Heading: Blog

In Win Alice: a "fabulous" computer case made of plastic with a custom layout

In Win has announced a new, very unusual computer case called Alice, which was inspired by the classic fairy tale “Alice in Wonderland” by the English writer Lewis Carroll. And the new product really turned out to be very different from other computer cases. The frame of the In Win Alice case is made of ABS plastic and steel elements are attached to it, on which components are attached. Outside on […]

Google's 7 Container Best Practices

Note transl.: The author of the original article is Théo Chamley, Google cloud solutions architect. In this post for the Google Cloud blog, he provides a summary of his company's more detailed guide, called "Best Practices for Operating Containers." In it, Google experts have collected best practices for operating containers in the context of using Google Kubernetes Engine and more, touching on […]

The Inside Playbook. Network functions in the new Ansible Engine 2.9

The upcoming release of Red Hat Ansible Engine 2.9 brings exciting improvements, some of which are discussed in this article. As always, we've been developing Ansible Network improvements openly, with community support. Get involved - check out the GitHub issue board and review the roadmap for the Red Hat Ansible Engine 2.9 release on the wiki page for […]

idea farm

1. There was little left to the final goal - about a third of the way - when the space cruiser came under severe information icing. What was left of the lost civilization hovered in the void. Paragraphs of scientific essays and images from literary works, scattered rhymes and simply sharp words, once thrown casually by unknown creatures - everything looked abstruse and extremely disordered. AND […]

School of Java developers in Nizhny Novgorod

Hi all! We are opening a free school for beginner Java developers in Nizhny Novgorod. If you are a final year student or a university graduate, have some experience in IT or a related profession, live in Nizhny or its environs - welcome! Registration for training is here, applications are accepted until October 30. Details are under the cut. So, the promised […]

The Tor project published OnionShare 2.2

The Tor project has announced the release of OnionShare 2.2, a utility that allows you to securely and anonymously transfer and receive files, as well as organize a public file sharing service. The project code is written in Python and is distributed under the GPLv3 license. Ready-made packages are prepared for Ubuntu, Fedora, Windows and macOS. OnionShare runs a web server on the local system that operates as a hidden service […]

Apple in 2019 is Linux in 2000

Note: This post is an ironic observation on the cyclical nature of history. This very observation does not have any practical use, but in its essence it is very apt, so I decided that it was worth sharing with the audience. And of course, we’ll meet in the comments. Last week, the laptop I use for MacOS development reported that […]

Mom, I'm on TV: how was the final of the "Digital Breakthrough" contest

What happens if you leave 3000+ IT specialists of different stripes in one huge territory? Our participants broke 26 mice, set a Guinness record and destroyed one and a half tons of chak-chak (perhaps they should have claimed another record). Two weeks have passed since the final of the “Digital Breakthrough” - we remember how it was and sum up the main results. The final of the competition took place in Kazan with [...]

Khronos provided the opportunity for free certification of open drivers

The Khronos graphics standards consortium has given open graphics driver developers the opportunity to certify their implementations against the OpenGL, OpenGL ES, OpenCL and Vulkan standards without paying royalties or having to join the consortium as a member. Applications are accepted for both open hardware drivers and fully software implementations developed under the auspices of […]

Arch Linux prepares to implement zstd compression algorithm in pacman

Arch Linux developers have warned about their intention to enable support for the zstd compression algorithm in the pacman package manager. Compared to the xz algorithm, using zstd will speed up packet compression and decompression operations while maintaining the same level of compression. As a result, switching to zstd will lead to an increase in the speed of package installation. Support for packet compression using zstd will be coming in the release of pacman […]

Suricata 5.0 attack detection system available

The OISF (Open Information Security Foundation) has published the release of the Suricata 5.0 network intrusion detection and prevention system, which provides tools for inspecting various types of traffic. In Suricata configurations, it is possible to use the signature database developed by the Snort project, as well as the Emerging Threats and Emerging Threats Pro rulesets. The source code of the project is distributed under the GPLv2 license. Major changes: New modules have been introduced […]