Heading: Administration

Comparative review of portable microwave devices Arinst vs Anritsu

A pair of devices from the Russian developer “Kroks” have been submitted for independent test review. These are fairly miniature radio frequency meters, namely: a spectrum analyzer with a built-in signal generator, and a vector network analyzer (reflectometer). Both devices have a range of up to 6,2 GHz in the upper frequency. There was an interest in understanding whether these are just another pocket “display meters” (toys), or really noteworthy devices, because the manufacturer positions them: […]

Asynchronous programming in JavaScript (Callback, Promise, RxJs )

Hi all. Sergey Omelnitsky is in touch. Not long ago I hosted a stream on reactive programming, where I talked about asynchrony in JavaScript. Today I would like to take notes on this material. But before we start the main material, we need to make an introductory note. So let's start with definitions: what is a stack and a queue? A stack is a collection whose elements [...]

Retrospective: how IPv4 addresses were depleted

Geoff Huston, chief research engineer at internet registrar APNIC, predicted that IPv4 addresses will run out in 2020. In a new series of materials, we will update information about how addresses were depleted, who still had them, and why this happened. / Unsplash / Loïc Mermilliod Why addresses are running out Before moving on to the story of how the pool “dried up” […]

Cryptographic Attacks: An Explanation for Confused Minds

When you hear the word “cryptography,” some people remember their WiFi password, the green padlock next to the address of their favorite website, and how difficult it is to get into someone else’s email. Others recall a series of vulnerabilities in recent years with telling abbreviations (DROWN, FREAK, POODLE...), stylish logos and a warning to urgently update your browser. Cryptography covers all of this, but the point is different. The point is there is a fine line between [...]

Directory size is not worth our effort

This is a completely useless, unnecessary in practical application, but funny little post about directories in *nix systems. It's Friday. During interviews, boring questions often arise about inodes, everything-is-files, which few people can answer sanely. But if you dig a little deeper, you can find interesting things. To understand the post, a few points: everything is a file. directory is also [...]

Energy efficiency in the office: how to reduce real energy consumption?

We talk a lot about how data centers can save energy through smart equipment placement, optimal air conditioning, and centralized power management. Today we will talk about how you can save energy in the office. Unlike data centers, electricity in offices is needed not only by technology, but also by people. Therefore, to obtain a PUE coefficient here at […]

Site statistics and your small storage

Webalizer and Google Analytics have helped me gain insight into what's happening on websites for many years. Now I understand that they provide very little useful information. Having access to your access.log file, understanding the statistics is very simple and to implement quite basic tools such as sqlite, html, sql language and any script […]

Excursion in light green tones

The most important transport problem in St. Petersburg is bridges. At night, because of them, you have to run away from the tavern without finishing your beer. Well, or pay twice as much for a taxi as usual. In the morning, carefully calculate the time so that as soon as the bridge is closed, you make it to the station like a nimble mongoose. We don’t […]

Is Kafka on Kubernetes good?

Greetings, Habr! At one time, we were the first to introduce the Kafka topic to the Russian market and continue to monitor its development. In particular, we found the topic of interaction between Kafka and Kubernetes interesting. A review (and rather cautious) article on this topic was published on the Confluent blog back in October last year, authored by Gwen Shapira. Today we […]

Medium Weekly Digest #3 (July 26 – Aug 2, 2019)

Those who are willing to give up their freedom to gain short-lived protection from danger deserve neither freedom nor safety. — Benjamin Franklin This digest is intended to increase the Community's interest in the issue of privacy, which in the light of recent events is becoming more relevant than ever before. On the agenda: The Medium Root CA certification authority introduces certificate verification using the OCSP protocol Features […]

Five students and three distributed key-value stores

Or how we wrote a client C++ library for ZooKeeper, etcd and Consul KV In the world of distributed systems, there are a number of typical tasks: storing information about the composition of the cluster, managing the configuration of nodes, detecting faulty nodes, choosing a leader, and others. To solve these problems, special distributed systems have been created - coordination services. Now we will be interested in three of them: ZooKeeper, […]

KVM (under)VDI with disposable VMs with bash

Who is this article intended for? This article may be of interest to system administrators who were faced with the task of creating a service of “one-time” jobs. Prologue The IT support department of a young dynamically developing company with a small regional network was asked to organize “self-service stations” for use by their external clients. These stations were supposed to be used for registration on external company portals, downloading [...]