Heading: Administration

CMake and C++ are brothers forever

During development, I like to change compilers, build modes, dependency versions, perform static analysis, measure performance, collect coverage, generate documentation, etc. And I really love CMake because it allows me to do everything I want. Many people criticize CMake, and often deservedly so, but if you look at it, it’s not all that bad, and recently […]

How to compact up to 90% backup storage in object storage

Our Turkish clients asked us to properly configure backup for their data center. We are doing similar projects in Russia, but here the story was more about researching how best to do it. Given: there is local S3 storage, there is Veritas NetBackup, which has acquired new advanced functionality for moving data to object storage, now with support for deduplication, and there is a problem with […]

StealthWatch: deployment and configuration. Part 2

Hello colleagues! Having determined the minimum requirements for deploying StealthWatch in the last part, we can begin deploying the product. 1. Methods for deploying StealthWatch There are several ways to “touch” StealthWatch: dcloud – cloud service for laboratory work; Cloud Based: Stealthwatch Cloud Free Trial – here Netflow from your device will be sent to the cloud and StealthWatch software will be analyzed there; On-premise POV […]

Deploying your MTProxy Telegram with statistics

“I inherited this mess, starting with the unscrupulous Zello; LinkedIn and ending with “everyone else” on the Telegram platform in my world. And then, with a hiccup, the official hastily and loudly added: “But I will restore order (here in IT)” (...). Durov rightly believes that it is authoritarian states that should be afraid of him, the cypherpunk, and Roskomnadzor and golden shields with their DPI filters […]

Likes and Dislikes: DNS over HTTPS

We analyze opinions regarding the features of DNS over HTTPS, which have recently become a “bone of contention” among Internet providers and browser developers. / Unsplash / Steve Halama The essence of the disagreement Recently, large media and thematic platforms (including Habr) often write about the DNS over HTTPS (DoH) protocol. It encrypts queries to the DNS server and responses to […]

Transactions in InterSystems IRIS globals

The InterSystems IRIS DBMS supports interesting structures for storing data - globals. Essentially, these are multi-level keys with various additional goodies in the form of transactions, fast functions for traversing data trees, locks and its own ObjectScript language. Read more about globals in the series of articles “Globals are treasure-swords for storing data”: Trees. Part 1 Trees. Part 2 Sparse arrays. Part […]

80% of your company's data is inaccessible to you. What to do with it?

Data is the driving force behind company development in 2019. No large company can do without data collection and management, and many of them already have specialist staff in this field. However, the main disappointment of our time is that, for various reasons, up to 80% of data is inaccessible for processing and analysis. In fact […]

Globals are treasure swords for storing data. Sparse arrays. Part 3

In previous parts (1, 2) we talked about globals as trees, in this one we will consider globals as sparse arrays. A sparse array is a type of array in which most of the values ​​take the same value. In practice, sparse arrays are often so huge that there is no point in occupying memory with identical elements. Therefore, it makes sense to implement sparse arrays […]

Globals are treasure swords for storing data. Trees. Part 2

Beginning - see part 1. 3. Options for structures when using globals A structure such as an ordered tree has different special cases. Let's consider those that have practical value when working with globals. 3.1 Special case 1. One node without branches Globals can be used not only like an array, but also like ordinary variables. For example, as a counter: Set ^counter […]

Globals are treasure swords for storing data. Trees. Part 1

The real database swords - globals - have long been known, but still few know how to use them effectively or do not own this superweapon at all. If you use globals in solving those problems that they are really good at, you can achieve outstanding results. Either in productivity or in simplifying the solution of the problem (1, 2). Globals are a special […]

Creating a cloud PBX 3CX on any Openstack-compatible hosting

Often you need to install a 3CX PBX in the cloud, but your chosen cloud provider is not on the list of supported 3CX (for example, Mail.ru Cloud Solutions). It's OK! This is not difficult to do; you just need to find out whether the provider supports the Openstack infrastructure. 3CX, among other companies, sponsors the development of Openstack and supports the Openstack API and the Horizon standard interface for monitoring and […]

Post-analysis: what is known about the latest attack on the network of crypto-key servers SKS Keyserver

The hackers used a feature of the OpenPGP protocol that has been known for more than ten years. We tell you what the point is and why they can’t close it. / Unsplash / Chunlea Ju Network problems In mid-June, unknown attackers attacked the SKS Keyserver network of cryptographic key servers, built on the OpenPGP protocol. This is an IETF standard (RFC 4880) that is used […]