IoT architecture - first look under the hood

The concept of IoT (Internet of Things) has long been a part of the IT-schnik lexicon. Although I did not find such a hub, I hope this will be fixed soon :)
 
However, until now, many people confuse the IoT architecture with the automation architecture, where the main task is to obtain information from sensors, and on their basis control of the actuators is carried out.
 
IoT architecture - first look under the hood
 
 
IT architecture includes two seemingly incompatible things: on the one hand - a large number of peripherals with low computing power, low power consumption, high response speed to events, and on the other hand - cloud servers with high ...
+ 0 -

Asymmetric cryptography with a one-time secret key: description of the idea and possible application

Asymmetric cryptography with a one-time secret key: description of the idea and possible application  
(to understand what is said in this article, it is necessary and sufficient at least in general terms to imagine what is asymmetric cryptography and how the electronic signature works)
 
 
The script for using a one-time secret key is:
 
 
 
A key pair consisting of a secret key (secret key, SK) and an open (public key, PK) key is created.
 
A number of operations are performed using the secret key. The first of these, the creation of a public key, has already been completed in the first step.
 
At first glance, an antilogical action is performed - the secret key is destroyed without the possibility ...
+ 0 -

Exactly once is NOT exactly the same: an analysis of the article

Introduction
 
I decided to analyze the article, describing some interesting details of stream processing exactly once: exactly-once . The matter is that some authors very strange understand terms. The analysis of the article just will make it possible to clarify many details deeper, tk. revealing illogicalities and oddities allows you to fully experience the concepts and meaning.
 
Let's get started.
 
Analysis
 
Everything starts very well:
Heterogeneous competitive data processing in real time is strictly one time .
 
In other words, the processing of an event can happen more ...
+ 0 -

Examples of calculating the "availability ratio" for sets of network equipment

Examples of calculating the "availability ratio" for sets of network equipment
 
 
The theory and the main points on the methodology for calculating the "readiness factor" were described by me earlier in this article .
 
 
In this publication, we calculate the "availability ratio" of two sets of carrier-class network equipment installed in each telecommunications cabinet and compare it with the calculation of the "availability factor" for a set of equipment without duplicated elements.
 
 
Why do you need to do calculations of the "availability ratio" for different cases of equipment layout?
 
 
We have data on calculating the "availability ratio" in the final results may be ...
+ 0 -

WireGuard will "come" to the Linux kernel - why?

In late July, the developers of the VPN-tunnel WireGuard proposed set of patches , which will make their software for organizing VPN tunnels a part of the Linux kernel. However, the exact date of implementation of the "idea" is still unknown. Under the cut, let's talk about this tool in more detail.
 
 
WireGuard will "come" to the Linux kernel - why?

 
/photo Tambako The Jaguar CC
 
 

Briefly about the project


 
WireGuard is a new generation VPN tunnel, created by Jason A. Donenfeld...[/h]
+ 0 -

Neither GA nor NM. Its clickstream in Avito is

Neither GA nor NM. Its clickstream in Avito isWe collect more than two billion analytical events per day. Thanks to this we can learn a lot of necessary things: whether the hearts are pressed more than on the stars, at what hours they write more detailed descriptions, in which regions they often miss the green buttons.
 
The system of gathering and analyzing events can be called the clickstream. I'll tell you about the technical side of the Avto's clickstream: the device of events, their sending and delivery, analytics, reports. Why do you want yours, if there is Google Analytics and Yandex.Metrica, who is spoiled by the life of developers ...
+ 0 -

Do not be afraid of microservice: Alexey Baitov about the use of microservice architecture in practice

Do not be afraid of microservice: Alexey Baitov about the use of microservice architecture in practiceFor some, microservices are an opportunity to remake and refactor an application under a conditionally modern style. Another this architectural solution is not suitable because of the peculiarities of interaction between different parts of the application. In any case, when choosing architecture, it is useful to study someone else's experience of moving from a monolith to a set of services.
 
 
We asked to share our development and delivery case for Alexey Bayitov, a leading engineer of the 2GIS. Let's talk about the architectural solutions, deploy and scalability. We will ask about trend and simple ...
+ 0 -

Automation of salary monitoring using R

Automation of salary monitoring using RDo you know how much you are underpaid? And maybe overpay? What is the ratio of resumes and vacancies to a position that is similar to yours?
 
Answering this question, you can lie to yourself, you can brazenly lie, but you can operate with statistics.
 
In fact, every self-respecting office regularly conducts monitoring of salaries in order to orientate in the labor market segment of interest to it. The results of such monitoring help in the formation of the wage policy, in the drafting of the budget of the Labor Code and in the adoption of a whole range of these strategic decisions.
 
Despite ...
+ 0 -

Course MIT "Security of computer systems." Lecture 6: "Opportunities", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 6: "Opportunities", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -