Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Years
  • 1
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 15 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: What’s in store for infrastructure and operations in the future? Where’s the field headed? And what technologies will take us there? Join us for this recording of a live event covering some of the key changes you can expect to see in the world of infrastructure and operations. You’ll learn about the trends and new technologies that will shape how you deliver software and meet the needs of your business and customers in the coming years, with a focus on the emerging ideas and tools that you can make use of right now. Whether you’re looking for cutting-edge techniques for today or want to get ahead of the game for tomorrow, this is the event for you. What you’ll learn and how you can apply it Explore the technologies that will shape the future of infrastructure and operations Learn how to employ new technologies and stay ahead of the curve This recording of a live event is for you because… You’re a developer who wants to know what’s coming next for infrastructure and operations. You want to better understand new technologies such as data mesh and eBPF. You need to apply continuous delivery principles to make the end-to-end process of developing and deploying ML systems more repeatable and reliable. Recommended follow-up: Read Data Mesh (book) Read Container Security (book) Read Building Machine Learning Pipelines (book) Read Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, second edition (book) Read Linux Observability with BPF (book)
    Note: Online resource; Title from title screen (viewed November 17, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: First edition.
    Keywords: Go (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Docker's catchphrase for its containers is compelling: "Build, Ship and Run Any App, Anywhere." Go already has some of those attributes built in, including cross-compilation and the production of single executable files without dependencies. Are there any reasons, then, for Go programmers to use containers to deploy code? In this lesson, veteran developer Liz Rice outlines several advantages that containers can provide for Go programmers-such as how they help you restrict the resources that your code can access, and how you can use them to run and test your software locally with other components. You'll then look at some cases where containers wouldn't add any benefit at all. As always, it's important to use the right tool for the job, and containers can offer advantages for Go programmers in the right circumstances. This lesson provides some helpful guidelines.
    Note: Description based on online resource; title from title page (Safari, viewed February 7, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: 1st edition.
    Keywords: Computer software ; Development ; Go (Computer program language) ; Electronic data processing ; Electronic books ; Electronic books ; local
    Abstract: Are you a Go programmer looking to introduce Docker containers into your workflow? In this lesson, you'll learn how to set up a containerized development environment that rebuilds Go code automatically as you edit it. You'll learn how to use tools such as Realize, and how to generate a small and efficient container image for production distribution using Docker Multistage Builds.
    Note: Description based on online resource; title from title page (viewed January 29, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Go (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: This report shows how Go programmers can build small, efficient containers for their Go code. It explains what's inside a container image and walks you through how to build and run containers for your Go projects. What you'll learn-and how you can apply it You'll learn how to containerize the Go code you're working on, with worked examples to show you exactly what to do. You'll see how to build a container from the scratch image, and why that's a good idea for Go code. You'll also learn how to set up port bindings so that the outside work can connect to the code running in your container, and how to pass in configuration environment variables. This report is for you because... You've heard of containers, but you're not sure whether they're right for your project, or how you would use them in your daily workflow. Prerequisites We'll assume you're comfortable with the command line We're using Go in this lesson but many of the concepts are applicable to other languages as well Materials or downloads needed in advance Install Docker Install the Go tools
    Note: Description based on online resource; title from title page (Safari, viewed May 5, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 audio file (01 hr., 03 min.))
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Computer security ; Open source software ; Audiobooks ; Audiobooks
    Abstract: Join us for a special conversation on the extended Berkeley Packet Filter (eBPF) with Sam Newman and Isovalent chief open source officer Liz Rice. You'll learn how eBPF has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing, why the ability to dynamically change the kernel behavior is so useful (and why eBPF is such a game changer), and much more.
    Note: Online resource; title from title details screen (O'Reilly, viewed November 8, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: O'Reilly superstream series
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Computer security ; Open source software ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Join us for a special conversation on the extended Berkeley Packet Filter (eBPF) with Sam Newman and Isovalent chief open source officer Liz Rice. You'll learn how eBPF has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing, why the ability to dynamically change the kernel behavior is so useful (and why eBPF is such a game changer), and much more. Sam and Liz talk about eBPF, container security, infrastructure and ops, and their own career journeys. They'll also spend a few minutes covering the trends that are influencing infrastructure, then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it Explore the origins of and need for eBPF See what's coming next for infrastructure and ops This recording of a live event is for you because... You want to better understand how to implement eBPF at your organization. You're looking for ways to improve your software delivery time and team structure. Recommended follow-up: Read What Is eBPF? (report) Read Container Security (book) Read Security Observability with eBPF (report) Attend Infrastructure & Ops Superstream: Linux Fundamentals (live event on September 14).
    Note: Online resource; title from title details screen (O'Reilly, viewed August 23, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (52 pages) , color illustrations
    Edition: First edition.
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Computer Security ; Logiciels d'application ; Développement ; Automatisation ; Logiciels libres ; Sécurité informatique ; Electronic books
    Abstract: In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, ops engineers, and engineering team leads will learn what eBPF is and why it's so powerful. Rice, chief open source officer at Isovalent, shows you how to load and run custom eBPF programs within the kernel of your operating system, modifying the way the kernel behaves. You'll learn what's required to build eBPF-enabled tools, and why eBPF has become so prevalent in such a short period of time. With this report, you will: Learn why the ability to dynamically change the kernel behavior is so useful, and how eBPF is a game-changer when it comes to making kernel changes See what's involved in writing eBPF code with a programming example to understand how the process works Explore an overview of eBPF-enabled tools that you can use to instrument your cloud native applications.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Orig.schr. Ausgabe: 初版.
    Title: 入門 eBPF : : Linuxカーネルの可視化と機能拡張 /
    Publisher: 東京都新宿区 : オライリー・ジャパン
    ISBN: 9784814400560 , 481440056X
    Language: Japanese
    Pages: 1 online resource (228 pages)
    Edition: Shohan.
    Uniform Title: Learning eBPF
    DDC: 005.1
    Keywords: Linux ; Application software Development ; Automation ; Open source software ; Computer security ; Logiciels d'application ; Développement ; Automatisation ; Logiciels libres ; Sécurité informatique
    Abstract: What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves.
    Note: Includes bibliographical references , In Japanese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Electronic data processing ; Distributed processing ; Application software ; Development ; Open source software ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features-including when to use what-and shows you how to augment those features with container image best practices and secure network communication. Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely. Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection
    Note: Description based on online resource; title from title page (Safari, viewed January 17, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Language: English
    Pages: 1 online resource (1 streaming video file (36 min., 59 sec.)) , digital, sound, color
    Keywords: Go (Computer program language) ; Application software ; Development ; Electronic videos ; local
    Abstract: "Many people use container systems like Docker, but how do they work? What do people mean when they mention cgroups and namespaces, or when they describe a container as a 'lightweight virtual machine'? In this course designed for the intermediate level programmer (any language), you'll discover exactly what a container is by writing one with a surprisingly small amount of Go code. Along the way, you'll lose your fear of syscalls and learn that a container is really just a Linux process with its view of the world limited through namespaces, cgroups, and chroot."--Resource description page.
    Note: Title from title screen (viewed July 25, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...