Heading: Administration

MSI/55 - old terminal for ordering goods by a branch in a central store

The device shown on KDPV was designed to automatically send orders from a branch to a central store. To do this, it was necessary, after entering the articles of the ordered goods into it, to call the number of the central store and send the data according to the principle of an acoustically interfaced modem. The rate at which the terminal sends data is assumed to be 300 baud. It is powered by four mercury-zinc elements (then […]

Russian storage system AERODISK: load testing. Squeezing out IOPS

Hi all! As promised, we are publishing the results of a load test of a Russian-made data storage system - AERODISK ENGINE N2. In the last article, we broke the storage system (that is, we performed crash tests) and the crash test results were positive (that is, we did not break the storage system). Crash test results can be found HERE. In the comments to the previous article, wishes were expressed about […]

Seven Unexpected Bash Variables

Continuing the series of notes on lesser-known bash features, here are seven variables you might not know about. 1) PROMPT_COMMAND You may already know how to manipulate the prompt to show various useful information, but not everyone knows that you can run a shell command every time the prompt is shown. In fact, many complex prompt manipulators […]

Today, many popular addons for Firefox stopped working due to certificate issues.

Hello, dear Khabrovites! I want to warn you right away that this is my first publication, so I ask you to immediately notify me of any problems, typos, and so on. In the morning, as usual, I turned on my laptop and began leisurely surfing in my favorite Firefox (release 66.0.3 x64). Suddenly, the morning ceased to be languid - at one beautiful moment, a message popped up that […]

How DNSCrypt solved the issue of expired certificates by introducing a 24 hour expiration date

In the past, certificates often expired due to the fact that they had to be renewed manually. People just forgot to do it. With the advent of Let's Encrypt and the automatic update procedure, it seems that the problem should be solved. But recent history with Firefox shows that it's actually still relevant. Unfortunately, the certificates continue to expire. If anyone missed this story, […]

Dummies Guide: Building DevOps Chains with Open Source Tools

Building your first DevOps chain in five steps for beginners. DevOps has become a panacea for too slow, disconnected and otherwise problematic development processes. But you need minimal knowledge in DevOps. It will cover concepts such as the DevOps chain and how to create one in five steps. This is not a complete guide, but only a "fish" that can be expanded. Let's start with history. […]

β€œAnd so it will do”: that cloud providers do not agree on personal data

Somehow an application for cloud services came to us. We figured out in general terms what would be required of us, and sent back a list of questions to clarify the details. Then we analyzed the answers and realized: the customer wants to place personal data of the second level of security in the cloud. We answer him: "You have a second level of personal data, sorry, we can only make a private cloud." A […]

Speed ​​up exploratory data analysis using the pandas-profiling library

The first step in getting started with a new dataset is to understand it. In order to do this, you need, for example, to find out the ranges of values ​​accepted by the variables, their types, and also find out about the number of missing values. The pandas library provides us with many useful tools to perform Exploratory Data Analysis (EDA). But before you use them, you usually […]

Why does the Ministry of Industry and Trade need a ban on storing data on foreign equipment

A draft resolution on establishing a ban on the admission of hardware and software systems of data storage systems (DSS) of foreign origin to participate in procurement to meet state and municipal needs has been published on the Federal Portal of Draft Regulatory Legal Acts. It is written that in order to ensure the security of the critical information infrastructure (CII) of Russia and for national projects. CII include, for example, information systems of government agencies, […]

LINSTOR storage and its integration with OpenNebula

Not so long ago, the guys from LINBIT presented their new SDS solution - Linstor. This is a completely free storage based on proven technologies: DRBD, LVM, ZFS. Linstor combines simplicity and well-designed architecture, which allows you to achieve stability and quite impressive results. Today I would like to tell you a little more about it and show how easy […]

Meeting of system operators of points of the network "Medium" in Moscow, May 18 at 14:00 at Patriarch's Ponds

On May 18 (Saturday) in Moscow at 14:00 at the Patriarch's Ponds there will be a meeting of system operators of points of the Medium network. We believe that the Internet should be politically neutral and free - the principles on which the World Wide Web was built - do not stand up to scrutiny. They are outdated. They are not safe. We live in Legacy. Any centralized network […]

Amazon Redshift Parallel Scaling Guide and Test Results

We at Skyeng use Amazon Redshift, including parallel scaling, so we found this article by Stefan Gromoll, founder of dotgo.com, for intermix.io interesting. After the translation - a bit of our experience from the engineer according to Daniyar Belkhodzhaev. The Amazon Redshift architecture allows scaling by adding new nodes to the cluster. The need to cope with peak requests can lead to excessive […]