HPE webinars in August-October

A new series of HPE webinars has arrived, and there are a lot of interesting topics in it: arm processors in high-performance computing, acceleration of calculations with Intel Optane, building Wi-Fi in extreme conditions, HPE Lanamark utility for reviewing the state of IT infrastructure, various services for data centers. See the full list and register:
 
HPE webinars in August-October  
The arm processor in HPC. We dismantle HPE Apollo 70 - August 29
 
HPE Apollo 70 - the first corporate HPC platform based on arm processors from HPE. What for? What is inside? What's outside? What's around? Understand the points.
 
 
...
+ 0 -

Overview of the data center IXcellerate (the largest machine hall in the Russian Federation)

Overview of the data center IXcellerate (the largest machine hall in the Russian Federation)  
 
The most important thing is that after the turbine hall hot wet wipes are served, as in Japanese restaurants. It has nothing to do with the technical part, but it's humanly nice.
 
 
And this is a guitar with Paul McCartney's autograph, and yes, it hangs at the entrance to the turbine hall:
 
 
 
 
This data center has a certain mood.
 
 
It looks like a huge hangar in the industrial zone near the metro station "Otradnoe". The height of the hangar is 14 meters, inside the data center is 9 meters high. The remaining space plays the role of a heat insulator, which affects the local cooling features. The building was chosen in such a way that it did not go out on the road with edges (certification protocols can not get high levels if you can get into the truck through a truck, ramming the wall - apparently there were cases), had two different routes and was relatively close to the metro. The MCC station was ...
+ +1 -

Stadium "Central" in Yekaterinburg: how we reconstructed engineering systems

Stadium "Central" in Yekaterinburg: how we reconstructed engineering systems  
Every year, the Department of Intelligent Buildings gets more and more interesting objects. We started quite trite - with SCS in offices more than 20 years ago. Then came the smart buildings, power centers, data centers, stand-alone installations far beyond the cities, industrial facilities - and now several stadiums.
 
 
In total, at the stadium "Yekaterinburg Arena" we have implemented more than 20 engineering subsystems from security with a system for identifying diversionary and terrorist means to high-density vai-fay, a television broadcasting system and multimedia screens.
 
 
Today I'll talk about ...
+ 0 -

Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 2

Start here:
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1
 
 
Stearic acid, it turns out, is really an important component of this explosive, and if you use the wrong proportions, it will not work. This test video shows what happens if it is not enough in relation to aluminum - just an explosion and everything has flown apart. This is a complete failure. When the content of stearic acid is correct, it turns out that - the explosion on the video has a directional character and is similar to the launch of a rocket.
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 2 ...
+ 0 -

Acknowledgments post: day of the system administrator

Acknowledgments post: day of the system administrator  
 
Today is the holiday of the most patient superheroes of the IT universe! On the last Friday of July, "fighters of the invisible front" celebrate their professional holiday - Day of the system administrator.
 
 
Congratulations to all system administrators on your professional holiday!
 
 
We wish all colleagues interesting tasks and realization in work, friendly colleagues and a pleasant atmosphere at work and at home!
 
 
P.S. [/b]
Do not forget to thank the sysadmin at your work :)   Today is the holiday of the most patient superheroes of the IT universe! On the last Friday of July, "fighters of the invisible front" celebrate their professional holiday - Day of the system administrator.  Congratulations to all system administrators on your professional holiday!  We wish all colleagues interesting tasks and realization in work, friendly colleagues and a pleasant atmosphere at work and at home!  P.S. Do not forget to thank the sysadmin at your work :)...
+ 0 -

Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1

Hello, DEFCON! I'm going to break the tradition and this time to begin the performance a minute earlier, because I want to show you so many things that I'm afraid not to be in time. I'm sure that in this presentation there are many more explosive moments than in the whole history of presentations for 25 years of the existence of "Defcon".
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1  
 
This is not a solo project, I used many ideas from my friends. This presentation was inspired by the performances of Bruce Potter, who already spoke here, Shane Lawson and Diviant Ollam at the DefCon 19 conference. They told how they launched a data center in which ...
+ 0 -

Happy System Administrator Day! Postcard with the meaning

Happy System Administrator Day! Postcard with the meaningThe sysadmin is a favorite character of the 3-r3r34. anime [/s] jokes and cool stories. Who among us does not remember the cherished 4 words that are obligatory for a successful quotation in the Bashore (if anyone does not remember - "cat, shredder, admin, x * yase") and did not share stories with Ithappens who did not wear chocolates and beer to quietly expand office limit. Well, in general, we have already given our age, so on - only about the heroes of today's holiday, Day of the system administrator. Or rather - about how they are here in 2018?
 
 
[leech=https://habr.com/company/alloy_software/blog/418341/] ...
+ 0 -

Course MIT "Security of computer systems." Lecture 4: "Division of Privileges", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 4: "Separation of privileges", part 3

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 4: "Division of privileges", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -