Missed deadline, or why more than half of the companies were not ready for GDPR

Missed deadline, or why more than half of the companies were not ready for GDPRIn recent days, letters to the mail regularly from different companies, applications, services and sites that you have ever used or where your accounts started. The letters are about the same - they report a change in the privacy policy and explain how the company processes personal data.
 
 
We are already wrote about that , what exactly changes in the data processing policies of major IT companies: WhatsApp, Facebook, Instagram and Twitter. Now we understand why dozens of letters from many services began to come only now, after a formal deadline for the GDPR, why not all companies were ...
+ 0 -

As forgotten for 12 years, the server can manage in 12?000 pounds sterling

As forgotten for 12 years, the server can manage in 12?000 pounds sterlingJust a few days before the entry into force of the GDPR, the University of Greenwich suffered trouble. The Information Commissioner's Office fined the university for £ 12?000 (at the time of writing this is about 136 thousand euros, 160 thousand US dollars, 10 million Russian rubles, 4.2 million Ukrainian hryvnia) for a serious security vulnerability, which led to the leakage of data of almost 20 thousand students and employees. As such a serious university managed to get under the ICO distribution and become the first university to be fined for violating the DPA, and what it teaches us, read under ...
+ 0 -

REG.RU selected 70 thousand customers from a partner who independently started registering domains

Yesterday brought the owners of 7?000 domains that were registered with the Beget hostess through the REG.RU registrar, not very pleasant news: the registrar and the hoster quarreled and the registrar took to his service all the customer domains , which they registered through the hoster.
 
 
REG.RU connects this with "systematic violations of the rules of working with customers and a contract for the provision of services" from their old partner.
 
 
REG.RU selected 70 thousand customers from a partner who independently started registering domains
 
Without the demand transferred ...
+ 0 -

A small note about the wildcard certificates Let's Encrypt

Everything already, probably, is aware of such an organization as Let's Encrypt. For some time there you can get a wildcard certificate. In this short note I will describe a couple of not very obvious moments that I encountered.
 
here .
 
The use of DNS plugins is described in detail in the documentation on the link above.
 
 
When using the manual mode, you will need to manually add a TXT record to DNS. Each time this record will be different, i.e. automatic certificate renewal in this case is possible only through certbot hooks. There, by the way, you can hang up a team, for example, to ...
+ 0 -

The second generation AMD Ryzen: testing and detailed analysis

The second generation AMD Ryzen: testing and detailed analysis  
 
With the end of 201? in which the Ryzen processor became one of AMD's most successful products, a logical question arose: what next? In early 201? plans were voiced: Ryzen of the second generation should appear in the middle of the year, after which the second generation of Threadripper will be released, at the 12-nm process GlobalFoundries. This is not the next new AMD microarchitecture, which, as we know, will be Zen 2 on the 7 nm process technology. This release of components with some improvements, plus the ability to use a manufacturing process that allows you to raise the frequency and performance ...
+ 0 -

Distributed data center from the provider: what and why

Distributed data center from the provider: what and whyOver the decades of its existence, data centers have come a long way from small computer rooms to data centers, data centers, cloud and distributed data centers. What is the purpose of distributed data centers? All known Cisco Systems distinguishes the following goals of their creation:
 
 
 
Catastrophic resistance
 
Continuity of data processing
 
Mobility of applications
 
Migration of systems
 
Capacity /capacity expansion
 
Distributed services
 
Geographically-localized services
 
 
Medium-sized organizations often have a fairly centralized model, where all data, services and applications ...
+ 0 -

Magic on the verge of extreme: fearless 7-ka date of the centers

Magic on the verge of extreme: fearless 7-ka date of the centers  
 
Most recently, a list of applicants for the title of "the most beautiful data center" of the world was published. It was our turn to combine beauty with extreme. That's how ComTec has a list of the 7 most extreme server farms. Whether it's a deep cave at the South Pole or deep waters off the Pacific coast of the United States, the data is safely stored in extreme places around the world.
 
Ice Cube Lab - More than 1200 computing cores and three petabytes of memory, cooling server capacity at an outside temperature of less than -40 - at least extremes. You can not just take and run such a chilling ...
+ 0 -

The story of the build apk on a virtual hosting

Hello!
 
 
This publication is more of an informational goal, rather than describes in detail the steps of setting up, using a particular technology, etc. Here you can find personal observations, reasoning and conclusions.
 
 
As a testing ground, Beget (clickable image)
made a speech.  
 
The story of the build apk on a virtual hosting
 

 
What are the actual options for the build apk:
 
 
 
Gradle
 
Android Maven Plugin
 
Ant + Ivy
 
The reverse does not quite fit the task (probably there may be another 100500 variants, but I consider the main ones)
 
 
Setting up the Android SDK, Oracle JDK does not cause any special difficulties. Plus on hosting ...
+ 0 -

UK encryption devices: English restraint in every detail

Cryptography as art, the art of creating and creating masterpieces influencing the course of history. The history of cryptographic devices of the USSR, Germany, the USA, Japan It was the turn to get acquainted with some cryptomachines of the United Kingdom.
 
 
UK encryption devices: English restraint in every detail  
 
Great Britain boasts a wide range of production of various devices, from mechanical rotary machines to fully electronic. Over the years, they have been developed by the Government Communication Service (GCHQ), sometimes in collaboration with the US National Security Agency (NSA). By the first half of the last century, the importance of creating ...
+ 0 -

Laser hair removal for a virtual server

Friends, are happy to inform you about our unique and at the same time experimental action, conducted jointly with the Moscow medical center of equipment cosmetology EPILAS .
 
We thought for a long time how to do something really unusual, something that no one expects from a hosting provider and at the same time, so that it is in demand and interesting to a large number of people.
 
 
Laser hair removal for a virtual server  
 
So, for all our dear current and new customers who are until the end of June 2018 will order and pay the virtual server for VPS.house any configuration ...
+ 0 -