Heading: Administration

The new Windows Terminal: answers to some of your questions

In the comments to a recent article, you asked a lot of questions about the new version of our Windows Terminal. Today we will try to answer some of them. Below the cut are some of the most frequently asked questions we've heard (and still hear), as well as the official answers, including replacements for PowerShell and how to […]

Analysis of virtual machine performance in VMware vSphere. Part 1: CPU

If you administer a virtual infrastructure based on VMware vSphere (or any other technology stack), you probably often hear complaints from users: β€œThe virtual machine is slow!” In this series of articles I will analyze performance metrics and tell you what and why it slows down and how to make sure it doesn’t slow down. I will consider the following aspects of virtual machine performance: CPU, RAM, DISK, […]

.NET: Tools for working with multithreading and asynchrony. Part 1

I publish the original article on Habr, the translation of which is posted on the corporate blog. The need to do something asynchronously, without waiting for the result here and now, or to divide a lot of work between several units that perform it, existed before the advent of computers. With their appearance, this need has become very tangible. Now, in 2019, typing this article on an 8-core laptop […]

IoT, AI systems and network technologies at VMware EMPOWER 2019 - we continue broadcasting from the scene

We are talking about the new products presented at the VMware EMPOWER 2019 conference in Lisbon (we are also broadcasting on our Telegram channel). Revolutionary network solutions One of the main topics of the second day of the conference was intelligent traffic routing. Wide Area Networks (WANs) are quite unstable. Users often connect to corporate IT infrastructure from mobile devices through public hotspots, which entails certain […]

Elasticsearch made problematic security functions previously released to open source free

Recently, an entry appeared in the Elastic blog, which reports that the main security functions of Elasticsearch, brought to the open source space more than a year ago, are now free for users. The official blog entry contains the "correct" words that open source should be free and that the owners of the project are building their business on other additional features that […]

Wrote API - broke XML (two)

The first MyWarehouse API appeared 10 years ago. All this time we have been working on existing versions of the API and developing new ones. And several versions of the API have already been buried. There will be a lot of things in this article: how the API was created, why the cloud service needs it, what gives users, what kind of rake we managed to step on and what we want to do next. Me […]

Save hard drive space with steganography

When we talk about steganography, people imagine terrorists, pedophiles, spies, well, at best, crypto-anarchists and other scientists. And really, who else might need to hide something from outside eyes? What would be the benefit of this to the common man? It turns out there is some. That is why today we will compress data using steganography methods. And at the end […]

CPU consumption benchmark for Istio and Linkerd

Introduction We at Shopify have been deploying Istio as a service mesh. In principle, everything suits, except for one thing: it's expensive. The published benchmarks for Istio say: With Istio 1.1, the proxy consumes approximately 0,6 vCPUs (virtual cores) per 1000 requests per second. For the first region in the service mesh (2 proxies on each side of the connection), […]

Research: Creating a block-resistant proxy service using game theory

A few years ago, an international team of scientists from the Universities of Massachusetts, Pennsylvania, and Munich, Germany, conducted a study on the effectiveness of traditional proxies as an anti-censorship tool. As a result, scientists have proposed a new method for bypassing blocking based on game theory. We have prepared an adapted translation of the main points of this work. Introduction Popular lock traversal tools like Tor rely on […]

Containers, microservices and service meshes

There are a lot of articles on the Internet about service meshes (service mesh), and here's another one. Hooray! But why? Then, I want to state my opinion that service meshes would have been better 10 years ago, before the advent of container platforms such as Docker and Kubernetes. I'm not claiming that my point of view is better or worse than others, but since service meshes are pretty complex […]

The smartest heater

Today I will talk about one interesting device. They can heat the room by placing it under the window, like any other electric convector. They can be heated "wisely", according to any conceivable and unimaginable scenarios. He himself can easily control the smart home. You can play on it and (oh, Space!) even work. (carefully, a lot of large photos under the cut) On the front side, the device […]

Traffic monitoring systems in VoIP networks. Part One - Overview

In this article, we will try to consider such an interesting and useful element of the IT infrastructure as a VoIP traffic monitoring system. The development of modern telecommunications networks is amazing: they have stepped far ahead from signal fires, and what seemed unthinkable before is now simple and mundane. And only professionals know what is hidden behind everyday life and the widespread use of the achievements of the information technology industry. Variety of environments […]