Linux — Debugging a Python Process with gdb

<MEDIUM: https://raaki-88.medium.com/linux-debugging-a-python-process-with-gdb-b9ea67173aff&gt;

Have you anytime used py-bt inside gdb or used gdb to trace a linux process, if so you can skip this post

GDB is awesome! Am not a everyday programmer but I have been studying internal of linux and operating systems and its fascinating. I wrote about process last time <https://raaki-88.medium.com/linux-process-what-happens-under-the-hood-49e8bcf6173c> and continuing towards threads, Its now making sense when we import modules in python lets examine below snippet which is typically used in Python.

>>> from concurrent.futures import ThreadPoolExecutor

vs

>>> from concurrent.futures import ProcessPoolExecutor

One of the distinctions that I learnt when studying these two functions for multiprocessing is that typical use of ThreadPoolExecutor is when you have IO based activity while ProcessPool is for CPU bound compute activity, I left that

What I now understood is that thread is an integral part of process, there can be multiple threads with in a process and there can be multiple processes, each process needs to be scheduled for CPU cycles and you have different locking mechanism for single process. Now, scheduler algorithm schedules these process as linux is time-sharing based operating system, effectively schedules processes on many factors, Continue reading

Linux — Process, what happens under the hood?

<MEDIUM: https://raaki-88.medium.com/linux-process-what-happens-under-the-hood-49e8bcf6173c&gt;

I have taken operating systems for granted but looking internally it’s an excellent experience to understand how everything gets glued together, this post will be an overview of a process and what happens to a process.

A program is nothing but a set of instructions that the user writes for the desired behavior after execution. when the program gets into a running state that’s when you have a process which gets created and gets associated with the program, in other words, this is how to program is abstracted by the process.

Let’s consider the below python program, we will create some Child processes and Parent processes from the program and see how the underlying operating sees when we execute the program.

You don’t have to be a python expert to know what is going on in this program, basically, we can see the python program has an imported OS module and then it calls on fork() operation to create various child processes.

import os
def child():
    print('\nA new child', os.getpid())
    os._exit(0)

def parent():
    while True:
        newpid = os.fork()
        if newpid == 0:
            child()
        else:
            pids = (os.getpid(), newpid)
            print("Parent: %d,  Continue reading

Heavy Networking 640: Architecture Vs. Engineering Roles

What’s been your experience with architecture vs. engineering roles? Are those distinct functions or combined in your organization? How do the roles interact? Does the architecture team hand down holy designs from their ivory tower the engineering team is expected to implement them? Is the architecture and engineering function more combined, where experienced engineers are expected to create an architecture and help put it in place? Ethan Banks and guest Pat Allen share their experiences with architecture and engineering roles from organizations they've worked in.

Heavy Networking 640: Architecture Vs. Engineering Roles

What’s been your experience with architecture vs. engineering roles? Are those distinct functions or combined in your organization? How do the roles interact? Does the architecture team hand down holy designs from their ivory tower the engineering team is expected to implement them? Is the architecture and engineering function more combined, where experienced engineers are expected to create an architecture and help put it in place? Ethan Banks and guest Pat Allen share their experiences with architecture and engineering roles from organizations they've worked in.

The post Heavy Networking 640: Architecture Vs. Engineering Roles appeared first on Packet Pushers.

Network security depends on two foundations you probably don’t have

You’ve done everything to secure your network, and you still face threats. That’s what most enterprises say about their network security, and they’re half right. Yes, they still face threats, but they’ve not done everything to address them. In fact, most enterprises haven’t really implemented the two foundations on which real network security must be based.When I ask enterprises whether they’ve done a top-down analysis of network security, they usually say they do it every year. When I ask what’s involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.To read this article in full, please click here

Network security depends on two foundations you probably don’t have

You’ve done everything to secure your network, and you still face threats. That’s what most enterprises say about their network security, and they’re half right. Yes, they still face threats, but they’ve not done everything to address them. In fact, most enterprises haven’t really implemented the two foundations on which real network security must be based.When I ask enterprises whether they’ve done a top-down analysis of network security, they usually say they do it every year. When I ask what’s involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.To read this article in full, please click here

Network security depends on two foundations you probably don’t have

You’ve done everything to secure your network, and you still face threats. That’s what most enterprises say about their network security, and they’re half right. Yes, they still face threats, but they’ve not done everything to address them. In fact, most enterprises haven’t really implemented the two foundations on which real network security must be based.When I ask enterprises whether they’ve done a top-down analysis of network security, they usually say they do it every year. When I ask what’s involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.To read this article in full, please click here

Enforcing SLAs with Real Data

I’m sure by now you’ve probably seen tons of articles telling you about how important it is to travel with location devices in your luggage. The most common one I’ve seen is the Apple AirTag. The logic goes that if you have one in your checked suitcase that you’ll know if there are any issues with your luggage getting lost right away because you’ll be notified as soon as you’re separated from it. The advice is sound if you’re someone that checks your bag frequently or has it lost on a regular basis.

The idea behind using technology to enforce an agreement is a great one. We make these agreements all the time, especially in networking. These service level agreements (SLAs) are the way we know we’re getting what we pay for. Take a leased line, for example. You typically pay for a certain speed and a certain amount of availability. The faster the link or the more available it is the more it costs. Any good consumer is going to want to be sure they’re paying for the right service. How can you verify you’re getting what you’re paying for?

For a long time this was very hard to Continue reading

Edge data center market to double in next 5 years, researchers say

The market for edge data center services and equipment will grow at a compound annual rate of 17% over the next five years, propelling the total size of the market above $18 billion by 2026, according to a report from Ireland-based analytics firm ResearchAndMarkets.com.Edge data centers, which the report defined as “small data centers located close to the edge of a network”—that is, closer to the end-user than the public cloud—are currently a $9.3 billion global market, the researchers said, which they predict will nearly double in size in the next half-decade.To read this article in full, please click here

Edge data center market to double in next 5 years, researchers say

The market for edge data center services and equipment will grow at a compound annual rate of 17% over the next five years, propelling the total size of the market above $18 billion by 2026, according to a report from Ireland-based analytics firm ResearchAndMarkets.com.Edge data centers, which the report defined as “small data centers located close to the edge of a network”—that is, closer to the end-user than the public cloud—are currently a $9.3 billion global market, the researchers said, which they predict will nearly double in size in the next half-decade.To read this article in full, please click here