Service and IaaS Development: A Compilation of Cloud, Storage, and 1cloud Evolution

We deal with the law on PD, tell how the infrastructure has evolved, discuss changes in the policies of IT companies and the development of cloud ecosystems.

A photo – Tristan schmurr – CC BY / Photo changed

Development, cloud and data storage

  • Will the cloud save ultra-budget smartphones. In the article, we discuss the market of smart feature phones – push-button phones with some smartphone capabilities. Different companies sought to occupy a niche of operating systems for this class of devices. There was Samsung Tizen, Asha Platform, authored by Nokia, as well as Firefox OS. But they all fell victim to cheap iron. The functionality of “smart dialers” must be limited so that they do not “press” on a low-power filling, and this is a non-trivial task. It is believed that the cloud can help. And there have already been attempts to create such a device – let’s talk about Nextbit Robin, Android Go and Puffin OS.

  • Why mainstream browser developers again refused to display the subdomain. Chrome developers say that without the www subdomain, it will be easier for people to read and understand URLs. However, the IT community was greeted with a cool initiative – a new approach could create confusion with addresses and increase the risk of phishing attacks. In the article, we discuss the opinions of experts and ordinary users, as well as the hidden reasons behind the decision of Google. For example, the company’s desire to promote its own technology AMP (Accelerated Mobile Pages), which increases the speed of loading web pages.

  • This is the turn: why Apple has changed the requirements for application developers. Last summer, the IT company banned embedding “third-party analytic services or advertising” in applications for children. The corporation explained its decision with the requirements of the laws of COPPA and GDPR. However, some have linked policy change to Wall Street Journal reportwhere Apple was accused of a large number of tracking services in applications on the App Store. In the article, we discuss the opinions of experts, possible consequences for Apple and the community, as well as initiatives of other companies aimed at protecting children’s privacy.

  • Screening electronic devices at the border – a need or violation of human rights? In 2017, in the United States, customs services conducted 30 thousand searches of devices. This is 60% more than a year earlier. At the same time, border guards were even given the right to read personal messages and “upload” information to service servers. The situation is similar on the border in China and Canada. Many believe that this practice violates the right of people to privacy of correspondence. But there are those who are convinced that such searches are carried out for security purposes. We decided to consider the points of view of both parties, as well as provide methods and tools for protecting data on a mobile device.

  • Personal data: what is the essence of the law? This is the first part of a series of posts devoted to the analysis of Law No. 152 “On Personal Data”. We analyze its features taking into account the placement of IT infrastructure in the cloud. We start with an analysis of the basic terms and a checklist on how to obtain consent to the processing of personal data from customers. In second Part of the material will focus on PD protection products dictated by the Federal Service for Technical and Export Control (FSTEC). IN third part We talk about what exactly needs to be protected: communication channels, operating systems and virtualization environments.

IaaS provider work

  • 1cloud Cloud Architecture Evolution. Initially, our services were built according to the classical three-level model: with web server, application server and database server. But with the growth of the user base, this approach began to cause certain inconveniences – it did not scale well. Therefore, we decided to make the infrastructure modular. Now for the work of each service – for example, “Virtual infrastructure“,”Object storage“,”DNS hosting“- responds to its application module. We share the experience of migration to a new architecture.

  • DevOps in a cloud service using as an example. A review article in which we talk about approaches to the development of our services and how they have changed over time. We will go through all stages of the application life cycle: accounting, control, assembly, testing and deployment. Let’s talk about the technological stack and why we prefer to use our own Git server.

  • How 1cloud technical support works. You can contact 1cloud specialists at the telephone, email, chat on the site, through web form feedback or control panel. Each of these methods has its own characteristics – in the article we tell which one is worth using in order to get the fastest answer. We also provide interesting statistics about the work of technical support. For example, our clients are very active on Saturdays and Sundays – this is due to the fact that system administrators set up corporate IT infrastructure in those days when it is less busy.

  • How to choose a direction for the development of an IT project. This is a post in which we continue the theme of the previous material. Teams that are just starting to develop cloud-based applications will find here some useful tips on how to improve their services – let’s talk about studying consumer portrait, developing IT infrastructure (disks, CPU and RAM) and features that will make working with the cloud easier for non-specialists.

A photo – Jyrki huusko – CC BY

  • How to create a virtual infrastructure provider. This is a story about how 1cloud was built: how it was originally conceived and what it became in the end. Initially, the service was supposed to be a “cloud solutions store” – software developers and integrators would register templates, and customers would deploy them in the cloud. We will show how the interface of our platform (with pictures) changed and business processes and approaches to working with clients were transformed.

Our other digests:

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *