AUUG2005—The Conference for UNIX, Linux and Open Source Professionals
Carlton Crest Hotel, Sydney
Conference 19-21 October
Tutorials 16-18 October
On this page:
Morning tutorials run from 9:00am to 12:30pm with a break from 10:30am to 11:00am. Afternoon tutorials run from 1:30pm to 5:00pm with a break from 3:00pm to 3:30pm. Full day tutorials take in both sessions.
Lunch will be provided to delegates who attend a full day tutorial or two half day tutorials on the same day.
To register for tutorials, please fill out a Conference Registration Form.
Click here to return to the AUUG2005 conference home page.
Tutorial Timetable
Sunday, 16 October 2005
S1 - Full Day Debugging Kernel Problems Greg Lehey |
||
S2 - Afternoon Introduction to Network Simulator 2 (ns2) Joel Sing |
S3 - Afternoon Installing GNU HURD from scratch, and creating a strict GPL development environment Andrew Chalmers |
Monday, 17 October 2005
M1 - Full Day Security Technology Review Peter Gutmann |
M2 - Morning Secure High Availability Open Source Systems and Solutions Mark Uemura |
M3 - Morning An Introduction To SQLite Dan Kennedy |
M4 - Morning PHP and MySQL Best Practices Luke Welling and Laura Thomson |
M5 - Afternoon An Introduction to CVS David Purdue |
M6 - Afternoon The Inner Workings Of SQLite Dan Kennedy |
M7 - Afternoon Firewalling with PF Peter N. M. Hansteen |
Tuesday, 18 October 2005
T1 - Morning Building Open Source Secure Wireless Networks for the Enterprise Mark Uemura |
T2 - Morning A Cryptography Primer Laurie Brown |
T3 - Morning Optimising MySQL Arjen Lentz |
T4 - Morning Hands-on NSA Security Enhanced Linux Russell Coker |
T8 - Afternoon Solaris 10: Dynamic Tracing (DTrace) and Containers Bryan Cantrill |
T5 - Afternoon Security Risk Management Laurie Brown |
T6 - Afternoon MySQL 5.0 in Depth: Stored Procedures, Views, Triggers, Cursors Arjen Lentz |
T7 - Afternoon I'm Not Dead Yet! (Tcling For Fun And Profit) Steve Landers |
S1 - Debugging Kernel Problems
Intended Audience:
Kernel developers and experienced system adminstrators.
The tutorial assumes a good working knowledge of UNIX systems
administration and the C programming language.
A knowledge of kernel internals will be helpful, but is not essential.
Depending on prior experience,
participants will learn to locate and either fix or report kernel bugs.
Description:
This tutorial will show debugging techniques on live systems.
The operating system for most of the tutorial will be FreeBSD,
but it will explain the (relatively small) differences in NetBSD
and OpenBSD.
Much of the content, including some of the kernel debugging examples,
applies to Linux as well.
Topics:
- How and why kernels fail.
- Understanding log files: dmesg, /var/log/messages.
- Using common tools for debugging a running system: ps, netstat, top.
- Building a kernel with debugging support: the options.
- Preparing for dumps: dumpon, savecore.
- Demonstration: panicing and dumping a system.
- Preliminary dump analysis (non-technical, without sources).
- The assembler-level view of a C program.
- Introduction to the kernel source tree.
- Analysing panic dumps with gdb (technical).
- On-line kernel debuggers: ddb, remote serial gdb.
- Debugging a running system with gdb.
- If time permits, a demonstration of some of these topics on NetBSD and OpenBSD systems.
Greg Lehey
Greg Lehey has been in the computer industry for 30 years, in which time he has performed most jobs, ranging from kernel development to product management, from systems programming to systems administration, from processing satellite data to programming petrol pumps, from the production of CD-ROMs of ported free software to DSP instruction set design. He is the author of ``Porting UNIX Software'' (O'Reilly and Associates, 1995) and ``The Complete FreeBSD'' (O'Reilly and Associates, 2003).
S2 - Introduction to Network Simulator 2 (ns2)
This tutorial will provide attendees with a basic introduction to Network Simulator 2 (ns2), a discrete event simulator designed for networking research.
Overview:
- What is Network Simulator 2 (ns2)?
- What are its capabilities?
- What are its limitations?
- Installing ns2
- Installing from source
- Validating installation
- A guided tour of ns2
- Overview of oTCL
- Fundamental objects
- Simulator
- Nodes
- Queues
- Links
- Agents
- Applications
- Building simulations
- Basic simulations
- Intermediate simulations
- Making sense of the data
- Introduction to NAM
- Visualising simulations with NAM
- Generating traces & graphs
- Using xgraph
- xd3d
- Putting it all together
- Creating functional simulations
- Generating traces & graphs
- Reviewing results
- Extending ns2
- Making modifications to protocols
- Implementing your own protocols
It is expected that attendees will have a reasonable understanding of TCP/IP and computer networking, including basic knowledge of protocol internals.
Joel Sing
Joel is one of the founders of Ionix Technology, a Bendigo based company that provides business computing solutions to small and medium enterprise. He is a highly skilled software engineer, with many years experience developing complex software systems. Joel is familiar with the installation and configuration of many operating systems, having had over eight years of industry experience in both system and network administration.
Joel graduated from La Trobe University, Bendigo in 2000 with a Bachelor of Computing with Distinction, before graduating with an Honours degree in 2001. He is currently a PhD candidate at La Trobe University, Bundoora and is undertaking research regarding the performance of TCP over long delay links.
S3 - Installing GNU HURD from scratch, and creating a strict GPL development environment
The HURD is the GNU projects UNIX replacement Operating System, it also represents a unique frontier for OS development and design. But getting HURD onto your hard drive, whether your developing, testing out new features or just curious can be a painful process. This tute intends to make it simple if not intuitive.
A far more elegant introduction to the HURD can be found here: http://www.gnu.org/software/hurd/hurd.html
Initially I will take you over the basics:
- Getting the HURD.
- Installing the GNU base.
- Correctly setting up the grub boot loader.
Then we will make the system worth the effort:
- Installing a compiler sandbox.
- Setting up gcc options and additional libraries.
- Setting up the L4 pistachio kernel.
- Setting up an account on the Savannah system.
We will also cover HURD design decisions, new development trends and a little project history.
M1 - Security Technology Review
Peter Gutmann presents the world's most comprehensive security technology review, the actual content of which will depend largely on the needs and interests of attendees, but drawn generally from the following:
Security threats and requirements, services and mechanisms, historical ciphers, assorted block, stream, and public-key ciphers, hash functions, and signature algorithms, key management, key distribution, the certification process, certification hierarchies, LDAP, certificate revocation, X.509 certificate structure and extensions, certificate profiles, setting up and running a CA, RA's, PGP certificates, SPKI, digital signature legislation, IPSEC, SKIP, SSL, SGC, TLS, S-HTTP, SSH, SNMP security, DNSSEC, email security mechanisms, PEM, PGP, MOSS, PGP/MIME, S/MIME and CMS, MSP, user authentiction, Unix password encryption, LANMAN, NT, and Netware 3.x and 4.x authentication, Kerberos 4 and 5, Kerberos-like systems (KryptoKnight, SESAME, DCE), authentication tokens, SecurID, S/Key, OPIE, PPP PAP/CHAP, PAP variants (SPAP, ARAP, MSCHAP), RADIUS, TACACS/XTACACS/TACACS+, biometrics, PAM, electronic payment mechanisms, (Netcash, Cybercash, book entry systems in general), Digicash, e-cheques, SET, why security is hard to get right, TEMPEST, snake oil crypto, selling security, smart cards, electronic purse standards, PKCS #11, PC/SC, JavaCard/OCF, iButtons, contactless cards, attacks on smart cards, voice encryption, GSM security and how to break it, traffic analysis, anonymity, mixes, onion routing, mixmaster, crowds, steganography, watermarking and so much more!
Peter Gutmann
Peter Gutmann is a researcher in the Department of Computer Science at the University of Auckland working on design and analysis of cryptographic security architectures. He helped write the popular PGP encryption package, has authored a number of papers and RFC's on security and encryption including the X.509 Style Guide for certificates, and is the author of the open source cryptlib security toolkit. In his spare time he pokes holes in whatever security systems and mechanisms catch his attention and grumbles about PKIs.
M2 - Secure High Availability Open Source Systems and Solutions
Today there are Open Source software and systems that rival commercial alternatives. This is especially true in the Security World. This tutorial focuses on building Secure High Availability Open Source Systems and Solutions and are great examples of Open Source at its best.
Tutorial attendees will see live demonstrations for each of the following High Availability solutions:
- Automatic Stateful Failover Firewalls with rich Enterprise class firewall technology Packet Filter, Firewall Redundancy, Logging, Packet, Normalization, Quality of Service, Load Balancing, Authentication, IPv6 Automatic Failover Support, NAT and more...
- Secure High Availability Web Servers that are built for...
- Intrusion Detection
- Distributed Denial of Service Mitigation
- Redundancy
- Load Balancing
- Unlimited Scalability
- Secure Wireless Networks for the Enterprise (demonstration only)
Learn how to implement these and other solutions for your business or organization and find out why they are now being used in one of the largest and oldest services firms in the world.
The objective of the tutorial is to give everyone the tools and how-to information that they need to build their own Secure High Availability Open Source Systems and Solutions for their company. Those attending will receive full documentation for the first two solutions and an authentic OpenBSD 3.7 CD release.
M3 - An Introduction to SQLite
SQLite is a small C library that implements a self-contained, embeddable, zero-configuration SQL database engine. It is used inside many high-profile commercial and open-source software systems and new projects are adopting it daily. SQLite offers the power and convenience of SQL data storage without the overhead and administrative burden of a tradition client/server RDBMS.
This sessions provides a detailed introduction to SQLite. Programmers who are unfamiliar with SQLite or who are have only a limited acquaintance with SQLite will come away with all the knowledge they need to assess the relative merits of SQLite and to begin using the library in their own projects.
The following are some of the topics that will be covered:
- A quick overview of SQLite: what it does, it's history, and who is currently using it.
- Distinctive features of SQLite: what makes it different from other SQL database engines.
- A comparison of SQLite to other popular database engines.
- Intellectual property issues: what does it mean to be "public domain"?
- Appropriate uses for SQLite and when a different database might be a better choice
- The SQL Language supported by SQLite
- The native C-language interface
- TCL bindings
- Bindings to other languages: Perl, PHP, Python, etc.
M4 - PHP and MySQL Best Practices
Many web programmers use PHP with MySQL. However, lots of hard working programmers work to tight deadlines, are self-taught, and may never have experimented with some of this combination's newer features. In this session, we will look at best practices for using MySQL from PHP, showing how common web development tasks can be made easier, more efficient, or more secure.
Welling and Thomson discuss when and how to use the following features in the web environment:
- Different storage engines
- The MySQL query cache
- Prepared statements for efficiency and protection against SQL injection attacks
- Transactions
- Full text searching
- Subqueries
This tutorial is aimed at programmers who already use PHP and MySQL together, but want to get more out of the pairing.
Luke Welling
Luke Welling lives in Melbourne and is a Senior Software Engineer at Hitwise.com. He has been using PHP for nearly ten years. PHP and MySQL Web Development, co-authored with Laura Thomson (Sams 2004), is the best selling open source programming book of all time.
Luke has previously worked as a programmer for various companies including MySQL AB, run a freelance web development business, and taught computer science and engineering at RMIT University. He is a regular speaker at open source conferences around the world, having given tutorials, sessions, or keynotes at the O'Reilly Open Source Convention, PHPCon, LinuxTag, The MySQL Users' Conference, The International PHP Conference and the Australian Open Source Developers' Conference.
Laura Thomson
Laura Thomson is the co-author of the best selling PHP and MySQL Web Development, has worked as a programmer, consultant, and lecturer. She has taught PHP to thousands of students. Laura is currently a lecturer at RMIT University, creating new open source converts every semester.
M5 - An Introduction To CVS
Change control and tracking is becoming incresingly important for technical, managerial and legal reasons.
In open source projects in particular it is important that change is monitored and controlled, while allowing geographically dispersed individual developers to be as productive as possible and just get on with their coding.
The tool of choice for achieving this is CVS - the concurrent version system.
This tutorial will give and introduction to CVS and its use, including:
- Configuration management/source code control concepts and motivation.
- Setting up a CVS repository.
- The CVS checkout/develop/checkin cycle.
- Tagging to define releases.
- Working with multiple developers.
- Remote access.
- Repository maintenance.
David Purdue
David Purdue is the President of AUUG Inc. He has been fiddling with UNIX systems for over 20 years, and has been on the AUUG Board for over 10.
David uses CVS primarily to administer web sites and track system admin config changes - in particular on the AUUG web site.
David works for Sun Microsystems on resolving service issues for Sun's top 50 global customers.
M6 - The Inner Workings Of SQLite
This session provides a guided tour through the source code and internal workings of the SQLite embedded database engine. The aim is to make attendees comfortable enough with the SQLite code base that they will know immediately where in the code to look for answer to questions about how the database operates and can confidently make any desired customizations and enhancements.
The material is intended for the following audiences:
- Programmers at companies that use SQLite in their products and that want to support SQLite internally rather than relying on external support contracts or free support from the open-source community.
- System architects who are considering the use of SQLite and who want a detailed under-the-hood look at SQLite to help them make an informed decision about whether SQLite is appropriate for their designs.
- System programmers who want to be able to use SQLite more effectively by understanding what it does behind the scenes.
- Developers of other database engines looking for ideas to help improve their own products.
- Anyone who is just curious about how SQL databases engines work.
The following are some of the topics that will be covered:
- The 6 major subsystems within SQLite, what each does, and how they interact
- The SQLite database file format
- How SQLite insures that transactions are atomic, consistent, isolated, and durable
- The operation of the Virtual Machine inside of SQLite
- How SQL statements are translated into programs for the Virtual Machine
- The assumptions and design principles behind SQLite's query optimizer
- Guidelines for extending, enhancing, modifying and troubleshooting SQLite
- Strategies for porting SQLite to new platforms and operating systems
- The purpose and role of each of the 60 primary source files in SQLite
- Techniques for doing custom builds of SQLite
M7 - Firewalling with PF
The OpenBSD Packet Filter (PF) offers firewalling, NAT, traffic control and bandwidth management in a single, flexible and sysadmin friendly system. Since its inital release as part of OpenBSD 3.0 in 2001, PF has been incorporated in the base systems of FreeBSD, NetBSD and DragonFlyBSD. The objective of the tutorial is to show you the tools and methods for taking control of your network traffic - keeping some of it safely inside or outside your network, directing traffic to specific hosts or services, flexible resource allocation and protection against cracking, DOSing and spamming.
- Background and history
- Packet filter? Firewall? Demystifying some common terms.
- NAT - why NAT was needed, how it works
- PF today - features
- BSD vs Linux - Configuration (for the BSD-curious Linuxer)
- Basic setup on OpenBSD, FreeBSD and NetBSD
- Exploring the basics of rule sets
- Lists and macros and why they are good for you
- Statistics from pfctl - introducing a few information gathering techniques
- Simple gateway with NAT - a common setup explained
- That sad old FTP thing - the cons, cons and whys and hows of ftp
- Making your firewall troubleshooting friendly
- Hygiene: block-policy, scrub and antispoof
- Adapting to changing needs, easily
- The practical sides of logging
- Keeping an eye on things with pftop
- Invisible gateway - bridge (you can filter even if you're invisible)
- Directing traffic with altq
- CARP and pfsync: redundancy and failover - a taste of what is possible
- Giving spammers a hard time - stopping stupidity at $ext_if, greylisting and tarpitting
Peter Hansteen
Peter N. M. Hansteen (b 1963) is Senior Consultant at Datadokumentasjon A/S in Bergen, Norway. A freenix user since the mid 1990s, he tends to networks in between documentation related tasks. Advocates freenixes via the local BLUG and national NUUG user groups, where he is a member of the core group and board member respectively. A member of the original RFC1149 implementation team.T1 - Building Open Source Secure Wireless Networks for the Enterprise
Wireless Networks are bliss to users and the bane of Security Administrators. Most wireless networks are insecure by default and security seems to be an afterthought for the users, hardware and software vendors alike. More over, even with security features used, most Access Points use very weak encryption, little or no authentication methods and have no built-in firewall technology. So how can companies utilize wireless technology and still be able to protect confidential information from unauthorized access? This solution addresses the following security concerns: Authentication, Encryption and Firewall protection. More over, there's no lock-in, no extra hardware or software expenditures and it's very user friendly, robust and scalable.
This will be a hands-on tutorial with no time for theory. Attendees will benefit most by bringing a laptop with a wireless device (802.11b/g). This solution was designed/automated for Windows 2000/XP wireless clients but should not be limited to Windows. The Secure Wireless Access Points will be running OpenBSD but should also work for other BSD systems that use pf for the firewall, OpenSSH and that have IPsec support.
The objective of the tutorial is to give everyone the tools and how-to information that they need to build their own Secure Wireless Network at home or for their company. Those attending will receive full documentation and an authentic OpenBSD 3.7 CD release.
T2 - A Cryptography Primer
Data encryption algorithms form an important technical component in providing secure and authenticated electronic security and communications. This workshop is designed to provide attendees with a brief overview of the field of cryptography, the terms, techniques, and algorithms.
It starts by introducing the classical cryptographic techniques which form the foundations of the field. We then survey modern private key ciphers, widely used for bulk and link data encryption, from DES to the new AES encryption algorithm Rijndael. Next we consider public key encryption algorithms and signature schemes, essential for the use of cryptography in large scale, wide area communications. We conclude with a brief look at a couple of cryptographic applications, illustrating the different ways these components are combined to build a security solution.
Dr Lawrie Brown
DR LAWRIE BROWN is a senior lecturer in the School of Information Technology and Electrical Engineering, at the Australian Defence Force Academy (UNSW@ADFA) in Canberra.
His professional interests include cryptography, communications and computer systems security, and safe mobile code. His current research is in the design of safe and secure remote (mobile) code execution environments, currently focusing on the functional language Erlang. He has previously worked on the design and implementation of private key block ciphers, in particular the LOKI family of encryption algorithms.
He currently lectures postgraduate courses in Computer Security and Cryptography, the undergraduate second year core Computing Technology course, and the general studies "Computers in Society" course. He is also an instructor for the CISCO Regional Networking Academy at ADFA.
Additionally, Lawrie is a webmaster on the Internet Project (AUUG Canberra & PCUG) system.
T3 - Optimising MySQL
This tutorial examines the many aspects involved when optimising a MySQL application, the MySQL server, and its environment.
Contrary to popular expectations (and habits), hardware will be the absolute last item on our list. The reason for this will become apparent as we build an overall picture and take a closer look at various specific issues.
The tutorial will be highly interactive, using discussions, games, and other ways that insure maximum benefit for all participants. This method of teaching, which is the standard format of MySQL AB training courses, has proven to be much more effective than regular lectures.
Optimisation is certainly not a topic of dry knowledge. Instead it is about gaining the skills needed to analyse the big picture, and recognising the often small but important opportunities. As such, this tutorial provides a particularly valuable experience for intermediate-level MySQL users.
Arjen Lentz
Arjen Lentz (35) is originally from Amsterdam, The Netherlands. Since marrying an Aussie, he decided that Australia is a very nice place to live, so together with their black cat they now reside in Kenmore, a Western suburb of Brisbane, QLD.
Arjen started with programming, but has since branched out to writing, translating, marketing, training and consultancy. He has been working for MySQL AB (the Swedish company that owns, develops and supports the MySQL database software, www.mysql.com) since 2001, primarily as technical writer for MySQL Documentation Team.
In addition, Arjen teaches MySQL training courses, and maintains contacts with the MySQL community and other organisations in Australia. Arjen co-founded and is actively involved with OSIA, Open Source Industry Australia, Incorporated (www.osia.net.au) and also helps on the press team of Linux Australia (www.linux.org.au).
Arjen is always keen to be involved in open discussions with interested parties about MySQL and the possibilities for Open Source.
T4 - Hands-on NSA Security Enhanced Linux
This hands-on tutorial will cover using SE Linux on a Red Hat platform. Attendees will learn the basic SE Linux administration commands and tasks, including:
- How to view the contexts of files and processes
- How to change the contexts of files
- How to login with a particular context
Russell Coker
Russell Coker has been working on SE Linux since mid 2001. He works for Red Hat on the SE Linux support in Fedora and RHEL. Prior to working for Red Hat he worked as a sysadmin for various ISPs.T5 - Security Risk Management
This tutorial will present an overview of security risk management, including the critical risk assessment process. This aims to identify threats to, impacts on and vulnerabilities of information and information processing facilities and the likelihood of their occurence, in order that these threats may be controlled and minimised at an acceptable cost. Unfortunately, this process is often not managed well. An overview of relevant international and national standards will be presented which provide guidance on this process. The latter part of the tutorial will be a "simplified case-study", walking through an example risk assessment for a hypothetical (though based on actual) organisation, using the process outlined in the recently revised DSD ACSI 33. This standard is mandated for commonwealth government use, but provides good guidance for any who need to undertake such a process.
Dr Lawrie Brown
DR LAWRIE BROWN is a senior lecturer in the School of Information Technology and Electrical Engineering, at the Australian Defence Force Academy (UNSW@ADFA) in Canberra.
His professional interests include cryptography, communications and computer systems security, and safe mobile code. His current research is in the design of safe and secure remote (mobile) code execution environments, currently focusing on the functional language Erlang. He has previously worked on the design and implementation of private key block ciphers, in particular the LOKI family of encryption algorithms.
He currently lectures postgraduate courses in Computer Security and Cryptography, the undergraduate second year core Computing Technology course, and the general studies "Computers in Society" course. He is also an instructor for the CISCO Regional Networking Academy at ADFA.
Additionally, Lawrie is a webmaster on the Internet Project (AUUG Canberra & PCUG) system.
T6 - MySQL 5.0 in Depth: Stored Procedures, Views, Triggers, Cursors
An in-depth look at MySQL 5.0, now available in production.
Views, stored procedures and triggers have long been considered a basic requirement of an enterprise-ready DBMS. Now, MySQL 5.0 introduces support for these flagship features, as well as for a standard SQL-compliant INFORMATION_SCHEMA data dictionary, bringing the popular open-source DBMS several steps closer to matching all the capabilities of the competition.
In this tutorial, each of these features are discussed in-depth, with practical examples. Interesting for all users at intermediate and advanced levels, but particularly useful for existing MySQL users who may not be familiar with these features from other databases.
Arjen Lentz
Arjen Lentz (35) is originally from Amsterdam, The Netherlands. Since marrying an Aussie, he decided that Australia is a very nice place to live, so together with their black cat they now reside in Kenmore, a Western suburb of Brisbane, QLD.
Arjen started with programming, but has since branched out to writing, translating, marketing, training and consultancy. He has been working for MySQL AB (the Swedish company that owns, develops and supports the MySQL database software, www.mysql.com) since 2001, primarily as technical writer for MySQL Documentation Team.
In addition, Arjen teaches MySQL training courses, and maintains contacts with the MySQL community and other organisations in Australia. Arjen co-founded and is actively involved with OSIA, Open Source Industry Australia, Incorporated (www.osia.net.au) and also helps on the press team of Linux Australia (www.linux.org.au).
Arjen is always keen to be involved in open discussions with interested parties about MySQL and the possibilities for Open Source.
T7 - I'm Not Dead Yet! (Tcling For Fun And Profit)
Want to develop in a scripting language that is web enabled, portable, object oriented, extensible, supports rapid GUI development, is fully internationalised and localised, byte-compiled, threaded, supports single file deployment, an embedable web server, supports easy network programming, is fully event driven, has a security model that supports sandboxes, is open source ... and was described by Eric Raymond as "Radically simple"?
No - not Java .... Tcl!
Contrary to the rumours, Tcl isn't dead but is alive and thriving. Sure it doesn't get the publicity and mindset of more "trendy" languages, but has a large, growing and devoted following - especially in some industry segments like telecommunications, automation and electronic design.
This tutorial will take you through the fundamentals of Tcl and Tk (its GUI extension). In addition the tutorial will cover a broad range of resources available to the Tcl developer - including various extensions, development tools and deployment options.
The tutorial assumes a knowledge of programming languages and principles, an open mind and a willingness to have fun when building software.
Steve Landers
Steve Landers is the Senior Consultant at Digital Smarties. He is active within the Tcl/Tk community, where he regularly contributes both software and expertise. He has a particular interest in the development of cross-platform scripted applications, and is a leading proponent of Tclkit, Starkit, Starpacks and Metakit for developing complex and robust cross-platform applications.
Steve regularly speaks at conferences, both in Australia and internationally. He has spoken at a number of SAGE-AU and AUUG annual conferences, and was a speaker at the Tcl2001 And Tcl2002 conferences.
T8 - Solaris 10: Dynamic Tracing (DTrace) and Containers
Solaris 10 is garnering rave reviews from the industry. Typical of these reviews are the comments from Illuminata analyst Gordan Haff, who claims that Solaris 10 has “more features that are both visible and meaningful to users than any other recent Unix release.”
This tutorial is a deep-dive and demonstration of two of the most visible and meaningful features in Solaris 10: Dynamic Tracing (DTrace) and Containers. Come see for yourself the technologies that eWeek called “compelling” and “impressive”, respectfully.
Dynamic Tracing
- Bottlenecks can be identifed and fixed in minutes or hours rather than weeks or months.
- Existing systems can handle more users or transactions, leading to greater utilization of existing resources.
- Analyse appplication performance without the need for elaborate test cases or statically instrumented binaries.
Solaris Containers
- Virtualise your Solaris OS into many containers, allowing you to run multiple applications on the one server, all independantly and isolated from each other.
- Dynamically re-assign system resources in real-time based on workloads and application usage.
Bryan Cantrill
Bryan Cantrill is a Senior Staff Engineer in the Solaris Kernel Development Group at Sun Microsystems. His interests include dynamic software instrumentation, postmortem diagnosability, real-time kernel implementation and microprocessor architecture.
Over his career, Bryan has done work in many kernel subsystems; most recently, he (with two colleagues) designed, implemented, and shipped DTrace, a facility for systemic dynamic instrumentation of Solaris that won the Sun 2004 Chairman's Award for Innovation, the InfoWorld 2005 Innovators Award, and the high praise of SysAdmin magazine, which hailed DTrace as a “brilliant piece of work.”
In September 2005 Bryan was selected to the Technology Review 35 (TR35), for his work on the Solaris(TM) 10 Operating System (OS). The selection by Technology Review, MIT's magazine of innovation, honors Cantrill as one of thirty-five young innovators under 35 years old who exemplify the spirit of contemporary innovation in technology and have the potential to profoundly impact the world.
Bryan received the ScB magna cum laude with honors in Computer Science from Brown University.
Information Disclaimer
The information on this page is accurate as at the time of posting. Updates to this page will be made if necessary due to changed circumstances.
AUUG reserves the right to alter this timetable or to cancel tutorials. If this happens, AUUG will contact delegates registered for affected tutorials to arrange for an alternative tutorial or a refund.