Micro-course on the programming of SCADAPack controllers on the C

Micro-course on the programming of SCADAPack controllers on the C
 
On the harbor, there are frankly few articles about ACS TP. Moreover, I suspect that programming in the field of industrial automation for most Khabrovians is a magical dark forest with strange legends and creatures. And so I wanted to spend a short excursion in this forest for cognitive purposes, but we will not limit ourselves to cognitive purposes, and we will try to make this material useful to people just starting their way in the process control system or for the first time faced with the type of controllers under consideration.
 
ozna.forum24.ru/?1-11-0-00000001-000-0-0#003 ...
+ 0 -

Training FastTrack. "Networking basics." "Cisco Swatchy". Eddie Martin. December, 2012

About a year ago, I noticed an interesting and fascinating series of lectures by Eddie Martin, which is incredibly intelligible, thanks to his history and examples from real life, as well as his tremendous experience in teaching, allows him to gain an understanding of quite complex technologies.
 
 
Training FastTrack. "Networking basics." "Cisco Swatchy". Eddie Martin. December, 2012  
 
We continue the cycle of 18 articles on the basis of his lectures:
 
 
Training FastTrack. "Networking basics." "Understanding the OSI model." Part one. Eddie Martin. December, 2012
 
 
Training FastTrack. "Networking basics." "Understanding ...
+ 0 -

Mikrotik vs Old PC, the problem of choice in a small enterprise

In small enterprises, there is an acute problem of economy in the purchase of equipment, often this issue is resolved by refusing to purchase, if it is possible to make the existing ones work. In this article, I want to share my experience in this matter and highlight the main reasons why many do so.
 
 
Mikrotik vs Old PC, the problem of choice in a small enterprise  
.Mikrotik L2TP /IPSec for NAT: ipsec, error failed to pre-process ph2 packet )
 
CAPsMAN does not know how to work as an intermediate controller, which does not allow you to manage all WiFi companies across all branches. If communication with the controller disappears, then WiFi disconnects: (
 
Maybe ...
+ 0 -

Integration of dovecot and Apache Solr

Integration of dovecot and Apache SolrGood afternoon.
 
 
Today, mail is still one of the key means of messaging in the corporate segment. The volume of stored mail only grows and over time takes hundreds of gigabytes, or even a few terabytes. At this point, users in most cases begin to experience problems in the process of using mail, for example, with a search. If you use a Web client, for example, the same RoundCube, then when you search all messages in all folders and even the content of the message itself, very often the result had to wait tens of seconds, which is not very pleasant. That's why I thought it would be time to configure ...
+ 0 -

If you do not have a dog

If you do not have a dog If your business needs BDD with live documentation in Russian, there is no dedicated tester position, or its knowledge level is insufficient for self-automation and it is important to provide a single stack of technologies between scrum teams, then you definitely need to connect our Akita library at least once and check it in action.
 
 
Before I go into the stories about what the Akita library is, I would like to talk about how we got to the idea of ​​implementing it, what problems we wanted to solve and what we eventually achieved.
 
anna-che , Alice ...
+ 0 -

We train on cats: modification of collections and tables in iOS

We train on cats: modification of collections and tables in iOS To visualize arrays of arbitrary data, Apple gave us the tables UITableView for one-dimensional visualizations and the collection UICollectionView for more complex cases. For example, in iFunny tens of thousands of users publish and send out "memasiki" every day. The application constantly works with various lists: memes, users, tags, correspondence, etc.
 
 
The task of displaying a list is very common, and it's fairly easy to program. However, everything is significantly more complicated if this list is dynamically changing. Unexpectedly catch NSInternalInconsistencyException After ...
+ 0 -

What is missing in Trello for Agile development and where to look for alternatives?

What is missing in Trello for Agile development and where to look for alternatives?
 
Many of those who are used to working with Trello, note the convenience and versatility of the tool, but forget that around there are many new services and functions. Trello is built on the basis of Kanban boards. Unfortunately, the Kanban boards in Trello are greatly simplified: they do a great job with common office tasks, but there are not enough functions for Agile software development.
Hygger.io , Alexander Sergeev.
 
Swimlanes
 
It is easy to imagine vertical columns on the board. Presented? So, Swimlanes are horizontal columns. As a rule, on the development board we make three types of Swimlanes:
 
 
Tasks & ...
+ 0 -

Organization of monitoring system

Monitoring is the main thing that the administrator has. Admins are needed for monitoring, and monitoring is needed for admins.
 
Organization of monitoring system
 
The monitoring paradigm itself has changed over the past few years. A new era has already come, and if you now monitor the infrastructure as a set of servers - you do not monitor almost anything. Because now "infrastructure" is a multi-level architecture, and each level has its own tools for monitoring.
 
In addition to problems such as "the server crashed", "you need to replace the screw in the raid", now you need to understand the problems of application level and business ...
+ 0 -

Bypass of SAML authorization

Bypass of SAML authorization
 
 
A critical vulnerability has been detected in SAML (Security Assertion Markup Language), with which
 
you can bypass authorization. Vulnerabilities are affected by the decisions of various SSO-providers and several libraries using SAML SSO (Single Sign-On).
 
The markup language SAML (Security Assertion Markup Language) is an open standard based on XML, which is intended for the exchange of authentication and authorization data between the parties of the process. Using the SAML protocol, users can access many of their cloud applications, specifying just one login and password. Single Sign-On (SSO) is ...
+ 0 -