Heading: Administration

Data Privacy, IoT and Mozilla WebThings

From the translator: a brief retelling of the article Centralization of smart home devices (like the Apple Home Kit, Xiaomi and others) is bad because: The user becomes dependent on a certain vendor, because devices cannot communicate with each other outside the same manufacturer; Vendors use data about users at their own discretion, leaving no choice to the user; Centralization makes the user more vulnerable because […]

The history of the fight against censorship: how the flash proxy method created by scientists from MIT and Stanford works

In the early 2010s, a collaborative team of experts from Stanford University, the University of Massachusetts, The Tor Project, and SRI International presented the results of their research into ways to combat Internet censorship. Scientists analyzed the methods of bypassing blocking that existed at that time and proposed their own method, called flash proxy. Today we will talk about its essence and history of development. Introduction […]

Corda - open source blockchain for business

Corda is a distributed Ledger for storing, managing and synchronizing financial commitments across different financial institutions. Corda has pretty good documentation with video lectures, which can be found here. I will try to briefly describe how Corda works inside. Consider the main features of Corda and its uniqueness among other blockchains: Corda does not have its own cryptocurrency. Corda does not use the concept of mining […]

Why CFOs are moving to an operating cost model in IT

What to spend money on so that the company can develop? This question keeps many CFOs awake. Each department pulls the blanket over itself, and you also need to take into account many factors that affect the spending plan. And these factors often change, forcing us to revise the budget and urgently seek funds for some new direction. Traditionally, when investing in IT CFOs, […]

PostgreSQL 11: Partitioning evolution from Postgres 9.6 to Postgres 11

Great Friday everyone! There is less and less time left before the launch of the Relational DBMS course, so today we are sharing the translation of another useful material on the topic. During the development of PostgreSQL 11, impressive work has been done to improve table partitioning. Table partitioning is a feature that has been around in PostgreSQL for quite some time, but it is, so to speak, essentially […]

How to disguise yourself on the Internet: comparing server and residential proxies

In order to hide the IP address or bypass content blocking, a proxy is usually used. They are of different types. Today we will compare the two most popular types of proxies - server and residential, and talk about their pros, cons and usage scenarios. How server proxies work Server (Datacenter) proxies are the most common type. When used, IP addresses are issued by cloud service providers. […]

Random numbers and decentralized networks: implementations

Introduction function getAbsolutelyRandomNumer() { return 4; // returns absolutely random number! } As in the case with the concept of an absolutely secure cipher from cryptography, the real protocols β€œPublicly Verifiable Random Beacon” (hereinafter PVRB) only try to get as close as possible to the ideal scheme, because in real networks in its pure form, it is not applicable: it is necessary to agree strictly on one bit, rounds must […]

Meeting of system operators of points of the network "Medium" in Moscow, May 18 at 14:00, Tsaritsyno

May 18 (Saturday) in Moscow at 14:00, Tsaritsyno Park, a meeting of system operators of points of the Medium network will take place. Telegram group The following questions will be raised at the gathering: Long-term development plans for the Medium network: discussion of the network development vector, its key features and comprehensive security when working with the I2P and / or Yggdrasil network? Proper organization of access to I2P network resources […]

The most terrible poisons

Hi %username% Yes, I know the title is hackneyed and there are over 9000 links on google that describe scary poisons and tell horror stories. But I don't want to list the same. I do not want to measure LD50 doses and claim originality. I want to write about the poisons that you, %username%, are at great risk of encountering every […]

How Megafon fell asleep on mobile subscriptions

For a long time, stories about paid mobile subscriptions on IoT devices have been circulating as not funny jokes. With Peekaboo Everyone understands that these subscriptions are not complete without the actions of mobile operators. But mobile operators stubbornly claim that these subscribers are suckers: the original For many years I have never caught this infection and even thought that people […]

Honest programmer resume

Section 1. Soft Skills I am silent in meetings. I try to put on an attentive and intelligent face, even if I don't care. People consider me positive and negotiable. I always politely and non-persistently report that the task says to make kaku. And only once. Then I don't argue. And when I finish the task and it turns out to be what […]