Reading for the weekend: materials for acquaintance with IaaS, events from the field of information security and regulation in IT
Under the cut, you will find articles where, using the example of practical cases, we demonstrate the possibilities for applying
IaaS infrastructure . In addition, we deal with basic concepts and technologies in the field of IaaS, touch on the topic of information security and talk about regulation in IT.
/ Flickr / naixn / CCIntroducing Virtual Infrastructure and IaaS
- What is Virtual Desktop Infrastructure, and why it is needed - MarketsandMarkets analysts' forecasts show that in just 3-4 years the cost of the desktop virtualization market will be $ 13 billion. Therefore, we decided to talk about one of its components - the workplace infrastructure or the Virtual Desktop Infrastructure. Here we explain with clear examples why remote access may be needed, and how to provide it, for example, not to one person, but to many employees of the enterprise.
- Than rented infrastructure is better than ordinary “hardware” - In this article we explain in simple words what a virtual server is, talk about its advantages and compare its capabilities with ordinary “hardware”. As criteria for comparison, we consider the reliability, characteristics and capabilities for working with faults.
- How dynamic traffic distribution methods work - Liverpool scientists estimate that the Biased Random Sampling load balancing method can reduce latency in data transfer by 22%. We will tell how this and other dynamic balancing methods work: “ant” and “bee”.
- What is the essence of application containers - Analytical company 451 Research writes that the market volume of containerization will be 2.7 billion dollars by 2020. Almost all over the world, it is developing faster than other segments of the cloud infrastructure. In this material you will find a brief historical excursion with the highlights of the development of the area. He will also tell how containers are used in the development of software solutions and the construction of high-load systems.
- Why do we need a virtual dedicated server - Here we provide an introductory material on what a virtual dedicated server (VDS) is, what practical tasks it solves and how it differs from the physical one. Let us tell the story of VDS, and then compare VDS and the “iron” server by criteria of safety, reliability and flexibility.
- Where object storage is useful - According to researchers from the Market Storage Future, the cloud object storage market is developing steadily: by 2023 its value will reach $ 6 billion. In this post, we are talking about practical cases of using object storage: from backup and data recovery to storage of corporate documentation and large multimedia files.
- Minute of terminology: why monitoring is needed - Dealing with a monitoring system is not so difficult. Here we give practical recommendations on the topic of monitoring computer infrastructure. Inside, we simply answer the following questions: “How to check server performance”, “How often you need to check the availability of services and servers”, “How automation simplifies monitoring” and others on a given topic.
Practical use of the cloud
- How 1cloud makes life easier for a 1C developer: interview with a client - Follow the link to find an example of how a VPS server helps a 1C developer. According to our client, 1C-developer faces a number of tasks that need to be solved very quickly: for example, to make the necessary changes to the SQL or 1C-server settings to demonstrate the result of the work to the customer. For this, the developer must always have an effective tool at hand - a virtual infrastructure.
- "Guerrilla Marketing": an interview with a client - Here we offer to read the success story of one of our clients - Oleg Bykov, who is engaged in online business and website promotion. He will explain how the 1cloud cloud helps save resources and organize the automatic collection and distribution of information in 24/7 format.
- The ideal development environment: the programmer's workplace in the cloud - In this article, we collected examples of development tasks that the cloud can help solve. It will be about how to work together a group of programmers, what is the peculiarity of software testing on a virtual server, and how to use the cloud to deploy the product before launching it into operation.
- How IaaS helps freelance programmers: 1cloud experience - Payoneer surveyed 21 thousand freelancers from 170 countries around the world. The results of this survey showed that a freelance programmer is the highest paid position in the “teleworking” segment (programmers bypassed writers, translators, designers and financiers). To earn more, without leaving home, many developers tend to switch to freelancing. As a result, competition among freelance programmers is increasing, and in order not to “get lost in the crowd”, developers use technologies such as IaaS. In this post, we present 5 practical cases, when IaaS simplifies the life of freelance developers and helps them beat competitors.
Information Security
- From July 2018, HTTP sites will be considered insecure - In February 2018, Google announced that after the release of Chrome 68 (from July 2018), all sites that use HTTP will be marked as unprotected by the browser. Here we will understand the current situation and show you what you need to remember when switching to HTTPS.
- Why Google reduces the “lifetime” of cookies received via HTTP - Continuing the theme of Google’s distrust of HTTP: talking about the next step of the IT giant - gradually limiting the “age” of cookies. Representatives of the company believe that long-livers cookies help attackers to carry out an attack, which is called “ comprehensive monitoring ” and other similar types of attacks. We tell more about the situation and analyze the possible consequences.
- DigiCert revokes 23 thousand SSL certificates: what is the reason - In February 2018, the company Trustico took and simply sent 23 thousand private user certificate keys to DigiCert certification by email. In this regard, DigiCert had to revoke all these certificates, and certificate holders - to deal with this. We talk about how it happened, and what the community thinks about it.
- Cisco ASA: Patched Firewalls Critical Vulnerability - The vulnerability of Cisco ASA firewalls, through which cybercriminals launched DDoS attacks and rebooted the system remotely, has already been “closed”. Nevertheless, in this post, we decided to elaborate on the essence of the vulnerability and talk about the patches for the ASA, which were released to Cisco. Additionally, in the review, we provided links to the latest updates.
/ Wikimedia / US Navy photo / CC- New standards for passwordless authentication: how they work - In April of this year, 2 new standards of passwordless authentication were seen: the WebAuthn API and CTAP. From this material, you will learn how authentication with WebAuthn works, and what levels CTAP consists of. In addition, we stop at companies that plan to implement this approach: Mozilla, Google, Microsoft and (possibly) Apple.
- New "work" for graphics processors: GPU protects against virus attacks - We continue to talk about the plans of Intel: the company decided to introduce technology into its next processors to deal with virus threats at the hardware level. The first of these, Accelerated Memory Scanning, will allow the GPU to detect attacks on memory, and the second, Advanced Platform Telemetry, will help you more accurately track CPU behavior. More information about these technologies and plans of Intel - in ours.
- Chip Puzzle: an unbreakable processor will be developed by the DARPA order - the Office of Advanced Research Projects of the US Department of Defense (DARPA), believes that the elimination of “gaps” at the hardware level will avoid 40% of software exploits. Therefore, DARPA decided to allocate a grant to create a processor that is not afraid of attacks of this type. The grant holders are researchers from the University of Michigan who have already begun to implement the project. Here we also talk about similar developments of scientists from South Korea and Abu Dhabi.
IT regulation
- ICANN has renewed the policy of working with WHOIS - they are again dissatisfied - In continuation of the topic “ICANN vs WHOIS” we are talking about a new initiative of the Corporation regarding the network protocol. As a temporary specification for working with the ICANN protocol, the registrars were asked to create a system that would allow third parties to request information from their domain name owners via e-mail. In more detail about the specification and opinion of recorders we will tell in this material.
PS Our other collections on Habré:
Source: https://habr.com/ru/post/413777/
All Articles