Asynchronous loops in Node.js 10 &lt;{short}&gt; &lt;{full}&gt; <div class="post__text post__text-html js-mediator-article"> <p> <img src="https://habrastorage.org/webt/hw/wg/n5/hwwgn5if__e2jx7csqt2bmx6irq.png" alt=""></p> <br>   <p> This month, t

<{full}>
Asynchronous loops in Node.js 10          
  This month, the tenth version of Node.js is coming out, in which we expect a change in the behavior of the streams (          
  This month, the tenth version of Node.js is coming out, in which we expect a change in the behavior of the streams (
 
This month, the tenth version of Node.js is coming out, in which we expect a change in the behavior of the streams ( <{short}> This month, the tenth version of Node.js is coming out, in which we expect a change in the behavior of the streams (  This month, the tenth version of Node.js is coming out, in which we expect a change in the behavior of the streams ( ? readable-stream), Caused by the appearance of asynchronous cycles. for-await-of . Let's see what it is and what we prepare for. Using async iteration natively in Node.js . Continuing the topic   Iterables and Iterators .  Asynchronous iteration . ...
+ 0 -

How to hide DNS-requests from prying eyes of the provider

Configure ???.1 from Cloudflare and other DNS services still requires the skills of working on the command line


 
How to hide DNS-requests from prying eyes of the provider  

Encryption of traffic between your device and DNS-service prevents third parties from monitoring traffic or changing the address of

 
 
The death of network neutrality and the weakening of the rules for Internet service providers handling network traffic caused a lot of fears about confidentiality. ISPs (and other unauthorized people who are monitoring traffic) have long had a tool that allows them to easily monitor people's behavior on the Internet: these are their domain name ...[/h]
+ 0 -

The concepts of distributed architecture, with which I got acquainted with the construction of a large system of payments

The concepts of distributed architecture, with which I got acquainted with the construction of a large system of paymentsI joined Uber two years ago as a mobile developer with some experience in backend development. Here I worked on the development of payment functionality in the application - and in the process rewrote the very appendix . After that I Has passed in management of developers and headed the team itself. Thanks to this, I was able to get to know the backend much more closely, since my team is responsible for many of the systems of our backend that allow making payments.
 
 
Prior to my work in Uber, I had no experience working with distributed systems. I got a traditional education ...
+ 0 -

Blocking Telegram and AWS - Morning does not start with coffee

Blocking Telegram and AWS - Morning does not start with coffee
 
That's how today began the morning of those who tried to go to docs.mongodb.com
 
 
Also under the distribution were services, the number of which at the moment is difficult to calculate.
 
Given the "inflexible" position of ILV and Telegram - to expect a quick resolution of this issue is not necessary.
 
 
Many became hostages of this situation - not everyone has the privilege of spending personal millions of dollars in the struggle for freedom.
 
 
The problem should be solved right now, so that the service as soon as possible earned.
 
 

VDS in the Netherlands and Russia


 
We decided ...[/h]
+ 0 -

Detection of attacks on Active Directory with Azure

Next year will be 20 years since the creation of the Active Directory directory service. During this time the service has acquired functional, protocols, various clients. But the need to maintain compatibility with a number of obsolete clients forces you to have default settings that are interoperable. Administrators often do not change them, and this creates a big risk. In this article, we'll look at detecting attacks that can lead to domain dominance.
 
 
Detection of attacks on Active Directory with Azure
 
 
What is common between the attacks on Active Directory and Azure? On March ? 201? Azure Advanced Threat Protection was released. This service, which ...
+ 0 -

Open free webcast of the Mobius 2018 Piter

Open free webcast of the Mobius 2018 Piterconference.   April 20-2? that is, tomorrow or the day after tomorrow, in St. Petersburg will be a conference on the mobile development of Mobius. Android and iOS, a variety of topics from multithreading to testing, Russian speakers and foreign stars - about what will be there, we are already wrote .  But what else has not been reported: on both days of the conference, the online broadcasting of the first hall will be free of charge. Go on YouTube, so it's easy to watch anywhere, even on a smartphone, even on a TV. And although nothing can replace a completely personal presence, we try to bring the ...
+ 0 -

Conference SMARTRHINO-2018

Conference SMARTRHINO-2018On April 2? a conference for students of SMARTRHINO-2018 will be held at the SEC of the IB Bauman Moscow State Technical University. The conference will be devoted to 4 directions:
 
Kotlin
 
Reverse engineering
 
Best Practices
 
Machine Learning
 
️Speakers of the conference are the leading employees of the INFORION Company.
 
Active participants will receive valuable prizes.
 
The detailed information on the speakers and the conference program is available on the website: https://www.smartrhino.ru/
 
The actual information is in the Telegram group https://t.me/smartrhino2018 ...
+ 0 -

How we broke Ceph

 
How we broke Ceph  
 
Detective in 1 part.
 
This story happened in October.
 
 
There is Ceph version ??? (Hammer). 6 storages, 8 monitors, 6-8 osd on each storage, SSDs ranging from 1 TB to 4 TB. Replica - ? at least 1.
 
 
Once it happened: in the evening a storm passed through the whole cluster and spontaneously restarted a lot of osd. In the osd logs, we saw standard errors for ceph of the form no reply from osd.X . A few slow requests and spontaneous restarts that for ceph is not a critical event and quite frequent. In general, it happens. But, unfortunately, not all the restarted osd were able to rise...
+ 0 -

Associative rules, or beer with diapers

Associative rules, or beer with diapers  
 

Introduction to the theory of


 
Learning on associative rules (ARL) is, on the one hand, simple, on the other hand, a method of searching for relationships (associations) in datasets, or more specifically, itemsests, quite often used in real life. For the first time, Piatesky-Shapiro G spoke about this in detail.[1] in the work "Discovery, Analysis, and Presentation of Strong Rules." (1991) Agrawal R, Imielinski T, Swami A developed the subject more extensively in "Mining Association Rules between Sets of Items in Large Databases" (1993) [2] and "Fast Algorithms for Mining ...[/h]
+ 0 -

WorkFlowSoft: the history of our friendship

Hello. My name is Lydia, and for seven years now I have been working in the Marketing Department of Softline. In this article I will tell you how differently you can approach the issue of organizing the work of a creative team (and, indeed, any other), and how different - cardinally opposite! - results can be achieved.
 
 
WorkFlowSoft: the history of our friendship
 
 
Our department at Softline is engaged in the production of design and content: this means that we write articles on IT topics, issue a magazine for clients and create many other printed products, arrange events, help web designers, draw pretty banners with funny slogans. In general...
+ 0 -