Heading: Administration

Internet History: Decay, Part 1

Other articles in the cycle: History of the relay The method of "rapid transmission of information", or the birth of the relay Long-ranger Galvanism Entrepreneurs And finally, the relay The talking telegraph Simply connect The forgotten generation of relay computers The electronic era The history of electronic computers Prologue ENIAC Colossus The electronic revolution The history of the transistor darkness From the crucible of war Repeated reinvention The history of the Internet The backbone […]

Technological trends in web development 2019

Introduction Digital transformation covers more and more different spheres of life and business every year. If a business wants to be competitive, ordinary information sites are no longer enough, mobile and web applications are needed that not only provide users with information, but also allow them to perform some functions: receive or order goods and services, provide tools. So, for example, it is no longer enough for modern banks to have […]

Mail on "raspberry"

Designing Mail, mail ... "Currently, any novice user can get his own free e-mail box, just register on one of the Internet portals," says Wikipedia. So launching your own mail server for this is a bit strange. However, I do not regret the month spent on this, counting from the day the OS was installed to the day […]

All your analyzes are in the public domain

Hello again! I again found an open base with medical data for you. Let me remind you that quite recently there were three of my articles on this topic: the leakage of personal data of patients and doctors from the DOC + online medical service, the vulnerability of the Doctor Nearby service, and the leakage of data from ambulance stations. This time, the server […]

Internet for summer residents. We get the maximum speed in 4G networks. Part 2. Choosing an external antenna

Recently, I conducted a comparative test of LTE routers and it turned out quite expectedly that the performance and sensitivity of their radio modules differ significantly. When I connected an antenna to the routers, the speed increase increased by a multiple. This gave me the idea to conduct a comparative test of antennas, which will not only provide communication in a private house, but also make it […]

11. Check Point Getting Started R80.20. Threat Prevention Policy

Welcome to Lesson 11! If you remember, back in lesson 7 we mentioned that Check Point has three types of Security Policy. These are: Access Control; Threat prevention; desktop security. We have already covered most of the blades from the Access Control policy, the main task of which is to control traffic or content. Blades Firewall, Application Control, URL Filtering and Content […]

Amazon Redshift Parallel Scaling Guide and Test Results

We at Skyeng use Amazon Redshift, including parallel scaling, so we found this article by Stefan Gromoll, founder of dotgo.com, for intermix.io interesting. After the translation - a bit of our experience from the engineer according to Daniyar Belkhodzhaev. The Amazon Redshift architecture allows scaling by adding new nodes to the cluster. The need to cope with peak requests can lead to excessive […]

Meeting of system operators of points of the network "Medium" in Moscow, May 18 at 14:00 at Patriarch's Ponds

On May 18 (Saturday) in Moscow at 14:00 at the Patriarch's Ponds there will be a meeting of system operators of points of the Medium network. We believe that the Internet should be politically neutral and free - the principles on which the World Wide Web was built - do not stand up to scrutiny. They are outdated. They are not safe. We live in Legacy. Any centralized network […]

Why does the Ministry of Industry and Trade need a ban on storing data on foreign equipment

A draft resolution on establishing a ban on the admission of hardware and software systems of data storage systems (DSS) of foreign origin to participate in procurement to meet state and municipal needs has been published on the Federal Portal of Draft Regulatory Legal Acts. It is written that in order to ensure the security of the critical information infrastructure (CII) of Russia and for national projects. CII include, for example, information systems of government agencies, […]

LINSTOR storage and its integration with OpenNebula

Not so long ago, the guys from LINBIT presented their new SDS solution - Linstor. This is a completely free storage based on proven technologies: DRBD, LVM, ZFS. Linstor combines simplicity and well-designed architecture, which allows you to achieve stability and quite impressive results. Today I would like to tell you a little more about it and show how easy […]

“And so it will do”: that cloud providers do not agree on personal data

Somehow an application for cloud services came to us. We figured out in general terms what would be required of us, and sent back a list of questions to clarify the details. Then we analyzed the answers and realized: the customer wants to place personal data of the second level of security in the cloud. We answer him: "You have a second level of personal data, sorry, we can only make a private cloud." A […]

Speed ​​up exploratory data analysis using the pandas-profiling library

The first step in getting started with a new dataset is to understand it. In order to do this, you need, for example, to find out the ranges of values ​​accepted by the variables, their types, and also find out about the number of missing values. The pandas library provides us with many useful tools to perform Exploratory Data Analysis (EDA). But before you use them, you usually […]