Heading: Blog

Huawei demands that US operator Verizon pay more than $1 billion for 230 patents

Huawei Technologies has notified US telecommunications operator Verizon Communications of the need to pay licensing fees for the use of more than 230 patents it owns. The total amount of payments exceeds $1 billion, an informed source told Reuters. As the Wall Street Journal previously reported, back in February, Huawei's head of intellectual property licensing said Verizon should pay […]

Xiaomi Mijia Smart Door Lock: NFC Smart Door Lock

Xiaomi has announced the Mijia Smart Door Lock, which will go on sale at the end of this month at an estimated price of $250. The new product offers a variety of unlocking methods. In particular, a fingerprint scanner is provided to open the lock using a fingerprint. In addition, there is a built-in panel for entering a digital password. You can remove the protection when [...]

@Kubernetes Meetup #3 at Mail.ru Group: June 21

It seems like an eternity has passed since the February Love Kubernetes. The separation was a little brightened up only by the fact that we managed to enter the Cloud Native Computing Foundation, certify our Kubernetes distribution kit for the Certified Kubernetes Conformance Program, and also launch our Kubernetes Cluster Autoscaler implementation in the Mail.ru Cloud Containers service. It's time for the third @Kubernetes Meetup! In short: Gazprombank will tell you how they […]

Phison to introduce 6500MB/s SSD controller early next year

Phison is working on a new controller designed for next-generation solid-state drives using the high-speed PCI Express 4.0 interface. A key feature of the new product will be support for higher data transfer rates - up to 6500 MB/s. Earlier this year, Phison demonstrated its PS5016 controller, designed for next-generation solid-state drives with the ability to connect four […]

October. Revolutionary Approaches to Security

Information security threat vectors continue to change. To develop an approach that provides the most comprehensive protection for data and systems, Acronis is hosting the first global Cybersecurity Revolution Summit this fall. For those interested in the event program and participation opportunities, detailed information is below the cut. Acronis Global Cyber ​​Summit​ will be held at the Fontainebleau Hotel in Miami, Florida […]

Reduce backups by 99.5% with hashget

hashget is a free, operable deduplicator — a utility similar to an archiver that allows you to significantly reduce the size of backups, as well as organize incremental and differential backup schemes and more. This is an overview article to describe the features. The use of hashget itself (quite simple) is described in the README of the project and the wiki documentation. Comparison According to the law of the genre, I'll start right away with an intrigue - […]

Finding Zina

- Quiet! Quiet! – the chairman shouted, running along the narrow, broken, but paved central street of the village of Makarovo. - Just calm down! Mikhalych has arrived! But the crowd continued to roar. Mass gatherings rarely happened in the village, and the people frankly missed them. Even Village Day, which used to be celebrated on such a grand scale, has long since sunk into oblivion. Although, can one call [...]

AERODISK Engine: Disaster recovery. Part 1

Hello, Habr readers! The topic of this article will be the implementation of disaster recovery in AERODISK Engine storage systems. Initially, we wanted to write in one article about both tools: replication and metrocluster, but, unfortunately, the article turned out to be too large, so we split the article into two parts. Let's go from simple to complex. In this article, we will set up and test a synchronous […]

Size zero element

Graphs are a schematic notation in many areas. Model of real objects. Circles are vertices, lines are graph arcs (connections). If there is a number next to the arc, it is the distance between points on the map or the cost on the Gantt chart. In electrical and electronics, vertices are parts and modules, lines are conductors. In hydraulics, boilers, boilers, fittings, radiators and […]

How to get the most out of a conference

The question of the benefits and necessity of going to IT conferences often causes controversy. For many years now I have been involved in organizing several major events and I want to share a number of tips on how to make sure you get the most out of the event and not think about a lost day. First, what is a conference? If you think “reports and speakers”, then this is not […]

Why do we make Enterprise Service Mesh

Service Mesh is a well-known architectural pattern for integrating microservices and migrating to cloud infrastructure. Today in the cloud-container world it is quite difficult to do without it. Several open-source service mesh implementations are already available on the market, but their functionality, reliability and security are not always sufficient, especially when it comes to the requirements of large financial companies across the country. That's why […]

90 billion rubles for the development of artificial intelligence

On May 30 of this year, a meeting was held on the territory of Sberbank’s School 21 on the development of technologies in the field of artificial intelligence. The meeting can be considered a bit epoch-making - firstly, it was chaired by Russian President V.V. Putin, and the participants were presidents, general directors and deputy general directors of state corporations and large commercial companies. Secondly, neither more nor less was discussed, but the national […]