HPE MSA Entry-Level Array Innovations: A More Available Flash Array and Rich Solution Integration

 3r33939. 3r3-31. How does HPE invest in expanding the capabilities of MSA entry-level arrays with SSD support for companies with different budgets and storage needs?
 3r33939. More and more good news for small and medium business owners who are looking for an entry-level disk array - they are becoming more productive and easy to manage. HPE continues to develop MSA arrays so that you get more speed, data availability, and mobility. I suggest taking a closer look at the innovations that will allow you to get much more from MSA.
 3r33939. HPE MSA Entry-Level Array Innovations: A More Available Flash Array and Rich Solution Integration ...
+ 0 -

Emergency start-up "Soyuz MS-10" (updated)

 3r3334. 3r3-31. At the site of the second stage of the Soyuz launch vehicle, an accident does not take place on the ISS, an emergency landing is in progress. Post updated.
 3r3334.
 3r3334. Shortly after the separation of the first stage, the CAC and the head fairing, a carrier crashed. The ship is separated from the rocket, there is a ballistic descent. There is a connection with the astronauts.
 3r3334.
 3r3334. NASA-TV (with English dubbing)
 3r3334.
3r314.
+ 0 -

Open lesson "Virtual Lab on Vagrant"

Good day to all!
 3r3335.
 3r3335. We had an open webinar last week as part of our 3-3338 course. Linux Admin
where Leonid parsed the quick configuration of Vagrant, as well as the possibilities and nuances of the joint use of Vagrant and Git.
 3r3335.
 3r3335.
3r318.
 3r3335.
 3r3335. Questions and comments, as always, are waiting either here, or you can ask our teachers by going to Open Day .
3r3335. 3r3335. 3r3333. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == ...
+ 0 -

How to reduce the number of experiments on animals

+ 0 -

Career steroids

A lot of books, films, articles and even songs are devoted to building a career. I read many of them - wonderful works. But Some are too correct, or something.
 
 
In the works of a lighter genre - for example, in songs and films - it is said about building a career much more prosaic, often with humor and irony. From what comes to mind immediately, I will name two songs - "Manager" groups Leningrad and, sorry for the idiom, The booty Gaza (the song is really called that),
 
 
But, as it should be for the light genre, there is no systematic approach, fullness, and examples from life...
+ 0 -

How to patch find under FreeBSD?

 
3r3-31.

We teach FreeBSD to look for files by extended attributes

3r3394.  
Summary: The FreeBSD OS has a file system-level control mechanism for extended file attributes (extattr). Using the standard commands setextattr, getextattr and rmextattr you can create, read and delete comments, keywords and other file metadata. But you cannot search for files by extended attributes. In addition, extended attributes are lost when copying a file. In two articles, I will offer my patches for the find and cp commands that eliminate these shortcomings. However, I am not a professional programmer ...[/h]
+ 0 -

There is evidence of the presence of spyware chips in Supermicro

There is evidence of the presence of spyware chips in Supermicroservers. 3r3-31.  Where is a smart man hiding a leaf? In the woods. Where does he hide the spy chip? In server 3r336.  Only yesterday on Habré was r3r311. publishedAn article stating that there is no evidence of the presence of spyware in Supermicro hardware. Well, today they appeared . I found them in the equipment of one of the largest telecommunications companies in the US network security expert Yossi Applebaum.  The expert is one of the leaders of Sepio Systems, which specializes in the security of hardware solutions. Relatively recently, she fulfilled the order of one of the clients (whom ...
+ 0 -

Petrol bikes or a strange product search (e-commerce)

 3r3146. 3r3-31. Discussing the quality of grocery search and the ways of its automated testing, last time, came to an understanding of some opacity of the problem. A huge number of online stores often put buyers in a dead end, not finding the required simple requests, and the problem, as it were, is not. In a word, we look at the real problems of a not very relevant search for a very popular online store (which really wants to be a “marketplace”). 3r3116.  3r3146. 3r3116.  3r3146. Petrol bikes or a strange product search (e-commerce) The case of a missing cake
3r3116...
+ 0 -

How to write in an assembler program with overlapping instructions (another bytecode obfuscation technique)

How to write in an assembler program with overlapping instructions (another bytecode obfuscation technique)We present to your attention the technique of creating assembler programs with overlapping instructions, - to protect the compiled byte-code from disassembling. This technique is able to withstand both static and dynamic analysis of bytecode. The idea is to pick up such a stream of bytes, when disassembling which starting from two different offsets, two different chains of instructions were obtained, that is, two different ways of executing the program. To do this, we take multibyte assembly instructions, and hide the protected code in the variable parts of the byte code of these instructions...
+ 0 -

Convert words and phrases into an anagram

 
3r3-31.
Anagram (from the Greek. Ανα- - “per” and γράμμα - “letter”) is a literary device consisting in rearrangement of the letters or sounds of a certain word (or phrases), which results in another word or phrase 3r3155.  
Anagrams are used to encrypt the answer to a quiz question (charade, crossword, etc.).
 
 
I bring to your attention two functions that implement the algorithm for obtaining anagrams from individual words and phrases.
 
 
The work of the functions “in combat”, as they say, can be seen in 3r3-316. here
.
 
 
To select the most “mixed” anagram, the Levenshtein function ...
+ 0 -