Author: ProHoster

The software core of the onboard cyber infrastructure of the unified strike fighter F-35

An overview of the key components of the "Autonomous Logistics Information System" (ALIS) of the F-35 Unified Strike Fighter. A detailed analysis of the “combat use support unit” and its four key components: 1) human-system interface, 2) executive-control system, 3) on-board immune system, 4) avionics system. Some information about the F-35 fighter software and hardware and about the tools that are used for its on-board software. A comparison is made […]

Cisco Training 200-125 CCNA v3.0. Day 8. Setting up the switch

Welcome to the world of switches! Today we will talk about switches. Let's assume that you are a network administrator and you are in the office of a new company. A manager approaches you with an out-of-the-box switch and asks you to set it up. You might think that we are talking about an ordinary electrical switch (in English, the word switch means both a network switch and an electric […]

Xiaomi accelerates production: Redmi K20 Pro sold out in China

At the end of May, the Xiaomi-owned Redmi brand introduced the flagship smartphone Redmi K20 Pro and its somewhat simplified version Redmi K20. An emphasis on the aspects that are most interesting to the mass user and savings in other areas allowed the company to offer a flagship product with an attractive price. Proof of this can be the results of the initial sales of the Redmi K20 Pro smartphone in China: for example, 1 […]

Release of earlyoom 1.3, a process for early response to low memory

After seven months of development, the earlyoom 1.3 background process has been released, which periodically checks the amount of available memory (MemAvailable, SwapFree) and tries to respond at an early stage to memory shortages. If the amount of available memory is less than the specified value, then earlyoom will force (by sending SIGTERM or SIGKILL) the process that is consuming the most memory (having the highest /proc/*/oom_score) to terminate, […]

"Yandex" does not consider it legitimate to transfer encryption keys to the FSB

Messages have appeared on the Internet about Yandex receiving a request from the FSB to provide encryption keys for user correspondence. Although the request was received several months ago, this became known only now. As noted by the RBC resource, the request regarding the transfer of encryption keys for the Yandex.Mail and Yandex.Disk services was never fulfilled. The Yandex press service told RBC that the legal requirements for providing […]

Kaspersky Lab rebranded

Kaspersky Lab has rebranded and updated the company logo. The new logo uses a different font and does not include the word lab. According to the company, the new visual style emphasizes the changes taking place in the IT industry and Kaspersky Lab’s desire to make security technologies accessible and simple for everyone, regardless of age, knowledge and lifestyle. “Rebranding is a natural stage in the evolution [...]

Leak: The Surge 2 may be released on September 24

It seems that the digital store Microsoft Store has prematurely declassified the release date of the hardcore role-playing action game The Surge 2. According to the information on the pre-order page, the release will take place on September 24. The pre-order price from this store is $59,99. Sales have not yet started on other platforms, and the release date has not been officially confirmed. By purchasing the RPG in advance, you will receive additional in-game materials: a […]

At the ENOG 16 conference, they proposed switching to IPv6

The regional conference for the Internet community ENOG 16/RIPE NCC, which started on June 3, continued its work in Tbilisi. RIPE NCC External Relations Director for Eastern Europe and Central Asia Maxim Burtikov noted in a conversation with journalists that the share of Russian IPv6 Internet traffic, according to Google, currently amounts to 3,45% of the total volume. In the middle of last year this [...]

The main arena of the country. How Luzhniki was updated before the World Cup

The time has come to tell you how we prepared the Luzhniki Stadium for the World Cup. The INSYSTEMS and LANIT-Integration team received low-current, fire safety, multimedia and IT systems. Actually, it’s still too early to write memoirs. But I'm afraid that when the time comes for this, a new reconstruction will happen, and my material will become outdated. Reconstruction or new construction I really love history. I freeze in front of some guy’s house [...]

Do you want to be a little happier? Try to be the best in your business

This is a story for those whose only resemblance to Einstein is the mess on their desk. A photo of the great physicist's desk was taken a few hours after his death, on April 28, 1955, in Princeton, New Jersey. The Myth of the Master All culture created by man is based on archetypes. Ancient Greek myths, great novels, Game of Thrones - the same […]

When should we test the non-inferiority hypothesis?

An article from the Stitch Fix team suggests using the non-inferiority trials approach in marketing and product A/B tests. This approach really applies when we are testing a new solution that has benefits that are not measured by tests. The simplest example is cost reduction. For example, we automate the process of assigning the first lesson, but we don’t want to significantly reduce end-to-end conversion. Or we test […]

Unity Game Engine Developers Announce Unity Editor for GNU/Linux

Unity Technologies has announced a preview release of the Unity Editor for GNU/Linux. This release comes after several years of publishing unofficial experimental builds. The company now plans to provide official support for Linux. It is noted that the range of supported operating systems is expanding due to the growing demand for Unity in various fields, from the gaming and film industries to the automotive […]