Privacy Defender Webinar Ticket $70Privacy Defender tickets are the recommended ticket type for those who can afford to help fund the digital security and online privacy advocacy communities with their financial resources, are attending the workshop with the support of their employers or other backers, or have other resources available to them. Purchasing tickets at this level makes it possible for us to offer reduced price tickets to those in need.
General Admission $35General Admission tickets are the regular ticket type intended for members of the general public.
Reduced price admission (for queer-identified, femme, and BIPOC people) $25Reduced price workshop tickets help offset systemic biases prevalent in society and in the technology sector especially.
Prices shown may exclude nominal handling fees. All sales are final and non-transferable. When you make a purchase, our payment processor retains a copy of your billing information, which may include your legal name, address, and other details.
Thank you for purchasing a ticket to our upcoming “Ship Shape Computing: Working with Containers and Containerizing Digital Workloads” webinar. Please allow several minutes for delivery of your webinar access credentials to the email address associated with your payment processor account. Remember to check your spam folder, as well!
If you still don’t receive your webinar access credentials after one hour, please contact us and we’ll help you get it sorted.
Your order has been cancelled.
Learn how to pack up your code bases, apps, and microservices and get ready to set sail aboard container orchestration platforms in the cloud or on your own metal in this introductory workshop about working with containers. Far from a newfangled buzzword, containerizing digital workloads have precedents dating back to the invention of the UNIX operating system in the 1970’s. Today, operating container engines like Docker and orchestration platforms like Kubernetes are increasingly essential skills, but difficult to navigate. This workshop will put you back on course by providing a ground-up view of what containers really are, where they came from, and how to best use them for DevOps, site reliability, and even enhanced security tasks.
In the earliest days of computing, an application would be responsible for processing only very small amounts of input. It would then produce a similarly small amount of output, working as fast and efficiently as possible. Known as a processing “pipeline,” this early solutions paradigm is most famously expressed as the so-called “UNIX philosophy,” a programmer’s adage that states each program should “do (only) one thing, and do it well,” and it’s still the beating heart of powerful computer interfaces such as command line use to this day.
Then, all throughout the 1980’s, 90’s, and 2000’s, as computing speed relentlessly increased while its cost simultaneously plummeted, companies began building larger, more complex applications. Known as “monoliths,” this generation of apps were well-suited for their environment, where they were deployed onto singular mainframe-like computers housed inside private server rooms. But these application architectures are no longer sensible in a world where cloud computing and virtualization technologies make it possible to dynamically reserve compute power as user demand ebbs and flows. Why over-purchase server hardware when you can spin up another virtual machine to handle a spike in traffic, then automatically have that machine shut itself down when incoming requests settle back at manageable levels?
That’s one reason why, today, online apps from Google, Facebook, and others are written as “microservices.” Far from being worthy of the buzzword-driven hype, this paradigm is actually a return to software’s original designs where the goals of a larger application are processed independently by a set of cooperating but independent smaller programs, each one performing only one job very well. To make this work in today’s cloud environments, each microservice must be “containerized,” packaged into a single Operating System process that is run by a container management engine such as Docker, CoreOS’s rkt (pronounced “rocket”), or LXD in preparation for being orchestrated across a fleet of hundreds or thousands of (often virtual) compute instances.
In this hands-on workshop, you’ll learn how to make use of the thousands of ready-made containers available at container registries such as the Docker Hub, create new containers from scratch, containerize existing codebases, manage running containers, and more. We’ll explore how to troubleshoot container failures, show how to network multiple containers together, and touch on container orchestration tools like Docker’s Swarm mode, HashiCorp Nomad, Apache Mesos/Marathon, and Kubernetes to see how our containers can be automatically distributed, or “scheduled,” and be tasked with their specialized workloads across a virtual private cloud based on whatever resources we have available to us.
As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so purchase your ticket now to reserve your spot.
To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of Mozilla Firefox or Google Chrome. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.
If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.
Please refer to our workshops and webinars FAQ for additional tips and advice before you join the video conference.
As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior will result in immediate removal from class without a refund. Please refer to our lightweight social rules for details on our strictly enforced no-tolerance policy against bigotry of any kind.
About Tech Learning Collective
Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit TechLearningCollective.com.
- New York NY United States
- New York NY United States