Pull to refresh

Admin

Show first
Rating limit
Level of difficulty

Anonymity and Authenticity

Reading time15 min
Views1.4K

The following text consists of two logically connected parts. The first part constructively rules out the assumption that untraceability supposes anonymity. The second part enumerates specific practical tasks in the form of various scenarios when digital signatures (DS) do not provide correct solutions to the task. It is demonstrated that a complete solution can be obtained through a special combination of DS and an interactive anonymous identification protocol.

Read more
Rating0
Comments0

How Can I Start My Own IPTV Provider?

Reading time4 min
Views7.5K

IPTV is quickly rising to the top of the list of TV viewing options for viewers worldwide. other types of home entertainment, including music and video. This indicates a developing market for service providers and a potential new source of income. But how can you set up an IPTV service? Mware Solutions can assist you in establishing the required infrastructure for a successful entry into this cutthroat market.

TV delivered using an Internet Protocol Network is known as IPTV. This new technology has the potential to alter how we watch television at home, get training, utilize computers, and even use cell phones. From computer monitors and mobile phone screens to plasma and LCD televisions, it is used to provide television services to all of these devices. But how can you launch an IPTV company and become a provider of IPTV? An IPTV business solution is what?

We, therefore, decided to offer an eight-week boot camp to teach you everything you require to launch your own IPTV company. You may build the necessary infrastructure with the aid of Setplex to successfully enter this cutthroat market.

Read more
Total votes 3: ↑3 and ↓0+3
Comments0

How we designed the user interface for an enterprise analytical system

Reading time5 min
Views901

In 2021, we were contacted by an industrial plant that was faced with the need to create a system for analyzing processes in its production. The enterprise team studied ready-made solutions, but none of the analytics system designs fully covered the required functionality. So they turned to us with a request to develop their own analytical system that would collect data from all machines and allow it to be analyzed to see bottlenecks in production. For this project, we created a data-driven UI/UX design and also developed a web-based interface for the equipment monitoring system.

Read more
Total votes 5: ↑5 and ↓0+5
Comments0

Understanding the Differences Between Kafka and RabbitMQ: in Simple Terms

Reading time7 min
Views4.5K

Software message brokers became the standard for creating complex systems. However not all IT specialists understand how these instruments work. Pavel Malygin, Lead System Analyst at Innotech, dives into the topic of message brokers and explains how they are used.

Read more
Total votes 3: ↑3 and ↓0+3
Comments2

Methodology for calculating results of a task set: taking into account its level of difficulty

Reading time3 min
Views2.4K

In the world of academic knowledge evaluation, objective calculation of large data presents a serious problem. Can a student studying in an Advanced Maths class and getting B-marks be evaluated equally with another student, getting B-marks in a General Maths class? Can we create a system that would take into account the level of difficulty those students face?

This article will describe a system of independent evaluation we have been using for school olympics in five subjects (Mathematics, English Language, Russian Language, Tatar Language, Social Science) for students grades 1 to 11. In each academic year we organise six qualification tournaments, with about 15,000 students from different regions of Russia. Then we select the top ten participants in each subject and each grade for their future participation in the final (seventh) tournament, where only the best of the best are chosen. It means that 550 participants compete in the final tournament, which is about 5.5% of all participants in the academic year. 

It is obvious that those multiple tournaments cannot be absolutely homogenous, and inevitably the levels of difficulty for each set of tasks vary. Therefore, it is critical for us to take into consideration those variations of difficulty and calculate the results in the most objective manner.

Read more
Rating0
Comments0

How Yandex Made Their Biggest Improvement in the Search Engine with the Help of Toloka

Reading time5 min
Views2K

Toloka is a crowdsourcing platform and microtasking project launched by Yandex to quickly markup large amounts of data. But how can such a simple concept play a crucial role in improving the work of neural networks?

Learn how
Total votes 1: ↑1 and ↓0+1
Comments0

Modern Micro-Service Architecture: Key Challenges for System Analysts

Reading time9 min
Views1.7K

We're continuing to explore micro service architecture. In today's blog Alexander Solyar, Lead system architect at Innotech, describes the main challenges analysts are facing while working with micro services. He also shares a number of effective solutions and recommendations.

Read more
Total votes 3: ↑3 and ↓0+3
Comments0

The 2022 National Internet Segment Reliability Research

Reading time8 min
Views918

The National Internet Segment Reliability Research explains how the outage of a single Autonomous System might affect the connectivity of the impacted region with the rest of the world. Generally, the most critical AS in the region is the dominant ISP on the market, but not always.

As the number of alternate routes between ASes increases (the "Internet" stands for "interconnected networks" - and each network is an AS), so does the fault-tolerance and stability of the Internet across the globe. Although some paths are more important than others from the beginning, establishing as many alternate routes as possible is the only viable way to ensure an adequately robust network.

The global connectivity of any given AS, whether an international giant or a regional player, depends on the quantity and quality of its path to Tier-1 ISPs.

Usually, Tier-1 implies an international company offering global IP transit service over connections with other Tier-1 providers. Nevertheless, there is no guarantee that such connectivity will always be maintained. For many ISPs at all "tiers", losing connection to even one Tier-1 peer would likely render them unreachable from some parts of the world.

Read more
Total votes 9: ↑9 and ↓0+9
Comments0

Top 10 incident response mistakes

Reading time9 min
Views1.1K

Imagine someone withdrew money from a company's account at night. The next morning panic breaks out, leading to yet more problems. The IT department can reinstall a compromised system from scratch or restore it from backup. Reinstalling from scratch will wipe out all traces left by the attackers, and external investigators will have to search for clues in other systems. Restoring from backup carries the risk of accidentally reinstating a compromised image. In this paper, we will describe common mistakes that experts make when responding to security incidents.

Read more
Rating0
Comments0

Modern Microservice Architecture: Design Principles

Reading time7 min
Views3.5K

First mentions of micro service architecture application go back to the previous decade. Today this approach became the industry standard. Alexander Solyar, Lead software architect at Innotech, dives into details, shares professional insights and practical rules for working with micro services .

Read more
Total votes 3: ↑3 and ↓0+3
Comments1

How I gave my old laptop second life

Reading time16 min
Views2.9K

17-19 min read

Hi y'all, my name is Labertte and I use Arch btw.
Probably like every other Linux user, I'd like to buy a ThinkPad, put some lightweight distribution like Arch or Gentoo on it, and then go to Starbucks, get a soy latte and tell everyone that I use "linux". But I decided to go a little different route and give a chance to my old laptop that I was using about five or seven years ago.

Read more
Total votes 2: ↑1 and ↓10
Comments4

Backup & Recovery Solutions from China

Reading time9 min
Views4.1K

There are new challenges that force IT companies to look for non-trivial approaches to solve the problems of their customers every year.  And as you know LANIT-Integration is not an exception. Our team has already managed to work with many products, but we never stop discovering new ones.

In this article I would like to provide an overview of backup and recovery software from Chinese vendors and to compare these solutions with domestic ones.

Read more
Total votes 15: ↑15 and ↓0+15
Comments1

The Systems Engineering Methodology for Startups

Reading time6 min
Views1.7K

Creating a product startup can be an exciting experience, but it can be a daunting one as well. On average, only 1 out of 10 startups is successful, according to the Global Startup Ecosystem Report. Therefore, to raise your prospects, there are quite a number of important considerations to make in advance. 

Bearing in mind everything you need when launching a startup is a challenging task, so it’d be a sound idea to rely on some well-established methodology. That's why we were inspired by the Systems Engineering methodology, presented in such industry standards as ISO 15288 and CFR21. In this article, we’ll make a brief overview of this methodology and highlight how it can help entrepreneurs to encompass and structure the process of creating and developing a startup.

Read more
Rating0
Comments3

Metaverses: hype or the future to come?

Reading time5 min
Views1.5K

Alexander Volchek, IT entrepreneur, CEO educational platform GeekBrains

Pretty much everyone in the IT community is talking metaverses, NFTs, blockchain and cryptocurrency. This time we will discuss metaverses, and come back to everything else in the letters to follow. Entrepreneurs and founders of tech giants are passionate about this idea, and investors are allocating millions of dollars for projects dealing with metaverses. Let's start with the basics.

Read more
Total votes 2: ↑1 and ↓10
Comments0

What are neural networks and what do we need them for?

Reading time4 min
Views3.9K

Explaining through simple examples

For a long time, people have been thinking on how to create a computer that could think like a person. The advent of artificial neural networks is a significant step in this direction. Our brain consists of neurons that receive information from sensory organs and process it: we recognize people we know by their faces, and we feel hungry when we see delicious food. All of this is the result of brain neurons working and interacting with each other. This is also the principle that artificial neural networks are based on, simulating the processes occurring in the human brain.

What are neural networks

Artificial neural networks are a software code that imitates the work of a brain and is capable of self-learning. Like a biological network, an artificial network also consists of neurons, but they have a simpler structure.

If you connect neurons into a sufficiently large network with controlled interaction, they will be able to perform quite complex tasks. For example, determining what is shown in a picture, or independently creating a photorealistic image based on a text description.

Read more
Total votes 1: ↑1 and ↓0+1
Comments1

IDS Bypass at Positive Hack Days 11: writeup and solutions

Reading time10 min
Views1.7K

The IDS Bypass contest was held at the Positive Hack Days conference for the third time (for retrospective, here's . This year we created six game hosts, each with a flag. To get the flag, participants had either to exploit a vulnerability on the server or to fulfill another condition, for example, to enumerate lists of domain users.

The tasks and vulnerabilities themselves were quite straightforward. The difficulty laid in bypassing the IDS: the system inspected network traffic from participants using special rules that look for attacks. If such a rule was triggered, the participant's network request was blocked, and the bot sent them the text of the triggered rule in Telegram.

And yes, this year we tried to move away from the usual CTFd and IDS logs towards a more convenient Telegram bot. All that was needed to take part was to message the bot and pick a username. The bot then sent an OVPN file to connect to the game network, after which all interaction (viewing tasks and the game dashboard, delivering flags) took place solely through the bot. This approach paid off 100%!

Подробнее
Total votes 3: ↑3 and ↓0+3
Comments0

An Antidote to Absent-Mindedness, or How I Gained Access to an OpenShift Node without an SSH Key

Reading time6 min
Views5.2K

Typically when a Node falls out of the OpenShift cluster, this is resolved by simply restarting the offending element. What should you do, however, if you’ve forgotten the SSH key or left it in the office? You can attempt to restore access by using your wit and knowledge of Linux commands. Renat Garaev, lead developer at Innotech, described how he found the solution for this riddle and what was the outcome.

Read more
Rating0
Comments0