Using DeviceLock DLP and Citrix Xen to control email on mobile devices

 3r3105. 3r3-31.
The professional community is seriously concerned about the risks of leaking restricted access information through corporate and personal mail from BYOD mobile devices. Practically at every data leakage conference, the question of controlling corporate mail on mobile devices running the most common Android and iOS platforms arises for most participants.
 3r3105.
Using DeviceLock DLP and Citrix Xen to control email on mobile devices
 3r3105.
Let's try to deal with this issue.
 3r3105.
DeviceLock Virtual DLP technology. allows you to intercept e-mail messages directly from an e-mail client application published to Citrix XenApp, which the user gains ...
+ 0 -

Implementing SSD caching in a QSAN XCubeSAN

Implementing SSD caching in a QSAN XCubeSANstorage system. 3r3-3596. 3r3-31. 3r33570. Productivity technologies based on the use of SSD and widely used in storage systems, have long been invented. First of all, it is the use of SSD as storage space, which is 100% efficient, but expensive. Therefore, in the course are the technology of tiring and caching, where SSD are used only for the most popular ("hot") data. Tiring is good for long-term (day-to-week) use scenarios. And caching, on the contrary, for short-term (minutes-hours) use. Both of these options are implemented in storage 3r3-3582. QSAN XCubeSAN. In this article we will consider the implementation ...
+ 0 -

Load testing Veeam Backup & Replication

 3r31867. 3r3-31. Load testing Veeam Backup & Replication via Veeam® Backup & Replication ™ (hereinafter referred to as VBR). We approached the project implementation thoroughly, planned and carried out the following list of works: 3r31854.  3r31867. 3r31854.  3r31867. 3r31841.  3r31867. 3r31846. Study of documentation and best practices on Veeam
products.  3r31867. 3r31846. The development of the VBR architecture of the service provider level 3r31847.  3r31867. 3r31846. Deploying the VBR infrastructure
 3r31867. 3r31846. Testing solutions, determining the optimal settings and modes of operation 3r31847.  3r31867. 3r31846. Launching the solution ...
+ 0 -

Three kinds of memory leaks

 
3r3-31. Hello colleagues. 3r33333.  
3r33333.  
Our long search for timeless bestsellers on optimizing the code so far only gives the first results, but we are ready to please you, that the translation of the legendary book of Ben Watson " Writing High Performance .NET Code 3r33333.". In stores - approximately in April, watch for advertising. 3r33333.  
3r33333.  
And today we offer you to read a purely practical article on the most pressing types of RAM leaks, written by 3r312. Nelson Ilheage
(Nelson Elhage) from 3r314. Stripe 3r33333. . 3r33333.  
3r318. 3r33333. 3r33333.  
3r33333.  
So...
+ 0 -

Client Internet in an isolated QEMU virtual machine using port tunneling through the SPICE channel

The usual approach to connecting a virtual machine to the Internet is similar to connecting any other device to the network and consists of connecting a virtual or forwarding real network interface, as well as setting up and checking network connections, services, routing rules and filtering traffic and so on.
 
If the virtual machine is a server or is a virtual desktop and is assigned to a specific user, this approach is fully justified, but what if the virtual machine is a public virtual desktop and anyone can connect to it for free?
https://github.com/flexvdi]repository. in it, they ...
+ 0 -

How to cut off the light in a small data center: a cheap emergency deployment method

 3r3151. 3r3-31. How to cut off the light in a small data center: a cheap emergency deployment method 3r3133. 3r3113.  3r3151. 3r3111. And what to do? 3r33112. 3r3113.  3r3151. It is with this task that the customer came to us. There is no budget, you need to look for an existing solution. 3r3113.  3r3151. 3r3113.  3r3151. The normal case (this is not counting the appearance of the second input, the transfer of equipment or the appearance of a diesel generator) - deploy the second exactly the same instance in the cloud and switch to it if something suddenly falls. Called Disaster Recovery. Some of them are building a second data center, it is cold and is waiting for the main one to fall...
+ 0 -

RAID EE technology in Qsan

RAID EE technology in Qsanstorage. 3r3187. 3r3-31. 3r3168. RAID algorithms have long been a generally accepted standard in the field of data storage, providing specified reliability and speed of access. Although RAID variations are not small, currently the main levels are levels ? 5 and 6 (plus their combinations with zero level). But their further development in the form of RAID EE made it possible to increase their strengths as well as reduce some of the existing disadvantages. 3r3173. 3r3174.  3r3187. 3r33150. Qsan Technology 3r3172. just one of the few who implemented the possibility of using RAID EE in their products (starting ...
+ 0 -

Old play IBM

Old play IBMThe best way to understand how Red Hat built a multi-billion dollar open source business is to look at IBM. Red Hat founder Bob Young spoke about this at All Things Open conference in 2014 :
 
 
3r3202. There is no secret. It takes a lot of hard work to retain customers, think through and understand development opportunities. What competitors are not doing, what can you do better? One of the great examples that inspired us at the beginning, besides the fact that I didn’t have enough money to pay for a rented apartment, is the example of Lou Gerstner and IBM
 
 
Gerstner came to IBM and transformed ...
+ 0 -

Hypervisor for Dummies

Hello! I decided to share the experience of creating a hypervisor based on Ubuntu server ??? LTS and a free virtual machine virtualbox 5.2 with a web-based management interface for both the server itself (webmin) and virtual machines (phpvirtualbox). On the net you can find a crooked instruction to raise the above on ubuntu server 16.0? but this instruction is obsolete and offers a version of virtualbox 5.0-? despite the fact that at ??? version 5.2 had already taken root in the official repositories. Here we fix it all. This instruction applies to ubuntu server 14.0? and to ???. On more ...
+ 0 -

ZFS and disk access speed in hypervisors

ZFS and disk access speed in hypervisorsThis article publishes the results of measurements of the speed of access to the file system inside the hypervisor in various versions of the ZFS installation. To all who are interested I ask under the cut, I warn about the presence of a large number of images under the spoilers (optimized).
 
kvaps ), However I could not find comparative performance tests of virtualized machines on the Internet (maybe badly looked for?). So I decided to build a test platform for my comparative study.
 
 
My article does not pretend to any scientific discoveries, it is unlikely to help professionals who have ...
+ 0 -