logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Margaret Tucker, Justin Colannino
2022-06-22

This interactive session will discuss the important role of package registries in securing the open source software supply chain, as well as best practices and guiding principles for a secure package registry ecosystem. Maintainers have been managing risk in their ecosystems since the start and are the first line of defense for ecosystem code quality. But package registries also have a responsibility to protect developers depending on their package ecosystem and, ultimately, the end-users of the software. This responsibility to maintain safety and reliability must be balanced against the freedom and creativity of package maintainers whose skill, innovation, and gumption allow others to accomplish great things.
Authors: Richard Case, Anusha Hegde
2022-05-19

tldr - powered by Generative AI

The presentation discusses how to build your own Cluster API Provider and highlights common patterns, development and debugging workflows, and common pitfalls to take into account when writing your own provider.
  • Cluster API Providers make the experience of provisioning clusters consistent
  • Providers handle the infrastructure or environment-specific operations
  • Cluster API has higher order functionality like automatic scaling and upgrades
  • Building a Cluster API Provider is similar to building a Kubernetes operator
  • Tilt is a useful tool for testing and debugging locally
Authors: Rui Zang, Cathy Zhang
2022-05-18

tldr - powered by Generative AI

The presentation discusses an enhanced snapshot-based approach to address the challenges of creating new function instances and supporting fast auto-scaling in response to burst traffic. The approach involves breaking the original function code image into essential and non-essential code blocks, regenerating a new set of unique data associated with a specific micro VM instance, and adjusting existing running micro VMs resource boundary to create more function containers.
  • The enhanced snapshot-based approach addresses the challenges of creating new function instances and supporting fast auto-scaling in response to burst traffic.
  • The approach involves breaking the original function code image into essential and non-essential code blocks.
  • A small program is developed to regenerate a new set of unique data associated with a specific micro VM instance.
  • Existing running micro VMs resource boundary is adjusted to create more function containers.
  • The approach reduces code start latency and saves time.
  • The snapshot file needs to be downloaded before starting the container.
  • The essential code blocks are smaller and only a small portion of the data are actually used during the function test run.
  • The snapshot file and essential code blocks combined are much smaller than the original image size.
  • This results in a shorter downloading time and a shorter code start time.