7 "hard" examples of how in different countries they are trying to control the functioning of the Internet
Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The…

Continue reading →

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

Continue reading →

Setting up equipment for Stream
The article by Peter Didenko “Connecting and saving”, published on the pages of our publication, told about how to save money when connecting to the Stream channel. In today's article…

Continue reading →

blog will suffice

1 2 3 5

Adobe for web developers

Adobe has no need for a special presentation – it is very well known among almost all users who have ever dealt with graphics processing. Of course, we are talking about the program Adobe Photoshop, which is used both for the preparation of professional images for printing, and for working with images for web pages. Continue reading

Spammers began to unite in online clubs

Spammers also know the parable of the broom twigs, which are easy to break individually, but together it is almost impossible. And these bad people, which most normal people hate and despise, are united in the Internet community. They share their experience there, raise their morale and learn to resist those who struggle with them. Continue reading

One site & nb p; & mda h; two servers?

In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user’s computer using the DNS system are sent to this server, which responds with all the necessary data. However, in some cases this scheme is very complicated. To do this, a copy of the site is placed on one or more servers, and a special module (load balancer) sends requests from users’ computers to the least loaded one. Continue reading

1 2 3 5
MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

...

Viral marketing on the Internet
Marketing is the path to success Internet marketing has many different tools for increasing sales of products or services. Some of them are legal, others are not. And there are…

...

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

...

Ordering a SERM service: the principles of online reputation management and the price of a question
It is quite difficult to earn a good reputation in the market of any company, including financial, and sometimes it takes more than one year. But often the company's brilliant…

...