Variants of application or what the load balancers do not have

Variants of application or what the load balancers do not haveA couple of years ago I completed the migration project in the network of one of our clients, the task was to change the platform that distributes the load between the servers. The scheme for providing this client's services evolved over almost 10 years, together with new developments in the data center industry, so the customer was expecting a solution that would satisfy not only the failover requirements of network equipment, load balancers and servers, in a good sense of the word , but also would have such properties as scalability, flexibility, mobility and simplicity. In this article, I will ...
+ 0 -

How did we kill ourselves in one click, placing the site and billing on the geocluster or once again we'll talk about the redundancy of

How did we kill ourselves in one click, placing the site and billing on the geocluster or once again we'll talk about the redundancy ofYes, I too am a moron. But this I did not expect from myself. It seems to be "not the first year married." It seems to be reading a bunch of smart articles on fault tolerance, redundancy, etc., something sensible once even wrote himself here. Over 10 years I am the CEO of the hosting provider working under the brand ua-hosting.company and providing hosting and server hosting services in the Netherlands, the US, and literally a week ago and in the UK (do not ask why the name ua, the answer can be found in our autobiographical article ...
+ 0 -

Course MIT "Security of computer systems." Lecture 8: "The model of network security", part 1

Course MIT "Security of computer systems." Lecture 8: "The model of network security", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Launching elements of offshore platforms. Part 1 &lt;{short}&gt; &lt;{full}&gt; <div class="post__text post__text-html js-mediator-article"> Kind time of the day, dear Khabrovians. <br>   <br>   A cursory search for Habra on the topics "sea platfor

<{full}>
Kind time of the day, dear Khabrovians.
 
 
A cursory search for Habra on the topics "sea platforms and shipbuilding" gives, basically, all sorts of masked sea launches and drowning data centers. I suggest that this topic be diluted a little.
 
 
Launching elements of offshore platforms. Part 1    Kind time of the day, dear Khabrovians.    
    
 A cursory search for Habra on the topics "sea platforms and shipbuilding" gives, basically, all sorts of masked sea launches and drowning data centers. I suggest that this topic be diluted a little.    
    
     
      
 Our company (this ship repair and shipbuilding plant) in 2014 won a tender for the construction of a support block of the offshore drilling platform for one oil company. This company operates on two deposits in the Caspian (    Kind time of the day, dear Khabrovians.    
    
 A cursory search for Habra on the topics "sea platforms and shipbuilding" gives, basically, all sorts of masked sea launches and drowning data centers. I suggest that this topic be diluted a little.    
    
     
      
 Our company (this ship repair and shipbuilding plant) in 2014 won a tender for the construction of a support block of the offshore drilling platform for one oil company. This company operates on two deposits in the Caspian (  
 
Our company (this ship repair and shipbuilding plant) in 2014 won a tender for the construction of a support block of the offshore drilling platform for one oil company. This company operates on two deposits in the Caspian ( <{short}>Kind time of the day, dear Khabrovians.  A cursory search for Habra on the topics "sea platforms and shipbuilding" gives, basically, all sorts of masked sea launches and drowning data centers. I suggest that this topic be diluted a little.     , Reference 2 ) The Caspian Sea at the site of drilling platforms is rather small. Therefore, the platforms are installed directly on the seabed and fixed with piles. The support block is the foundation of the platform. After manufacturing at the factory, it is towed to the site, then water is poured into its ballast compartments and it sinks to the ...
+ 0 -

Seven "NOT" monitoring of IT infrastructure

Throughout my work, I periodically observed situations when the introduction of monitoring in the company did not bring the expected results. Monitoring worked poorly or did not work at all. Analyzing such situations, I understood that their reasons were almost always the same. Although they all lay on the surface, I met them all the time and therefore decided to put them together so that you were warned and armed.
 
 
Seven "NOT" monitoring of IT infrastructure  
 

1. HE implement the monitoring tool


 
If IT departments receive only a monitoring tool, effective and demanded monitoring will not arise by itself. Instead of implementing the ...[/h]
+ 0 -

CIB "SearchInform" as a working tool of the analyst or "Fear the Danaites, gifts bringing"

CIB "SearchInform" as a working tool of the analyst or "Fear the Danaites, gifts bringing"As you can see from the header, today we will talk about the CIB SearchInform. To this article, I had several variants of names and even epigraphs. One of the first was "All happy families are happy equally, each unhappy family is unhappy in its own way" from "Anna Karenina." Then there was "Not all yogurts are equally useful" from old advertisements and a lecture by one of the employees of SearchInform.
 
 
I honestly admit that I have not read and do not read reviews and articles-comparisons of DLP-systems on the Internet from the word "absolutely". What for? When the system was implemented and ...
+ 0 -

As a cloud provider to manage software licenses - will help the blocker

Company Red Hat presented a block system that helps cloud providers determine how customers use their services. As a result, vendors are able to offer new, more user-friendly payment models and identify fraud with software licenses.
 
 
More details about the Red Hat system and other block-based solutions in this area, we tell further.
 
 
As a cloud provider to manage software licenses - will help the blocker

 
/photo PxHere PD
 
 

About the system Red Hat


 
Red Hat offer to apply block to monitor how and how much (on time) the customer ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 7: "Sandbox Native Client", part 3

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

On the digital economy, fires and the Internet

August 26 in the nearest suburbs, namely in the neighborhood Jubilee, Korolev, there was a fire in the apartment building (you can go in google to dial "Korolev fire at Leninskaya 4"): showed on all central and non-central television channels. No one expected that the roof and the upper flats would burn over the entire length of the house, but it happened. It did not help to extinguish all day, not even a helicopter.
 
But I wanted to tell you about something else. There was a misfortune, people lost their apartments. My friend burned EVERYTHING. And yet I'm not talking about this. In the ...
+ 0 -