Heading: Administration

Visual Programming for Sonoff Basic

An article about how to create a programmable logic controller from a cheap Chinese device. Such a device will find its use both in home automation and as practical classes in school computer science. For reference, by default, the Sonoff Basic program works with a mobile application via a Chinese cloud service; after the proposed modification, all further interaction with this device will […]

Application Centric Infrastructure. Network architecture of the future - from reasoning to action

Over the past few years, Cisco has been actively promoting a new architecture for building a data transmission network in the data center - Application Centric Infrastructure (or ACI). Some are already familiar with it. And some even managed to implement it at their enterprises, including in Russia. However, for most IT professionals and IT managers, ACI is still either an obscure acronym or just […]

9. Check Point Getting Started R80.20. Application Control & URL Filtering

Welcome to Lesson 9! After a short break for the May holidays, we continue our publications. Today we will discuss an equally interesting topic, namely Application Control and URL Filtering. That's what people sometimes buy Check Point for. Need to block Telegram, TeamViewer or Tor? This is what Application Control is for. In addition, we will touch upon [...]

Overview of Veeam Backup & Replication 9.5 Update 4

At the end of January, Update 4 was released for Veeam Availability Suite 9.5, full of features like another full-fledged major release. Today I will briefly talk about the main innovations implemented in Veeam Backup & Replication, and I promise to write about Veeam ONE in the near future. In this review we will consider: versions of systems and applications that the solution now supports working with […]

How blocking access to pages that distribute prohibited content works (now the RKN also checks search engines)

Before proceeding to the description of the system that is responsible for filtering access by telecom operators, we note that now Roskomnadzor will also control the work of search engines. At the beginning of the year, a control procedure and a list of measures were approved to ensure that search engine operators comply with the requirements to stop issuing information about Internet resources, access to which is restricted on the territory of the Russian Federation. The corresponding order of Roskomnadzor [...]

Let's count the agents "Inspector"

It is no secret that the automated system "Revizor" monitors the control of blocking on the list of prohibited information in Russia. How it works is well written in this article on Habr, the picture is from the same place: The Agent Auditor module is installed directly at the provider: The Agent Auditor module is a structural element of the Auditor automated system (AS Auditor). This system is designed to control […]

Seamless RabbitMQ to Kubernetes migration

RabbitMQ is a message broker written in Erlang that allows you to organize a failover cluster with full data replication to multiple nodes, where each node can serve read and write requests. Having many Kubernetes clusters in production, we maintain a large number of RabbitMQ installations and faced the need to migrate data from one cluster to another without downtime. This […]

Happy Radio and Communication Day! A short postcard about

If you turn to an ordinary person, he will probably say that radio is dying, because in the kitchen the radio point has long been cut off, the receiver only works in the country, and in the car your favorite tracks are played from a flash drive or an online playlist. But you and I know that if it weren’t for the radio, you and I wouldn’t be reading on HabrΓ© about space, cellular […]

What's new in the cloud: 15 materials about standards, tools and regulation

Below the cut are reviews of cloud solutions, cases, practical recommendations and analytical materials from our blog and Telegram channel. / photo by Dennis van Zuijlekom CC BY-SA Industry Where is cloud infrastructure heading in 2019 A brief overview of this year’s key cloud trends: serverless systems, multi-cloud, 5G networks, quantum technologies and AI systems. In our Telegram channel, we provide statistics and expert opinion […]

New rules for anonymity of messengers

The bad news we've been waiting for. Today, on May 5, new rules for identifying messenger users by phone number came into force on the territory of the Russian Federation. The corresponding government decree was published on November 6, 2018. Russian users will now need to verify that they own the phone number they are using. During the identification process, the messenger will send to the mobile operator […]

"How we build IaaS": materials about the work of 1cloud

We talk about how we launched and developed the 1cloud cloud, we talk about the evolution of its individual services and architecture as a whole. We also disassemble myths about IT infrastructure. / Wikimedia / Tibigc / CC Evolution How we started the development of our IaaS provider We compare our expectations before launching the platform with the first experience of providing services to clients. Let's start with a brief […]