Video Recordings and Review of the LVEE-2014 Conference
Last year in the forests of Belarus took place near Grodno Conference LVEE-2014 , a summary report of which was on the Habré . I shot and edited the video, and although I published it last fall, only now did I get my hands to briefly describe the reports themselves. On a habr there has never been a publication of videos and reviews of reports from this conference, I hope it will be interesting. A quick video about LVEE-2014 for the general impression:
Under the cut, the most concise description and links to videos and additional materials (abstracts, slides, speaker contacts), i.e. Do not be afraid to go, even if you have GPRS.
Philosophical and legal issues open-source
Robots and automation
Nuclear Physics / kernel hacking
DEVOPS
Data
Creation
Network
Distribution engineering
Just high-quality development, without special Linux specifics
Let me remind you that the links to “additional materials” include annotations, extended abstracts, detailed slide infographics, thematic classification, and information about the authors. There were also a dozen different blitz reports, reports in Belarusian, near-advertising ... here is a complete list .
But I would like to remind once again that the conference is called Linux Vacation Eastern Europe, and Vacation is one of the key factors. A conference in the forest, continuously flowing into afterparties (barbecue, snacks, fireworks) and vice versa, is really a lot of time for communication with experts, both among speakers and participants.
Here are the pictures from LVEE-2014take a look. Moreover, if last year it was all at the end of August, there was rain that drove some of the reports into the room, then this year the LVEE-2015 conference will be already next week, June 25-28, at the most sunny time, and same place.
Yes, there is not a very close path there, but a shuttle service from Minsk and Grodno is also organized there, you can go by your own car or blablacar, and last year the two speakers came by bicycle at all. From Ryazan. From Ryazan, Karl.
In general, registration of participants is open before the end of the week.
By the way, if you have a report on Linux topics, despite the fact that the program is formed, you can still offer it, plus there is a section for short quick talks where any participant can speak, plus sometimes windows suddenly appear ... so if there is a topic - welcome.
Well, if you can’t come, and you are interested in open source reports, look, I shot and published a lot of them .
Under the cut, the most concise description and links to videos and additional materials (abstracts, slides, speaker contacts), i.e. Do not be afraid to go, even if you have GPRS.
Philosophical and legal issues open-source
- “ Licensed immunity of open source software. The release of the project on the example of Kallithea » additional materials - Living history of how open-source works. The developer of a good (by the way I myself used) “yet another github for mercury / gita / svna” RhodeCode sawed the system openly for a long time, and finally desired monetization and decided to close the code. There it was. The community forked and renamed the project, and held the defense against the distressed project starter. As a result, the source project code remains open, only under a very strange and contradictory license . And yes, first-hand history, the developer of Kallithea told about all this.
- " Commercialization of open source software under the GPL license " additional materials - The return to the previous story. Devilish Russian
hackerslawyers found a legal (RMS recognized!) Gap in GPLv3, how to hide sors, delivering it only to the customer. In fact, I’ve already three times (+ [1] , [2]) shot this report at various conferences, but it was worth it - the audience’s reaction was very different. The business audience usually perceived OK, for the most part not even understanding what the problem was (“what kind of GPL? Doesn’t it have legal force in the Russian Federation - by the forest”), but here there were rather developers who attacked the speaker strongly - how can I close it their code, depriving them of fame and bugfixes from the community ... IMHO, of course there is a niche for this solution - small-run, almost custom solutions for small businesses, when if you open everything, no one will buy at all, and so, you can "share the costs" for a couple of dozen customers (for example, adaptation of open ERP to specific requirements "Russian pharmacy", etc.).
- “ What prompted the Belarusian pirates to create a branch of Creative Commons? » Additional materials - Besides standard anti- piracy rhetoric, here is a story about how some Belarusian activists, let’s say, organize a branch of Creative Communities and attack the Belarusian copyright law. It is amusing that this activism was not approved by the audience, a discussion unfolded in which some listeners who came from Ukraine tried to explain the danger of unconstructive interaction with the authorities.
Robots and automation
- " The use of popular protocols and free software in the management of a mobile robot " additional materials - Namely, a floating robot. Of course, these are not ocean robots from Liquid Robotics, but relatively simple structures made of foam, food containers, Rasberri Pi, sensors and open-source. But they work - monitoring of lake reservoirs, coastal profiles and depth, and that’s all. The story about the experience - how to provide communication (Bluetooth, WiFi, GPS), which glands and protocols you tried, which frameworks ... By the way - plus conferences in nature - there was also a live demonstration - this drone was launched into the water and chased there (there is a video).
- “ Smart GreenHouse ” additional materials - Nothing moving here, automation of the growth of “grass at home”, if you know what I mean. Light-watering-temperature-humidity-monitoring, and even remote photography (what is happening inside and possibly outside). Interesting - used low-power Rasberry Pi, and ... Java. Java Embedded is quite raspberry-rich, and easy to develop. The guys obviously need to do crowdfunding, even a couple of stories about much simpler devices slipped even on the hub ( [3] , [4] - watering automation, arduino, smartphones, etc.).
Nuclear Physics / kernel hacking
- " On methods of dynamically embedding into the kernel of the operating system, using Linux as an example " additional materials - Real hacking - intercepting functions in various ways, through interrupts, through the system call manager, wrappers, patching the prolog with disassembly, Linux Security Modules hooks, bypass page protection ... All this Of course, not for hacking, it is numb, but for protection - both for modeling attacks and for implementing SZI.
- “ Bootloader and Linux kernel debugging on ARM board with OpenOCD ” additional materials - how to drag the bootloader and Linux kernel onto a new unknown ARM hardware, how to make it all take off and debug, because it does not have a display or a network - which connectors they usually have and how to work with them.
- " Clsync progress - security and porting to freebsd " additional materials - Here is a story about special tools for migrating LXC containers. She has an open problem - using the inotify interface to track changes, and there is an architectural conflict that often root privileges are needed for proper operation, but all this is unsafe. The speaker spoke of several attempts to unleash this, but judging by the discussion, it is still far from a beautiful final decision. He also ported all this to BSD, although there is no inotify there at all, and there he had to specifically pervert.
- “ ROOT. A data analysis framework " additional materials - And this is real" nuclear physics ", not in the sense of" kernel hacking ", we are talking about the tools of a real high-energy physicist. And these physicists are now not like in the forties, to the elbow in radium, melts of beryllium and graphite, but mainly by the computer (inventing HTML and all that from boredom, instead of the cheap thermonuclear poison that has been expected of them for a century). Then they gave birth to Yet Another data analysis framework. And not some scilearn-kit on python, or R - this is for wimps, but on High Performance C ++ (everything should be High there), for
megatons ofpetabytes of data. With simple documentation on a thousand pages, and three thousand C ++ classes. For strong in spirit, or who has a real bigdata, who needs to model their Matrix.
DEVOPS
- “ Test environment configuration with Ansible ” additional materials - Well, you won’t surprise anyone with the story about Ansible, it’s another matter that not only the devops-sysadmin should know this, but a normal tester should automate the deployment of systems for manual or automatic testing.
- " Text parsing with python and PLY " additional materials - Configs, configs, endless system administration configs. Previously, when automating work with configs, it was customary to write disposable pearl parsers on regexp - crooked, unreliable, but writing a real parser on a Lex-yak is expensive. And then there was a small master class on how to quickly and confidently write a real parser of real grammar on a Piton parser generator - PLY.
- “ Flume and Morphlines - transforming data flows without a line of code ” additional materials - Another eternal problem for system administrators and analyzers of different bigdates is collectors-parsers-log analyzers, which in the case of scaled systems turns into a difficult task. It was immediately shown how to use Apache Flume and Morphlines to solve all this once and for all, reliably and scalably. And without a line of code. Software. But the configs will certainly have to be eaten and written, without this in any way.
Data
- “ Assessing data corruption on bad media for Ext3 and NTFS ” additional materials - this is not a recovery master class, but rather, where and how to look, so that when the failures go, to assess the extent of the problem: maybe the data is not affected, maybe not all gone, maybe it's not time to do backups, etc.
- " Guaranteed destruction of information " additional materials - and vice versa. If you need to destroy information, faster and more reliable. And there are no superdevices for the explosion-shooting-demagnetization of hard drives. Is it necessary to clean the screw 100,500 times using the “Guntman method”, or is all this superfluous and was invented only to delay you while the door is being broken?
Creation
- “ Creating a 3D cartoon using open source software ” dop MATERIALS - How to make a 3D cartoon on an open-source stack (Blender and all that), how much time and energy you need to threaten, even if it's just a clip for a couple of minutes. Make a cartoon on your own, on a “diploma”, having mastered all professions near-animation. The most popular report from the conference, the speaker was given the main prize. True, they were “waiting for the boy” - the prize seemed to be a toy robot, and the winning speaker turned out to be suddenly of fair sex and appearance.
- “ Features of the correction of optical distortion in digital photography ” additional materials - First, “matan” a brief introduction to the problem of lenses and their distortions, then how to fix it with a different open source, from Blender to OpenCV. Heuristically, or using world databases for all lenses. For me, all this was somewhat surprising, because I hardly see any distortions at all, or I don’t pay attention, and when editing a video I often add them at all to fill in a “denser frame”. But those who are fighting for the perfect photo, you probably need to know.
Network
- " FlowForwarding Warp - how is JVM running SDN controller " additional materials - secret developments of the Epama laboratories in the field of software-configurable networks. And they gave birth to a cthulhu-like framework (really Shub-Niggurath on slides and in the report), which respawn agents, connections and all this on the JVM, actor Akka-Java model + Apache Avro for messaging.
- “ Token-based authorization for direct connection sessions in the cloud ” additional materials - the guys are sawing globally accessible NAS, living somewhere on local networks, but accessible through a special service from everywhere. And then they had to forward authorization between the global server and the NAS. Random one-time tokens running between the client, server and NAS, Apache mod_auth_token, which they had to finish a little. It seems nothing magical, but you can imagine similar tasks if you invent another dropbox or something similar.
Distribution engineering
- " Overview of multi- architecture support implementations in Linux distributions and their assembly systems "- A cool Linux build specialist collecting EPAM Linux tried to open his eyes to the abyss of problems in the repository system of various Linux distributions. This is also an incomplete assembly in Fedorov and Debian, when to launch a seemingly sterile and integral assembly system, you need to lay down the “bearing nail” of packages manually assembled somewhere on development machines. And hacks with non-integral packet meta-information to deliver 32bit packets to 64bit systems. And the curves and non-expandable standards, such as FMS, in which designers did not even provide architectures other than i32 / i64. And the divergence of attempts to solve these problems in violation of standards. In general, quoting the speaker "Chaos and horror ... And it’s not written anywhere, no one knows it, even the maintainers, because all this is complicated."
Just high-quality development, without special Linux specifics
- “ Flawless history in Git or Mercurial ” additional materials - Development efficiency in DVCS fights the beauty of history ... how to make sure that productivity is not reduced by creepy regulations, and the VCS repository retroactively looked like a healthy person's repository. Rebeys, squash, cherry-peaks and that’s all, in a lecture from one of the Opera developers.
Let me remind you that the links to “additional materials” include annotations, extended abstracts, detailed slide infographics, thematic classification, and information about the authors. There were also a dozen different blitz reports, reports in Belarusian, near-advertising ... here is a complete list .
But I would like to remind once again that the conference is called Linux Vacation Eastern Europe, and Vacation is one of the key factors. A conference in the forest, continuously flowing into afterparties (barbecue, snacks, fireworks) and vice versa, is really a lot of time for communication with experts, both among speakers and participants.
Here are the pictures from LVEE-2014take a look. Moreover, if last year it was all at the end of August, there was rain that drove some of the reports into the room, then this year the LVEE-2015 conference will be already next week, June 25-28, at the most sunny time, and same place.
Yes, there is not a very close path there, but a shuttle service from Minsk and Grodno is also organized there, you can go by your own car or blablacar, and last year the two speakers came by bicycle at all. From Ryazan. From Ryazan, Karl.
In general, registration of participants is open before the end of the week.
By the way, if you have a report on Linux topics, despite the fact that the program is formed, you can still offer it, plus there is a section for short quick talks where any participant can speak, plus sometimes windows suddenly appear ... so if there is a topic - welcome.
Well, if you can’t come, and you are interested in open source reports, look, I shot and published a lot of them .