Introduction to WSGI Servers: Part One

 3r3406. 3r3-31. This article is a translation of Kevin Goldberg’s “An Introduction to Python WSGI Servers: Part 1” article blog.appdynamics.com/engineering/an-introduction-to-python-wsgi-servers-part-1 with minor additions from the translator 3r33382.  3r3406. 3r33382.  3r3406. Introduction to WSGI Servers: Part One 3r33382.  3r3406. 3r33382.  3r3406. 3r33380. A brief history of servers WSGI Python
3r33382.  3r3406. 3r33394. WSGI [/b] Servers appeared because web servers at that time could not interact with applications written in Python. 3r33394. WSGI [/b] ( Pronounced “whiz-gee” with a solid “g” ) Was developed ...
+ 0 -

Installing kubernetes via kubespray (local-storage, installing ELK, prometheus)

Installing kubernetes via kubespray (local-storage, installing ELK, prometheus) 3rr3465. 3r3-31.
How to raise the High-Availability Kubernetes cluster and not to blow up the brain?
 3rr3465. Use Kubespray, of course.
 3rr3465. Kubespray is a set of Ansible roles for the installation and configuration of an orchestration system with Kubernetes containers.
 3rr3465. Kubernetes is an open source project designed to manage a cluster of Linux containers as a single system. Kubernetes manages and runs containers on a large number of hosts, and also provides co-location and replication of a large number of containers.
 3rr3465. Carefully, under the cut 4 screenshots of elasticsearch ...
+ 0 -

Proxy files from AWS S3 using nginx

It would seem that the task of implementing the frontend for AWS on nginx sounds like a typical case for StackOverflow - after all, there can be no problems with proxying files from S3? In fact, it turned out that a ready-made solution is not so easy to find, and this article should correct this situation.
 
 
Proxy files from AWS S3 using nginx  
 

Why is this even necessary?


 
 
File access control by means of nginx is relevant for the concept of IaC (infrastructure as code). All changes related to access will be contributed only in configs that are in the project.
 
If you give files through your nginx, it becomes ...[/h]
+ 0 -

The oldest IT manufacturer in Europe conquers Habr: Bull opens its blog

The oldest IT manufacturer in Europe conquers Habr: Bull opens its blog  
Bonjour, Habr!
 
 
Bull is the oldest IT company in Europe, and since 201? Atos is a technology brand that supplies hardware and software to more than 50 countries around the world.
 
 
Atos was founded in 1997. The main development was due to mergers and acquisitions. Acquisitions include French hardware manufacturer Bull, SchlumbergerSema, ΙΤ-consulting divisions of Siemens (Unify) and KPMG, IT-outsourcing division of Xerox.
 
 
The Bull company is named after the talented engineer Fredrik Rosing Bulle, who invented the prototype of a modern computer - the “combined sorter-recorder-tabulator punch card”.
 
 
In Russ...
+ 0 -

How to update the code of smart contracts in Ethereum

How to update the code of smart contracts in Ethereum 3r31146. 3r3-31.

How to update the code of smart contracts in Ethereum /Part 1

3r31131.  3r31146. 3r31-104. 3r31099. The article assumes that the reader has a basic understanding of how Ethereum, EVM (Ethereum Virtual Machine) and smart contracts work at a technical level, as well as an understanding of the fundamentals of the smart contract programming language Solidity. 3r31100. 3r31135. of example 3r31134. Let us recall an error in one of Parity’s wallet libraries, which led to the freezing of the air at a cost of $ 160 million 3r31135. 3r31131.  3r31146. 3r31-104. Therefore, the ability ...[/h]
+ 0 -

Conference BLACK HAT USA. A botnet of a million browsers. Part 2

Conference BLACK HAT USA. A botnet of a million browsers. Part 2 3r33434. 3r3-31. Conference BLACK HAT USA. A botnet of a million browsers. Part 1 3r3402.  3r33434. 3r3402.  3r33434. 3r3406. Matt Johanson: [/b] Now I will show you how to enter this code. There are many ad networks, but we chose this one because it allows us to do what we want. 3r3402.  3r33434. 3r3402.  3r33434. 3r314. 3r3402.  3r33434. 3r3402.  3r33434. You can choose a banner image of a sufficiently large size, paste it here and assign it a URL, so that after clicking on the banner the user will go to the desired site. The owners of this ad network provide the option of HTML jаvascript...
+ 0 -

Record of the webinar "Do you need Kubernetes"

Record of the webinar "Do you need Kubernetes" 3r3189. 3r3-31.
3r3185. 3r3185. 3r3185. 3r33175.  3r3189. 3r33177. Pavel Selivanov is the main speaker at the intensives of Kuburnethes (3r3-3172. Slurm-2 3r3-33173. For those who are just getting acquainted with the technology and
MegaSlerm
For those who are already working with Cooberntes). 3r33175.  3r3189. October 25–27 - 3–3–319. Slurm-2
3r33175.  3r3189. October 29–31 - 3-33323. MegaSlerm
3r3178. 3r33175.  3r3189. 3r33177. If you register before October 1? tell the manager “I am from a webinar” and you will be given a 10% discount. 3r3178. 3r33175.  3r3189. 3r33177. Slurm 3 is scheduled ...
+ 0 -

MongoDB is changing its open source license

MongoDB is changing its open source license
 3r350.
MongoDB is somewhat offended by the fact that some cloud providers, especially in Asia, use their open code and offer the commercial version of their database in the cloud to their users, not playing according to the rules of open source software. To combat this, MongoDB today announced the release of a new software license - 3r310. Server Side Public License
(SSPL), which will be used in all new releases of their MongoDB Community Server, as well as in all patches to previous versions.
 3r350.
Earlier, MongoDB used 3r3188. GNU AGPL v3
licensed, they have now sent the SSPL for approval at the Open ...
+ 0 -

Eat breakfast yourself, share your work with the “cloud”

Eat breakfast yourself, share your work with the “cloud” 3r33333.  
How Zyxel Cloud helps the local gateway to repel threats. 3r33333.  
3r33333.  
Speaking of security (and not only in IT) it is customary to frighten the consumer. 3r33333.  
“Here come the evil hackers and hack the network. Therefore, it is necessary, it is necessary, it is necessary and further a long list of everything that needs to be bought, set up to order, spend, and, most importantly, allocate a lot of money for this. ”3r33317.  
3r33320. 3r33333.  
3r33333.  
Terrible stories about mysterious kidnappings of “client bases” that caused the complete collapse of the company are walking ...
+ 0 -

FM spam: soon the posters will “grow wiser” and start broadcasting the FM signal, scoring our favorite radio station

FM spam: soon the posters will “grow wiser” and start broadcasting the FM signal, scoring our favorite radio stationLast year, a very interesting presentation was presented at the conference “USENIX Symposium on Networked Systems Design and Implementation”. How to turn a T-shirt or billboard into an FM radio station. The presentation author explains how to “fit” digital data and arbitrary audio tracks onto an FM signal already flying over the air. Through the effect of backscattering radio waves. The presentation seemed so interesting to me that I could not refrain from preparing a brief retelling.
 
What is the practical value of such "FM-jerking"? Are they generally real, or is it from science fiction? And ...
+ 0 -