Heading: Administration

Fault-tolerant IPeE network from improvised means

Hello. This means there is a network of 5k clients. Recently a not very pleasant moment came up - in the center of the network we have a Brocade RX8 and it started sending a lot of unknown-unicast packets, since the network is divided into vlans - this is partially not a problem, BUT there are special vlans for white addresses, etc. and they are stretched […]

Fight of two yokozuna

There are less than 8 hours left before sales of new AMD EPYC™ Rome processors begin. In this article, we decided to recall how the history of the rivalry between the two largest CPU manufacturers began. The world's first 8008-bit commercially available processor was the Intel® i1972, released in 200. The processor had a clock frequency of 10 kHz, was made using 10000 micron (XNUMX nm) technology […]

Safety Helms

The gist of the story about the most popular package manager for Kubernetes could be depicted using an emoji: the box is Helm (this is the most appropriate thing in the latest Emoji release); lock - security; the little man is the solution to the problem. In reality, everything will be a little more complicated, and the story is full of technical details about how to make Helm safe. […]

My third day with Haiku: the big picture is starting to emerge

TL;DR: Haiku has the potential to be a great open source desktop operating system. I really want this, but there are still a lot of fixes needed. I've been learning Haiku, a surprisingly good operating system, for two days. Now is the third day, and I like this operating system so much that I am constantly thinking: how can I make it an operating system for every day? In respect of […]

vGPU - cannot be ignored

In June-July, almost two dozen companies contacted us, interested in the capabilities of virtual GPUs. Graphics from Cloud4Y is already used by one of the large subsidiaries of Sberbank, but in general the service is not very popular. So we were very pleased with such activity. Seeing the growing interest in the technology, we decided to talk a little more about vGPU. “Data lakes” obtained as a result of scientific […]

Chaos Engineering: The Art of Deliberate Destruction

Note transl.: We are pleased to share the translation of wonderful material from senior technology evangelist from AWS - Adrian Hornsby. In simple terms, he explains the importance of experimentation to mitigate the effects of failures in IT systems. You've probably already heard about Chaos Monkey (or even used similar solutions)? Today, approaches to creating such tools and their implementation in a broader […]

Acquaintance with the PVS-Studio static analyzer when developing C++ programs in a Linux environment

PVS-Studio supports analysis of projects in C, C++, C# and Java. The analyzer can be used under Windows, Linux and macOS systems. This note will focus on analyzing code written in C and C++ in the Linux environment. Installation You can install PVS-Studio under Linux in different ways, depending on the type of distribution. The most convenient and preferred method is [...]

SGX malware: how villains exploit the new Intel technology for purposes other than those for which it was conceived

As you know, the code executed in the enclave is seriously limited in its functionality. It cannot make system calls. It cannot perform I/O operations. It does not know the base address of the host application's code segment. It cannot jmp or call host application code. It has no idea about the address space structure that governs the host application (for example, which pages are mapped […]

We create a pipeline for streaming data processing. Part 2

Hi all. We are sharing the translation of the final part of the article, prepared specifically for students of the Data Engineer course. The first part can be found here. Apache Beam and DataFlow for real-time pipelines Setting up Google Cloud Note: I used Google Cloud Shell to run the pipeline and publish custom log data because I was having trouble running the pipeline in Python […]

How we organized the first electronic leasing and what it led to

Despite the popularity of the topic of electronic document management, in Russian banks and in the financial sector in general, the majority of any transactions are executed the old fashioned way, on paper. And the point here is not so much the conservatism of banks and their clients, but the lack of adequate software on the market. The more complex the transaction, the less likely it is that it will be carried out within the framework of EDI. […]

Go to 2FA (Two Factor Authentication for ASA SSL VPN)

The need to provide remote access to a corporate environment is emerging more and more often, no matter whether it is your users or partners who need access to a particular server in your organization. For these purposes, most companies use VPN technology, which has proven itself to be a reliably protected way of providing access to the organization’s local resources. My company did not […]

LinOTP two-factor authentication server

Today I want to share how to set up a two-factor authentication server to protect a corporate network, sites, services, ssh. The server will run the following combination: LinOTP + FreeRadius. Why do we need it? This is a completely free, convenient solution, within its own network, independent of third-party providers. This service is very convenient, quite visual, unlike other open source products, and also supports […]