The book «Site Reliability Engineering. Reliability and reliability as in Google »

The book «Site Reliability Engineering. Reliability and reliability as in Google » For almost 20 years, Google has been providing incredibly complex and large-scale systems that are responsive to users' requests. The Google search engine finds the answer to any questions in a fraction of a second, Google maps accurately reflects the earth's landscape, and Google's mail is available in 365/24/7 mode and, in effect, became the first public cloud storage. Are these systems impeccable? No, they also refuse, break down and become obsolete, like any technique. We just do not notice it. The thing is that for more than ten years Google has been developing a unique technology Site Reliability Engineering...
+ 0 -

Why do you need Splunk? Internet of things and industrial data

Why do you need Splunk? Internet of things and industrial data  
 
Today we want to talk about the Internet of things (IoT) and the industrial Internet of things (IIoT), and also about how Splunk is connected with this.
 
SplunkBase in the Internet of Thing section.
 
 

Splunk Industrial Asset Intelligence


 
 
 
In the spring of 201? Splunk announced the launch of its first platform Splunk Industrial Asset Intelligence (IAI) , directly related to IIoT, intended for process automation engineers in industrial companies.
 
 
This solution is intended for companies in production, energy, transportation, oil and gas, as well as other industrial sectors.
 
 
Splunk IAI correlates data from automated control systems (ACS), sensors, SCADA systems and applications, which makes it easy to monitor and diagnose equipment operation and problems in real time.
 
 
Since June 2? the Splunk IAI is released with limited availability, and a full release is scheduled for autumn of 2018 .
 
 
The official ...[/h]
+ 0 -

GitHub opened the code of its load balancer - how their solution works

Developers from GitHub last week laid out in the open source source of its load balancer - GLB Director. The team has been working on this project for several years.
 
 
What is remarkable about their solution, how it is arranged, and who else passed the load balancing systems to open source, we tell further.
 
 
GitHub opened the code of its load balancer - how their solution works

 
/Flickr / theilr / CC
 
 

Why GitHub its balancer


 
In GitHub use the cloud infrastructure based on bare metal to ...[/h]
+ 0 -

How to correctly measure the speed of an Internet channel and stop looking like a fool in the eyes of your ISP

How to correctly measure the speed of an Internet channel and stop looking like a fool in the eyes of your ISP
 
 
Forgive me for forgiveness, boiling. We are the Sochi provider "Business Communication" , since 2002 we have been providing customers with access to the wonderful world of the Internet. Our unofficial type of slogan is "Normal communication operator". And we are responsible for our words - the quality of the Internet is above the average for the market, we do our work well, competently and honestly, no one is on this site. For example, we have internet rates of 200 and 300 megabits per second. We monitor parameters throughout the network, which is designed and built with the need for constant monitoring ...
+ 0 -

Examples of calculating the "availability ratio" for sets of network equipment

Examples of calculating the "availability ratio" for sets of network equipment
 
 
The theory and the main points on the methodology for calculating the "readiness factor" were described by me earlier in this article .
 
 
In this publication, we calculate the "availability ratio" of two sets of carrier-class network equipment installed in each telecommunications cabinet and compare it with the calculation of the "availability factor" for a set of equipment without duplicated elements.
 
 
Why do you need to do calculations of the "availability ratio" for different cases of equipment layout?
 
 
We have data on calculating the "availability ratio" in the final results may be ...
+ 0 -

WireGuard will "come" to the Linux kernel - why?

In late July, the developers of the VPN-tunnel WireGuard proposed set of patches , which will make their software for organizing VPN tunnels a part of the Linux kernel. However, the exact date of implementation of the "idea" is still unknown. Under the cut, let's talk about this tool in more detail.
 
 
WireGuard will "come" to the Linux kernel - why?

 
/photo Tambako The Jaguar CC
 
 

Briefly about the project


 
WireGuard is a new generation VPN tunnel, created by Jason A. Donenfeld...[/h]
+ 0 -

Comparison of Parallels RAS with alternative technologies

Comparison of Parallels RAS with alternative technologies  
 
A few years ago, virtual jobs were in demand only at large enterprises of the Enterprise segment with a large number of branches. This, in the first place, was due to the fact that the deployed work environment required expensive complex software and qualified employees to correctly install and configure the system. Today, solutions are becoming more economical, ergonomic and light, and successfully conquer the market for small and medium-sized businesses. This is evidenced by the growing demand for virtualization technologies for workplaces, and many alternative solutions offered on the market. Under ...
+ 0 -

As a "no-brand" startup has received $ 240 million to defeat the Amazon

Masayoshi Son is known for his profitable investments. In 199? his SoftBank fund invested $ 1 million in Yahoo, which in three years yielded $ 3 billion. In 200? the company gave $ 20 million to Chinese Alibaba - and by September 201? when it entered the IPO, they turned into $ 60 billion. Who will the next brand that will blow up the market? Masayoshi Seon believes that this will not be a brand at all.
 
As a "no-brand" startup has received $ 240 million to defeat the Amazon  
 
Now his SoftBank with assets for $ 220 billion has a new pet - Brandless, a store without brands. At the meeting with Masayoshi Song in March, the founders of this start-up from San Francisco left ...
+ 0 -

Course MIT "Security of computer systems." Lecture 6: "Opportunities", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 6: "Opportunities", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -