Bills of materials or BOMs are nothing new, but they are new in the software industry. They have been part of many supply chains for decades. When you purchase a car or a pharmaceutical device, the manufacturer of those products maintains a list of...
Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing
Presented by David Godlove at MAGIC meeting on February 7, 2018
HPC COMPATIBLE SECURITY MODEL
• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even
in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own
Join Our Mailing List
There are many different approaches that can be taken when building software. At one end of the spectrum is the extreme caution and conservatism that’s appropriate, for example, of safety critical code used in vehicles or in real-time operating systems. At the other...
In the development world, continuous integration is where members of a team integrate all their work frequently, for example, think of a team all working on the same code base, they are fixing bugs, implementing new features, so to prevent conflicts, all the code is...