Merken

Jetpack, a container runtime for FreeBSD (part 2 of 2)

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
open specification and it's important to know that struck at implemented specification 1st 1st they were documentation and then the riot skin are called then there was supporting code and only then the implemented in rock and this but it's actually no trial it's not to specific it's not and it's what clear the
base part to the 1st part is set up container image which is specified just to be a terrible that contains an adjacent manifest and stuff uniquely at the end of the there files and it is identified by a just simple checks so as
simple manifest looks like that and here we have the name will be hopefully running the initial built from this that causes manifested it has the name it has labels aggression numbers operating system and architecture are you can use this trick to discover the image which was in a moment it too has an obligation under trance it's executes 0 this server as this value the group is that these mount points which should be fulfilled when the application is started publishing this uh at this point it's got a timestamp independences dependences how their inheritance is implemented in the spec this energy depends on for is the base which means that it's so the 1st will be unpacked on top of the food for me is the basis for the the next part is
the discovery which is the means to get from a CI name and labels to the URL to download the emission downloaded speech of the signature and what to discover public to so for example if you want to discover the previous the based image with these labels what do we do 1st which I simple
discovery we just try to resolve this as a base URL so we just the other version of as an architecture labels wooden ACI and the end for the image case see I asked for the signature and there is no work it would be pointless to discover a public key this way because it would publish the same was well as the so for that in the oral would look like that and it is a for all 4 of this doesn't exist so if if it
fails then the mood and there is a middle discovery process so we go to just name but others you parameter on top of that look for certain HTML meta tags which should redirect you will to the will murals and if that fails strip the last component of the name try again go up and up and up In the here hierarchy and can either get the meta tags or you're out of components so for the usual looking for we start from trying to do look at this URL is for all forests so we go here we get these meta tasks the ASA discovery task this specifies that book for fear of friends but that prefix we have this URL templated to download the Aeneid and its signature and you have this URL that holds the public key so in the end we have these 3 or else after rendering dissolved place the
runtime is supported at but it's a list of applications and airport camera on more than 1 application more than 1 image and it will be they will be launched in a shot execution they will share PID namespace they will assure network IPC and a host name but it application which optimal has its own separate files so it is a C troops inside the jet and that the more precise isolation dependencies can be also specified in the image manifests on the bottom manifest surprises so the pub manifest will be running for the demo looks like this it's got to obligations 1 its radius and we've just seen the image manifest for forward this image the 2nd 1 is the keyboard it is a monitoring the on-board software that I just to store on because it's pretty and there's 1 volume that to we show from the host which is the data directory for the board are the definitions of polyps but this is not the complete information it doesn't precisely identify their image and they're not all the moms Our fulfilled so to board is fulfilled this amount has a volume but to they cut the the so that their implementation has to it's called the right if I which is
his which materialize I think about money 1st which means it has to resolve the name and a precise idea to be sure that if it has to recreate the container it will realize the exactly the same image same for the other image here and it adds that missing rate is they can evolve which isn't it also assigned an IP address for the for and the
last part of the system executes or which is it's basically the entire it's from the inspectors perspective it is responsible for assigning the ideas for rendering setting up volumes and so on and so on and starting the the application process from the up perspective it is just possible that that OP is Ecuador's responsible that the OCR and see the proper environment variables was UID GID and so on and so on and inside the portal we have an optimal because something or metadata service so there is this an environment variable exposed that leads to the that make service so an application currency annotations from its manifest see it's full manifest a new idea and its considered in need should manifest in the majority all of the current this is the this way you can use annotations in the manifest to parameterize the behavior of the content it also provides the metadata service also provides way to cryptographically signed and verify signatures of any data so what what can ask the metadata service to sign some piece of data and then another Potkonjak with the metadata service that the other port was that UID actually centers or the upcoming Oscar Metadata Service to send its own data to pass it to the user it in that from the user and if that's really my religion
just by itself is they're not production-ready incomplete prototype implementation of the top suspect for previously sits
within and go and users jails it uses the affairs as much as for this data and relations allows it come around and I cannot unfortunately demoted because list update of current made if I make and I didn't update again and that's beyond my capabilities present about but I had a adjoining should around 32 bit notes images on a stable on and point 1 and the current with very sad and to changes that in on money on my workstation also introduced 64 bit Linux emulation which means that we can use rocket images for 64 and we're gonna use those who can't convert with rockets torture and become convert docker images lazy eyes and also run them just as much as the simulation and as surrogates breaks the darkroom monocultural Linux just park hopefully will break loose from the culture and the work and this Monday difficult efforts of mostly so we use a z of
source for snapshots of is based on clones I actually I'm running out of time about that had not been OK great OK so will fit the demo I think each images through the 1st is held by the runtime z of a snapshot and the depended images are cloned from parent and then the data that and ops applications Rutherford this is also a clone from the apparent so provisioning is as quick as the 1st column and anytime people use also the office dataset which means that the the empty volume that means that is a way to tell the runtime that I don't have a character on these discrete and you thereafter for this book and if a data set we can it we can be happy conclude and in the long run we want to be able to say just not sure this application with all its volumes and making a copy or making a copy with a new version of the image there
that itself uses just for isolation and see truth inside for the extra 1st in isolation icons and also considering using nested jails for upper-level isolated toss about this a long shots and the volumes are and not has mounted from the host or from the a trouble inherited from actual if the dataset into the applications sort of image building terms I was afraid of implementing that but it turned out to be really simple process because it's just creating appalled from the apparent image copying build deer and in the long run I will make the build the good during volume right now it's a copy it's runs that build command inside the builder inside the bolt and the builder can I there including you manifest or candlelit inside the bald will see why in a moment and just after the descriptors is done whose portrait of us as a new image which means that it is does not include any new syntax any new jet pack file to build it you can just provide any kind of because you're shift person who go on shift so you cannot make and our sample makes not cross to make it easier you can shell and this is how process the notes spots you can't basically use any tool that you want as long as it a common so an
example build script exible Make file tool be than debauched image which will be running as more it is just the 1st this is making that was specified current image we specify packages so we would installed and that are dissolved in with ordered and after the packages are installed the Butte project make that is copied into the board in this final judge intimately file is copied as well so the abuse part inside the port is executed from the same make so you can have in a single file the preparation outside on the hose and abuse process inside so be it just prepares and by the virtual and physical some files ransom siblings and generate the money and the generation of the manifest is so that the execute inside jail does is it just inside the beautiful because if you can see we don't specify the version we ask then to bot we just installed for the version and we use that here in the manifest we don't need to specify the version Makefile just installed the new West and 95th generated will have proper versions and here we can see from the same in each of the settings of by file which is example of using the metadata survey is because we are getting there but in the URL from environment we just give the IP address connotation which we have just seen that is under the dual of creation and use this as a host foreign this was so
there's still a lot to do this custom isolate terrorists there's so proper network management and I forgot to write is the image support would be greatest while and cops equal more would be a great addition you idealize the mass and the cold needs refactoring which is probably what I will focus on after conference the result of boring stuff to do recommendations acceptance tests and if somebody has an idea how to test something this complex I'd be happy to hear at my best idea right now is to use a cucumber but because of the use delta from before about maybe there's something better the native or the Apple support because right now only 1 application can be stopped at the at the time so we need we will need to open multiple terminals prepare lobbying of the terms with that From this moral as a laundry list for 0 1 0 and for 1st actually number 2 so it's in pretty early stage but it works and we're going to see and and so we have some extra time the 1st
thing is that we will I will create appalled I have that images I have
already built the demo images board and prejudice life here and to avoid that wasn't time for downloading the park controls so I will just start the vote to the part save IDA that will use the term plate and not the URI fired 1 of them to park random well for a fact don't look too
much at the format of the output will be rewarded will be pretty here but you can see that it inserts and the volume for data directory created a
new poll descended UID so we have the new
board with 2 outs so will start the cops right now through
this we don't have any process management we just seem to rounding up separately on the terminal so 1st we under the In this 2nd
terminal the had to board up to and um to just sit in data to fit to board
data will will run the client we can see here the 2 the client is receiving data you don't
mind my on the IP of the BOLD we can see
the wall and we surely
be single bit text on the left hand bundles I will just a standard client is about this is that this is the
roller focus which it
showed consider pretty monitor a bundled up strands from the containerized see images from the compa-nies from from the boss or it's shut that
down pretty now destroyed
the fault clean up after ourselves and I have no idea maybe somebody knows why the people that did any network input output linger so long and I think it can be a minute if somebody knows that catch me after that of place and be happy to know that the 2nd piece of the model of lecture to show this I prepared and published an indeed besides the besides the Free BSD based image I prepared the image with basically it's the basis that tools became binary plos parts dialog that can be used by mounting some volumes to test building of parts all immigrants system so we just create appalled we save it ID for later wrote weight parameter it's already granted to immediately we mount points these files and the parts the amount that's apparently because the parts volume is read only to avoid writing any to the whole system and I can just to show that these files for I if I skip it to just pop will create an empty volume and will and portable government decides on its on and I here is therefore shares the image name and annotation to object affordances MRC's lashing that and the image right now is not here we don't have any
measurement and Jefferson for builder and we don't have any trust that Japan is a GP tickets so let's the that we need to use the right it
just but will 1st go the discovery and the font is too big but you can see it and it will form scroll but you can see that it uses you are as just like the ones In the discovery part of the presentation it would no doubt it doubles the image it did download the signature this way it until it completes it to note is that it doesn't have any it doesn't have the public key and it's attempting the discovery downloads and asked me if I want to trust it yes I know that
I Generative myself the image
is important hide inside the metadata service of this but that followed this
already could create it is a it does have portable there so if I just
grounded ball this will automatically start the up again and it will start to make again so it's also useful if make fails I considers started in the same but we don't want to be the
docks and as Don I can
run the console we just build a
portal on on clean system again once were done let's school not that would be it and the
questions remarks this can be viewed at the end of the this means that to say that the you you set 8 years I have showed to be approved by the user it does not install circular D. right now and it won't be situated the it's up to you to properly administrator to configure so the worst file and right now i've got I started because I have entry and so the learners and the proper strips and this is the all theory yes so right after after the talk I will upload them to a speaker DAG I will tweet data and hopefully the conference account also with with that these theories so so what's what's the specification doses specifies that the that there is a priest ARToolKit neutrons always us what inside the container and post stall and which can be used to for example generate configuration has ruled while the main applications of some provisions but there are no around then signals there's no way tool for example or on an maybe job but uh when I say when I want something to happen and the specification does not to subpart any extra signals not probably there is any need it's can be discussed only up suspect it top is how keep that I can cover to Doka images toward the ACI images there are tools for them that they come running cut and this so as so little simulation will stop panicking with the judge Park and the 64 bit emulation is stable because right now the 64 bit instances coalition is only on the current only future because we have about event as to the extent implemented by 4 because the light or it will be possible to run into ice yet many of you are 1 of the 2 of them it was the 1st part of the the problem is that the this specification says that the main isolation across applications is that CH and gender are all moves general isolation things like central limit and so on that don't need to jail and on the notes in rocket is implemented there 2 the application surface has a root of the process and the which starts speech publication in the port were the 1st is a system the that starts it obligations on sutra wrote about without any for the isolation of yes and no right and this is not needed possibly tool implements all it will be needed to implement SOM extra isolated arose on the upper level but only if it's possible to stop the Jacobus to share the BIG namespace still assure natural devices so challenges and should be able to share networking with upper level jails but I'm not sure about the idea I didn't give it much fault and it's not truly required by special which will be done if it makes anything easier or possible KP OK so I think that's it thank you very much
Umwandlungsenthalpie
Offene Menge
Offene Menge
App <Programm>
Code
Computeranimation
Elektronische Publikation
Punkt
Momentenproblem
Gruppenkeim
Varianz
Quellencodierung
Zahlenbereich
Kartesische Koordinaten
Physikalisches System
Menge
Computeranimation
Zeitstempel
Spezialrechner
Energiedichte
Wurzel <Mathematik>
Mereologie
Basisvektor
Elektronischer Fingerabdruck
Vererbungshierarchie
Server
Computerarchitektur
Zeitstempel
Versionsverwaltung
Bildgebendes Verfahren
Public-Key-Kryptosystem
Sprachsynthese
Elektronische Unterschrift
Atomarität <Informatik>
Computeranimation
Arithmetisches Mittel
Spezialrechner
Gewicht <Mathematik>
Elektronische Unterschrift
COM
Elektronischer Fingerabdruck
Computerarchitektur
Versionsverwaltung
Bildgebendes Verfahren
URL
Demo <Programm>
Prozess <Physik>
Gemeinsamer Speicher
Kartesische Koordinaten
Template
Computeranimation
Metropolitan area network
Spezialrechner
Komponente <Software>
Volumen
Prinzip der gleichmäßigen Beschränktheit
Schnelltaste
Namensraum
Prinzip der gleichmäßigen Beschränktheit
Datennetz
Schlüsselverwaltung
Elektronische Unterschrift
Atomarität <Informatik>
Brennen <Datenverarbeitung>
Meta-Tag
Vollkommene Information
Rechter Winkel
COM
Wurzel <Mathematik>
URL
Verzeichnisdienst
Versionsverwaltung
Public-Key-Kryptosystem
App <Programm>
Hierarchische Struktur
Implementierung
Content <Internet>
Whiteboard
Kontextbezogenes System
Spezifisches Volumen
Task
Open Source
Mailing-Liste
Hauptidealring
Gewicht <Mathematik>
Software
Datennetz
Zusammenhängender Graph
Spezifisches Volumen
Speicher <Informatik>
Bildgebendes Verfahren
Demo <Programm>
Meta-Tag
Wald <Graphentheorie>
Raum-Zeit
Rechenzeit
Mailing-Liste
Elektronische Publikation
Prozess <Physik>
Kartesische Koordinaten
Dienst <Informatik>
Netzadresse
Computeranimation
Metadaten
Open Source
Spezialrechner
Statechart
Variable
Elektronische Unterschrift
Perspektive
Adressraum
Datennetz
Endogene Variable
Volumen
Spezifisches Volumen
Inhalt <Mathematik>
Bildgebendes Verfahren
URL
Demo <Programm>
Perspektive
Kegelschnitt
Programmierumgebung
Physikalisches System
Bitrate
Elektronische Unterschrift
Variable
Brennen <Datenverarbeitung>
Inverser Limes
Sinusfunktion
Dienst <Informatik>
Mereologie
Eigentliche Abbildung
Programmierumgebung
Einfügungsdämpfung
Schreiben <Datenverarbeitung>
Bit
Prozess <Informatik>
App <Programm>
Relativitätstheorie
Mathematisierung
Speicher <Informatik>
Implementierung
Mailing-Liste
Computeranimation
Netzwerktopologie
Freeware
Bus <Informatik>
Arbeitsplatzcomputer
Simulation
Emulator
Emulator
Bildgebendes Verfahren
Implementierung
Prototyping
Demo <Programm>
Prozess <Physik>
Momentenproblem
App <Programm>
Versionsverwaltung
Gebäude <Mathematik>
Kartesische Koordinaten
Term
Computeranimation
Spezifisches Volumen
Spezialrechner
Stichprobenumfang
Klon <Mathematik>
Volumen
Vererbungshierarchie
Spezifisches Volumen
Bildgebendes Verfahren
Verschiebungsoperator
Rechenzeit
Vererbungshierarchie
Gebäude <Mathematik>
Rechenzeit
Speicher <Informatik>
Quellcode
Bildschirmsymbol
Elektronische Publikation
CAM
Quick-Sort
Office-Paket
Menge
Wurzel <Mathematik>
Klon <Mathematik>
Resultante
Stellenring
Prozess <Physik>
Versionsverwaltung
Datenmanagement
Kartesische Koordinaten
Computerunterstützte Übersetzung
Benutzerfreundlichkeit
Sondierung
Computeranimation
Metadaten
Spezialrechner
Netzwerkverwaltung
Softwaretest
Umkehrung <Mathematik>
Fahne <Mathematik>
Radikal <Mathematik>
Protokoll <Datenverarbeitungssystem>
Skript <Programm>
Gasdruck
Softwaretest
Addition
Installation <Informatik>
Gebäude <Mathematik>
Ruhmasse
Teilmenge
Generator <Informatik>
Funktion <Mathematik>
Menge
COM
Login
Projektive Ebene
URL
Programmierumgebung
Versionsverwaltung
Hash-Algorithmus
Taupunkt
Zahlenbereich
Gebäude <Mathematik>
Term
Whiteboard
Netzadresse
Gewicht <Mathematik>
Bildgebendes Verfahren
Demo <Programm>
URL
Binärdaten
Data Encryption Standard
Mailing-Liste
Elektronische Publikation
Menge
Whiteboard
Mereologie
Eigentliche Abbildung
Videospiel
Demo <Programm>
Abstimmung <Frequenz>
Dean-Zahl
Fächer <Mathematik>
Term
Whiteboard
Computeranimation
Whiteboard
Betragsfläche
Mehragentensystem
Mereologie
Elektronischer Fingerabdruck
Gravitationsgesetz
Versionsverwaltung
Personal Area Network
Bildgebendes Verfahren
Demo <Programm>
Server
Stellenring
Einfügungsdämpfung
Mereologie
Hash-Algorithmus
Gewichtete Summe
Whiteboard
Computeranimation
Spezifisches Volumen
TUNIS <Programm>
Spezialrechner
Open Source
Mailing-Liste
Gewicht <Mathematik>
Adressraum
Typentheorie
Bus <Informatik>
Volumen
Punkt
Spezifisches Volumen
Ereignishorizont
Funktion <Mathematik>
Demo <Programm>
Binärdaten
Dean-Zahl
Varianz
Netzwerkbetriebssystem
Graphiktablett
Programmierumgebung
Kreisbogen
Gruppenkeim
Elektronischer Fingerabdruck
Ruhmasse
Dateiformat
Verzeichnisdienst
Versionsverwaltung
Magnettrommelspeicher
Prozess <Physik>
Datenmanagement
Schlüsselverwaltung
Radikal <Mathematik>
Computerunterstützte Übersetzung
Graphiktablett
Radius
Whiteboard
Computeranimation
Chipkarte
Dean-Zahl
Mereologie
Schlüsselverwaltung
Verhandlungs-Informationssystem
Gewichtete Summe
Graphiktablett
Instantiierung
Menge
Computeranimation
Client
Gruppenkeim
Typentheorie
Elektronischer Fingerabdruck
Versionsverwaltung
Ereignishorizont
Demo <Programm>
Binärdaten
Offene Menge
Fehlermeldung
Bit
Dean-Zahl
Elektronische Publikation
Gewichtete Summe
Einfache Genauigkeit
Graphiktablett
Computeranimation
Client
Verzeichnisdienst
Gruppenkeim
Einheit <Mathematik>
Typentheorie
Mehragentensystem
Elektronischer Fingerabdruck
Punkt
Gasdruck
Versionsverwaltung
System-on-Chip
Ereignishorizont
Faserbündel
Demo <Programm>
Offene Menge
Server
Spielkonsole
Gewichtete Summe
Wrapper <Programmierung>
Computeranimation
W3C-Standard
Metropolitan area network
Message-Passing
Verzeichnisdienst
Socket
Ereignishorizont
Modallogik
Meta-Tag
Demo <Programm>
Binärdaten
Physikalischer Effekt
Fehlermeldung
Elektronische Publikation
Dean-Zahl
Schlüsselverwaltung
Prozess <Informatik>
Systemplattform
CAM
Instantiierung
Gerade
Schlussregel
Warteschlange
Spannweite <Stochastik>
Reihe
Einheit <Mathematik>
Parametersystem
Digitales Zertifikat
Programmbibliothek
Bitrate
Viewer
Offene Menge
Chipkarte
Server
Mereologie
Gewichtete Summe
Computerunterstützte Übersetzung
Computeranimation
TUNIS <Programm>
Verzeichnisdienst
Dedekind-Schnitt
Ereignishorizont
Binärdaten
Fehlermeldung
Elektronische Publikation
Dean-Zahl
Schlüsselverwaltung
Systemplattform
Graphiktablett
Zeiger <Informatik>
Instantiierung
Fokalpunkt
Gerade
Systemaufruf
Kreisbogen
Schlussregel
Warteschlange
Spannweite <Stochastik>
Loop
Parametersystem
Client
Verbandstheorie
Programmbibliothek
Viewer
Binärdaten
Server
Elektronische Publikation
Schlüsselverwaltung
Spielkonsole
Verhandlungs-Informationssystem
Graphiktablett
Zeiger <Informatik>
Gerade
Computeranimation
Gesetz <Physik>
Unendlichkeit
W3C-Standard
Message-Passing
Socket
Benutzerschnittstellenverwaltungssystem
Gerade Zahl
Programmbibliothek
Ereignishorizont
Bildgebendes Verfahren
Bitmap-Graphik
Mereologie
Punkt
Gewicht <Mathematik>
Freeware
Gemeinsamer Speicher
Taupunkt
Computerunterstützte Übersetzung
Binärcode
Computeranimation
Informationsmodellierung
Gewicht <Mathematik>
Mehragentensystem
Spezifisches Volumen
Bildgebendes Verfahren
Einflussgröße
Demo <Programm>
Funktion <Mathematik>
Softwaretest
Eindringerkennung
Parametersystem
Data Encryption Standard
Dean-Zahl
Schlüsselverwaltung
Datennetz
Gebäude <Mathematik>
Graphiktablett
Physikalisches System
Ein-Ausgabe
Elektronische Publikation
Menge
Objekt <Kategorie>
Fluid
COM
Rechter Winkel
Basisvektor
Mereologie
Elektronischer Fingerabdruck
Client
Versionsverwaltung
Public-Key-Kryptosystem
Mereologie
Algebraisches Modell
Computerunterstützte Übersetzung
Benutzerfreundlichkeit
Kombinatorische Gruppentheorie
Computeranimation
Eins
Font
Gewicht <Mathematik>
Betragsfläche
Code
Mehragentensystem
Bildgebendes Verfahren
Demo <Programm>
Dean-Zahl
Elektronische Publikation
Schlüsselverwaltung
Graphiktablett
Elektronische Unterschrift
Unabhängige Menge
Mereologie
Elektronischer Fingerabdruck
Versionsverwaltung
Arithmetisches Mittel
Stellenring
Mereologie
Taupunkt
Fächer <Mathematik>
Gewichtete Summe
PASS <Programm>
Wiederkehrender Zustand
Computerunterstützte Übersetzung
Dienst <Informatik>
Oval
Dialekt
Information
Obere Schranke
Computeranimation
Spezifisches Volumen
Spezialrechner
Metropolitan area network
Metadaten
Elektronische Unterschrift
Gewicht <Mathematik>
Klon <Mathematik>
Gravitationsgesetz
Bildgebendes Verfahren
Demo <Programm>
Binärdaten
Eindringerkennung
Koroutine
Elektronische Publikation
Dean-Zahl
Schlüsselverwaltung
Vererbungshierarchie
Varianz
Graphiktablett
CAM
Systemaufruf
Dienst <Informatik>
Gruppenkeim
Einheit <Mathematik>
Wurzel <Mathematik>
COM
Client
Elektronischer Fingerabdruck
Systemtechnik
Programmbibliothek
Personal Area Network
Webforum
Stellenring
Mereologie
Gewichtete Summe
PASS <Programm>
Computerunterstützte Übersetzung
Information
Extrempunkt
Computeranimation
Metropolitan area network
Freeware
Font
Softwaretest
Standardabweichung
Rechter Winkel
Code
Mehragentensystem
Computersicherheit
Ordnungsbegriff
Spielkonsole
Cliquenweite
Koroutine
Dean-Zahl
Installation <Informatik>
Volumenvisualisierung
Computervirus
Spannweite <Stochastik>
Emulation
Gruppenkeim
Funktion <Mathematik>
Wurzel <Mathematik>
COM
Login
ATM
Programmbibliothek
Versionsverwaltung
Kontrollstruktur
Taupunkt
Dienst <Informatik>
Patch <Software>
Dialekt
Spezifisches Volumen
Homepage
Physikalisches System
Mailing-Liste
Verzeichnisdienst
Gewicht <Mathematik>
CAD
FAQ
Binärdaten
Drucksondierung
Elektronische Publikation
Rechenzeit
Mathematisierung
Varianz
Graphiktablett
Menge
Gerade
Keller <Informatik>
Formale Sprache
Ruhmasse
Fibonacci-Folge
Zentralisator
Bit
Prozess <Physik>
Gemeinsamer Speicher
Computerunterstützte Übersetzung
Kartesische Koordinaten
Sprachsynthese
Physikalische Theorie
Computeranimation
Übergang
Magnettrommelspeicher
Prozess <Informatik>
Flächentheorie
Inverser Limes
Wurzel <Mathematik>
Maßerweiterung
Schnitt <Graphentheorie>
Konfigurationsraum
Bildgebendes Verfahren
Demo <Programm>
Umwandlungsenthalpie
Data Encryption Standard
Namensraum
Datennetz
Systemverwaltung
Graphiktablett
Physikalisches System
Elektronische Publikation
Ereignishorizont
Koalitionstheorie
Geschlecht <Mathematik>
Mereologie
Simulation
Emulator
Instantiierung

Metadaten

Formale Metadaten

Titel Jetpack, a container runtime for FreeBSD (part 2 of 2)
Untertitel Breaking the Linux/Docker Monoculture
Serientitel The Technical BSD Conference 2015
Autor Pasternacki, Maciej
Lizenz CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/18664
Herausgeber Berkeley System Distribution (BSD), Andrea Ross
Erscheinungsjahr 2015
Sprache Englisch

Technische Metadaten

Dauer 31:00

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Jetpack brings application containers, popularized by Docker on Linux, to FreeBSD Application containers are a new approach to virtualization, popularized in last two years by Docker - a Linux implementation that all but monopolized the market. Jetpack is an application container runtime for FreeBSD that implements the App Container Specification using jails and ZFS. I will speak about how the container paradigm is different from the existing jail management solutions, how Jetpack fits into the general landscape of container runtimes, and about Jetpack's inner workings and implementation challenges. A quick demo is not unlikely.

Ähnliche Filme

Loading...