ClickHouse replication: expectation and reality
There is a lot of different information about ClickHouse, but let’s talk about how to prepare the infrastructure with it. It took us about six months to get it to work exactly the way it finally suits us. It was necessary to find an efficient…
Protection against hacker attacks on deep learning models
Like anything else in computing, deep learning models can be hacked. The IBM team has identified threats and developed techniques to protect AI models called deep generative models (DGMs). DGM models are an emerging AI technology that can synthesize data from complex, high-dimensional arrays, be…
CRM: systematization or automation?
Did you write cheat sheets at school? Surely yes. Probably, they noticed that some spurs were a monolithic rewriting of a textbook, while others were real clues: I opened it, grabbed the diagrams, lists, paragraphs with my eye, and quickly removed it because the information…
Clickhouse next to Zabbix or how to collect logs with monitoring
Monitoring of infrastructure objects is carried out in Zabbix with a correlation of incoming flows in Monq. Some time passes and an event from Zabbix comes to Monq, stating that the authentication service is not available. Why? What happened? We open the Monq primary events…
Why is IT outsourcing profitable and what are its advantages
Guys, has anyone thought about how who chooses a contractor company or a person for a team to perform certain works with their it-infrastructure? So you have your own product, project, or maybe you work in some large company, but one way or another, if…
Research: over 2 million Microsoft web servers are running vulnerable versions of IIS
CyberNews researchers said they have identified over 2 million web servers running on outdated, out-of-service and vulnerable Microsoft Internet Information Services (IIS). Since outdated versions of IIS are no longer supported by Microsoft, the researchers said they could easily compromise them, inject all sorts of…
Update Tuesday: Microsoft has released August security updates
Microsoft released planned security updates covering 44 vulnerabilities (51 vulnerabilities, including closed vulnerabilities in Microsoft Edge browser), 7 of which were classified as critical, 3 were of the zero-day (0-day) vulnerability, and 1 vulnerability was exploited in real attacks. In this article, I will cover…
Optimizing the code using the sort function as an example
A number of algorithms can be distinguished that are basic and underlie almost every line of programs written in high-level languages. It is good to have at hand the classic multivolume work of Donald Knuth “The Art of Computer Programming”, where many basic algorithms are…
DevOps Time for Java Developers
The topic for discussion is building Java applications in CI. Let’s take a look at the Maven repository on Docker Hub. The latest version (3.8.1) appears everywhere, but images based on Alpine are only ibmjava-8, there are no 11 or current releases. The 11-slim image…
Type Safety in JavaScript: Flow and TypeScript
Disclaimer: I do not claim to be a discovery in this article, but only want to help avoid mistakes when creating applications. We all love the “magic” that a tool like SignalR gives us and are happy to implement it in our projects. Of course,…
Service
Categories
- DEVELOPMENT (102)
- DEVOPS (53)
- FRAMEWORKS (25)
- IT (24)
- QA (14)
- SECURITY (13)
- SOFTWARE (13)
- UI/UX (6)
- Uncategorized (8)