ClickHouse replication: expectation and reality
There is a lot of different information about ClickHouse, but let’s talk about how to prepare the infrastructure with it. It took us about six months to get it to work exactly the way it finally suits us. It was necessary to find an efficient…
Protection against hacker attacks on deep learning models
Like anything else in computing, deep learning models can be hacked. The IBM team has identified threats and developed techniques to protect AI models called deep generative models (DGMs). DGM models are an emerging AI technology that can synthesize data from complex, high-dimensional arrays, be…
CRM: systematization or automation?
Did you write cheat sheets at school? Surely yes. Probably, they noticed that some spurs were a monolithic rewriting of a textbook, while others were real clues: I opened it, grabbed the diagrams, lists, paragraphs with my eye, and quickly removed it because the information…
Clickhouse next to Zabbix or how to collect logs with monitoring
Monitoring of infrastructure objects is carried out in Zabbix with a correlation of incoming flows in Monq. Some time passes and an event from Zabbix comes to Monq, stating that the authentication service is not available. Why? What happened? We open the Monq primary events…
Why is IT outsourcing profitable and what are its advantages
Guys, has anyone thought about how who chooses a contractor company or a person for a team to perform certain works with their it-infrastructure? So you have your own product, project, or maybe you work in some large company, but one way or another, if…
Research: over 2 million Microsoft web servers are running vulnerable versions of IIS
CyberNews researchers said they have identified over 2 million web servers running on outdated, out-of-service and vulnerable Microsoft Internet Information Services (IIS). Since outdated versions of IIS are no longer supported by Microsoft, the researchers said they could easily compromise them, inject all sorts of…
Update Tuesday: Microsoft has released August security updates
Microsoft released planned security updates covering 44 vulnerabilities (51 vulnerabilities, including closed vulnerabilities in Microsoft Edge browser), 7 of which were classified as critical, 3 were of the zero-day (0-day) vulnerability, and 1 vulnerability was exploited in real attacks. In this article, I will cover…
DevOps Time for Java Developers
The topic for discussion is building Java applications in CI. Let’s take a look at the Maven repository on Docker Hub. The latest version (3.8.1) appears everywhere, but images based on Alpine are only ibmjava-8, there are no 11 or current releases. The 11-slim image…
Type Safety in JavaScript: Flow and TypeScript
Both engines for JavaScript-type support have roughly the same capabilities. However, if you come from strongly typed languages, even typed JavaScript has a very important difference from Java: all types essentially describe interfaces, that is, a list of properties (and their types and/or arguments). And…
How hackers spoof DNS requests by poisoning the cache
Domain Name Server (DNS) spoofing is a cyberattack in which an attacker directs the victim’s traffic to a malicious site (instead of a legitimate IP address). Attackers use DNS cache poisoning to intercept Internet traffic and steal credentials or confidential information. DNS cache poisoning and…
Service
Categories
- DEVELOPMENT (87)
- DEVOPS (39)
- FRAMEWORKS (17)
- IT (21)
- QA (14)
- SECURITY (13)
- SOFTWARE (11)
- UI/UX (6)
- Uncategorized (7)