Heading: Administration

CampusInsight: From Infrastructure Monitoring to User Experience Analysis

The quality of the wireless network is already included by default in the concept of service level. And if you want to satisfy the high demands of customers, you need to not only quickly deal with emerging network problems, but also predict the most widespread of them. How to do it? Only by tracking what is really important in this context - the user’s interaction with the wireless network. Network loads continue […]

How to understand when proxies are lying: verification of physical locations of network proxies using the active geolocation algorithm

People around the world use commercial proxies to hide their true location or identity. This can be done for various purposes, including access to blocked information or privacy. But how correct are the providers of such proxies when they claim that their servers are located in a certain country? This is a fundamentally important question, from answering […]

CJM for false positives of DrWeb antivirus

The chapter in which Doctor Web removes the Samsung Magician service DLL, declaring it a Trojan, and in order to leave a request to the technical support service, you must not only register on the portal, but indicate the serial number. Which, of course, is not, because DrWeb sends a key during registration, and the serial number is generated during the registration process using the key - and is not stored ANYWHERE. […]

Major accidents in data centers: causes and consequences

Modern data centers are reliable, but any equipment breaks down from time to time. In a short note, we have collected the most significant incidents of 2018. The impact of digital technologies on the economy is growing, the volume of processed information is increasing, new facilities are being built, and this is good as long as everything works. Unfortunately, the impact of data center failures on the economy has also been increasing since people started […]

MegaSlurm for Kubernetes engineers and architects

Kubernetes intensives will start in 2 weeks: Slurm-4 for those who get acquainted with k8s and MegaSlurm for k8s engineers and architects. Slurm-4 has the last 10 seats left in the hall. There are enough people who want to master k8s at a basic level. For an Ops who is getting to know Kubernetes, starting a cluster and deploying an application is already a good result. Dev has requests and […]

Improving Wi-Fi performance. General principles and useful things

Everyone who collected, bought, or at least tuned a radio receiver probably heard such words as: sensitivity and selectivity (selectivity). Sensitivity - this parameter indicates how well your receiver can receive a signal even in the most remote areas. And selectivity, in turn, shows how well the receiver can tune to a particular frequency without the influence of other frequencies. […]

Additional Uplinks in Intel C620 System Logic Architecture

In the architecture of x86 platforms, two currents have emerged that complement each other. According to one version, it is necessary to move towards the integration of computing and control resources in one crystal. The second approach professes the distribution of duties: the processor is equipped with a productive bus that forms a peripheral scalable ecosystem. It forms the basis of the topology of the Intel C620 system logic for high-level platforms. The fundamental difference from the previous chipset […]

What is special about Cloudera and how to cook it

The market for distributed computing and big data, according to statistics, is growing at 18-19% per year. This means that the issue of choosing software for these purposes remains relevant. In this post, we will start with why we need distributed computing, dwell in more detail on the choice of software, talk about using Hadoop with Cloudera, and finally talk about choosing […]

Loading FIAS into the database on MSSQLSERVER using improvised (SQLXMLBULKLOAD) tools. How it (probably) should not be done

Epigraph: "When you have a hammer in your hands, everything around you seems like nails." Somehow, a long time ago, it seems - last Friday, while walking around the office, the accursed bosses became concerned that I was spending time in idleness and contemplating cats. - Why don't you download FIAS, my dear friend! - said the authorities. – For the process of downloading something is not […]

11. Check Point Getting Started R80.20. Threat Prevention Policy

Welcome to Lesson 11! If you remember, back in lesson 7 we mentioned that Check Point has three types of Security Policy. These are: Access Control; Threat prevention; desktop security. We have already covered most of the blades from the Access Control policy, the main task of which is to control traffic or content. Blades Firewall, Application Control, URL Filtering and Content […]

Another monitoring system

16 modems, 4 cellular carriers = Upload speed 933.45 Mbps Introduction Hello! This article is about how we wrote a new monitoring system for ourselves. It differs from the existing ones by the possibility of high-frequency synchronous obtaining of metrics and very low resource consumption. The polling rate can be as low as 0.1 milliseconds with a timing accuracy of 10 nanoseconds between metrics. All binaries take […]