multithreading – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Tue, 09 Jun 2020 16:38:17 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png multithreading – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 The Little Distro That Could | LINUX Unplugged 357 https://original.jupiterbroadcasting.net/141847/the-little-distro-that-could-linux-unplugged-357/ Tue, 09 Jun 2020 12:00:00 +0000 https://original.jupiterbroadcasting.net/?p=141847 Show Notes: linuxunplugged.com/357

The post The Little Distro That Could | LINUX Unplugged 357 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/357

The post The Little Distro That Could | LINUX Unplugged 357 first appeared on Jupiter Broadcasting.

]]>
Lost Technology | BSD Now 96 https://original.jupiterbroadcasting.net/84587/lost-technology-bsd-now-96/ Thu, 02 Jul 2015 10:22:23 +0000 https://original.jupiterbroadcasting.net/?p=84587 Coming up this week, we’ll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He’ll tell us what makes these old (and often forgotten) machines so interesting. As usual, we’ve also got answers to your emails and all this week’s news on BSD Now – the place to B.. SD. Thanks to: […]

The post Lost Technology | BSD Now 96 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up this week, we’ll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He’ll tell us what makes these old (and often forgotten) machines so interesting. As usual, we’ve also got answers to your emails and all this week’s news on BSD Now – the place to B.. SD.

Thanks to:


DigitalOcean


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

Out with the old, in with the less

  • Our friend Ted Unangst has a new article up, talking about “various OpenBSD replacements and reductions”
  • “Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs.”
  • In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure
  • It starts off with a lesser-known SCSI driver that “tried to do too much” being replaced with three separate drivers
  • “Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver.”
  • In contrast to that example, he goes on to cite mandoc as taking a very non “unixy” direction, but at the same time being smaller and simpler than all the tools it replaced
  • The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)
  • He also talks about the rewritten “file” utility: “Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it.”
  • Finally, sudo in OpenBSD’s base system is moving to ports soon, and the article briefly describes a new tool that may or may not replace it, called “doas”
  • There’s also a nice wrap-up of all the examples at the end, and the “Pruning and Polishing” talk is good complementary reading material

More OpenZFS and BSDCan videos


SMP steroids for PF

  • An Oracle employee that’s been porting OpenBSD’s PF to an upcoming Solaris release has sent in an interesting patch for review
  • Attached to the mail was what may be the beginnings of making native PF SMP-aware
  • Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind – this is just one piece of the puzzle
  • The initial response has been quite positive though, with some back and forth between developers and the submitter
  • For now, let’s be patient and see what happens

DragonFly 4.2.0 released

  • DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes
  • i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release
  • Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there’s a wiki page about configuring it
  • They’ve also switched the default compiler to GCC 5, though why they’ve gone in that direction instead of embracing Clang is a mystery
  • The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools
  • Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement
  • There was also some hacker news discussion you can check out, as well as upgrade instructions

OpenSMTPD 5.7.1 released

  • The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently
  • Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default
  • The long-awaited filter API is now enabled by default, though still considered slightly experimental
  • Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)
  • Many more small additions and bugfixes were made, so check the changelog for the full list
  • Starting with 5.7.1, releases are now cryptographically signed to ensure integrity
  • This release has gone through some major stress testing to ensure stability – Gilles regularly asks their Twitter followers to flood a test server with thousands of emails per second, even offering prizes to whoever can DDoS them the hardest
  • OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately
  • Let’s all encourage Kris to stop procrastinating on switching from Postfix

Interview – Jun Ebihara (蛯原純) – jun@soum.co.jp / @ebijun

Lesser-known CPU architectures, embedded NetBSD devices


News Roundup

FreeBSD foundation at BSDCan

  • The FreeBSD foundation has posted a few BSDCan summaries on their blog
  • The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: “Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people.”
  • He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily
  • Their second trip report is from Ahmed Kamal, who flew in all the way from Egypt
  • A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum’s about MINIX and NetBSD
  • There are also two more wrap-ups from Zbigniew Bodek and Vsevolod Stakhov, so you’ve got plenty to read

OpenBSD from a veteran Linux user perspective

  • In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time
  • “For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an ‘old-school’ Linux admin, and I’ve felt out of place with the latest changes on the system administration.”
  • The post is a collection of his thoughts about what’s different between Linux and BSD, what surprised him as a beginner – admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags
  • One of the things that surprised him (in a positive way) was the documentation: “OpenBSD’s man pages are so nice that RTFMing somebody on the internet is not condescending but selfless.”
  • He also goes through some of the basics, installing and updating software, following different branches
  • It concludes with “If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern.”

FreeBSD on the desktop, am I crazy

  • Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up – this time about FreeBSD on the desktop
  • He begins with a bit of forewarning for potential Linux switchers: “It certainly wasn’t an easy journey, and I’m tempted to say do not try this at home to anybody who isn’t going to leverage any of FreeBSD’s strong points. Definitely don’t try FreeBSD on the desktop if you haven’t used it on servers or virtual machines before. It’s got less in common with Linux than you might think.”
  • With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd
  • The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash
  • Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well
  • In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too

OpenIKED and Cisco CSR 1000v IPSEC

  • This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED
  • What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud
  • There are lots of details (and example configuration files) for using IKEv2 and OpenBSD’s built-in IKE daemon
  • It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that’s afraid to try them… don’t be

HardenedBSD improves stack randomization

  • The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area
  • In their initial implementation, the stack randomization was a random gap – this update makes the base address randomized as well
  • They’re now stacking the new on top of the old as well, with the goal being even more entropy
  • This change triggered an ABI and API incompatibility, so their major version has been bumped

OpenSSH 6.9 released

  • The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes
  • There are a couple new things though – the “AuthorizedKeysCommand” config option now takes custom arguments
  • One very notable change is that the default cipher has changed as of this release
  • The traditional pairing of AES128 in counter mode with MD5 HMAC has been replaced by the ever-trendy ChaCha20-Poly1305 combo
  • Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to “no” by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they’re under 1024 bits
  • Many small bugs fixes and improvements were also made, so check the announcement for everything else
  • The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon

Feedback/Questions


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • We’d love to see more participation from the listeners – get in touch with us if you’re doing something interesting you’d like to talk about (or have already written about)
  • If you’re using DNSCrypt on your router to protect your DNS lookups, as mentioned in a few of our tutorials, you may want to consider switching the authoritative resolver away from OpenDNS (since Cisco recently bought them and doesn’t have the best security record)

The post Lost Technology | BSD Now 96 first appeared on Jupiter Broadcasting.

]]>
DES Challenge IV | BSD Now 47 https://original.jupiterbroadcasting.net/62987/des-challenge-iv-bsd-now-47/ Thu, 24 Jul 2014 11:44:16 +0000 https://original.jupiterbroadcasting.net/?p=62987 Coming up this week on the show! We’ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now – the place to B.. SD. Thanks to: […]

The post DES Challenge IV | BSD Now 47 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up this week on the show!

We’ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like.

The latest news, answers to your emails and even some LibreSSL drama, on BSD Now – the place to B.. SD.

Thanks to:


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

g2k14 hackathon reports

  • Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon
  • Lots of work got done – in just the first two weeks of July, there were over 1000 commits to their CVS tree
  • Some of the developers wrote in to document what they were up to at the event
  • Bob Beck planned to work on kernel stuff, but then “LibreSSL happened” and he spent most of his time working on that
  • Miod Vallat also tells about his LibreSSL experiences
  • Brent Cook, a new developer, worked mainly on the portable version of LibreSSL (and we’ll be interviewing him next week!)
  • Henning Brauer worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)
  • Martin Pieuchot fixed some bugs in the USB stack, softraid and misc other things
  • Marc Espie improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency
  • Martin Pelikan integrated read-only ext4 support
  • Vadim Zhukov did lots of ports work, including working on KDE4
  • Theo de Raadt created a new, more secure system call, “sendsyslog” and did a lot of work with /etc, sysmerge and the rc scripts
  • Paul Irofti worked on the USB stack, specifically for the Octeon platform
  • Sebastian Benoit worked on relayd filters and IPv6 code
  • Jasper Lievisse Adriaanse did work with puppet, packages and the bootloader
  • Jonathan Gray imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection
  • Stefan Sperling fixed a lot of issues with wireless drivers
  • Florian Obser did many things related to IPv6
  • Ingo Schwarze worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface
  • Ken Westerback hacked on dhclient and dhcpd, and also got dump working on 4k sector drives
  • Matthieu Herrb worked on updating and modernizing parts of xenocara

FreeBSD pf discussion takes off

  • A thread started on the freebsd-questions and freebsd-current mailing lists this week concerning FreeBSD’s version of pf being old and seemingly unmaintained (unfortunately people didn’t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)
  • Straight from the SMP FreeBSD pf maintainer: “no one right now [is actively developing pf on FreeBSD]” and “Following OpenBSD on features would be cool, but no bulk imports would be made again. Bulk imports produce bad quality of port,
    and also pf in OpenBSD has no multi thread support”
  • Baptiste Daroussin was quick to point out that multi-thread support is not the only difference between FreeBSD and OpenBSD versions of pf, including work that was done to support VIMAGE (network virtualization, to support have entire network stacks in jails)
  • Baptiste Daroussin also reports on his efforts to update FreeBSD pf. He ran into problems and after breaking pf on head, his changes were reverted. He reports that he is still interested in porting individual OpenBSD pf features that are relevant to him, but not in a ‘full sync’ or being the overall maintainer of FreeBSD pf
  • The project is looking for volunteers to continue the work. Mentorship is available for a number of people familiar with the FreeBSD networking stack, and Henning Brauer (one of the authors of OpenBSD pf) has stated his willingness to help on a number of occasions, and candidates can apply to the FreeBSD Foundation for funding
  • Searching for documentation online for pf is troublesome because there are two incompatible syntaxes
  • FreeBSD’s pf man pages are lacking, and some of FreeBSD’s documentation still links to OpenBSD’s pages, which are not compatible anymore
  • The discussion also touched on importing pf patches from pfSense, although the license that these patches are under is not clear at this time
  • Things quickly got off topic as further disagreement among individual developers vs. users derailed the conversation somewhat
  • Many users are very vocal about wanting it updated, saying they are willing to deal with the syntax change and it is worth the benefits
  • Some developers wonder which features of OpenBSD pf users actually want, other than just ‘the latest shiny’
  • Currently the only known problem with FreeBSD pf is with ipv6 fragments, and the VIMAGE subsystem
  • Gleb Smirnoff, author of the FreeBSD-specific SMP patches, says Henning’s claims about OpenBSD’s improved speed are “uncorroborated claims” (but neither side has provided any public benchmarks)
  • Olivier Cochard-Labbé (of the BSD Router Project) provided his benchmarks from Nov 2013 of packet forwarding rates with various configurations of FreeBSD 9.2 and 10, vs OpenBSD 5.4. Here is the raw data and scripts to reproduce and a graph of the results
  • There seem to be many opinions about what to do about pf, but so far no one willing to do the work

LibreSSL progress update

  • LibreSSL’s first few portable releases have come out and they’re making great progress, releasing 2.0.3 two days ago
  • Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list
  • However, there has already been some drama… with Linux users
  • There was a problem with Linux’s PRNG, and LibreSSL was unforgiving of it, not making an effort to randomize something that could not provide real entropy
  • This “problem” doesn’t affect OpenBSD’s native implementation, only the portable version
  • The developers decide to weigh in to calm the misinformation and rage
  • A fix was added in 2.0.2, and Linux may even get a new system call to handle this properly now – remember to say thanks, guys
  • Ted Unangst has a really good post about the whole situation, definitely check it out
  • As a follow-up from last week, bapt says they’re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly – if you’re a port maintainer, please test your ports against it

Preparation for NetBSD 7

  • The release process for NetBSD 7.0 is finally underway
  • The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September
  • If you run NetBSD, that’ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)
  • They’re also looking for some help updating documentation and fixing any bugs that get reported
  • Another formal announcement will be made when the beta binaries are up

Interview – Dag-Erling Smørgrav – des@freebsd.org / @RealEvilDES

The role of the FreeBSD Security Officer, recent ports features, various topics


News Roundup

BSDCan ports and packages WG

  • Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages
  • Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages
  • There’s also some detail about the signing infrastructure and different mirrors
  • Ports people and source people need to talk more often about ABI breakage
  • The post also includes information about pkg 1.3, the old pkg tools’ EOL, the quarterly stable package sets and a lot more (it’s a huge post!)

Cross-compiling ports with QEMU and poudriere

  • With recent QEMU features, you can basically chroot into a completely different architecture
  • This article goes through the process of building ARMv6 packages on a normal X86 box
  • Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now
  • The poudriere-devel port now has a “qemu user” option that will pull in all the requirements
  • Hopefully this will pave the way for official pkgng packages on those lesser-used architectures

Cloning FreeBSD with ZFS send

  • For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen
  • This post shows his entire process in creating a mirror machine, using ZFS for everything
  • The “zfs send” and “zfs snapshot” commands really come in handy for this
  • He does the whole thing from a live CD, pretty impressive

FreeBSD Overview series

  • A new blog series we stumbled upon about a Linux user switching to BSD
  • In part one, he gives a little background on being “done with Linux distros” and documents his initial experience getting and installing FreeBSD 10
  • He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels
  • Most of what he was used to on Linux was already in the default FreeBSD (except bash…)
  • Part two documents his experiences with pkgng and ports

Feedback/Questions


  • All the tutorials are posted in their entirety at bsdnow.tv
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Last week we talked a bit about hardware compatibility, check out the NYC BSD Users’ Group’s dmesgd , a database of user submitted dmesg output from various hardware on various BSD’s. Help the community, submit your dmesg today!
  • If you want to come on for an interview or have a tutorial you’d like to see, let us know – we want to do what the viewers want to see
  • Watch live Wednesdays at 2:00PM Eastern (18:00 UTC)

The post DES Challenge IV | BSD Now 47 first appeared on Jupiter Broadcasting.

]]>
Base ISO 100 | BSD Now 44 https://original.jupiterbroadcasting.net/61457/base-iso-100-bsd-now-44/ Thu, 03 Jul 2014 11:46:54 +0000 https://original.jupiterbroadcasting.net/?p=61457 This time on the show, we’ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we’ll show you how to roll your own OpenBSD ISOs with all the patches already applied… ISO can’t wait! This week’s news and answers to all your emails, on BSD Now – […]

The post Base ISO 100 | BSD Now 44 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This time on the show, we’ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we’ll show you how to roll your own OpenBSD ISOs with all the patches already applied… ISO can’t wait!

This week’s news and answers to all your emails, on BSD Now – the place to B.. SD.

Thanks to:


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

pfSense 2.1.4 released

  • The pfSense team has released 2.1.4, shortly after 2.1.3 – it’s mainly a security release
  • Included within are eight security fixes, most of which are pfSense-specific
  • OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)
  • It also includes a large number of various other bug fixes
  • Update all your routers!

DragonflyBSD’s pf gets SMP

  • While we’re on the topic of pf…
  • Dragonfly patches their old[er than even FreeBSD’s] pf to support multithreading in many areas
  • Stemming from a user’s complaint, Matthew Dillon did his own work on pf to make it SMP-aware
  • Altering your configuration‘s ruleset can also help speed things up, he found
  • When will OpenBSD, the source of pf, finally do the same?

ChaCha usage and deployment

  • A while back, we talked to djm about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5
  • This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20
  • OpenSSH offers it as a stream cipher now, OpenBSD uses it for it’s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it
  • Both Google’s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not
  • Unfortunately, this article has one mistake: FreeBSD does not use it – they still use the broken RC4 algorithm

BSDMag June 2014 issue

  • The monthly online BSD magazine releases their newest issue
  • This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, “saving time and headaches using the robot framework for testing,” an interview and an article about the increasing number of security vulnerabilities
  • The free pdf file is available for download as always

Interview – Craig Rodrigues – rodrigc@freebsd.org

FreeBSD’s continuous testing infrastructure


Tutorial

Creating pre-patched OpenBSD ISOs


News Roundup

Preauthenticated decryption considered harmful

  • Responding to a post from Adam Langley, Ted Unangst talks a little more about how signify and pkg_add handle signatures
  • In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end – this had the advantage of not requiring any extra disk space, but raised some security concerns
  • With signify, now everything is fully downloaded and verified before tar is even invoked
  • The pkg_add utility works a little bit differently, but it’s also been improved in this area – details in the post
  • Be sure to also read the original post from Adam, lots of good information

FreeBSD 9.3-RC2 is out

  • As the -RELEASE inches closer, release candidate 2 is out and ready for testing
  • Since the last one, it’s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things
  • The updated bsdconfig will use pkgng style packages now too
  • A lesser known fact: there are also premade virtual machine images you can use too

pkgsrcCon 2014 wrap-up

  • In what may be the first real pkgsrcCon article we’ve ever had!
  • Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event
  • Unfortunately no recordings to be found…

PostgreSQL FreeBSD performance and scalability

  • FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales
  • On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings
  • Lots of technical details if you’re interested in getting the best performance out of your hardware
  • It also includes specific kernel options he used and the rest of the configuration
  • If you don’t want to open the pdf file, you can use this link too

Feedback/Questions


  • All the tutorials are posted in their entirety at bsdnow.tv
  • There, you’ll also find a link to Bob Beck’s LibReSSL talk from the end of May – we finally found a recording!
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • If you want to come on for an interview or have a tutorial you’d like to see, let us know
  • Watch live Wednesdays at 2:00PM Eastern (18:00 UTC)
  • Next week Allan will be at BSDCam, so we’ll have a prerecorded episode then

The post Base ISO 100 | BSD Now 44 first appeared on Jupiter Broadcasting.

]]>