Seminar "Virtual infrastructure for developers: opportunities, applications and services", June 2? St. Petersburg

Seminar "Virtual infrastructure for developers: opportunities, applications and services", June 2? St. Petersburg
 
 
Hello, Habr! We close the DataLine Universities season with a seminar in St. Petersburg .
 
 
28 June We are waiting for you at the seminar "Virtual infrastructure for developers: capabilities, applications and services" . Let's talk about how the cloud infrastructure and services can be useful for developers. Consider examples of deploying test environments and working with containers and applications.
 
 
There are only a few places left, ...
+ 0 -

"Forget about GDPR": the reform of copyright in the EU can completely change the situation in the Network

"Forget about GDPR": the reform of copyright in the EU can completely change the situation in the NetworkConversations around the adoption of the GDPR do not cease. For all these discussions about the pros, cons, pitfalls and holes in the new regulations on the protection of personal data, many did not pay attention to another document, which in a month will be submitted to the European Parliament - new directive on copyright protection .
 
 
It imposes strict restrictions on the distribution of content on the network and involves several changes in the work of platforms, and in the lives of users. We understand what will change, why it is important and how this can affect the future of the ...
+ 0 -

How to make friends of all operators in the stadium and not sow it with hundreds of

How to make friends of all operators in the stadium and not sow it with hundreds ofantennas.The FIFA World Cup has already begun, and in this regard, in several arenas of the championship, we deployed our new infrastructure. One of the arenas - "St. Petersburg", home stadium FC "Zenith". In this post we will talk about how the connection is made on one of the main venues of the tournament, where we hide the antennas, and why our engineers go four thousand steps before each match (if not more often).     material on how to monitor the mobile network in Moscow ...
+ 0 -

Installation of 3CX on hosting for ??? Euro /month. for 10 minutes

Installation of 3CX on hosting for ??? Euro /month. for 10 minutesPerhaps you know that at the moment, 3CX provides free hosting ATS For all new users on Google's cloud infrastructure for 1 year. However, for existing users of 3CX or those who want to use commercial hosting right away, in order not to "move" in the future, it makes sense to install ATS on an inexpensive virtual Linux machine in a reliable data center. The advantage of installing 3CX on your own virtual machine compared to the so-called. "Virtual PBX" is that you completely control both PBX services and confidential data - history and records of conversations.
 
 
3CX has done a lot of work ...
+ 0 -

Secure interaction in distributed systems

Secure interaction in distributed systems
 
 
Hello Habr!
 
 
My name is Alexey Solodky, I'm a PHP developer at Badoo. And today I will share the text version of my report for the first Badoo PHP Meetup. Videos of this and other reports with the mitapa can be found here .
 
 
Any system consisting of at least two components (and if you have both PHP and the database, it's already two components), encounters whole classes of risks in the interaction between these components.
 
 
The platform department in which I work integrates new internal services with our application. And solving these problems, we have accumulated experience, which I want ...
+ 0 -

Programming for network engineers: working with

Programming for network engineers: working withconfiguration.Even in a good network, in terms of design, from time to time, work is needed to update the configurations of certain entities. Among the most weighty and expected reasons for such activity, we can note migrations for harmonizing the physical and logical planes, the development of the network in the process of technological evolution, the harmonization of the architectures of the segments being joined and the solution of growth problems. In fact, the life cycle of the network, almost always represents a change with a certain level of risk and the impact on the service, in the evaluation of which ...
+ 0 -

Working with Veeam Availability Console: Configuring managed backup Managed Backup Services

Working with Veeam Availability Console: Configuring managed backup Managed Backup Services  
 
We recently launched a new service for managing client backup policies - Veeam Managed Backup. It is based on the Veeam Availability Console portal. On the functionality of the portal Veeam already told . Briefly recall the main:
 
 
 
For the customer - Monitoring of tasks and infrastructure of the Republic of Kazakhstan, obtaining information on billing;
 
 
For the provider - management of client backup: configuration, monitoring and maintenance.
 
 
 
In my article, I want to talk about how to work in the portal and configure Managed Backup for virtual environments. But first, briefly ...
+ 0 -

Notes IoT-provider. Activation and security in LoraWAN

Notes IoT-provider. Activation and security in LoraWANHello, dear fans of the Internet Things. Continuation of IoT-provider's notes.
 
The first part of > || > The second part is > || > The third part is > || > The fourth part is
 
Today it's time to talk about security in LoRaWAN. There are many rumors and legends. We will try to understand how this works and what the risks are.
 
In general, to move to the topic of security, you'll have to do a little introductory and talk about the initial initialization of the radomodule on the network. This process in LoRaWAN is called activation.
 
For brevity, I will list below the list of terms ...
+ 0 -

What does VMware do, and what will be the network architecture of the future

What does VMware do, and what will be the network architecture of the futureLike note in Gartner, 10% of corporate data is generated outside the traditional data center. And it is expected that this figure will increase to 50% by 2022. The trend is related to the growing popularity of "peripheral computing" ( Edge computing ) And the Internet of things.
 
 
Companies have to look for new approaches to the organization of corporate networks. One such company is the developer of virtualization software for VMware. In early May, representatives of the organization ...
+ 0 -

Public Key Infrastructure: utility for generating requests for a qualified certificate

Public Key Infrastructure: utility for generating requests for a qualified certificate One of the central objects of the public key infrastructure (PKI /PKI) along with the key pair is the certificate, which today is actually an analog of a civil passport.
 
State service , pay taxes, defend your e-mail , sign and encrypt documents and much more.
 
 
Certificate, as well as passport , is issued on the basis of the application and the provision of a number of documents. The list of documents for obtaining a certificate is on any certification center that has accreditation of the Ministry of Communications ...
+ 0 -