logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Alona Paz, Kim Wuestkamp, Dinesh Majrekar, Ryan Hallisey, Peter Salanki
2023-04-20

Since joining the CNCF as a sandbox project in 2019, KubeVirt has steadily grown in size, features, and stability. But developing a project is different from how it is used. As we approach our milestone v1.0 release, we wanted to have an open discussion with our end users. In this panel discussion, we will hear from representatives for ARM, Civo, CoreWeave, Killercoda, and NVIDIA. This will be a free-flowing conversation but we expect attendees will learn about how these companies deploy KubeVirt, and any other CNCF projects, to cover their use cases and address their customers' needs, how they interact with and contribute back to the project, and how we can learn from and grow with each other.
Authors: Melanie Cebula
2022-10-27

tldr - powered by Generative AI

The presentation discusses the process of implementing multi-architectures in Airbnb's infrastructure to improve price and performance.
  • Focus on one or two workloads that have a business need for better price and performance
  • Form a small pilot group with subject matter experts
  • Upgrade and migrate operating system, languages, runtimes, and open source software
  • Automate the process of building, uploading, and signing packages
  • Invest in performance tooling and analysis
Authors: Robert Ficcaglia
2022-05-20

tldr - powered by Generative AI

The presentation discusses the challenges and considerations in implementing trusted computing in a Kubernetes environment.
  • Trusted computing is not a silver bullet and requires careful consideration of the attack surface and minimizing it
  • Enclaves have shortcomings and are susceptible to side channel attacks
  • Compliance with government standards such as NIST can be achieved with enclaves
  • Hardware components are susceptible to tampering and must be carefully evaluated
  • Kubernetes can use trusted computing at the container level, but the control plane should be constrained to minimize attack surface
Authors: Tom Golway, Thomas Phelan
2021-10-15

tldr - powered by Generative AI

Using Data Processing Units (DPUs) with Kubernetes to offload software infrastructure
  • Enterprises are shifting their business innovation strategies to embrace the concept of being digitally aware
  • Application architectures are shifting towards a more disaggregated model that offers greater agility, supports elasticity, and provides greater control for software quality assurance
  • DPUs can be used to offload core Kubernetes software infrastructure components from the main CPU onto the processing units
  • DPUs can also offload network packet tracing functionality and service mesh components
  • Cloud-native infrastructure is required to support the optimal placement of workload, ensure performance, security, manageability, and accessibility to data
  • DPUs can help enable greater optimization of cloud-native application architecture while ensuring the usage of CPU cores and memory is maximized to support applications