forum (20)

2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edge
 
2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day
 
Pacemaker+DRBD
Pacemaker+DRBDPacemaker+DRBD
Pacemaker+DRBD
 
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreAdvanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
 
Leveraging IoT as part of your digital transformation
Leveraging IoT as part of your digital transformationLeveraging IoT as part of your digital transformation
Leveraging IoT as part of your digital transformation
 
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robots
 
Review of QNX
Review of QNXReview of QNX
Review of QNX
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015
 
Red Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftRed Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShift
 
NkSIP: The Erlang SIP application server
NkSIP: The Erlang SIP application serverNkSIP: The Erlang SIP application server
NkSIP: The Erlang SIP application server
 
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
Kubernetes Connectivity to Cloud Native Kafka | Christina Lin and Evan Shorti...
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Resume
ResumeResume
Resume
 
2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group
 
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersDeploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
 
The Why and How of HPC-Cloud Hybrids with OpenStack - Lev Lafayette, Universi...
The Why and How of HPC-Cloud Hybrids with OpenStack - Lev Lafayette, Universi...The Why and How of HPC-Cloud Hybrids with OpenStack - Lev Lafayette, Universi...
The Why and How of HPC-Cloud Hybrids with OpenStack - Lev Lafayette, Universi...
 
Fiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPSFiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPS
 
Fast RTPS
Fast RTPSFast RTPS
Fast RTPS
 

Mehr von Shawn Wells

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO PlatformsShawn Wells
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...Shawn Wells
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02Shawn Wells
 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...Shawn Wells
 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop CoursebookShawn Wells
 
2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security AutomationShawn Wells
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...Shawn Wells
 
2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security UpdateShawn Wells
 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross DomainShawn Wells
 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the DarkShawn Wells
 
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made EasyShawn Wells
 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to CollaboratorShawn Wells
 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarksShawn Wells
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackersShawn Wells
 
2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scapShawn Wells
 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbookShawn Wells
 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT ManufacturingShawn Wells
 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcementShawn Wells
 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014Shawn Wells
 

Mehr von Shawn Wells (20)

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift ...
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook
 
2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation2016-08-29 AFITC Security Automation
2016-08-29 AFITC Security Automation
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update
 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark
 
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap
 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook
 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing
 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement
 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
 

Kürzlich hochgeladen

Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 

Kürzlich hochgeladen (20)

Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 

2008-01-23 Red Hat Overview to CUNY Information Managers Forum

  • 1. CUNY Information Managers Forum Red Hat, Inc
  • 2. 2 Introductions  Shawn Wells <swells@redhat.com> Federal Solutions Architect  Mark St. Laurent <mstlaure@redhat.com> Federal Solutions Architect / Security SME / Forensics Expert  Michael Brown <mbrown@redhat.com> Federal Solutions Architect / Identity Management SME
  • 3. 3 Agenda Mike Certificate Management15:30 – 16:00 MikeEnterprise Directory Server14:30 - 15:30 MarkSecuring the Infrastructure, Continud (Incident Response)12:45 - 14:30 Red HatLunch & Learn – (SELinux Live Lab: Designing your own Policies) (OPTIONAL)12:00 - 12:45 Dave, RichardRHEL & SELinux11:00 - 12:00 ShawnRHEL5 Overview10:00 - 11:00 AllMeet and Greet - Breakfast9:30 – 10:00 SpeakerTopicTime
  • 4. 4  Headquarters: Raleigh, NC  Founded 1993  Public 1999 (NYSE: RHT)  Operating in 27 countries  Over 2200 Employees worldwide  Over 50% are engineers  80% Government/Commercial Linux Market Share  40+% Year over Year Growth (For 23 straight quarters) Red Hat, Inc
  • 7. 7 Open Source as a Security Innovation 1. More eyes on the code, therefore less security bugs 2. Red Hat’s rapid response to any vulnerabilities Time from a critical issue being known to the public until the day that a fix is available via RHN Red Hat Enterprise Linux 4, Feb 2005-Feb 2006
  • 8. 8
  • 9. 9
  • 11. Red Hat Technology Update - Virtualization - Security/MLS/Common Criteria
  • 12. 12 The Xen Hypervisor ● Flexible IT Services ● Disaster Tolerance ● Life Cycle Management ● Live Migration
  • 14. 14 Introduction to libvirt API  Hypervisor agnostic  Stable API for tool/app development  CIM providers; Python, C bindings, scriptable  Allows authenticated/encrypted sessions to remote hypervisors  Current support for  Xen Hypervisor  KVM Hypervisor  QEMU Hypervisor
  • 15. 15 Red Hat Security Certifications ● NIAP/Common Criteria: The most evaluated operating system platform ● Red Hat Enterprise Linux 2.1 – EAL 2 (Completed: February 2004) ● Red Hat Enterprise Linux 3 EAL 3+/CAPP (Completed: August 2004) ● Red Hat Enterprise Linux 4 EAL 4+/CAPP (Completed: February 2006) ● Red Hat Enterprise Linux 5 EAL4+/CAPP/LSPP/RBAC (Completed: June 2007) ● DII-COE ● Red Hat Enterprise Linux 3 (Self-Certification Completed: October 2004) ● Red Hat Enterprise Linux: First Linux platform certified by DISA ● DCID 6/3 ● Currently PL3/PL4: ask about kickstarts. ● Often a component in PL5 systems ● DISA SRRs / STIGs ● Ask about kickstarts. ● FIPS 140-2 ● Red Hat / NSS Cryptography Libraries certified Level 2
  • 16. 16 RHEL5 SELinux Enhancements  ExecShield This enhancement can prevent any memory that was writable from becoming executable. This prevents an attacker from writing his code into memory and then executing it  Stack Smashing protection (Canary values) The system will place a canary value at a randomized point above the stack. This canary value is verified during normal operation. If the stack has been smashed, the canary value will have been overwritten, indicating that the stack has been smashed. This is a method to detect buffer overflows early.  FORTIFY_SOURCE GCC option When the compiler knows the size of a buffer, functions operate on the buffer to make sure it will not overflow at runtime. This works to help catch format string flaws as well as buffer overflows.
  • 17. 17 LVM Host-Based Synchronous Mirroring  Each write is simultaneously written to 2 or more local or SAN disks (RAID1)  LVM automatically detects failure, uses the identical, mirrored disks or LUN  Upon restoration, recovery process begins in background  If minor outage, transaction log rapidly replays missed I/O
  • 18. 18 Device Mapper Multipath IO (MPIO)  Connects & manages multiple paths through SAN to storage array  Upon component failure, MPIO redirects traffic via redundant pathing  Active/Active array support  Bundled into RHEL
  • 19. 19
  • 20. 20 MRG Realtime  Determinism Ability to schedule high priority tasks predictably and consistently  Priority Ensure that highest priority applications are not blocked by low priority  Quality Of Service (QoS) Trustworthy, consistent response times  Proven results  Average of 38% improvement over stock RHEL5  Timer event precision enhanced to µs level, rather than ms
  • 21. 21 MRG: Messaging  Provides messaging that is up to 100-fold faster than before  Spans fast messaging, reliable messaging, large-file messaging  Implements AMQP, the industry's first open messaging standard, for unprecedented interoperability that is cross-language, cross-platform, multi- vendor, spans hardware and software, and extends down to the wire level  Uses Linux-specific optimizations to achieve optimal performance on Red Hat Enterprise Linux and MRG Realtime  Takes advantage of RHEL clustering, IO, kernel, and more  Includes new high-performance AIO Journal for durable messaging  Provides native infiniband support for transient messaging
  • 22. 22 About AMQP  AMQP is an open specification for messaging  It is a complete specification  Anyone may use the AMQP specification to create useful implementations without being charged for the IP rights to do so  AMQP aims to be technology and language-neutral  Available in C, C++, Java, JMS, .NET, C#, Ruby, Python, etc.  Requires IP, and can be used with TCP, UDP, SCTP, Infiniband, etc.  Products complying with AMQP are inter-operable  AMQP is a Wire-Level protocol based on the ubiquitous IP  Wire-level compatibility means it can be embedded in the network  Applications written to Product X will plug into servers running Product Y  Red Hat is a founding member of the AMQP Working Group
  • 23. 23 MRG: Realtime  Enables applications and transactions to run predictably, with guaranteed response times  Provides microsecond accuracy  Provides competitive advantage & meets SLA's  Travel web site: missed booking  Program trading: missed trades  Command & Control: life & death  Provides replacement kernel for RHEL 5.1+; x86/x86_64  Preserves RHEL Application Compatibility
  • 24. Red Hat Confidential Detail zoom-in of RHEL5 vs MRG Realtime
  • 25. 25 MRG: Realtime Tools  MRG includes a new MRG Realtime Latency Tracer  Runtime trace capture of longest latency codepaths – both kernel and application. Peak detector  Selectable triggers for threshold tracing  Detailed kernel profiles based on latency triggers  Existing standard RHEL5 based performance monitoring tools remain relevant  Gdb, OProfile Frysk – source level debuggers & profiler  SystemTap, kprobe – kernel event tracing and dynamic data collection  kexec/kdump standard kernel dump/save core capabilities
  • 26. 26 Red Hat Enterprise MRG Availability  MRG Announcement & Beta Launch: December 2007  Public beta  MRG v1.0: Early 2008  RHEL-only support for MRG Messaging broker  MRG Grid Technology Preview  MRG v1.1: Late 2008  Multi-platform support for MRG Messaging Java-based broker  AMQP support updated to newly available AMQP version (1.0)  MRG Grid support available http://www.redhat.com/mrg/
  • 27. 27 MRG: Grid based off Condor  MRG Grid is based on the Condor Project created and hosted by the University of Wisconsin, Madison  Red Hat and the University of Wisconsin have signed a strategic partnership around Condor:  University of Wisconsin makes Condor source code available under OSI- approved open source license  Red Hat & University of Wisconsin jointly fund and staff Condor development on-campus at the University of Wisconsin  Red Hat and the University of Wisconsin's partnership will:  Add enhanced enterprise features, management, and supportability to Condor and MRG Grid  Add High Throughput Computing capabilities to Linux
  • 29. 29 Worker Thread Config Example: ServerLimit 2 StartServers 2 ThreadsPerChild 3 MinSpareThreads 2 MaxSpareThreads 4 MaxClients 6 - Large number of requests - Less system resources
  • 30. 30 Prefork Threading - Need to avoid threading (legacy) - Problem with request will not effect others
  • 31. 31 suEXEC  Problem When running virtual hosts all files executed as same user  Vulnerability Malicious user may inject code into Apache to see other files on the system  Solution Utilize suEXEC, allowing virtual hosts to be ran as alternate users
  • 32. 32 Using suEXEC  SuexecUserGroup Sets executing process to run as alternate user <VirtualHost www.example.com> DocumentRoot /var/www/example.com ServerName www.example.com ...... SuexecUserGroup {web_user} {web_group} ...... </VirtualHost>
  • 34. 34 mod_ssl  Supports SSLv2, SSLv3, TLSv1  Supports RSA ciphers  128-bit strong encryption, world wide Client ServerProtocol Negotiation Server Sends Certificate Verification Session Key Gen Encrypts Session Key Sends Encrypted KeyEncrypts Session Key Decrypts Session Key Secure Comm Encrypted Traffic Secure Comm