What did you change?!?!
Gary Larizza – Puppet Labs
Have you ever wondered how many times we make changes to files or scripts in a deployment process? Gary Larizza did and in a volcanic session, explained how this can be kept under control by tracking changes using a powerful open-source tool called Git. As per Murphy’s Law, if something can go wrong, it will. With Git, there will be a way to step back in time. This is just one of the amazing features showed during the session, which demonstrated the versatility of this tool that can also be useful in many different situations, such as file comparison or even as a backup solution. So we can now go play with files and then if something goes wrong, do not panic, just let Git “fix it”. Nice one Gary.
IPv6 : success for migration
Rick Wylie – Key Options
I bet any of you, at least one time, looked at the option “Configure IPv6” in the network preferences pane said and said “So what?” Quite soon we will no longer be able to ignore that setting. Rick Wylie has shown in his session a good number of valid reasons to pay attention to IPv6. Among these reasons, the most important is that the IPv4 address space will run out. There is no way Internet growth can continue other than adopting IPv6 as a new primary standard. The session highlighted what will happen with the introduction of IPv6, the implications with DNS, the conversion mechanism between IPv4 and IPv6 we could adopt as well as an effective strategy to plan a successful transition. We will be spectators of great change sooner than we can think, this is certain!
Paul Suh – ps Enable, Inc.
Taking-off with a mathematic explanation that landed in just 3 slides then moving on to a more human-race understandable one, Paul Suh gave a clear overview of one of the toughest topics of the conference: Digital Certificates. The session was an interesting travel through Private and Public keys and their interaction to secure connections between parties, the role of the Certificate Authorities, where certificates are located within the OS and how they are pushed to devices and computers. Public-Key Infrastructure and what goes around it should now be “unencrypted”.