Directory of RSS feeds
Statistics

RSS feeds in the directory: 374

Added today: 0

Added yesterday: 0

Hi-Tech / Other

Habrahabr / Interesting / topical publications

Interesting publishing of thematic hubs on habrahabr

Other RSS feeds of this site

The best publications per day

Found 1633 items

Ten years ago was announced systemd which made a revolution in the management of Linux distributions, thereby dividing Linux users at several camps. The quality and nature of debate is not much improved since the flame wars in the period 2012-2014, and systemd is still not fully understood and studied the instrument with both the technical and public side, despite much attention to it community. This post is not quite about how to use systemd. Here, rather, will speak about the history of its origin, its components in General, and how to understand the system, which started as PID 1 and just became what I would call the middleware modern Linux distribution. maybe it's just a set of very free translations of various materials with blogs, channels and...

In recent years, JavaScript is evolving very quickly. This is especially true for the period following the release of the standard ES6 in 2015. Since in language there are many wonderful opportunities. Many new things were proposed for inclusion in the standard ES2020. Already formed the final list of possibilities, the appearance of which can be expected in the standard after its approval. This is good news for all fans of JS. The author, a translation of which we are releasing today, says that among these possibilities there are, which he especially delighted. Before that, he, in those situations in which they are applicable, it is much harder to write code. According to him, they appear in the language before, they would have saved him a lot of time and...

Who would have thought. Using the app Untappd (users set rating beer), you can track the history of the movement of troops. This social network has more than eight million users, mostly from Europe and North America. Its features allow you to reveal confidential information about users serving in the military and intelligence forces worldwide. the Willingness to skip the glass or other member or usage of social networking in itself is hardly interesting. However, Untappd users register hundreds, often thousands of geographic labels indicating the time when they were there. These places are carefully sorted by more than 900 categories as diverse as specifying, for example, "Botanical garden", "Strip club", "Gay bar", "restaurant Western cuisine" or "waiting...

July 12, 2018 saw the light first commit of the project :telemetry. The author of the commit — Mr. Gil, but the README claims that copyright © 2018 Chris McCord and Erlang Solutions and the latest commit as of today was made by Jose Walima. Library is as follows: Telemetry is a dynamic library of scheduling metrics and tools. It is lightweight, small size, and can be used in any project, erlang or elixir. the Main advantage of libraries is that it is really very simple. You simply register an event that "consists of numeric values and metadata attached", and just send the appropriate message whenever you need it. The message will be delivered to the handler, which can do anything; usually it's logging or something like that. The separation of business logic...

The best known algorithm for finding all Prime numbers not greater than specified, the sieve of Eratosthenes. It works fine for numbers up to billions, perhaps tens of billions, if carefully written. However, anyone who likes to have fun with simple numbers, knows that they always want to have on hand as much as possible. I once to solve one problem on hakurankai needed in-memory database of Prime numbers up to a hundred billion. At maximum optimization for memory, if the sieve of Eratosthenes to provide an odd number of bit array, the size is about 6 gigabytes, the memory of my laptop does not fit. There is a modification of the algorithm is much less demanding on memory (dividing the original range into several pieces and process one piece at a time...

May 11, in our instagram account went live with Alexander Karasinym. Share the record of ether, and the transcript of the interview. Good afternoon. I am the founder and CEO of Last.Backend, we develop technologies for the orchestration of the containerized apps. A couple of years ago, we launched a version of the popular technology Kubernetes, on which is built the modern Internet. We've come quite a long way – started in 2014, when the version of Docker was 0.2, and about the containerization of the few who knew. In the Russian market we are virtually unknown. Not so long ago we launched DevOps As a Service – we don't just create technology and product management containerservices infrastructure, but also provide a full service. We create the...

Hello Habr. the Board ESP32 very popular due to low prices, decent computing power (processor 200MHz), advanced SDK with support for both MicroPython and the Arduino IDE, the presence of GPIO c supporting peripherals (SPI, I2C, etc.) and wireless communication (WiFi, Bluetooth). Today we will see what we can do in this Board the price of just about$12. , We consider different variants of Wi-Fi use, from simple connection to the network before the Wi-Fi sniffer. For tests need any Board ESP32 (preferably with an OLED screen like the picture) and the Arduino IDE. For those who are interested how it works, the continuation under the cut. Read more →

PuppetConf 2016. Kubernetes for system administrators. Part 1 PuppetConf 2016. Kubernetes for system administrators. Part 2 We take the application from Lobsters and create a new image with the new requirements. First, enter the command deploy $ kubectl apply –f deployments/lobsters.yaml and send the application to the cluster, which needs to upgrade rolling update for each of the existing instances of the application in accordance with the policy updates. First, the system verifies the health of each instance and then destroys them on the next set of containers. let's See how it worked. To do this, reload the website and now the lack of white places will make our marketer happy. Read more →

Winston Churchill is one of the most known politicians of the XX century. His achievements in the state field — an example for imitation of many young politicians. Churchill reached almost the highest level in oratory. His speech discussed even 80 years after they were uttered. Part of the reason is, as the Prime Minister of great Britain uses the English language like juggling with words and meanings. Let's see, what's so special about the speeches of Churchill and how to learn to speak English the way he does. Read more →

Essay by Isaac Asimov on creativity from 1959. Isaac Asimov (1920-1992) American author and Professor of biochemistry at Boston University, known as the author of science fiction and popular science works. Asimov is considered one of the "big three" science fiction writers of his time along with Robert Heinlein and Arthur Clarke. Note Arthur Obermayer, a friend of the author: In 1959, I worked as a scientist at Allied Research Associates in Boston. The company was a product of MIT and initially studied the effects of nuclear weapons on aircraft design. The company signed a contract with ARPA abbreviation GLIPAR (Guide Line Identification Program for Antimissile Research) with the aim of identifying the most creative approaches to the creation of a missile...

Greetings, Harrowdene! In 2020, the year we all know what the Internet of Things and why you need it. But how many of us are familiar with cloud platforms, which represent one of the most important layers in the IoT? Let's deal. it is No secret that the heterogeneity of the protocols significantly complicates the process of connecting smart devices, their configuration and data processing. Such problems are solved thanks to cloud platforms, the Internet of Things. Today for example one of the Russian platforms of the Internet of things, I'll show you how easy it is to connect devices with different protocols, and to use the resulting information for the construction of automation processes. In the platform, which I usually use for those tasks, already...

In the context of the pandemic of novel coronavirus infection have increasingly raised the issue of compulsory vaccination and tighter control from the government. Discusses the introduction of passports for vaccines and immunization [1]. And it seems that by the time you receive an effective vaccine from COVID-19, many States will face the need to reconsider its policy on these issues. In this article I propose to examine the data for global studies the politics of vaccination in different countries and also try to outline the main factors that can influence the effectiveness of different approaches. Read more →

This is the second part "series" about the Russian school education and the ability of IT to improve it in different areas. Those who have not read it, I recommend to start with the first part. I have to warn you this article is not about the optimal choice of subjects for the exam and not about holivar between "pitching" and "nerds". It is, for the most part, about honesty and efficiency. In the end, a little opinion poll. Disclaimer: I Write imaginatively, at length, sometimes puts in radicalism. Conservatives of all stripes to read is not recommended. Do not say I did not warn you. Ready to add a bit of radicalism in the established routine? Ready!

Programmer spends many hours on the development of a functional and code to reflect best practice techniques adopted in the given environment. In these hours should not include regular writing template designs. The programmer can greatly help yourself in the proper organization of work, freeing yourself from unnecessary Affairs and investing time in learning the right tools. Good help can be and knowledge about valuable resources, a list of which is always useful to keep on hand. the author of the material, the translation of which we published today, proposes to consider several GitHub repositories, which, if sometimes to look at them, will allow web developers to improve your knowledge and skills will assist in writing better code, will help you to work...

This article describes a simple and understandable steps for implementing the threat modeling approach to the design of secure systems based on risk assessment. The approach is based on the definition of threats, to enable developers to prepare them. With the growth of cyber threats and the desire of companies to save their money to teams of developers require effective methods of protection. Unfortunately, the introduction of threat modeling often takes place with difficulty. Many methodologies require complex and comprehensive analysis which is not compatible with the modern teams. So instead to stop for the sake of creating an ideal model of threats, I recommend to start small and gradually expand. Read more →