Author: ProHoster

12 Tools That Make Kubernetes Easier

Kubernetes has become the standard way, and many will prove it by deploying containerized applications at different scales. But if Kubernetes helps us deal with messy and complex container deliveries, what will help us deal with Kubernetes? It can also be complex, confusing and difficult to manage. As Kubernetes grows and develops, many of its nuances will, of course, be eliminated within […]

Turing Pi is a cluster board for self-hosted applications and services

Turing Pi is a solution for self-hosted applications built on the principle of rack racks in a data center, only on a compact motherboard. The solution is focused on building a local infrastructure for local development and hosting of applications and services. In general, it's like AWS EC2 only for edge. We are a small team of developers who decided to create a solution for building bare-metal clusters in edge […]

CrossOver, the software for running Windows apps on Chromebooks, is out of beta

Good news for Chromebook owners who don't have enough Windows apps on their machines. The CrossOver software, which allows you to run applications under Windows OS in the Chomebook software environment, has left the beta. True, there is a fly in the ointment in this barrel of honey: the software is paid, and its cost starts at $40. Nevertheless, the solution is interesting, so we are already preparing […]

We are updating the marketplace: tell us how better?

This year we set ourselves ambitious goals for product improvement. Some tasks require serious preparation, for which we collect feedback from users: we invite developers, system administrators, team leaders, and Kubernetes specialists to the office. In some, we issue servers in response to feedback, as was the case with Blurred Education students, for example. We have very busy chats […]

We entered the university and showed the teachers how to teach students. Now we collect the largest audiences

Have you noticed, if you say the word “university” to a person, how he immediately plunges into stuffy memories? There he wasted his youth on useless objects. There he received outdated knowledge, and there lived teachers who had long merged with textbooks, but did not understand anything in the modern IT industry. To hell with everything: diplomas are not important, and universities are not needed. Is that what you all say? […]

NGINX Service Mesh available

We're excited to release the NGINX Service Mesh (NSM) Preview, a bundled, lightweight service mesh that uses an NGINX Plus-based data plane to manage container traffic in Kubernetes environments. NSM can be downloaded for free here. We hope that you will try it for dev and test environments - and we are waiting for your feedback on GitHub. The implementation of the microservices methodology involves […]

Content paths are inscrutable or let's say a word about CDN

Disclaimer: This article does not contain information previously unknown to readers familiar with the concept of CDN, but is in the nature of a technology overview The first web page appeared in 1990 and had a size of a few bytes. Since then, content has scaled both qualitatively and quantitatively. The development of the IT ecosystem has led to the fact that modern web pages are measured in megabytes and the […]

Networkers (not) needed

At the time of this writing, a search on a popular job site for the phrase "Network Engineer" gave out about three hundred vacancies throughout Russia. For comparison, a search for the phrase "system administrator" returns almost 2.5 thousand vacancies, and "DevOps engineer" - almost 800. Does this mean that networkers are no longer needed in the days of victorious clouds, docker, kubernetis and the ubiquitous […]

Everything you ever wanted to know about secure password reset. Part 1

Recently, I had time to think again about how the secure password reset feature should work, first when I built this functionality into ASafaWeb, and then when I helped another person do something similar. In the second case, I wanted to give him a link to the canonical resource with all the details of the safe implementation of the reset function. However, the problem is […]

Minimizing the risks of using DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH)

Minimizing the risks of using DoH and DoT DoH and DoT protection Do you control your DNS traffic? Organizations invest a lot of time, money and effort in securing their networks. However, one area that is often overlooked is the DNS. A good overview of the risks that DNS brings is Verisign's presentation at the Infosecurity conference. 31% of surveyed […]

The most important milestones in the history of the development of video surveillance systems

The functions of modern surveillance systems have long gone beyond video recording as such. Detection of movement in the area of ​​interest, counting and identification of people and vehicles, keeping an object in the stream - today even not the most expensive IP cameras are capable of all this. If you have a sufficiently productive server and the necessary software, the possibilities of the security infrastructure become almost limitless. But […]

The history of our open source: how we made an analytics service in Go and made it publicly available

Currently, almost every company in the world collects statistics about user actions on a web resource. The motivation is clear – companies want to know how their product/website is being used and better understand their users. Of course, there are a large number of tools on the market to solve this problem - from analytics systems that provide data in the form of dashboards and charts […]