Heading: Administration

Windows Subsystem for Linux (WSL) version 2: how will it be? (FAQ)

Under the cut is a translation of the published FAQ'a about the details of the future WSL second version (author - Craig Loewen). Issues covered: Does WSL 2 use Hyper-V? Will WSL 2 be available on Windows 10 Home? What will happen to WSL 1? Will she be abandoned? Will it be possible to simultaneously run WSL 2 and other third party virtualization tools (such as VMWare or Virtual […]

Technological trends in web development 2019

Introduction Digital transformation covers more and more different spheres of life and business every year. If a business wants to be competitive, ordinary information sites are no longer enough, mobile and web applications are needed that not only provide users with information, but also allow them to perform some functions: receive or order goods and services, provide tools. So, for example, it is no longer enough for modern banks to have […]

Run instrumental tests in Firebase Test Lab. Part 1: iOS project

My name is Dmitry, I work as a tester at MEL Science. Quite recently, I finished dealing with a relatively recent feature from Firebase Test Lab - namely, instrumental testing of iOS applications using the native testing framework XCUITest. I had previously tried Firebase Test Lab for Android and really liked it, so I […]

LLVM from a Go perspective

Compiler development is a very difficult task. But, fortunately, with the development of projects like LLVM, the solution to this problem is greatly simplified, which allows even a lone programmer to create a new language that is close in performance to C. Working with LLVM is complicated by the fact that this system is represented by a huge amount of code, provided with little documentation . In order to try to correct this shortcoming, the author of the material, […]

Deploy applications in VM, Nomad and Kubernetes

Hi all! My name is Pavel Agaletsky. I work as a team lead in a team that develops the Lamoda delivery system. In 2018, I spoke at the HighLoad++ conference, and today I would like to present a transcript of my report. My topic is dedicated to our company’s experience in deploying systems and services to different environments. Since our prehistoric times, when we deployed all systems […]

Internet History: Decay, Part 1

Other articles in the cycle: History of the relay The method of "rapid transmission of information", or the birth of the relay Long-ranger Galvanism Entrepreneurs And finally, the relay The talking telegraph Simply connect The forgotten generation of relay computers The electronic era The history of electronic computers Prologue ENIAC Colossus The electronic revolution The history of the transistor darkness From the crucible of war Repeated reinvention The history of the Internet The backbone […]

30 years of rampant insecurity

When the "black hats" - being the orderlies of the wild forest of cyberspace - turn out to be especially successful in their dirty work, the yellow media squeal with delight. As a result, the world is starting to take cybersecurity more seriously. But unfortunately not right away. Therefore, despite the increasing number of catastrophic cyber incidents, the world is not yet ripe for active proactive measures. However, it is expected that […]

Internet History: Decay, Part 2

By approving the use of private microwave networks in the "over 890 solution," the FCC may have hoped that it could push all these private networks into its quiet corner of the market and forget about them. However, it quickly became clear that this was not possible. New individuals and organizations emerged pushing for changes to the existing regulatory platform. They offered many new […]

CampusInsight: From Infrastructure Monitoring to User Experience Analysis

The quality of the wireless network is already included by default in the concept of service level. And if you want to satisfy the high demands of customers, you need to not only quickly deal with emerging network problems, but also predict the most widespread of them. How to do it? Only by tracking what is really important in this context - the user’s interaction with the wireless network. Network loads continue […]

How to understand when proxies are lying: verification of physical locations of network proxies using the active geolocation algorithm

People around the world use commercial proxies to hide their true location or identity. This can be done for various purposes, including access to blocked information or privacy. But how correct are the providers of such proxies when they claim that their servers are located in a certain country? This is a fundamentally important question, from answering […]

CJM for false positives of DrWeb antivirus

The chapter in which Doctor Web removes the Samsung Magician service DLL, declaring it a Trojan, and in order to leave a request to the technical support service, you must not only register on the portal, but indicate the serial number. Which, of course, is not, because DrWeb sends a key during registration, and the serial number is generated during the registration process using the key - and is not stored ANYWHERE. […]

Major accidents in data centers: causes and consequences

Modern data centers are reliable, but any equipment breaks down from time to time. In a short note, we have collected the most significant incidents of 2018. The impact of digital technologies on the economy is growing, the volume of processed information is increasing, new facilities are being built, and this is good as long as everything works. Unfortunately, the impact of data center failures on the economy has also been increasing since people started […]