Everything you wanted to know about security on Linux, but you were afraid to ask: how to set up a preloading environment and automatic security updates, restrict access to external systems, and set up access rights for users and other practical tips.
The article details the types of certificates according to the verification method and the certified domains. We also talk about the cost of coverage, certification centers and where to buy the certificate itself.
All modern browsers inform users about the connection status. However, not everyone pays attention to this. What are we willing to go to Google to protect users from unsafe connections and how to switch to HTTPS.
A little more about HTTPS and how different browsers tell users about the type of connection they are using. And also about the types and causes of errors and their visual display in different browsers.
Let us analyze which solutions for creating virtual private networks are better to choose, and consider the pros and cons of each, depending on the tasks to be performed.
Consider alternatives for the development of the IT industry and find out if any people will need programmers or coding, which areas and specializations will emerge and develop, as well as general trends within the industry.
How to simplify your work and increase its efficiency, can you make the routine more interesting and why programmers need to eat tomatoes. In addition, let's talk about working with someone else's code, commenting and automating processes.
The article analyzes in detail the opinion of specialists about what novice programmers should not do, what direction is better to choose for development, how important it is to adequately assess their capabilities, why do we need preliminary work and what it is.
Find out who is who with a little research. We checked what definitions dictionaries give these professions, how technical specialists understand them, what programs offer universities, and what employers require.
What really is technical support in the cloud provider, how difficult it is for clients to manage the virtual infrastructure and whether a separate specialist is needed in the client’s staff to interact with the infrastructure.
In this part, we decided to dispel the myths that the clouds can not be used for business-critical applications, that Russian hosts do not exist and talk about how safe it is to store data in the cloud.
In conclusion, a series of posts about the myths, we decided to tell you more about the equipment and technologies used in data centers, about where our equipment is actually located and what it is, and what level of availability of equipment can actually provide a hoster .
We answer common questions about our activities, explain the specifics of our work and the advantages of choosing our company.
Learn more about how we care about the safety of our customers, how we ensure the safety and availability of data, and how our data centers are arranged.
On the creation of zones with records of various types, the implementation of automatic migration of records, as well as record management using the API interface. We are proud that we can make free services of high quality.
An article on why we decided to create private networks and an API, how we improved our strengths and how we made it easier to work with a service for non-specialists.
As a long-distance communication system improves the efficiency of existing geographically distributed data centers, remote direct memory access solves the problem of data transfer between computers, and the new data storage and transmission system significantly improves the performance of computers.
As a service operating all over the world, it is possible to work without errors, conduct transactions in any currency, detect fraud and acquaint users with new geographic locations. And also more about pricing algorithms and demand prediction.
Why is television still alive, what changes are happening in the industry today and what will the television broadcasting system look like in the future. Find answers to these and other questions in the article.
What do the universe and neural networks have in common and how do scientists use this, how do neural networks make it possible to bypass image protection in determining personality from images and how the new recommendation system on YouTube works.
Let us see why Moore's law has different formulations, and experts fix different times of death of the law, whether transistors can continue to decrease, and what possible directions may appear in the industry.
At work, programmers often have to interact with people far from computer science. We decided to figure out how best to explain complex concepts to mere mortals or how to understand them can be approached by those who are still learning.
An article about how and how much programmers have a rest in different Western and international companies, why rest goes out of fashion and whether it is an opportunity to sleep in the workplace. And also about various vacation payouts and other bonuses.
An article about how hard it is to communicate with a person who does not understand anything in programming, especially if this person is your manager. We will try to understand how to respond to some requests correctly and whether it is possible to explain to the manager exactly what the work of the programmer is.
We understand how company policies can complicate the lives of programmers, what personal qualities can help in work and career growth, and why the comfort of the work environment often depends on the manager or boss.
Source: https://habr.com/ru/post/318430/
All Articles