1. The purpose of the IT product Telepathy – the brain-computer interface of NueralinkThe UN General Assembly Resolution of 22.03.2024 No. A/78/L.49 “Harnessing the Potential of Safe, Secure and Trustworthy Artificial Intelligence Systems for Sustainable Development” [1] confirms (paragraph 5) that"human rights and fundamental freedoms must be respected, protected and encouraged throughout the life cycle of artificial intelligence systems"and to all Member States of the United Nations and, where appropriat Read more ›
0
In the modern world, the term " **blockchain** " is steadily associated with cryptocurrencies, NFTs, mining, trading and financial pyramids. However, even among programmers and IT people there is not always a clear understanding of what it is and what it is for. This article attempts to look at this still relatively new element of the information and human space in practical and slightly philosophical aspects. > **Disclaimer**: The article... Read more ›
2
Queries in PostgreSQL. Index scanIn previous articles we discussed query execution stages and statistics. Last time, I started on data access methods, namely Sequential scan. Today we will cover Index Scan. Read more → Read more ›
0
Привет! Меня зовут Дарья, я Flutter-разработчик уровня Junior и это моя первая публикация на Хабре.Знаете, создавать новый проект всегда приятно — новая кодовая база, отсутствие legacy (пока что), null-safety, свежие версии ваших любимых пакетов и далее, далее, далее.Однако в начале проекта вы должны принять несколько важных решений: выбрать инструменты и пакеты для приложения, определить решение для управления состоянием, разработать план тестирования. В противном случае проект из красивой кареты превратит Read more ›
0
In this guide, I'd like to share with you tips and tricks about ActiveRecord preloading and how you can enhance it to the next level. Read more Read more ›
0
A similar article should have appeared earlier, about ten or fifthteen years ago, when Agile was just starting to be implemented in companies. How many mistakes, problems, conflicts could be avoided if managers immediately approached the issue correctly ...But during this time, the experience of "implementing" Agile in different conditions, in different companies has accumulated, which should be generalized and widely disseminated. Read more Read more ›
0
Всем привет! Недавно мы решили задачу, как перейти на новую версию Spring + OpenFeign в мультимодульном проекте, в котором выделен API с навешенными аннотациями @FeignClient@RestController и @FeignClient. Я, Алексей Скакун, @hyragano ведущий разработчик ДОМ.РФ, поделюсь с вами этим кейсом. Читать далее Read more ›
0
Today we're talking multi-factor authentication, also known as two-factor authentication, and 2-step verification. It's got a few names but what is it?Well, essentially it's proving your identity in more than one way. The principle being that if one of these authentication factors is defeated, that's not enough to give access to your data. So your data should be secure if someone steals your password for example. It's not enough to... Read more ›
0
Sometimes programming with mutexes gets too complicated and messy. Maybe you need to meet a new friend — the Event Loop pattern. Read more Read more ›
0
According to the no-cloning theorem it is impossible to create an independent and identical copy of an arbitrary unknown quantum state. We cannot delete any quantum information as well. All changes in time of the state vector in quantum mechanics are described by the action of unitary operators. Accordingly, there must be an operator performing a deleting operation. The operator must be a zero matrix in order to nullify quantum... Read more ›
0
Всем привет! Хочу поделиться новостями о том, как развивается BI-платформа в inDriver. Сегодня расскажу, как мы внедрили программу обучения Tableau в компании, чтобы развивать нашу self-service аналитику и децентрализовать процесс анализа данных. Перед тем, как начать рассказ про наш тернистый путь из проб, ошибок и успехов, хочу сделать небольшое лирическое отступление о том, из каких больших структурных блоков состоит наша BI-платформа. Их 3 — архитектура, self-service и репортинг. Подробнее о... Read more ›
0
This article discusses the lexical analyzer, which is an integral part of any compiler. The task of the lexical analyzer is to split the source code of the program into tokens. So for example the codeprint(1 + 2) will be tokenized asprint, (, 1, +, 2 and )Read more → Read more ›
0
N1Loader is designed to provide a simple way for avoiding N+1 issuesof any kind. Gladly, it's super easy to integrate with your GraphQLAPI. Without further delay, let's look at a simple but yet detailedexample. Read more Read more ›
0
Different navigation message protocols are used for different navigation signal type. This is true even for a single system like NAVSTAR GPS. For example, L1C/A signals have a LNAV protocol, while L2C and L5 signals utilize a CNAV protocol. The newest L1C signal will use CNAV-2. The protocol defines a data distribution into frames, subframes, the subframes structure, transmission intervals, data resolution and so on. A navigation receiver use the... Read more ›
0
В марте 2010 года были популярны в том числе и на Хабре, бесплатные хостинги картинок: собственного сервиса habrastorage.org у сайта ещё не было, а по форумам была довольно популярной услуга — опубликовать картинку на стороннем сервисе и показать её в статье или в комментарии. Возник вопрос — много ли таких сервисов в природе, чтобы бесплатно и главное — без регистрации, позволяли бы достаточно надёжно публиковать картинки, в основном, не требуя... Read more ›
0
Positive Hack Days 11 will begin in a matter of weeks. This international forum on practical security will be held on May 18–19 in Moscow. The red and blue teams for The Standoff have already been formed, and we are putting the finishing touches to the cyberrange infrastructure and the conference program.As per tradition, PHDays will have three big tracks dedicated to countering attacks (defensive), protection through attack (offensive), and... Read more ›
0
So you want to learn more about game engines and write one yourself? That's awesome! To help you on your journey, here are some recommendations of C++ libraries and dependencies that will help you hit the ground running. Read more Read more ›
0
Hearing is one of the few basic senses that we humans have along with the other our abilities to see, smell, taste and touch. If we couldn't hear, the world as we know it would be less interesting and colorful to us. It would be a total silence - a scary thing, even to imagine. And speaking makes our life so much fun, because what else can be better than... Read more ›
0
The first quarter of the year 2022 has passed; now, it is time to look at the events of Q1 in terms of mitigated DDoS activity and recorded BGP incidents. Read more Read more ›
0
Some time ago we discussed how to easy and fast setup 2FA using Google Authenticator API. In this article we describe how to make this working using Microsoft Authenticator app! Read more Read more ›
0
In-app messages are targeted notifications sent to customers/ users while they are active on the website or mobile application. They are a very effective way to engage customers as they are already within the application looking for specific information. In-app chat applications help connect better with the users and improve user retention as they are timely and targeted. Read more Read more ›
0
Most popular sources
Business Insider | 28% 9 |
Eurogamer.net | 10% 6 |
Tom's Hardware | 9% 0 |
Gizmodo | 8% 1 |
CNET | 8% 3 |
View sources » |
LIKE us on Facebook so you won't miss the most important news of the day!
25.11.2024 08:42
Last update: 08:37 EDT.
News rating updated: 15:30.
What is Times42?
Times42 brings you the most popular news from tech news portals in real-time chart.
Read about us in FAQ section.