Author: ProHoster

Instagram, Facebook and Twitter may deprive Russians of the right to use data

Experts who are working on the Digital Economy program have proposed prohibiting foreign companies without a legal entity in Russia from using the data of Russians. If this decision comes into force, it will be reflected on Facebook, Instagram and Twitter. The initiator was the autonomous non-profit organization (ANO) Digital Economy. However, exact information about who proposed the idea is not provided. It is assumed that the original idea […]

In every second online bank theft of funds is possible

Positive Technologies has published a report with the results of a study of the security of web applications for remote banking (online banking). In general, as the analysis showed, the security of the respective systems leaves much to be desired. Experts have found that most online banks contain critical vulnerabilities, the exploitation of which can result in extremely negative consequences. In particular, in every second - in 54% - banking applications […]

[Updated] Qualcomm and Samsung won't ship 5G modems to Apple

According to online sources, Qualcomm and Samsung have decided to stop supplying 5G modems to Apple. Considering that Qualcomm and Apple are engaged in many patent disputes, this outcome is not surprising. As for the South Korean giant, the reason for the refusal lies in the fact that the manufacturer simply does not have time to produce a sufficient number of branded Exynos 5100 5G modems. If […]

News of the week: major events in IT and science

Among the important ones, it is worth highlighting the drop in prices for RAM and SSD, the launch of 5G in the USA and South Korea, as well as an early test of fifth-generation networks in the Russian Federation, hacking of the Tesla security system, Falcon Heavy as a lunar transport and the emergence of the Russian Elbrus OS in general access. 5G in Russia and the world Fifth generation networks are gradually starting […]

Android Q will make it harder to install apps from unverified sources

The Android mobile OS has a poor reputation for malware protection. Although Google does its best to weed out dubious software, this only applies to the Google Play app store. However, the open nature of Android means that it is possible to install apps from other, “unverified” sources. Google already has a system in place that reduces the impact of this freedom, and it appears that Android […]

Samsung under attack: disappointing quarterly report expected

Things are looking bad for Samsung Electronics ahead of the release of its first-quarter 2019 financial report, with memory chip prices falling and high-end premium smartphones struggling in the market. The South Korean tech giant took the extraordinary step of issuing a preliminary warning last week that first-quarter financial results would likely fall short of market expectations […]

TSMC's 7nm Orders Grow, Driven by AMD and Beyond

Over the past few months, the Taiwanese company TSMC has faced a number of rather serious difficulties. First, some of the company's servers were infected with the WannaCry virus. And earlier this year, an accident occurred at one of the company's factories, due to which more than 10 semiconductor wafers were damaged and the production line was stopped. However, the growth in orders for 000nm products will help the company […]

EK Water Blocks Unveils EK-Velocity sTR4 Water Block for Ryzen Threadripper

EK Water Blocks has introduced a new processor water block in the Quantum Line series called EK-Velocity sTR4. The new product was developed specifically for AMD Ryzen Threadripper processors and is already the third EK water block for these chips. The base of the EK-Velocity sTR4 water block is made of nickel-plated copper. It is made large enough to cover the entire processor cover. On the inside there is [...]

Service Tracing, OpenTracing and Jaeger

We use microservice architecture in our projects. When performance bottlenecks occur, a lot of time is spent monitoring and parsing logs. When logging the timings of individual operations to a log file, it is usually difficult to understand what led to the invocation of these operations, to track the sequence of actions or the time shift of one operation relative to another in different services. To minimize […]

News of the week: major events in IT and science

Among the important ones, it is worth highlighting the drop in prices for RAM and SSD, the launch of 5G in the USA and South Korea, as well as an early test of fifth-generation networks in the Russian Federation, hacking of the Tesla security system, Falcon Heavy as a lunar transport and the emergence of the Russian Elbrus OS in general access. 5G in Russia and the world Fifth generation networks are gradually starting […]

Yo ho ho and a bottle of rum

Many of you remember our last year fan geek project “Server in the Clouds”: we made a small server based on Raspberry Pi and launched it in a hot air balloon. At the same time, we held a competition on Habré. To win the competition, you had to guess where the ball with the server would land. The prize was participation in the Mediterranean regatta in Greece in the same boat with the […]

Creating Animated Bar Charts with R

Animated bar charts that can be embedded directly into a post on any website are becoming increasingly popular. They display the dynamics of changes in any characteristics over a certain time and do this clearly. Let's see how to create them using R and generic packages. Skillbox recommends: Practical course “Python developer from scratch”. We remind you: for all Habr readers there is a 10 discount […]