Pull to refresh

Admin

Show first
Rating limit
Level of difficulty

About «free» #iam, #oidc, #saml, #etc

Level of difficulty Medium
Reading time 2 min
Views 133
DevOps *
Review

There is a task to develop a solution that allows:

- Access control to web applications via #oidc/#saml

- Access control to vanilla #Kubernetes

- SSH access control to bare-metal hosts - using SSH certificate technology if possible

- Authorizing users to other server applications such as #Vault, #PostgreSQL, #Kafka, #ClickHouse, #MongoDB

- Being able to connect users from third-party organizations to certain resources based on group membership, etc

- Ensuring that everything described above works, including the bare metal environment

Read more
Total votes 1: ↑1 and ↓0 +1
Comments 2

Journey to find a headset with a good side talk cancellation mic for calls in an open office

Level of difficulty Easy
Reading time 5 min
Views 351
Wireless technologies *Conferences Gadgets Computer hardware Lifehacks for geeks
Review

TL;DR: All AI-based noise cancellations suck, only the physical cancellation technique works! And physical cancellation is implemented well only in Jabra devices yet, but other features suck them! All Bluetooth headsets suck too! So, no solution yet, just complaints!

The environment: I work in a pretty talky office room, where sit around 10 people, and all of them have many online conferences every day, including me. So, silence in the room is a rare situation.

The problem: The main problem is that most of the microphones pick up all side talk pretty loud, which makes it very unpleasant for other people to listen to my voice in meetings!

Read more
Total votes 1: ↑1 and ↓0 +1
Comments 5

Q4 2022 DDoS Attacks and BGP Incidents

Reading time 7 min
Views 1.1K
Qrator Labs corporate blog Information Security *IT Infrastructure *Network technologies *

Now that 2022 has come to an end, we would like to share the DDoS attack mitigation and BGP incident statistics for the fourth quarter of the year, which overall saw unprecedented levels of DDoS attack activity across all business sectors.

In 2022, DDoS attacks increased by 73.09% compared to 2021. 

Let's take a closer look at the Q4 2022 data.

Read more
Total votes 7: ↑7 and ↓0 +7
Comments 0

Data Phoenix Digest — ISSUE 2.2023

Reading time 2 min
Views 567
Python *Big Data *Machine learning *DevOps *Artificial Intelligence
Digest

Video recording of our webinar about dstack and reproducible ML workflows, AVL binary tree operations, Ultralytics YOLOv8, training XGBoost, productionize ML models, introduction to forecasting ensembles, domain expansion of image generators, Muse, X-Decoder, Box2Mask, RoDynRF, AgileAvatar and more.

Read more
Total votes 1: ↑1 and ↓0 +1
Comments 0

BGP Route Leak prevention and detection with the help of the RFC9234

Reading time 8 min
Views 813
Qrator Labs corporate blog Information Security *Network technologies *Network standards *

All the credit is due to the RFC’s authors: A. Azimov (Qrator Labs & Yandex), E. Bogomazov (Qrator Labs), R. Bush (IIJ & Arrcus), K. Patel (Arrcus), K. Sriram.

A BGP route leak is an unintentional propagation of BGP prefixes beyond the intended scope that could result in a redirection of traffic through an unintended path that may enable eavesdropping or traffic analysis, and may or may not result in an overload or complete drop (black hole) of the traffic. Route leaks can be accidental or malicious but most often arise from accidental misconfigurations.

Read more
Total votes 9: ↑9 and ↓0 +9
Comments 0

Make first deb-src package by example cri-o

Reading time 9 min
Views 703
Configuring Linux *Open source **nix *Development for Linux *
Tutorial


Overview


Once every true-linux engineer gets a trouble: there is no any software in his distro or it's built without needed options. I am keen on the phrase: "Only source control gives you freedom".


Of course, you can build this software on your computer without any src-packages, directly (with simplification: configure, make, make install). But it's a non-reproducible solution, also hard for distribution.


The better way is to make distro-aligned package that can be built if needed and that produces lightly distributed binary-packages. It's about debian-source packages(debian,ubuntu,etc), pkgbuild (for arch), ebuild for gentoo, src-rpm for red hat-based, and many others.


I will use cri-o like a specimen.


Before reading the text below I strongly recommend to get familiarized with the official Debian policy manual placed here and debhelper manpage.


Also you will be required to setup some variables like DEBMAIL and DEBFULLNAME for proper data in changelog and other places.

Read more →
Total votes 1: ↑1 and ↓0 +1
Comments 2

Top 10 IPTV Services for FireStick, Android TV, PC [Best 2023 Reviews]

Reading time 11 min
Views 9K
IPTV *Monitors and TV

Are you looking for the best IPTV services for FireStick, Android TV, and PC now?

The rising demand for IPTV services has also raised the number of service providers in the marketplace. IPTV has emerged as one of the leading entertainment sources these days. It offers an extreme level of comfort and convenience to the users and makes it easier for them to find their preferred content at affordable pricing. 

IPTV is a more excellent and cost-effective solution for streaming cable channels conveniently. Using IPTV services is an altogether simple and easy-to-go process. You need to buy the preferable IPTV subscription and download the app on the supported devices. Most IPTV providers available in the marketplace need to provide high-end resolutions effortlessly.

IPTV serves as the primary source of Live TV Streaming and offers VOD movies and shows to the users. Please stay connected with us to know the leading IPTV services in detail.

The longer the format war goes on, the more opportunity smart players in the cable and IPTV and online spaces have to build market share.—Laura Behrens

Read more
Total votes 1: ↑1 and ↓0 +1
Comments 0

Anonymity and Authenticity

Reading time 15 min
Views 924
Decentralized networks *Information Security *Cryptography *

The following text consists of two logically connected parts. The first part constructively rules out the assumption that untraceability supposes anonymity. The second part enumerates specific practical tasks in the form of various scenarios when digital signatures (DS) do not provide correct solutions to the task. It is demonstrated that a complete solution can be obtained through a special combination of DS and an interactive anonymous identification protocol.

Read more
Rating 0
Comments 0

How Can I Start My Own IPTV Provider?

Reading time 4 min
Views 2.4K
IPTV *Monitors and TV

IPTV is quickly rising to the top of the list of TV viewing options for viewers worldwide. other types of home entertainment, including music and video. This indicates a developing market for service providers and a potential new source of income. But how can you set up an IPTV service? Mware Solutions can assist you in establishing the required infrastructure for a successful entry into this cutthroat market.

TV delivered using an Internet Protocol Network is known as IPTV. This new technology has the potential to alter how we watch television at home, get training, utilize computers, and even use cell phones. From computer monitors and mobile phone screens to plasma and LCD televisions, it is used to provide television services to all of these devices. But how can you launch an IPTV company and become a provider of IPTV? An IPTV business solution is what?

We, therefore, decided to offer an eight-week boot camp to teach you everything you require to launch your own IPTV company. You may build the necessary infrastructure with the aid of Setplex to successfully enter this cutthroat market.

Read more
Total votes 3: ↑3 and ↓0 +3
Comments 0

How we designed the user interface for an enterprise analytical system

Reading time 5 min
Views 621
Singula Team corporate blog Big Data *CGI *Data Engineering *

In 2021, we were contacted by an industrial plant that was faced with the need to create a system for analyzing processes in its production. The enterprise team studied ready-made solutions, but none of the analytics system designs fully covered the required functionality. So they turned to us with a request to develop their own analytical system that would collect data from all machines and allow it to be analyzed to see bottlenecks in production. For this project, we created a data-driven UI/UX design and also developed a web-based interface for the equipment monitoring system.

Read more
Total votes 5: ↑5 and ↓0 +5
Comments 0

Understanding the Differences Between Kafka and RabbitMQ: in Simple Terms

Reading time 7 min
Views 3.2K
Иннотех corporate blog Programming *IT Infrastructure *Data storage *DevOps *
Translation

Software message brokers became the standard for creating complex systems. However not all IT specialists understand how these instruments work. Pavel Malygin, Lead System Analyst at Innotech, dives into the topic of message brokers and explains how they are used.

Read more
Total votes 3: ↑3 and ↓0 +3
Comments 2

Methodology for calculating results of a task set: taking into account its level of difficulty

Reading time 3 min
Views 1.6K
IT Infrastructure *Mathematics *Statistics in IT IT-companies

In the world of academic knowledge evaluation, objective calculation of large data presents a serious problem. Can a student studying in an Advanced Maths class and getting B-marks be evaluated equally with another student, getting B-marks in a General Maths class? Can we create a system that would take into account the level of difficulty those students face?

This article will describe a system of independent evaluation we have been using for school olympics in five subjects (Mathematics, English Language, Russian Language, Tatar Language, Social Science) for students grades 1 to 11. In each academic year we organise six qualification tournaments, with about 15,000 students from different regions of Russia. Then we select the top ten participants in each subject and each grade for their future participation in the final (seventh) tournament, where only the best of the best are chosen. It means that 550 participants compete in the final tournament, which is about 5.5% of all participants in the academic year. 

It is obvious that those multiple tournaments cannot be absolutely homogenous, and inevitably the levels of difficulty for each set of tasks vary. Therefore, it is critical for us to take into consideration those variations of difficulty and calculate the results in the most objective manner.

Read more
Rating 0
Comments 0

How Yandex Made Their Biggest Improvement in the Search Engine with the Help of Toloka

Reading time 5 min
Views 1.3K
Search engines *Data Mining *Machine learning *Artificial Intelligence Data Engineering *
Tutorial

Toloka is a crowdsourcing platform and microtasking project launched by Yandex to quickly markup large amounts of data. But how can such a simple concept play a crucial role in improving the work of neural networks?

Learn how
Total votes 1: ↑1 and ↓0 +1
Comments 0

Synchronous Request-Response using REST and Apache Kafka

Reading time 8 min
Views 2.4K
Иннотех corporate blog High performance *Programming *Java *Apache *
Translation

At first glance making REST and Apache Kafka compatible seems quite a challenge. However Innotech team nailed the task. Kirill Voronkin, Lead Developer at Innotech, shared the details on transforming unsynchronized queries into synchronized.

Read more
Total votes 1: ↑1 and ↓0 +1
Comments 0

Modern Micro-Service Architecture: Key Challenges for System Analysts

Reading time 9 min
Views 1.2K
Иннотех corporate blog System administration *Server Administration *Microservices *
Translation

We're continuing to explore micro service architecture. In today's blog Alexander Solyar, Lead system architect at Innotech, describes the main challenges analysts are facing while working with micro services. He also shares a number of effective solutions and recommendations.

Read more
Total votes 3: ↑3 and ↓0 +3
Comments 0

The 2022 National Internet Segment Reliability Research

Reading time 8 min
Views 605
Qrator Labs corporate blog Decentralized networks *Information Security *

The National Internet Segment Reliability Research explains how the outage of a single Autonomous System might affect the connectivity of the impacted region with the rest of the world. Generally, the most critical AS in the region is the dominant ISP on the market, but not always.

As the number of alternate routes between ASes increases (the "Internet" stands for "interconnected networks" - and each network is an AS), so does the fault-tolerance and stability of the Internet across the globe. Although some paths are more important than others from the beginning, establishing as many alternate routes as possible is the only viable way to ensure an adequately robust network.

The global connectivity of any given AS, whether an international giant or a regional player, depends on the quantity and quality of its path to Tier-1 ISPs.

Usually, Tier-1 implies an international company offering global IP transit service over connections with other Tier-1 providers. Nevertheless, there is no guarantee that such connectivity will always be maintained. For many ISPs at all "tiers", losing connection to even one Tier-1 peer would likely render them unreachable from some parts of the world.

Read more
Total votes 9: ↑9 and ↓0 +9
Comments 0

Top 10 incident response mistakes

Reading time 9 min
Views 726
Positive Technologies corporate blog Information Security *Antivirus protection *Data recovery *Reverse engineering *

Imagine someone withdrew money from a company's account at night. The next morning panic breaks out, leading to yet more problems. The IT department can reinstall a compromised system from scratch or restore it from backup. Reinstalling from scratch will wipe out all traces left by the attackers, and external investigators will have to search for clues in other systems. Restoring from backup carries the risk of accidentally reinstating a compromised image. In this paper, we will describe common mistakes that experts make when responding to security incidents.

Read more
Rating 0
Comments 0

Modern Microservice Architecture: Design Principles

Reading time 7 min
Views 2.6K
Иннотех corporate blog System administration *Server Administration *Microservices *
Translation

First mentions of micro service architecture application go back to the previous decade. Today this approach became the industry standard. Alexander Solyar, Lead software architect at Innotech, dives into details, shares professional insights and practical rules for working with micro services .

Read more
Total votes 3: ↑3 and ↓0 +3
Comments 1