October 2, 2013Cloud Security: Plugging the Hole in Data Leakage by Carlos Cardenas & Dan Bogdanov, PhD
This is part of a series of blog posts on cloud security. Carlos Cardenas is a security expert who came to Joyent from The Institute for Cyber Security ICS at the University of Texas, San Antonio. While at ICS, Carlos worked under Ravi Sandhu, PhD, one of the leading security experts in the world.
October 1, 2013Wanelo and Joyent Fireside at Cloud Beat by Ben Wen
At Cloud Beat's fireside chat, Konstantin Gredeskoul, CTO of Wanelo and Bryan Cantrill, Joyent's SVP of Engineering discuss Wanelo's use of Joyent Manta.
September 27, 2013What the [bleep] Does Joyent Manta Have to Do with Twitter? by Mark Cavage
In Part 1 of this webinar series Joyent's lead Manta architect, Mark Cavage, provides an introduction to, and explores the motivations for building Manta. Mark also provides insight into its underlying architectural features and reveals top use cases.
September 25, 2013Cloud Security: The Challenges with Key Management in the Cloud (and everywhere else) by Carlos Cardenas
Key management is the system or act of managing cryptographic keys in a system which includes: generation, destruction, replacement, use, and distribution.
September 19, 2013Surge Wrap-up by David Pacheco
Last week, several Joyent engineers attended Surge in Washington, D.C. The highlight for several of us was the keynote by Gene Kranz (of Apollo 13 fame) about his days at Mission Control.
September 12, 2013Joyent Manta Storage Service: Image Manipulation and Publishing by Christopher Hogue, Ph.D.
Joyent Manta Storage Service: Image Content Manipulation and Publishing Example Part 1: The Getty Open Content Image Set.
August 30, 2013Getting Started with Manta by Trevor O
Trevor O shows how to get set up on Manta and jump into action.
August 21, 2013Reverse Engineering the Bootloader of Life by Rachel Balik
A unique journey into the world of life sciences.
August 19, 2013Ten Performance Wins by Brendan Gregg
Brendan Gregg writes about some of our toughest performance challenges, and how we solved them
August 15, 2013Streams in Node by Rachel Balik
Isaac Schlueter discusses stream3.
August 12, 2013ZFS Forensics - Recovering Files From a Destroyed Zpool by Mr. Max Bruning
In this post, I'll create a ZFS pool, add a file to the pool, destroy the pool, and then recover the file. To do this, I'll use a modified mdb, and a tool I wrote to uncompress ZFS compressed data/metadata (zuncompress).
August 8, 2013Introducing Kartlytics: Mario Kart 64 Analytics by Dave Pacheco
Your video game trash-talking will never be be the same.
August 7, 2013The New Systems Performance by Rachel Balik
A state of the union for systems performance.
August 2, 2013Joyent Engineering’s Latest Side Project Turns Heads and Stomachs by Rachel Balik
Don't try this at home.
July 30, 2013DTrace Caller Builtin by Mr. Max Bruning
This post answers a question I occasionally have when I am DTracing code: "How do I trace a function but only if it is called from a specific other function?"