Author: ProHoster

Detroit: Become Human Free Demo Now Available on EGS

Developers from the Quantic Dream studio have published a free demo of the game Detroit: Become Human on the Epic Games Store. Thus, those interested can try the new product on their hardware before purchasing, because David Cage’s studio recently revealed the system requirements for the computer port of its game - they turned out to be quite high for an interactive movie. You can try a free demo of Detroit: Become Human now by downloading […]

New article: Review of the Realme X2 Pro smartphone: flagship hardware without overpaying for the brand

At one time, Xiaomi offered the world smartphones with top-end technical characteristics at the price of budget A-brand handsets. This tactic worked and quickly bore fruit - in many countries, including Russia, the company is loved very much, loyal fans of the brand have appeared, and in general, Xiaomi has successfully made a name for itself. But everything is changing - modern Xiaomi smartphones […]

Introduction to SSD. Part 2. Interface

In the last part of the “Introduction to SSD” series, we talked about the history of the appearance of disks. The second part will talk about interfaces for interacting with drives. Communication between the processor and peripheral devices occurs according to predefined conventions called interfaces. These agreements regulate the physical and software level of interaction. Interface is a set of tools, methods and rules of interaction between system elements. […]

JJ Abrams considers Kojima a master of story-driven games

In a fresh interview with IGN, Star Wars writer, director and producer J. J. Abrams noted the unique talent of Hideo Kojima. The closer the release of Death Stranding got, the more often some Internet users criticized Kojima’s work. However, there is no arguing that the creator of Metal Gear truly brought innovative ideas and gameplay to the industry. Other […]

Load balancing in Zimbra Open-Source Edition using HAProxy

One of the main tasks when building large-scale Zimbra OSE infrastructures is proper load balancing. In addition to the fact that it increases the fault tolerance of the service, without load balancing it is impossible to ensure the same responsiveness of the service for all users. In order to solve this problem, load balancers are used - software and hardware solutions that redistribute requests between servers. Among them there are quite […]

DevOps Moscow Meetup 17/12

We invite you to the DevOps Moscow community meetup, which will take place on December 17 at Raiffeisenbank. Let's listen to a report about the DORA organization and the annual State of DevOps report. And in the format of a discussion, we will discuss together: on what principles can the path of transformation for the better be built for the company, what kind of teams within it can be for this, and other topical issues. Waiting for you […]

Imec unveils ideal transistor for 2nm process technology

As we know, the transition to a 3 nm process technology will be accompanied by a transition to a new transistor architecture. In Samsung terms, for example, these will be MBCFET (Multi Bridge Channel FET) transistors, in which the transistor channel will look like several channels located above each other in the form of nanopages, surrounded on all sides by a gate (for more details, see the archive […]

Kubernetes 1.17 - how to upgrade and not spend the entire error budget

On December 9, the next version of Kubernetes was released - 1.17. Its motto is “Stability”, many features received GA status, a number of outdated features were removed... And, as always, our favorite Action Required section of the CHANGELOG-1.17.md file requires attention. Let's work with our hands... Attention, Storage! Updating kubelet on the fly is not supported in version 1.17 because the path has changed […]

Data privacy issue in Active Directory

I was doing penetration testing using PowerView and used it to extract user information from Active Directory (AD). At the time, my emphasis was on collecting security group membership information and then using that information to navigate the network. In any case, AD contains confidential employee data, some […]