Federico Lucifredi is the Product Management Director for Ceph Storage at Red Hat and a co-author of O'Reilly's "Peccary Book" on AWS System Administration. Previously, he was the Ubuntu Server product manager at Canonical, where he oversaw a broad portfolio and the rise of Ubuntu Server to the rank of most popular OS on Amazon AWS. A software engineer-turned-manager at the Novell corporation, he was part of the SUSE Linux team, overseeing the update lifecycle and delivery stack of a $150 million maintenance business. A CIO and a network software architect at advanced technology and embedded Linux startups, Federico was also a lecturer for over 200 students in Boston University's graduate and undergraduate programs, and simultaneously a consultant for MIT implementing fluid-dynamics simulations in Java.

Presentations

22x

Ceph Storage: a Caffeinated Primer

Ceph is an open source distributed object store, network block device, and file system designed for reliability, performance, and scalability. It runs on commodity hardware, has no single point of failure, and is supported in the Linux kernel.

This tutorial will describe the Ceph architecture, share its design principles, and discuss how it can be part of a cost-effective, reliable cloud stack.

 

See Presentation
21x

Ceph Storage: a Caffeinated Primer

Ceph is an Open Source distributed object store, network block device, and file system designed for reliability, performance, and scalability. It runs on commodity hardware, has no single point of failure, and is supported in the Linux kernel.

This tutorial will describe the Ceph architecture, share its design principles, and discuss how it can be part of a cost-effective, reliable cloud stack.

See Presentation
20x

Introduction to Ceph

Introduction to Ceph

See Presentation
19x

Data Security and Storage Hardening in Rook and Ceph

We explore the security model exposed by Rook with Ceph, the leading software-defined storage platform of the Open Source world. Digging increasingly deeper in the stack, we examine hardening options for Ceph storage appropriate for a variety of threat profiles.

See Presentation
18x

Building Raspberry PI Supercomputers

Federico discusses what is required to integrate clusters of ARM SBCs, with a focus on Raspberry PI units due to their popularity; the software integration necessary to make them practical, what is necessary to easily configure nodes, and issue commands for system operation; and concludes with how to execute numerical workloads using the MPI interface.

See Presentation
17x

Hardware Hacking 101: Rogue Keyboards and Eavesdropping Cables

This is a live demonstration of hacking with keystroke injection attacks. We will be taking advantage of the inherent trust that computers place on what is believed to be a regular keyboard to unleash pre-programmed keystroke payloads at well over 1000 words a minute. We then dissect an easily-sourced, low-cost hardware implant embedded in a standard, innocent-looking USB cable providing an attacker with even more capabilities, including geolocation.

See Presentation
16x

Hardware Hacking 101: time and randomness

Using the lowest amount of custom hardware and pouring Perl and Shell Script over everything as the glue binding it all, we create two minimalistic devices delivering a perfectly tuned network time source (synchronizing with a GPS satellite), and a naturally random entropy source (leveraging a Geiger tube’s measurement of natural background radiation).

 

See Presentation
15x

Hardware hacking 101: There is plenty of room at the bottom

This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control and clocking in at an impressive 426 BogoMIPS - We can't possibly leave that territory unexplored, can we?

See Presentation
13x

Ubuntu Server Deep Dive: Security

Join the Ubuntu Server Product and Engineering Managers for a deep dive including a full overview of security features, and our choice of favorite new capabilities found in kernel and userland features.

See Presentation