Understanding why modern LLMs, despite all their power, remain "philosophical zombies," and what architectural detail could change this. Everything discussed in this article can be tested with your AI using the VORTEX Protocol prompt found in the article's appendix. Read more Read more ›
6
This article continues the series of articles on load tests. Today we will analyze the testing methodology and answer the question: "How many IP cameras can be connected to a WebRTC server?" Read more Read more ›
0
Knowing parameters of small-signal control-to-output transfer functions makes it easier for engineers to design compensation networks of DC/DC converters. The equations for SEPIC can be found in different works and Application Notes, but there are differences. A work has been done to solve this problem.Simplified design equations for SEPIC with Current Mode control (CM) in Continuous Conduction Mode (CCM) suitable for practical design of compensation networks are shown. Read more Read more ›
0
With this API implementing two factor authentication (2FA) is easier than ever. Just in 5 minutes I’ll guide you how to generate and validate time-based one-time passwords (TOTP) for second factor authentication (2FA) in fast and secure manner. Read more Read more ›
0
Hello!This post is about writing a fast enumerator in C#:foreach (var i in 1..10)We will figure out whether it's possible to make it as fast as for, and what can we do to improve our performance.A lot of benchmarks and sharplab coming. Let's rock! Read more Read more ›
0
It has been a year since most of our life has become online. We at ISPsystem are used to working from the office and seeing all team members every day at arm's length. I adapted quickly to the new format. However, I will be honest; working remotely is not as easy as it may seem from the outside. Many fail to cope. The lack of live communication and the too... Read more ›
0
Not everyone enjoys working in support. Many people who work there experience burnout. So maybe companies shouldn't have any support at all? How do they benefit from it? Is there a way to prevent burnout while working in support? Let's try to find the answers. Read more Read more ›
0
In this article, I am going to look at Redis versus Tarantool. At a first glance, they are quite alike — in-memory, NoSQL, key value. But we are going to look deeper. My goal is to find meaningful similarities and differences, I am not going to claim that one is better than the other. There are three main parts to my story:We’ll find out what is an in-memory database, or... Read more ›
0
Do you remember how just a few years ago it was a disaster to lose a camera at the end of a vacation? All memorable pictures and videos then disappeared along with the lost device. Probably, this fact prompted the great minds to invent cloud storage, so that the safety of records no longer depends on the presence of the devices on which these records are made. Read more Read more ›
0
The blog post demonstrates flexibility of the Company Structure in Employee Central when replicating complex SAP ERP HCM Organizational Structures. Read more Read more ›
0
IaC Development Life CycleЭто расшифровка выступления на T-Meetup: DevOps Life Cycle.Осмелюсь предположить, что многие слышали про SDLC (Systems development life cycle). Но что, если все то же самое происходит с IaC? Read more → Read more ›
0
We continue to review variants of load tests. In this article we will go over the testing methodology and conduct a load test that we will use to try and determine the number of users that could watch and stream at the same time, meaning the users will simultaneously publish and view the streams. Read more Read more ›
32
On August 25th, 2021, the Linux kernel celebrated its 30th anniversary. Since then, it's changed a lot. We changed too. Nowadays, the Linux kernel is a huge project used by millions. We checked the kernel 5 years ago. So, we can't miss this event and want to look at the code of this epic project again. Read more Read more ›
96
Есть две технологии в ИТ, которые казалось должны были исчезнуть на рубеже прошлого века, но их живучесть и удобство раз за разом отодвигает их уход со сцены. Речь идет об IPv4 и X11. Если первый из них практически во всех аспектах уступает IPv6, то преимущества Wayland, как технологии над X11 очевидны не всем. Wayland вовсе не универсален, как X Windows System, он намного более прост. Это дает ему ряд преимуществ... Read more ›
447
XSS - or cross-site scripting - is one of the most common vulnerabilities in web applications. It has been on the OWASP Top 10 list (the list of the most critical security risks to web applications) for a while now. So let's figure out together how your browser can acquire and execute a script from a third-party website, and what this may lead to (spoiler: your cookies could get stolen,... Read more ›
110
This article is a continuation of our series of write-ups about load tests for our server. We have already discussed how to compile metrics and how to use them to choose the equipment, and we also provided an overview of various load testing methods. Today we shall look at how the server handles stream mixing. Read more Read more ›
217
In my project, I was faced with the need to implement a scroll bar. The standard approaches didn't fully satisfy what designers wanted to see. Here is an example, it is slightly different in appearance from what I needed, but the essence is approximately the same: the scroll bar should be on the right side of the list and take into account the padding of the scroll bar, with the... Read more ›
0
It seems that the problem of calculating the absolute value of a number is completely trivial. If the number is negative, change the sign. Otherwise, just leave it as it is. In Java, it may look something like this:public static double abs(double value) { if (value < 0) { return -value; } return value; }It seems to be too easy even for a junior interview question. Are there any pitfalls... Read more ›
344
So, I finally found a moment to write a bit about how we created the water for TReload. Our basic goal was to flood all of the levels with acid - a lot of acid, as the flooded area is massive :) Here’s one of the results which we got out of this process: Read more Read more ›
0
The The Open Network (TON) is a fast, secure and scalable blockchain and network project, capable of handling millions of transactions per second.It was originally introduced by Telegram and called Telegram Open Network. Unfortunately, in May 2020, they announced the closure of the project due to the US court decision. Right after that, three different organizations announced their intentions to continue work on the blockchain: TON Labs, NewTON (TON Foundation),... Read more ›
0
In one of the previous articles, I’ve already written about the hybrid monitoring system from Monq. Almost two years have passed since then. During this time, Monq has significantly updated its functionality, a free version has appeared, and the licensing policy has been updated. If monitoring systems in your company start to get out of control, and their number rushes somewhere beyond the horizon, we suggest you take a look... Read more ›
301
Most popular sources
![]() |
13% 4 |
![]() |
13% 7 |
![]() |
12% 6 |
![]() |
8% 2 |
![]() |
8% 0 |
View sources » |
LIKE us on Facebook so you won't miss the most important news of the day!
11.07.2025 07:54
Last update: 07:46 EDT.
News rating updated: 14:42.
What is Times42?
Times42 brings you the most popular news from tech news portals in real-time chart.
Read about us in FAQ section.