Heading: Blog

About the localization of products. Part 2: how is the price formed?

In the second part of the article by our technical writer Andrey Starovoitov, we will look at how exactly the price for the translation of technical documentation is formed. If you don’t want to read a lot of text, immediately look at the “Examples” section at the end of the article. The first part of the article can be found here. So, you have roughly decided with whom you will collaborate on software translation. One of the most important points [...]

The rarest and most expensive programming languages. Part II

Recently, for Habr readers, I conducted a small study of programming languages ​​such as Rust, Dart, Erlang to find out how rare they are in the Russian IT market. In response to my research, more comments and questions regarding other languages ​​poured in. I decided to collect all your comments and conduct another analysis. The languages ​​included in the study: Forth, […]

Catch Me If You Can. Birth of a King

Catch Me If You Can. That's what they say to each other. Directors catch their deputies, they catch ordinary employees, each other, but no one can catch anyone. They don't even try. For them, the main thing is the game, the process. This is the game they go to work for. They will never win. I will win. More precisely, I have already won. AND […]

CERN abandons Microsoft products in favor of open source software

The European Center for Nuclear Research (CERN) introduced the MAlt (Microsoft Alternatives) project, which is working to move away from the use of Microsoft products in favor of alternative solutions based on open source software. Among the immediate plans, the replacement of “Skype for Business” with a solution based on an open VoIP stack and the launch of a local email service to avoid using Outlook are noted. The final […]

Google justified the limitation of the webRequest API used by ad blockers

The developers of the Chrome browser tried to justify the cessation of support for the blocking mode of operation of the webRequest API, which allows you to change the received content on the fly and is actively used in add-ons for blocking advertising, protection against malware, phishing, spying on user activity, parental controls and ensuring privacy. Google's motives: The blocking mode of the webRequest API leads to high resource consumption. When using this […]

Windows Insider builds with WSL2 subsystem (Windows Subsystem for Linux) published

Microsoft has announced the formation of new experimental builds of Windows Insider (build 18917), which include the previously announced WSL2 (Windows Subsystem for Linux) layer, which ensures the launch of Linux executable files on Windows. The second edition of WSL is distinguished by the delivery of a full-fledged Linux kernel, instead of an emulator that translates Linux system calls into Windows system calls on the fly. Using a standard kernel allows [...]

Release of atomically updated native Endless OS 3.6 distribution

The Endless OS 3.6.0 distribution kit has been prepared, aimed at creating an easy-to-use system in which you can quickly select applications to suit your taste. Applications are distributed as self-contained packages in Flatpak format. Suggested boot images range in size from 2GB to 16GB. The distribution does not use traditional package managers, instead offering a minimal, atomically updated base system […]

A version of Astra Linux for smartphones is being prepared

The Kommersant publication reported on Mobile Inform Group's plans in September to release smartphones and tablets equipped with the Astra Linux operating system and belonging to the class of industrial devices designed to work in harsh conditions. No details about the software have been reported yet, except for its certification by the Ministry of Defense, FSTEC and FSB for processing information to the […]

Bulk attack on vulnerable Exim-based mail servers

Security researchers at Cybereason have alerted email server administrators to the discovery of a massive automated attack exploiting a critical vulnerability (CVE-2019-10149) in Exim discovered last week. During the attack, attackers achieve execution of their code with root rights and install malware on the server for mining cryptocurrencies. According to the June automated survey, Exim's share is 57.05% (year […]

Rostelecom and Mail.ru Group will help develop digital school education

Rostelecom and Mail.ru Group announced the signing of an agreement on cooperation in the field of digital school education. The parties will develop information products designed to modernize the educational process in Russian schools. These are, in particular, communication services for schools, teachers, parents and students. In addition, there are plans to develop a new generation of digital diaries. As part of the agreement, Rostelecom […]

Video: Ubisoft talked a little about the creation of the Rainbow Six Quarantine co-op

The leaks made on the eve of the Ubisoft press conference turned out to be reliable - the French company actually presented the shooter Rainbow Six Quarantine in a small gloomy video. Following the cinematic teaser and scant information, the developers shared a “Behind the Scenes” video, in which Quarantine’s lead game designer Bio Jade talked about the creation of the project. Rainbow Six Quarantine is a tactical cooperative shooter designed for a team of three players. […]

Corporate wars: Beeline subscribers complain about the low speed of access to Mail.ru Group services

Today, information appeared on Beeline’s VKontakte page that the company’s subscribers have problems accessing Mail.ru Group services. They began on the 10th and were expressed in a decrease in the speed of access to VKontakte, Odnoklassniki, Yulia, Delivery Club, and so on. The operator suggested that users change services, and Mail.ru Group advised them to change the operator and […]