logo

Registries After Dark, Part 2: Distributed Random Access Merkledags

2022-05-19

Authors:   Jason Hall, Daniel Mangum


Summary

The presentation discusses the memory hierarchy and the use of container registries in DevOps.
  • The memory hierarchy is based on the principles of temporal and spatial locality.
  • The memory hierarchy consists of registers, cache, and RAM.
  • The presentation provides a demonstration of a simple program and its disassembled instructions.
  • Container registries have benefits but should be used judiciously.
  • There are some great applications for container registries.
  • The presentation invites discussion on RISC-V and container registries.
The speaker demonstrates a simple program and its disassembled instructions to illustrate the principles of the memory hierarchy. They also caution against overusing container registries and emphasize the importance of being judicious in their usage.

Abstract

Our friend the registry is back and is getting into more mischief than ever. After stretching the OCI image and distribution specifications to implement a registry that acts as a chat server, Dan and Jon have continued to exploit the generality of the spec to support more use cases. In this session, they’ll move beyond what actually happens when you “push” and “pull” or use tags as identifiers. Taking a step back and looking at the landscape of hosted registries offers a unique view of the capabilities of this network of systems we all rely on - capabilities exhibited by other systems we are familiar with: computers. Attendees will join Dan and Jon on a crash course through the history of computer architecture, making stops along the way at Turing machines, load-store architectures, and compiler design, before finding themselves faced with a new definition of DRAM: Distributed Random Access Merkledag.Click here to view captioning/translation in the MeetingPlay platform!

Materials: