Celebrate student success with Linux Academy!
Kubernetes latest upcoming release, 1.9, has a release scheduled for December 13, 2017, and contains a number of improvements and expanded functionalities. Changes to the Workloads API aim to address stability concerns as it gets added to General Availability, the Kubernetes Windows beta moves forward, and the Storage Special Interest Group (SIG-Storage) works with the Container Storage Interface (CSI) Community to create a single interface for Kubernetes storage solutions all in this update.
Currently listening to: When I started: Yoshimi Battles the Pink Robots by The Flaming Lips (pt.1). When I finished: Across the Room (feat. Leon Bridges) by ODESZA
1. What do you do at Linux Academy?
I develop and maintain the Android app(s) for Linux Academy. I also work with students to debug issues they’re having their devices. Android Developer, resident Audiophile and SQL expert. Been here since March 1st, 2017
2. What did you do before this?
I worked for defense contractor called Apptricity. I was primarily responsible for developing/maintaining their current and next-gen android apps.
I graduated from UNT with a BS in Computer Science, and a minor in Technical Writing. My biggest reason for coming here was the culture and closeness to home. And so far I’m loving it
3. What do you like most about what you do?
Having (mostly) complete creative control over the development of the Android App. Nowhere else would it have so easily been accepted to switch over to Kotlin from Java for Android dev. (more…)
The course I am currently working on is AWS Security Essentials, so my focus with most of my sessions involved security and seeing what changes are coming to services and best practices.
Ken Beer, the General Manager of AWS Key Management Service gave a session about encryption in the AWS system. In addition to the traditional topic of using a key to encrypt data then encrypting that key for encrypting data at rest, he also mentioned services that assist with client-side encryption, like the new AWS Encryption SDK and the S3 Encryption Client, which allow for easier solutions for encrypting data in transit.
I also attended a session, given by Quint Van Deman, on credentials which attempted to break down the differences between long-term and short-term credentials, as well as federation. Also involved with this session was the topic of “planes of access” that need to be considered depending on how “managed” an AWS service is. For instance, EC2 instances in a VPC have much different requirements than DynamoDB or S3.
A session I found really intriguing was Becoming an IAM Ninja with Scott Ward and Patrick McDowell that really covered a more advanced level of best practices in AWS. A couple of the more advanced concepts covered grabbed my attention: Using AWS config to snapshot policies and track changes in policies and relationships – something I have never thought about doing. Also, using AWS Macie to use behavior analytics to find historical data patterns and react using CloudWatch and Lambda. For example, if a user performs a task that Macie rates as high-risk, it can trigger a CloudWatch alarm that in turn triggers a Lambda function to effect that users access. I imagine this as being able to automatically place an explicit deny to remove all access if certain activities are attempted.
Overall, the week was informative. I also enjoyed meeting students and potential students in the booth. Thanks to all who stopped by!
We’re back with another cheat sheet – this time for Vagrant! We define some common terms, give you a rundown of the most-used commands, and even include a sample Vagrantfile that provisions a basic CentOS 7 web server to experiment on.
Check out the cheat sheet and get a basic Vagrant tutorial inside!