Developers Club geek daily blog

Passions on the Sex.com domain

2 years, 8 months ago
Sex.com domain history as if the detective thriller, it is impregnated with dramatic nature and mystery. This domain saga tells about long fight for the right ownership of property.

And began history in 1994 when the engineer Gary Kremen registered domain name of Sex.com. In those time the international Organization Network Solutions registering domains for all comers acted as the direct logger of domains. Bright Kremen realized at once that in the future will be able to earn from such simple and popular name not bad. And it appeared the rights.



Read more »


30 years of work as the system administrator

2 years, 8 months ago
Sandra Henry-Stocker (Unix Dweeb, works in the TeleCommunication Systems company developing the innovative technical solutions at present). Looking back in the past, more than 30 years of work as the Unix system administrator later, I can tell that it was the long and interesting way. These years I of course did not execute one and too. Development of technologies was led to improbable changes in my work. It were impressive improvements in "iron" which I serviced, and the invention of new software tools which I studied and put into practice. For many years I took improbable pleasure from that how a lot of work I could make in the command line for identification and elimination of different problems and understanding of how in the best way to provide data protection of my employers. Within 30 years I worked with surprising people, at the same time was dismissed once, and also learned a lot of new about what works and does not work, both from the technical point of view, and from the point of view of career development.
The profession and all with it connected changes dramatically, but it always brought and will bring me the sea of pleasure.

Here my reflections about changes which I saw also those which still I will see.

Read more »


Development of trade systems for FPGA: Pluses, minuses and the analysis of architecture of the existing library

2 years, 8 months ago


Many trading platforms for high-frequency trading often work at the equipment with high-performance network adapters. However minus of such systems is rather high and unpredictable delay — as a result many traders turned the view of hybrid architecture with hardware acceleration.

Experts of the Algo-Logic Systems Inc company. John Lokvud (Jowhn W. Lockwood), to Advayt Gupta (Adwait Gupte) and Nishit Mehta (Nishit Mehta) published work in which told about how FPGA are used in online trading for reduction of transfer lags of data. We present to yours highlights of this publication.

Read more »


Let's Encrypt leaves in a public beta: HTTPS everywhere, to everyone, from now on and forever free of charge

2 years, 8 months ago
Let&39;s Encrypt

Let's Encrypt — it is the non-commercial initiative providing the free, automated and open CA (certificate authority — certificate authority) created ISRGby for the benefit of society:

  • free of charge: the owner of any domain name can use Let's Encrypt and receive entrusted (to read as "is recognized as any modern browser") the TLS certificate (TLS — the successor of SSL) absolutely free of charge;
  • it is automated: Let's Encrypt provides free and the free software (client) which, being configured on the Web server, can request completely automatically non-paid provided certificates of Let's Encrypt, automatically configure and update them;
  • safely: Let’s Encrypt is under construction as a platform for promotion the best practician of safety of TLSof both on the party of certificate authority (CA), and on the party of websites, helping administrators to configure Web servers properly;
  • it is transparent: information on release and a withdrawal of each certificate of Let's Encrypt is available quite and publicly so that anyone to study it will be able to make it;
  • freely: the protocols of interaction from CA allowing to automate processes of release and updating of certificates will be published as the open standard for the maximum implementation;
  • kooperativno: as well as any protocol which is the cornerstone of the Internet and the World Wide Web of Let's Encrypt is joint, uncontrollable any specific organization by the non-commercial project created bringing benefit to society.

Read more »


Formula 1 and weather forecast: Where IaaS-technologies are still used

2 years, 8 months ago


On Habré and in our Hotels.ru and PickPoint transferred the infrastructure to a cloud, however such IT projects — not the only users of IaaS-technologies.

Clouds help to solve infrastructure problems and to the organizations from the unexpected industries — for example, spheres of a weather forecast or even the races "Formulas 1".

Read more »


Business processes: how not to automate a mess

2 years, 8 months ago
2006-2008 in business circles were marked by infinite discussions on project management and processes. The scientific organizations and institutes collected the whole conferences with participation of prominent international experts and literally without interruption on coffee break discussed projects and process approach. A bit later, in 2009 on one of the international round tables the graduate student of large higher education institution thoroughly and very convincingly proved that the sad end because "everything that the invariable mess becomes in the companies," is prepared for process approach and project management in Russia.

Fortunately, he was mistaken. Modern business proves that project management and processes is just the cornerstone of elimination of a disorder in the company. Business processes, in turn, of the theoretical plane passed in practical, in many respects thanks to the corporate software.


Read more »


As we won against a twilight between testing and operation

2 years, 8 months ago
Some time ago we in HeadHunter found "a twilight zone" by transfer of the new version of the website from testing in operation. The insufficient attention to a difference between test and fighting infrastructure periodically led to falling of the website.

Выйти из сумрака

Old test stands considerably differed on the internal device from a working cluster. Init-scripts for start of services differed, files of a configuration on an arrangement and contents differed. Interaction of services among themselves happened without features of a fighting environment.

I will show logic of our solution which allowed to achieve qualitatively new results of testing.

This article continues my report on SQA Days-18.

Read more »


Use of LRDIMM modules in high-end servers

2 years, 8 months ago
LRDIMM (Load-Reduced Dual Inline Memory Module or "DIMM with reduced loading") – type of the modules of memory supported by server platforms since 2012. LRDIMM modules are similar to register DIMM modules and approach the same connectors of memory. However the principle of work of LRDIMM differs from RDIMM. Using LRDIMM in the normal server it is possible to make 512 GB, 1tb or 1,5tb memories.


Read more »


Setup of public Internet access in five minutes

2 years, 8 months ago
Hi, Habr! Today we will tell how to owners of restaurants and cafe to avoid penalties for violation of the legislation regulating the organization of public Internet access. Let's remind that in the summer of last year there was a resolution of the government of Russia No. 758 according to which the organizer of public Wi - Fi - access has to perform identification of users. A usual anonymous input in a network now beyond the law.


Read more »


Stories of accidents on the UPS

2 years, 8 months ago
Continuing and supplementing a feature story "Failures and accidents in DPC", we will share several supervision without claim for the serious analysis of causes and effects. Perhaps, some moments will seem to the reader funny and amusing though everything that occurred, was very serious. We hope, these rather instructive stories will allow the reader most to draw conclusions.

Axiomatic scenario

On a twist of fate accident about which the speech will go below happened only three months after the customer and the general designer received from our company the warning letter with the recommendation to set an external service bypass on uninterruptible power supply unit later. But no reaction to warning followed.

In the process of construction of a data-center our company put and mounted the Trinergy UPS flagman block system with a power of 1 MW. Though this UPS is also equipped with the built-in service bypass, all of us recommended to parent organization to make an external general service bypass on system ― in case of accident that at adverse succession of events it would be possible to service this source completely, without interrupting power supply of loading. But specialists of the general contractor objected that the UPS is already equipped with a service bypass which will allow to service internal components of system in any situation. Nothing foretold bad, and cases that the new system was entirely put out of action, was expected.

Read more »