Import substitution, fairy tales continue (continued)

Import substitution, fairy tales continue (continued)Having a little continued the study of the issue of "import substitution" on the basis of newly appeared information (tests, search for a solution), I came to the disappointing conclusion that earlier I was an optimist. In reality, things are much worse (in general, like in a fairy tale) than further, the worse. According to the comments of colleagues commenting on the first article 3–3–34. "Import substitution, the voice crying in the wilderness" 3r-3345. I cite references to regulatory documents calling us to “Patriotism”. The number of documents is growing, but there is only one problem, or ...
+ 0 -

Fascinating cryptography or research on the topic of reversible encryption in PHP

One of the main truths of cryptography is that you should not invent anything in this area if you are not a professional. This is partly true, because all the best has long been invented, suffered and used for more than a decade in the field of information technology. The other side of the truth is that the development of some area of ​​knowledge occurs only with a constant influx of fresh ideas and original solutions in it.
 
 
For obvious reasons, we will not attack the giants of industrial cryptography like AES, but plunge into our own cryptographic research with blackjack and jokes.
 
...
+ 0 -

Conference DEFCON 22. Group GTVHacker. We crack everything: 20 devices in 45 minutes. Part 1

Amir Etemadi: I welcome everyone and welcome to the presentation of GTVHacker "Hacking everything: 20 devices in 45 minutes". We are the creators of the original Google TV products since 201? as well as products such as Chromecast, Roku and Nest, and we also release exploits for all Google TV devices.
 
 
Conference DEFCON 22. Group GTVHacker. We crack everything: 20 devices in 45 minutes. Part 1  
 
So, who are we? I am an Accuvant Labs researcher, created by the GTVHacker group, CJ is the group leader and a security systems researcher, and sometimes also a technology developer. Hans Nielsen works as a senior security consultant for Matasano, and Mike Baker develops firmware and is a co-founder ...
+ 0 -

Course MIT "Security of computer systems." Lecture 9: "Security of Web-applications", part 3

Course MIT "Security of computer systems." Lecture 9: "Security of Web-applications", part 3

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

What is interesting about the new UCS C480 ML M5 is the server for machine learning from Cisco

In March of this year, Cisco introduced the Cisco UCS B480 M5 server blade. On the basis of this system we are deployed a new pool of resources in St. Petersburg and we are preparing to launch a similar pool in Moscow. But literally six months later (in September) IT giant released one more novelty - UCS C480 ML M? "sharpened" for work with artificial intelligence systems. We tell what's inside, and why it's all data centers.
 
 
What is interesting about the new UCS C480 ML M5 is the server for machine learning from Cisco

 
/Wikimedia ...
+ 0 -

Sberbank launched its own operator "SberMobile"

September 26 after testing, Sberbank launched its own virtual operator SberMobile (the previous name "Let's Talk From the Savings Bank"), which operates on Tele2 networks. At the moment, only residents of Moscow, St. Petersburg and their regions can use the services of the operator, until the end of 2018 there are plans to add 13 more regions: Tula, Tver, Bryansk, Ryazan, Kaluga, Smolensk, Kostroma, Voronezh, Belgorod, Lipetsk, Kursk , Tambov and Orel regions.
 
 
Sberbank launched its own operator "SberMobile"
 
 
The name for the new operator, apparently..
.
+ 0 -

Course MIT "Security of computer systems." Lecture 9: "Security of Web-applications", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 9: "Security of Web-applications", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Variants of application or what the load balancers do not have

Variants of application or what the load balancers do not haveA couple of years ago I completed the migration project in the network of one of our clients, the task was to change the platform that distributes the load between the servers. The scheme for providing this client's services evolved over almost 10 years, together with new developments in the data center industry, so the customer was expecting a solution that would satisfy not only the failover requirements of network equipment, load balancers and servers, in a good sense of the word , but also would have such properties as scalability, flexibility, mobility and simplicity. In this article, I will ...
+ 0 -