Reading for the weekend: materials about working with PD, reviews of iron in the data center and the “kitchen” of the IaaS provider

 3r3304. 3r3-31. Today we have collected 17 articles on the security of personal data (PD), new technologies in data centers and the "internal kitchen" 3r-32r. 1cloud
. From these materials, you will learn why a data center has a GPS firewall, how to work with PDs in a public cloud, and how to cool servers with hot water.
 3r3304.
 3r3304. Reading for the weekend: materials about working with PD, reviews of iron in the data center and the “kitchen” of the IaaS provider 3r311.
 3r3304. 3r3197. 3r3198. /Flickr /3r317. Dennis van Zuijlekom
/ CC BY-SA [/i]
 3r3304.
 3r3304. 3r3178. How to handle personal data
 3r3304.
 3r3304.
3r3334. What is the essence of the law on personal data 3r-3264.
. We talk about the content of the law 152-FZ, which regulates the storage and processing of personal data in the territory of the Russian Federation. Inside - about what is meant by “personal data” and new bureaucratic obstacles regarding their processing. The block diagram given in the article will help determine what actions need to be taken to process user data in accordance with the law.
 3r3304.
 3r3304.
 3r3304.
[b] Personal data protection tools
. In this material we will talk about the documents that complement and clarify 152-FZ - government regulations and orders of federal services. You will learn about the levels of personal data protection and the security measures prescribed for each of them. A table based on these documents will help determine which standard your company needs to meet. Also in the material - a list of regulations and GOSTs, which mention personal data and information security.
 3r3304.
 3r3304.
 3r3304.
Data security in a public cloud . Consider the legal aspects of storing user data in a public cloud. You will learn about licenses and certificates that guarantee the security of cloud providers. We will also talk about protecting the components of the cloud infrastructure for which the companies themselves are responsible.
 3r3304.
 3r3304.
 3r3304.
Study: half the companies patch vulnerabilities during the month - why? According to a Kollective survey, 45% of large companies update vulnerable software only a month after the release of the required patch. Another 27% of respondents admitted that this process takes several months in their businesses. A slow update can be costly for companies and their customers. An example is the Equifax data leak, which has affected more than 140 million people. We understand why organizations are not in a hurry to close vulnerabilities and how to increase the efficiency of installing patches.
 3r3304.
 3r3304.
 3r3304.
The world's first law on the protection of IoT-gadgets - what is its essence 3r-3264. . In California, the first law was passed, obliging manufacturers of IoT devices to guarantee the information security of their products. We talk about the content of the act, about its supporters and critics, as well as about similar bills in the United States and other countries.
 3r3304.
 3r3304.
 3r3304.
3r3394. [b] What you need to know about security in a hybrid cloud system

. Many people mistakenly believe that the responsibility for data stored in the public cloud rests entirely with the providers. The CEO of security firms Varonis explains why this is not the case, and what practices will help protect your cloud infrastructure.
 3r3304.
 3r3304. 3r3178. About the work of IaaS-provider 1cloud
 3r3304.
 3r3304.
3r31-10. A large photo tour of the Moscow cloud 1cloud
. Excursion to the company's flagship data center. DataSpace is the first data center in Russia with a third-level certificate from the Uptime Institute. This means high fault tolerance and close to 100 percent uptime. You will learn about security, power, and cooling systems in the DataSpace, as well as see the hardware on which our customers' data is stored.
 3r3304.
 3r3304. 3r3119.
 3r3304. 3r3197. 3r3198. /Our NetApp FAS8040 storage system with DS2246 expansion shelves (rear view) [/i]
 3r3304.
 3r3304.
 3r3304.
How IaaS helps the 1C franchisee: 1cloud experience . It is becoming increasingly difficult for conscientious 1C service providers to distinguish themselves from one-day competitors. For many of these firms, IaaS solutions are key to continuous development. We spoke with Unitek24 CEO Sergei Danishevsky to understand how cloud technologies help his business develop new products and guarantee data security.
 3r3304.
 3r3304.
 3r3304.
3r3145. DevOps in the cloud service on the example of 1cloud.ru
. In this article we will look at the process of continuous integration in the 1cloud ecosystem: from the development of a new version of the product to its deployment. Inside - analysis of the tasks of each stage and associated DevOps tools. Also we will talk about what tasks you should not automate.
 3r3304.
 3r3304.
 3r3304.
Briefly about the types of software architectures, and which of them we chose for the IaaS provider 3r-3264. . Analysis of the advantages and disadvantages of multi-level, event-oriented, micronuclear and microservice architectures. Let us tell you why it was decided to transfer 1cloud to the microservice architecture, what we needed to perform this task, and what it would give to customers.
 3r3304.
 3r3304.
 3r3304.
[b] Evolution of cloud architecture 1cloud
. The material in which we analyze in more detail the new modular architecture of 1cloud. Let's talk about the principles of the separation of monolithic systems into modules, those modules on which we specifically stopped and their structure.
 3r3304.
 3r3304. 3r3178. Iron in data centers 3r3r179.
 3r3304.
 3r3304.
3r3185. Why data centers are moving to fuel cells 3r326464.
. In the 90s, on the request of NASA, work began on a renewable, efficient and environmentally friendly source of energy for use on Mars. Twenty years later, such devices are used to generate electricity in data centers. The article describes the principles of operation of fuel cells, their advantages and disadvantages, as well as examples of companies that already use these technologies in their data center.
 3r3304.
 3r3304. 3r3194.
 3r3304. 3r3197. 3r3198. /Flickr /3r3-33199. Steve Jurvetson
/ CC BY [/i]
 3r3304.
 3r3304.
 3r3304.
[b] A GPS firewall for the data center - why is it needed and how does
work? . Uninterrupted communication with GPS satellites is important for ensuring stable operation of data centers. By replacing the GPS signal, attackers can pause the data center or hack into its system. To protect against such attacks, and was developed by GPS-firewall. In the article we will tell you what principles it is built on and what alternatives exist.
 3r3304.
 3r3304.
 3r3304.
What is interesting about the new UCS C480 ML M5 - a server for machine learning from Cisco 3r-3264. . Material about the new server from Cisco, which is designed specifically to work with neural networks. Graphic capabilities of the product will make it an ideal choice for parallel computing, and the software supplied in the kit will help secure any data center. We talk about the "stuffing" and potential applications of this unusual server.
 3r3304.
 3r3304.
 3r3304.
[b] How Google creates “smart” data center
. Four years ago, smart assistants appeared in Google data centers - neural networks giving advice on the management of cooling and power supply systems. After a long training, the technology has become completely autonomous and is now able to manage the data center without human intervention. Let us tell you what results have been achieved in Google, how the system makes decisions, and what tasks the data center staff can do better than algorithms.
 3r3304.
 3r3304.
 3r3304.
How wave energy will power the submarine data centers. . In pursuit of more efficient cooling, a number of companies - including 3r-3252. Microsoft
- plans to place data centers under water. However, the ocean can be not only a medium for heat removal, but also a source of electricity. This material focuses on existing developments in wave energy and its potential environmental benefits.
 3r3304.
 3r3304.
 3r3304.
Cooling with hot water - why does it need . An article about the cooling system with hot water, which is used in supercomputers. This counterintuitive technology removes heat from the chips directly through the microchannels on the surface of the devices. The temperature of the water during flow is 60 ° C. In the material read about the effectiveness of this approach and the prospects of such decisions in the data center market.
 3r3304.
 3r3304.
Some more thematic digests from our blog on Habré:

 3r3304.
 3r3304.
DNS-digest: 45 materials from Habr and other resources 3r-3289.
 3r3304.
VPN Digest: Introductory articles on Habré and not only 3r-3289.
 3r3304.
Personal experience: a selection of virtual infrastructure, information security and trends in the market IaaS

 3r3304.
3r33300. 3r3304. 3r3304. 3r3304.
3r3304. 3r33300. 3r3304. 3r3304. 3r3304. 3r3304.
+ 0 -

Add comment