Articles Feed

NGINX reverse proxy as a video streaming engine

Post Written by
Jovan Damjanac

Reading time: 4 minutes

NGINX is open-source software designed as a web server in the first place to combine performance and stability. Many well-known companies are using NGINX due to its performance optimization for handling a large number of connections. The NGINX is the most reliable server with its event-driven, asynchronous architecture. It also works as a reverse proxy...

CDN in the gaming industry 

Post Written by
Jovan Damjanac

Reading time: 4 minutes

Whether you play games or not, the gaming industry grows rapidly every year. Since most modern games include advanced graphic details, the download size sometimes exceeds 100 GB. Even though this might not seem a lot, many casual gamers might lose patience and decide not to install the game. Post-game downloads are common since updates...

WAF – Web Application Firewalls | WAF Introduction

Post Written by
Valentina Stojković

Reading time: 3 minutes

WAF Introduction

Web Application Firewall protects your web service by filtering, monitoring, and blocking any malicious HTTP/S traffic going through to the web application. WAF prevents any non-authorized data from accessing or leaving the app. Having WAF is just like having a toll booth, for example, tool booths allow only paying customers to drive on the toll road...

Edge Compute in practice – Ubuntu Server as APT cache node

Post Written by
Orange Cloud Team

Reading time: 4 minutes

edge compute in practice - apt cache node

Managing server infrastructure introduces a vast array of operational challenges. Among other things, reducing bandwidth consumption and speeding up server upgrades can be a fundamental improvement and make the administrator’s life much easier.Ubuntu Server instances use APT package management system for software management. It allows system administrators to easily install and upgrade software across all...

Edge compute applications – why should you care

Post Written by
Orange Cloud Team

Reading time: 3 minutes

Everyone seems to be jumping on the edge computing bandwagon these days, but why? This article goes into the details of what edge computing is and how we got here. It all started with the CDNs Content Delivery Networks, or CDNs for short, enable you to push all kinds of content to your end-users from...

COVID-19

Post Written by
Ivan Dabić
Last modified on July 15th, 2020 at 12:33 pm

Reading time: 1 minute

Orange Cloud and joined brands have sent employees to work from home since the beginning of March. The treat of the epidemic was clear at that time so we took appropriate measures and applied the emergency procedures to initiate remote work. We have had the procedure for remote work since the very start of our...

Security Update – scp

Post Written by
Ivan Dabić
Last modified on July 15th, 2020 at 12:33 pm

Reading time: 1 minute

OpenSSH project had been working on version OpenSSH 8.0p1 in 2019 when they published that “scp” protocol thus the “scp” command has a vulnerability with verification of the file name sent by server against the one that client actually requested. This issue was mitigated in OpenSSH 8.0p1 but, was never fully applied across the platforms.Reference: https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-March/037672.html An...

Zero bytes responses – cache or not to cache?

Post Written by
Ivan Dabić
Last modified on August 15th, 2020 at 12:27 pm

Reading time: 4 minutes

Should 0 bytes responses be cached or not (on middle points like CDN or other proxies) is a problem that can be addressed by two entities: RFC Client’s request For client’s request to be met it’s assumed that #1 is honored. What RFC says for 0 bytes caching, basically, is that if a file (or...

Leading meetings that produce results

Post Written by
Ervin Duspara
Last modified on June 29th, 2020 at 1:58 pm

Reading time: 4 minutes

Leading meetings that produce results. We’ve all been there – you are stuck in an endless meeting, not really sure why you’re even there in the first place. And you’re probably not alone. When attending such meetings, I have the feeling of being in a hostage situation. Even worse, I can’t stop thinking about all...

Log checking with GREP and AWK

Post Written by
Ivan Dabić
Last modified on June 30th, 2020 at 10:42 am

Reading time: 5 minutes

Most of the time when checking logs we’re presented with a lot of data we may necessarily not need, or we have to manipulate it in some way or present it to a client in a specific way. All of that can be done using a scripting language or utilizing AWK right from the terminal...

Contact Us

Fill out the enquiry form and we'll get back to you as soon as possible.