Heading: Blog

"Anonymous data" or what is planned in 152-FZ

A brief excerpt from the bill on amendments to the Federal Law of July 27.07.2006, 152 N 152-FZ “On Personal Data” (152-FZ). With these amendments, XNUMX-FZ will “allow trading” of Big Data and will strengthen the rights of the operator of personal data. Perhaps readers will be interested in paying attention to the key points. For a detailed analysis, of course, it is recommended to read the source. As stated in the explanatory note: The bill was developed […]

How does a decentralized messenger on the blockchain work?

At the beginning of 2017, we began creating a messenger on the blockchain [name and link are in the profile] by discussing the advantages over classic P2P messengers. 2.5 years have passed, and we were able to prove our concept: messenger applications are now available for iOS, Web PWA, Windows, GNU/Linux, Mac OS and Android. Today we will tell you how the blockchain messenger works and how client […]

Vivo U10 smartphone spotted with Snapdragon 665 processor

Online sources have released information about the characteristics of the mid-level Vivo smartphone, which appears under the code designation V1928A. The new product is expected to debut on the commercial market under the name U10. This time the source of data was the popular Geekbench benchmark. The test suggests that the device uses a Snapdragon 665 processor (the chip is coded trinket). The solution combines eight computing […]

Dr. Jekyll and Mr. Hyde corporate culture

Free thoughts on the topic of corporate culture, inspired by the article Three Years of Misery Inside Google, the Happiest Company in Tech. There is also a free retelling of it in Russian. To put it very, very briefly, the point is that the good in meaning and message of the values ​​that Google laid in the foundation of its corporate culture, at some point began to work […]

Ethernet, FTP, Telnet, HTTP, Bluetooth are the basics of traffic analysis. Solving problems on a network with r0ot-mi. Part 1

In this article, the first 5 tasks will teach you the basics of traffic analysis of various network protocols. Organizational informationEspecially for those who want to learn something new and develop in any of the areas of information and computer security, I will write and talk about the following categories: PWN; cryptography (Crypto); network technologies (Network); reverse (Reverse Engineering); steganography (Stegano); search and exploitation of WEB vulnerabilities. […]

Announcement of the Kubernetes Web View (and a brief overview of other web UIs for Kubernetes)

Note Translation: The author of the original material is Henning Jacobs from Zalando. He created a new web interface for working with Kubernetes, which is positioned as “kubectl for the web.” Why a new Open Source project appeared and what criteria were not met by existing solutions - read his article. In this post, I review the various open source Kubernetes web interfaces […]

Questions for the future employer

At the end of each interview, the applicant is asked if there are any questions left. A rough estimate from my colleagues is that 4 out of 5 candidates learn about team size, what time to come to the office, and less often about technology. Such questions work in the short term, because after a couple of months what is important for them is not the quality of the equipment, but the mood in the team, the number of meetings […]

We don't need translation edits: our translator knows better how it should be translated

This post is an attempt to reach publishers. So that they hear and treat their translations more responsibly. During my development journey, I bought many different books. Books from a variety of publishers. Both small and large. First of all, large publishing houses that have the opportunity to invest in the translation of technical literature. These were very different books: we all […]

Porting a multiplayer game from C++ to the web with Cheerp, WebRTC and Firebase

Introduction Our company Leaning Technologies provides solutions for porting traditional desktop applications to the web. Our C++ Cheerp compiler generates a combination of WebAssembly and JavaScript, providing both a simple browser experience and high performance. As an example of its application, we decided to port a multiplayer game to the web and chose Teeworlds for this. Teeworlds is a multiplayer XNUMXD retro game […]

Habr Weekly #19 / BT door for a cat, why AI cheats, what to ask your future employer, a day with iPhone 11 Pro

In this episode: 00:38 - The developer created a door for a cat that only allows animals with a Bluetooth pass into the house, AnnieBronson 11:33 - AI was taught to play hide and seek, and he learned to cheat, AnnieBronson 19:25 - Questions for a future employer, Milording 30:53 — Vanya shares his impressions of the new iPhone and Apple Watch During the conversation, we mentioned (or really wanted to) […]

Modern methods for describing functional requirements for systems. Alistair Coburn. Review of the book and additions

The book describes one method for writing part of a problem statement, namely the use case method. What it is? This is a description of the user interaction scenario with the system (or with the business). In this case, the system acts as a black box (and this makes it possible to divide the complex design task into designing interaction and ensuring this interaction). At the same time, notation standards are introduced, which [...]

“Burn, burn brightly until it goes out”, or What is fraught with emotional burnout of your employees

How I wanted to figure out what was cheaper - to fire a burnt-out employee, to “cure” him, or to try to prevent burnout altogether, and what came of it. Now a short introduction to where this topic came from. I've almost forgotten how to write. At first there is no time; then it seems like everything you can/want to write about is obvious, and then you hear a story from […]