Heading: Administration

How to Completely Disable Windows Defender Antivirus on Windows 10

Windows 10 has built-in Windows Defender Antivirus (“Windows Defender”), which protects your computer and data from unwanted programs: viruses, spyware, ransomware, and many other types of malware and hackers. And although the built-in security solution is sufficient for most users, there are situations in which you may not want to use this program. For example, if you […]

SaaS vs on-premise, myths and reality. Stop chilling

TL; DR 1: a myth may be true in some conditions and false in other TLs; DR 2: I saw a holivar - take a closer look and you will see people who do not want to hear each other Reading another article written by biased people on the specified topic, I decided to give my point of view. Maybe someone will be useful. Yes, and it’s more convenient for me to give a link to […]

How Compression Works in Object-Oriented Memory Architecture

A team of engineers at MIT developed an object-oriented memory hierarchy to work with data more efficiently. In the article we understand how it is arranged. /stock /PD As you know, the performance growth of modern CPUs is not accompanied by a corresponding decrease in latency when accessing memory. The difference in the change in indicators from year to year can be up to 10 times (PDF, […]

The developer of the popular Linux distribution plans to enter the IPO and go into the "cloud"

Canonical, the developer of Ubuntu, is preparing for a public offering. She plans to develop in the field of cloud computing. / photo NASA (PD) - Mark Shuttleworth on the ISS Talk about Canonical's IPO has been going on since 2015 - then the founder of the company, Mark Shuttleworth, announced a possible public offering of shares. The purpose of the IPO is to raise funds that will help Canonical […]

What do you hear on the radio? Radio amateurs/Ham radio

Hello Habr. In the first part of the article about what is heard on the air, it was told about service stations on long and short waves. Separately, it is worth talking about amateur radio stations. Firstly, this is also interesting, and secondly, anyone can join this process, both for reception and transmission. As in the first parts, the emphasis will be on […]

3CX V16 Update 1 Beta - New Chat Features and Call Flow Service for Programmatic Call Control

After the recent release of 3CX v16, we have already prepared the first 3CX V16 Update 1 Beta. It includes new corporate chat capabilities and an updated Call Flow Service that, together with the Call Flow Designer (CFD) development environment, allows you to create complex voice applications in C#. Updated corporate chat The 3CX Live Chat & Talk communication widget continues […]

If there is already a knock on the door: how to protect information on devices

Several previous articles on our blog were devoted to the security of personal information that is sent using instant messengers and social networks. Now it's time to talk about precautions regarding physical access to devices. How to quickly destroy information on a flash drive, HDD or SSD Often the easiest way to destroy information is if it is nearby. We are talking about the destruction of data from […]

Toolbox for Researchers - Edition One: Self-Organization and Data Visualization

Today we are opening a new section in which we will talk about the most popular and accessible services, libraries and utilities for students, scientists and professionals. In the first issue, we will talk about the basic approaches that will help you work more efficiently, and the corresponding SaaS services. Also, we will share tools for data visualization. Chris Liverani / Unsplash The Pomodoro Method. This is a time management technique. […]

Practical application of ELK. Setting up logstash

Introduction While deploying another system, we faced the need to process a large number of various logs. ELK was chosen as the instrument. This article will talk about our experience in setting up this stack. We do not set a goal to describe all its capabilities, but we want to concentrate on solving practical problems. This is due to the fact that in the presence of a sufficiently large amount of documentation and […]

Compilation: unboxing IaaS provider hardware

We share materials with unpacking and tests of storage systems and server equipment that we received and used during different periods of activity of our IaaS provider. Photo is from our NetApp AFF A300 Server Systems Unboxing Cisco UCS B480 M5 Blade Server review. Overview of the compact enterprise-class UCS B480 M5 - the chassis (we also show it) fits four such servers with […]

Application of the Continuous Funding Model in Crowdfunding

The emergence of cryptocurrencies has drawn attention to a wider class of systems in which the economic interests of the participants coincide in such a way that they, acting for their own benefit, ensure the stable functioning of the system as a whole. In the study and design of such self-sufficient systems, the so-called cryptoeconomic primitives are distinguished - universal structures that create the possibility of coordinating and distributing capital to achieve a common goal through […]

What's going on with RDF repositories now?

The Semantic Web and Linked Data are like outer space: there is no life there. To go there for a more or less long period of time... well, I don’t know what they told you as a child in response to “I want to become an astronaut.” But you can observe what is happening while on Earth; It is much easier to become an amateur astronomer or even a professional. The article will focus on fresh, not older [...]