Author: ProHoster

Samsung reduces its presence at MWC 2020 due to coronavirus

Samsung, following Ericsson, LG and NVIDIA, has decided to revise plans for its presence at the MWC (Mobile World Congress) 2020 exhibition, starting at the end of the month in Barcelona. Like some other technology brands, the South Korean company has decided to reduce the number of specialists that will be sent to Barcelona to participate in the exhibition due to the outbreak of a new strain of coronavirus. The company is still […]

Delta: Data Synchronization and Enrichment Platform

In anticipation of the launch of a new stream at the Data Engineer course, we prepared a translation of interesting material. Overview We'll talk about a fairly popular pattern whereby applications use multiple data stores, where each store is used for its own purposes, for example, to store the canonical form of data (MySQL, etc.), provide advanced search capabilities (ElasticSearch, etc.). etc.), caching (Memcached, etc.) […]

FOSS News #1 - Free and Open Source News Review January 27 - February 2, 2020

Hi all! This is my first post on Habré, I hope the community will be interested. In the Perm Linux Users Group, we saw a lack of review materials on free and open source news and decided that it would be nice to collect all the most interesting things every week so that after reading such a review, a person would be sure that he did not miss anything important. I prepared issue #0, […]

By banning facial recognition, we're missing the point.

The whole point of modern surveillance is to differentiate between people so that everyone can be treated differently. Facial recognition technologies are only a small part of the system of total surveillance The author of the essay is Bruce Schneier, an American cryptographer, writer and information security specialist. Member of the board of directors of the International Association for Cryptological Research and member of the advisory board of the Electronic Privacy Information Center. The essay was published on January 20, 2020 in the blog […]

How much to be Nyasha?

Most people strive to be perfect. No, not to be, but to seem. There is beauty all around, not the world. Especially now with social media. And he’s a handsome guy himself, and he works great, and he gets along with people, and he’s constantly developing, and he reads smart books, and he relaxes on the seas, and he solves problems on time, and he’s promising, and he watches the right films (so that the rating […]

The smell reveals

I was inspired to write this article by a translation that described how, by focusing on facial recognition systems, we are missing the whole idea of ​​mass data collection: a person can be identified using absolutely any data. Even people themselves use different methods to do this: for example, the brain of a nearsighted person relies on gait to identify people over long distances, rather than trying to recognize a face. […]

Master SCADA 4D. Is there life on ARM?

Having quite a lot of experience in the field of industrial automation, we are always in search of the best options to solve our problems. Depending on the customer’s technical specifications, we had to choose one or another hardware and software base. And if there were no strict requirements for installing Siemens equipment in conjunction with the TIA-portal, then, as a rule, the choice fell on […]

Tiny Core Linux 11.0 release

The Tiny Core team has announced the release of a new version of the lightweight distribution Tiny Core Linux 11.0. Fast operation of the OS is ensured by the fact that the system is completely loaded into memory, while requiring only 48 MB of RAM to operate. The innovation of version 11.0 is the transition to kernel 5.4.3 (instead of 4.19.10) and broader support for new hardware. Also updated busybox (1.13.1), glibc […]

How a power engineer studied neural networks and a review of the free course "Udacity: Intro to TensorFlow for Deep Learning"

All my adult life, I have been an energy drink (no, now we are not talking about a drink with dubious properties). I have never been particularly interested in the world of information technology, and I can hardly even multiply matrices on a piece of paper. And I never needed this, so that you understand a little about the specifics of my work, I can share a wonderful […]

Vulnerability in Android that allows remote code execution when Bluetooth is on

The February update to the Android platform eliminated a critical vulnerability (CVE-2020-0022) in the Bluetooth stack, which allows remote code execution by sending a specially designed Bluetooth packet. The problem can be undetected by an attacker within Bluetooth range. It is possible that the vulnerability could be used to create worms that infect neighboring devices in a chain. To attack, it is enough to know the MAC address of the victim’s device (pre-pairing is not required, [...]

NGINX Unit 1.15.0 Application Server Release

The release of the NGINX Unit 1.15 application server is available, within which a solution is being developed to ensure the launch of web applications in various programming languages ​​(Python, PHP, Perl, Ruby, Go, JavaScript/Node.js and Java). NGINX Unit can simultaneously run multiple applications in different programming languages, the launch parameters of which can be changed dynamically without the need to edit configuration files and restart. Code […]

Valve releases Proton 5.0, a suite for running Windows games on Linux

Valve has published the first release of a new branch of the Proton 5.0 project, which is based on the developments of the Wine project and is aimed at ensuring the launch of gaming applications created for Windows and presented in the Steam catalog on Linux. The project's developments are distributed under the BSD license. Proton allows you to directly run Windows-only gaming applications in the Steam Linux client. The package includes […]