Syllabus - jeppersons/SkyPilot GitHub Wiki

Establish your Entity

### let's bootstrap

When I first started you had to first feed in the bootstrap tape

<<it would be fun to find a YouTube of a TTY reading a 'bootstrap' tape on a loop, w/noise>>

                              [Something close](https://www.youtube.com/watch?v=KjgM3cpgiIk)

This was my First Computer a PDP 8

16,000,000 bits 8 bit words 2,500 possible object actions. . .period! but remember. . . any use of storage cuts into that

 ACTUALLY THAT WAS A LOT THEN

OBJECT/ACTION

An object has: Properties Context

. . . its all about 'Context' with has to be integrated with Security

WHERE YOU ARE _

WHAT YOU CAN SEE and, _

WHAT YOU CAN DO_

Imagine You what to be a Virtual Machine in the Cloud

  • Perform Services
  • Answer queries
  • Your can be The 'APP' what you want to be choose your environment, use the languages you want . . .anything you might need * _You can even be an ATARI v1.0 _----- forever ----- _ should you choose `

What the Internet Offers us

  • A Bombed out reality – Those Military Years & ARPNET

  •     --the breaking-up of UNIX into the 'baby bells' 
    
  • ROUTERS -- Packet routing Do I go this way or that? What's the fastest route? * DataStreams normally get broken up.

  • Protocols What 'language' do I speak? NOTES: Maybe with the CERN link, deconstruct an address like smtp://mail.web.edu:5000/stuff maybe even H, N, A, R, records meanings to router.

You're paying $10 a mouth for your phone's N record (16 bites?) in the cloud

*** In the end: IT'S STATELESS**

                        *WE NEED COOKIES	
          > Making it ‘safe’ for Commerce
              We can't forget [The Enigma Machine](https://en.wikipedia.org/w/index.php?title=Enigma_machine&oldid=1186861859)
  • SIDs to CRYPTO

Security tokens: Our gateway to everything tracks back to the

The Enigma Machine

Develop how this methodology is still our best solution>>>

Blue tooth, encryption, crypto . . . everything * AND is all goes away if they ever get the Quantum Computer working.

CERN and Al Gore’s Internet

  A backgrounder on IP addressing, subnets, protocols and global influences 

NOTES: decompose an URL Arnie

The "Emergence of Mozilla" (Netscape)--------

Don't forget shmoos, Futureshock and Silicon Snake Oil

# # Here's What We’ve Built – The ISO Model

  • The best minds of a generation
  • The Giant killer - IBM,Novel . . .

ISO model Power Point

Focus on Our layers

  • APPS
  • SESSIONS
  • TRANSPORT

*** Taking the BIG DIVE! ** *** Put a shell around it** *** Clone it** Hop on the cloud!

  • To Infinity and Beyond

What is a Computer anyway?

  • CPU
  • Memory
  • Storage
  • Bus

WHAT WE WANT

Isolation in our SHELL

  • Across Time and Space
  • Control our resources.
  • Local libaries --we want be small, move fast

# ‘Choose’ YOUR Environment and BUT --STAY in your lane.

  • Send and Receive Protocols
  • HTTP, FTP, SMPT . . .
  • Listening
  • Ports and Firewalls

The Architecture

Client/Server?

  • I’m just an old fart. Don't let my say any of that <> Pinging ports

<>


Services as Virtual Machines

  • What services do we want?
  • What are selling?

-- SERVICES <>

Now digitize it <> <> changing these vectors into usable data Data Modifications PP on MPU6050 Test PP slides

FINALLY" This is what its all about!

Dusty PHONEs HOME

  • SOAP

Documentation

GET SMALL! Running in tight spots and leaving your shell behind

THE REGISTRIES GIT HUB Linking the world together talk about building requiremnts.txt and how we use it.

In Summary

  • WHAT WE WHAT
  • WHAT WE CAN DO

Other topics

  • Features (or methods)
  • Transaction processing
  • feeding the log file beast
  • bulk transfer – replication
  • Put on a BOW on it by saving your cursers
  • Control our appearance and security.

Call out the Hounds.

  • Clones and Scaling
  • Load balancing
  • Into the clouds
  • Your Sandbox

Overview of the Lab Environment

Two Computers and a Router <<moving camera video of NED, DUSTY, LUCKY>>

What's the goal here

We need to have a clear picture of libraries and file structures -- if we are to port the right stuff to a new machine * NO more fudging! (just adding libraries until the 'Not Found' errors go away)

  • Protocols, Web Services & buffering
  • The Security Shell, ports and firewalls Replicating folders, libraries, profiles

The Lab Environment re-enforces structures, security, via naming conventions and analogies

  • de-gobbledygooking the technical details

Building a space program

  • Bruins Altimeter

NOW Take the same services and deploy to differing environment like a drown

Clone and re-deploy that

A cluster of Drowns

Meet our Cast of Characters

You can't tell the players without a program.

the-three-amigos-thumb-1200w

I use nick names for different concepts and, to develop the different roles they play.

_Consider this as a primer for most of the other material _


Lucky's First Prototype

KISS - Plug & Play ?

  • Devices with QWIIC connectors are used to avoid prototyping and wiring issues.
  • That leaves you 16 pins (I'm only taking four)
  • WE ARE JUST ABOUT DATA

PHONE HOME

STREAMING OUR SERVICE TO THE SQL SERVICE

--the MCP! Living in its own Shell <>

MORE MORE

LIBRAIRES AND FILE STUCTURES HAVE TO BE RIGHT IF WE ARE TO MOVE TO A NEW MACHINE

Backups DD Replicating Folders/Libraries Curl Librariy build out scripts. The Great Registry in the Sky - github <> Vertical vs. Horizontal databases <> Come to love your log files!

Strange Bedfellows we've Created APPS are displaced not upgraded. What’s your hit rate? but they may always be around too Concatenated Library Structures The heart an soul of QA & testing in the big bad world so try to think that way

Drawing lines in the mush

Fun with Pivot Tables and the Virtual Data Structure

that IS the internet

      that IS driving our economy
      that IS training our AIs

Having AI as your development partner

I'm an old fart

https://clipchamp.com/watch/yVCJEXBiMiM

In the end it's about Asking the Right Question

APPEDIX

Things to think about when expanding --Wanted to deliver solid bare-bones solution, but there are necessities to consider:

Adding a larger storage device

  • On a machine
  • On the router

Configure your router

* Subnetting for fun and profit

Automated backups