This is part of a series of blog posts on cloud security. Carlos Cardenas is a security expert who came to Joyent from The Institute for Cyber Security ICS at the University of Texas, San Antonio. While at ICS, Carlos worked under Ravi Sandhu, PhD, one of the leading security experts in the world.
At Cloud Beat's fireside chat, Konstantin Gredeskoul, CTO of Wanelo and Bryan Cantrill, Joyent's SVP of Engineering discuss Wanelo's use of Joyent Manta.
In Part 1 of this webinar series Joyent's lead Manta architect, Mark Cavage, provides an introduction to, and explores the motivations for building Manta. Mark also provides insight into its underlying architectural features and reveals top use cases.
Key management is the system or act of managing cryptographic keys in a system which includes: generation, destruction, replacement, use, and distribution.
Last week, several Joyent engineers attended Surge in Washington, D.C. The highlight for several of us was the keynote by Gene Kranz (of Apollo 13 fame) about his days at Mission Control.
Joyent Manta Storage Service: Image Content Manipulation and Publishing Example Part 1: The Getty Open Content Image Set.
Trevor O shows how to get set up on Manta and jump into action.
A unique journey into the world of life sciences.
Brendan Gregg writes about some of our toughest performance challenges, and how we solved them
Isaac Schlueter discusses stream3.
In this post, I'll create a ZFS pool, add a file to the pool, destroy the pool, and then recover the file. To do this, I'll use a modified mdb, and a tool I wrote to uncompress ZFS compressed data/metadata (zuncompress).
Your video game trash-talking will never be be the same.
A state of the union for systems performance.
Don't try this at home.
This post answers a question I occasionally have when I am DTracing code: "How do I trace a function but only if it is called from a specific other function?"