Author: ProHoster

Characteristics of the flagship Huawei Mate 30 Pro revealed before the announcement

The Chinese company Huawei will present the flagship smartphones of the Mate 30 series on September 19 in Munich. A few days before the official announcement, detailed technical specifications of the Mate 30 Pro appeared on the Internet, which were published by an insider on Twitter. According to available data, the smartphone will have a Waterfall display with highly curved sides. Without taking into account the curved sides, the display diagonal is 6,6 […]

The Spektr-RG observatory discovered a new X-ray source in the Milky Way galaxy

The Russian ART-XC telescope aboard the Spektr-RG space observatory has begun its early science program. During the first scan of the central “bulge” of the Milky Way galaxy, a new X-ray source was detected, called SRGA J174956-34086. Over the entire period of observations, humanity has discovered about a million sources of X-ray radiation, and only dozens of them have their own names. In most cases, their […]

Cross replication between PostgreSQL and MySQL

I'll outline cross-replication between PostgreSQL and MySQL, as well as methods for setting up cross-replication between the two database servers. Typically, cross-replicated databases are called homogeneous, and it is a convenient method of moving from one RDBMS server to another. PostgreSQL and MySQL databases are considered relational, but […]

STEM Intensive Learning Approach

There are many excellent courses in the world of engineering education, but often the curriculum built around them suffers from one serious flaw - a lack of good coherence between various topics. One might object: how can this be? When a training program is being formed, prerequisites and a clear order in which the disciplines must be studied are indicated for each course. For example, in order to collect and [...]

Detection of vulnerabilities and assessment of resistance to hacker attacks of smart cards and cryptoprocessors with built-in protection

Over the past decade, in addition to methods for extracting secrets or performing other unauthorized actions, attackers have begun to use unintentional data leakage and manipulation of program execution through side channels. Traditional attack methods can be expensive in terms of knowledge, time and processing power. Side-channel attacks, on the other hand, can be more easily implemented and non-destructive, […]

The XY phenomenon: how to avoid the "wrong" problems

Have you ever thought about how many hours, months and even lives have been wasted solving the “wrong” problems? One day, some people began to complain that they had to wait unbearably long for the elevator. Other people were concerned about these slanders and spent a lot of time, effort and money trying to improve the operation of elevators and reduce waiting times. But […]

Linux kernel 5.3 has been released!

Main innovations The pidfd mechanism, which allows you to assign a specific PID to a process. Pinning continues after the process is terminated so that the PID can be issued to it when it starts again. Details. Limitations of frequency ranges in the process scheduler. For example, critical processes can be run at a minimum frequency threshold (say, at least 3 GHz), and low-priority processes at a higher frequency threshold […]

Habr Special #18 / New Apple gadgets, a fully modular smartphone, a village of programmers in Belarus, an XY phenomenon

In this issue: 00:38 - New Apple products: iPhone 11, Watch and budget iPad for students. Does the Pro console add professionalism? 08:28 — Fairphone “Honest Phone” is a completely modular gadget in which literally all parts can be replaced. 13:15 — Is “slow fashion” slowing down progress? 14:30 — A little thing that was not mentioned at the Apple presentation. 16:28 — Why do […]

Neovim 0.4.2

The fork of the vim editor – Neovim has finally passed the version 0.4 mark. Main changes: Added support for floating windows. Demo Added multigrid support. Previously, neovim had a single grid for all created windows, but now they are different, which allows you to customize each of them separately: change the font size, the design of the windows themselves and add your own scrollbar to them. Nvim-Lua introduced […]

Varlink - kernel interface

Varlink is a kernel interface and protocol that is readable by both humans and machines. The Varlink interface combines classic UNIX command line options, STDIN/OUT/ERROR text formats, man pages, service metadata and is equivalent to the FD3 file descriptor. Varlink is accessible from any programming environment. The Varlink interface defines which methods will be implemented and how. Every […]

Linux 5.3 kernel release

After two months of development, Linus Torvalds presented the release of the Linux kernel 5.3. Among the most notable changes: support for AMD Navi GPUs, Zhaoxi processors and Intel Speed ​​Select power management technology, the ability to use umwait instructions to wait without using cycles, 'utilization clamping' mode for increased interactivity for asymmetric CPUs, the pidfd_open system call, the ability to use IPv4 addresses from subnet 0.0.0.0/8, the ability […]