In this note, we discuss the Instant Digital Signature (IDS) mode, which was announced earlier. While the main content of the IDS mode was already disclosed in a previous publication, we believe that additional specifications will improve understanding. Read more Read more ›
0
The article was prepared for the Aha'22 conference and propose framework for market price optimisation problem. I have recently been working on it in Yandex Market, so here I tried to point out a number of things that seems important for me in the context of this problem. Previously, I was engaged in tasks related to Machine Learning (ML) in advertising technologies, and a year ago the topic of pricing... Read more ›
0
BackgroundAs a product manager with over a decade of experience, I'm always looking for new ways to enhance my skills and help other product managers advance in their careers. One area that many companies focus on during the job interview process is analytical and creative problem-solving. And as product managers, we encounter these types of challenges on a daily basis. It's important to stay sharp and continuously develop our problem-solving... Read more ›
0
Привет! Сегодня хочу поделиться идеей нового языка на смену Erlang - читатели хабра всё должны узнавать из первых рук! Это язык для платформы BEAM, предположительно - транслируемый в Erlang source-to-source. Семантически, он максимально совместим с эрлангом, на уровне библиотек - тоже.Berry-lang поддерживает статическую типизацию (опционально), однако типы в нём - не главное. Главное - это приятный синтаксис, о чём свидетельствует его ягодное название. Кстати, о названии: помимо того, что оно... Read more ›
0
This is the first post in a series on Business Process Management (BPM). Having worked as a business analyst and product manager in various companies ranging from middle-sized startups to big corporations, I have observed differences in approaches to business process management - from almost complete disregard to excessive attention. So, I decided to share my views on the topic, why I think BPM is important, especially when a company... Read more ›
0
Let's take a deeper look at the Q1 2023 DDoS attacks mitigation statistics and observations from Qrator Labs' perspective. Read more Read more ›
0
The point of this article is to explore Lambda functions, their dirrerences from regular functions and how they are implemented, based on C++, Python and Java programming languages.Throughout this article I will be using godbolt.org to compile code and see machine code or byte code. Read more Read more ›
0
Every day a new neural network appears and every day more opportunities are opened to designers to simplify their workflow. Someone fundamentally refuses to use them, because “there is no life in machinex and technologies”, and someone is only happy to find a way to reduce the amount of work. Personally, I belong to the second type and want to share the most detailed gait on neurons I have acquired... Read more ›
0
As a programmer, building connections with industry professionals can help you in advancing your career. Whether you're looking for a new job or want to connect with industry professionals, networking can help you achieve your goals. In this article, we'll examine the importance of networking for programmers and share practical tips and techniques for making strong connections in the programming community. From attending industry events to exploiting social media for... Read more ›
0
As many times before, I keep writing cheat sheets after the tasks which made me search a lot and glue things together before I found a solution. Long story short, this time I was asked to set up Google SSO for Kibana without switching from a basic license to a paid one. Kibana, by the moment, already had authentication set up and the customer wanted to log in there with... Read more ›
0
It takes a lot of time and effort to develop a game. Finding and fixing errors before the release is one of the most crucial stages of the whole process, and the bigger your project is, the more people are usually involved in testing. Even the most uncomplicated games require a proper and thorough examination by QAs. The processes are automated to provide high-level project maintenance by increasing testing speed... Read more ›
0
С помощью Apache Kafka мы в Авито гарантируем соблюдение контрактов публикуемых событий. Рассказываем, как мы переработали архитектуру и сделали работу с Kafka удобнее и надёжнее.Мы можем пережить даже полный отказ дата-центра. Почему — тоже расскажем в этой статье. Read more Read more ›
0
With each release, PHP is getting faster, and when JIT (Just-In-Time) compilation is enabled, it reaches almost the same C marks.Many people at one time probably had a desire to easily write console and window applications. The guys of Runet sometimes wrote irreplaceable applications for solving small tasks and shared them on forums, although some of them contained small bugs. However, times are changing, and people have begun to realize... Read more ›
0
The life of Langton's Ant seems sad and lonely, but, as we'll discover, he is not ready to put up with such an outrageous situation and is trying his best to escape. American scientist Christopher Langton invented his ant back in 1984. Since then, no one has been able to explain the strange behavior of this mysterious model... Read more Read more ›
0
In Swift, when working with objects, it’s important to manage memory correctly. One way to do this is by using weak references to avoid retaining objects too long and causing memory leaks. In this article, we will discuss how to create an array of weak references in Swift using a generic wrapper. Read more Read more ›
0
In this post I'll share my experience in adjustment of WiFi physical channel. The channel was implemented on a software defined radio (SDR) platform. WiFi looks like a very complicated thing standardized over hundreds of pages. Could a non-expert with a PC and a couple of 100$ devices (HackRFs) somehow improve it? Here I try to develop a WiFi optimization approach basically agnostic of protocol implementation details. There's some math... Read more ›
0
Cruel time. Nothing I can do.I needed positive emotions. Distract myself, do some useless work.Coding a game might help. Read more Read more ›
0
Reasons to write article: at the moment investigation is in a progress. Some of collected&tested info will be usefull for other. May be someone will add some tips. thank you.There is a task to develop a solution that allows: - keep users/groups in the some one directory - based on this information: 1. Access control to web applications via #oidc /#saml 2. Access control to vanilla #kubernetes. 3. SSH-access control... Read more ›
0
On the Internet and in non-fiction literature you can often find various mathematical tricks. The Collatz conjecture leaves all such tricks behind. At first glance, it may seem like some kind of a trick with a catch. However, there is no catch. You think of a number and repeat one of two arithmetic operations for it several times. Surprisingly, the result of these actions will always be the same. Or,... Read more ›
0
Most popular sources
Business Insider | 30% 12 |
Gizmodo | 15% 10 |
Tom's Hardware | 10% 7 |
Eurogamer.net | 7% 0 |
MacRumors | 6% 2 |
View sources » |
LIKE us on Facebook so you won't miss the most important news of the day!
05.10.2024 10:29
Last update: 10:20 EDT.
News rating updated: 17:21.
What is Times42?
Times42 brings you the most popular news from tech news portals in real-time chart.
Read about us in FAQ section.