Heading: Administration

Industrial unmanaged switches Advantech EKI-2000 series

When building Ethernet networks, various classes of switching equipment are used. Separately, it is worth highlighting unmanaged switches - simple devices that allow you to quickly and efficiently organize the operation of a small Ethernet network. This article provides a detailed overview of the EKI-2000 series of entry-level unmanaged industrial switches. Introduction Ethernet has long been an integral part of any industrial network. This standard, which came from the IT industry, allowed […]

Let's Encrypt SSL certificate management automation using DNS-01 challenge and AWS

The post describes the steps to automate the management of SSL certificates from Let's Encrypt CA using the DNS-01 challenge and AWS. acme-dns-route53 is a tool that will allow us to implement this feature. It can work with SSL certificates from Let's Encrypt, store them in Amazon Certificate Manager, use the Route53 API to implement the DNS-01 challenge, and finally push notifications to […]

"HumHub" is a Russian-language replica of a social network in I2P

Today, a Russian-language replica of the open source social network HumHub has been launched on the I2P network. There are two ways to connect to the network - through the use of I2P or through the clearnet. You can also use your nearest Medium provider to connect. Source: www.habr.com

Installing openmeetings 5.0.0-M1. WEB conferences without Flash

Good afternoon, Dear Khabravites and Guests of the portal! Not long ago I had the need to set up a small server for video conferencing. Not many options were considered - BBB and Openmeetings, because... only they answered in terms of functionality: Free Demonstration of desktop, documents, etc. Interactive work with users (shared board, chat, etc.) No additional software installation required […]

How to understand when proxies are lying: verification of physical locations of network proxies using the active geolocation algorithm

People around the world use commercial proxies to hide their true location or identity. This can be done for various purposes, including access to blocked information or privacy. But how correct are the providers of such proxies when they claim that their servers are located in a certain country? This is a fundamentally important question, from answering […]

Major accidents in data centers: causes and consequences

Modern data centers are reliable, but any equipment breaks down from time to time. In a short note, we have collected the most significant incidents of 2018. The impact of digital technologies on the economy is growing, the volume of processed information is increasing, new facilities are being built, and this is good as long as everything works. Unfortunately, the impact of data center failures on the economy has also been increasing since people started […]

CampusInsight: From Infrastructure Monitoring to User Experience Analysis

The quality of the wireless network is already included by default in the concept of service level. And if you want to satisfy the high demands of customers, you need to not only quickly deal with emerging network problems, but also predict the most widespread of them. How to do it? Only by tracking what is really important in this context - the user’s interaction with the wireless network. Network loads continue […]

Run instrumental tests in Firebase Test Lab. Part 1: iOS project

My name is Dmitry, I work as a tester at MEL Science. Quite recently, I finished dealing with a relatively recent feature from Firebase Test Lab - namely, instrumental testing of iOS applications using the native testing framework XCUITest. I had previously tried Firebase Test Lab for Android and really liked it, so I […]

Deploy applications in VM, Nomad and Kubernetes

Hi all! My name is Pavel Agaletsky. I work as a team lead in a team that develops the Lamoda delivery system. In 2018, I spoke at the HighLoad++ conference, and today I would like to present a transcript of my report. My topic is dedicated to our company’s experience in deploying systems and services to different environments. Since our prehistoric times, when we deployed all systems […]

30 years of rampant insecurity

When the "black hats" - being the orderlies of the wild forest of cyberspace - turn out to be especially successful in their dirty work, the yellow media squeal with delight. As a result, the world is starting to take cybersecurity more seriously. But unfortunately not right away. Therefore, despite the increasing number of catastrophic cyber incidents, the world is not yet ripe for active proactive measures. However, it is expected that […]

Hybrid drives for Enterprise storage. Experience with Seagate EXOS

A couple of months ago, Radix got the opportunity to work with the latest Seagate EXOS drives, designed for enterprise-class tasks. Their distinguishing feature lies in the hybrid drive device - it combines the technologies of conventional hard drives (for main storage) and solid state drives (for caching hot data). We have already had positive experience with hybrid drives from Seagate […]

Writing a secure browser extension

Unlike the common β€œclient-server” architecture, decentralized applications are characterized by: No need to store a database with user logins and passwords. Access information is stored exclusively by the users themselves, and their validity is confirmed at the protocol level. No need to use a server. The application logic can be executed in the blockchain network, where it is possible to store the required amount of data. There are 2 […]