You may have already read a recent article about the first PVS-Studio run and filtration of warnings. We used the GTK 4 project as an example. It's about time we worked with the received report in more detail. Our regular readers may have already guessed that this article will be a description of errors found in the code. Read more β Read more βΊ
0
You may have already read a recent article about the first PVS-Studio run and filtration of warnings. We used the GTK 4 project as an example. It's about time we worked with the received report in more detail. Our regular readers may have already guessed that this article will be a description of errors found in the code. Read more β Read more βΊ
0
The PVS-Studio analyzer is regularly updated with new diagnostic rules. Curiously enough, diagnostics often detect suspicious code fragments before the end of the work. For example, such a situation may happen while testing on open-source projects. So, let's take a look at one of these interesting finding. Read more Read more βΊ
0
In 2013 Canonical tried to crowdfund Ubuntu Edge smartphone. Its main feature could be the ability to use the smartphone as a full-fledged PΠ‘. Unfortunatly, the crowdfunding campaign did not accumulate enough money, so a dream of having a universal device remained to be the dream.I've been searching for universality, too, on the software side, not the hardware one. Today I can confidently say I found the necessary combination: Git... Read more βΊ
0
Home of this article: https://robotics.snowcron.com/coins/02_head_or_tail.htmThe global objective of these articles is to build a coin classifier, capable of scanning your pocket change and find rare / valuable coins. This is a second article in a series, so let me remind you what happened earlier (https://habr.com/ru/post/538958/). During previous step we got a rather large dataset composed of pairs of images, loaded from an online coins site meshok.ru. Those images were uploaded... Read more βΊ
0
Hey everyone! This post was born from a question asked by an IT forum member. The summary of the question looked as follows: There is a set of text files containing routing tables collected from various network devices. Each file represents one device. Device platforms and routing table formats may vary. It is required to analyze a routing path from any device to an arbitrary subnet or host on-demand. Resulting... Read more βΊ
0
AngelList is a social network designed to connect startups with investors and vice versa. The founders of it were dissatisfied with how opaque the VC world was, and built a transparent online funding network to increase the amount of available data. This drastically improves the price-setting process, and allows startups to find the best investors for their business. The project began in partnership with just 50 volunteer investors wishing to... Read more βΊ
0
All Prometheus metrics are based on time series - streams of timestamped values belonging to the same metric. Each time series is uniquely identified by its metric name and optional key-value pairs called labels. The metric name specifies some characteristics of the measured system, such as http_requests_total - the total number of received HTTP requests. In practice, you often will be interested in some subset of the values of a... Read more βΊ
0
What is distributed tracing? Distributed tracing is a method used to profile and monitor applications, especially those built using a microservices architecture. Distributed tracing helps pinpoint where failures occur and what causes poor performance.Letβs have a look at a simple prototype. A user fetches information about a shipment from `logistic` service. logistic service does some computation and fetches the data from a database. logistic service doesnβt know the actual status... Read more βΊ
0
Hi, Habr. Here I have prepared for you a small guide about NTFS Reparse points (hereinafter RP), reparse points. This article is for those who are just starting to into the Windows kernel drivers development. In the beginning, I will explain the theory with examples, then I will give an interesting task to solve.Read more β Read more βΊ
0
This is the third part of a series covering the implementation of algorithms in Go. In this article, we discuss the Merge Interval algorithm. Usually, when you start learning algorithms you have to deal with some problems like finding the least common denominator or finding the next Fibonacci number. While these are indeed important problems, it is not something that we solve every day. What I like about the Merge... Read more βΊ
0
As we enter a new decade, the IT industry has also encountered many loopholes that we must work on. Seeing this, hundreds of motivated young minds have decided to become entrepreneurs. But is it so easy to succeed in a world where competition is already so high? Bluntly, the answer is NO. It is not easy to be successful, and the reason for these startups' failure is the lack of... Read more βΊ
1
This article is about security. Iβll focus on this in the context of web applications, but Iβll also touch on other types of applications. Before I describe approaches and frameworks, I want to tell you a story.BackgroundThroughout my years working in the IT sphere, Iβve had the opportunity to work on projects in a variety of fields. Even though the process of authenticating requirements remained relatively consistent, methods of implementing... Read more βΊ
0
See more at robotics.snowcron.com This is the first article in a serie dedicated to coins classification.Having countless "dogs vs cats" or "find a pedestrian on the street" classifiers all over the Internet, coins classification doesn't look like a difficult task. At first. Unfortunately, it is degree of magnitude harder - a formidable challenge indeed. You can easily tell heads of tails? Great. Can you figure out if the number is... Read more βΊ
0
If you feel like the New Year just came, and you missed the first half of January, then all this time you've been busy looking for tricky bugs in the code you maintain. It also means that our article is what you need. PVS-Studio has checked the ELKI open source project to show you errors that may occur in the code, how cunningly they can hide there, and how you... Read more βΊ
0
ΠΡΠΎ ΡΡΠ΅ΡΡΡ ΡΠ°ΡΡΡ ΡΠ°ΡΡΠΊΠ°Π·Π° ΠΏΡΠΎ ΠΎΠΏΡΠΈΠΎΠ½Ρ, Π³Π΄Π΅ ΠΌΡ ΠΏΠΎΠ³ΠΎΠ²ΠΎΡΠΈΠΌ ΠΏΡΠΎ Π±ΠΈΠ½ΠΎΠΌΠΈΠ°Π»ΡΠ½ΡΡ ΠΌΠΎΠ΄Π΅Π»Ρ, ΡΠΈΡΠΊ-Π½Π΅ΠΉΡΡΠ°Π»ΡΠ½ΡΡ ΠΌΠ΅ΡΡ ΠΈ ΡΠ°Π·Π±Π΅ΡΡΠΌΡΡ, ΠΊΠ°ΠΊ ΡΠ°ΡΡΡΠΈΡΠ°ΡΡ ΡΠ΅Π½Ρ ΠΎΠΏΡΠΈΠΎΠ½Π°. Π§ΠΈΡΠ°ΡΡ Π΄Π°Π»Π΅Π΅ Read more βΊ
0
Π΄ΠΈΡΠΊΠ»Π΅ΠΉΠΌΠ΅ΡΡΡΠΎΡ Π΄ΠΎΠΊΡΠΌΠ΅Π½Ρ Π½Π΅ ΡΠ²Π»ΡΠ΅ΡΡΡ ΡΠΈΠ½Π°Π½ΡΠΎΠ²ΡΠΌ ΡΠΎΠ²Π΅ΡΠΎΠΌ, ΠΏΡΠΎΡΡ Π»ΠΈΡΠ½ΡΠ΅ ΠΌΡΡΠ»ΠΈ ΠΏΠΎ ΠΏΠΎΠ²ΠΎΠ΄Ρ ΠΈΠ½Π²Π΅ΡΡΠΈΡΠΈΠΉ, ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ ΠΏΠΎΡΠ΅ΠΌΡ Ρ ΠΈΠ½Π²Π΅ΡΡΠΈΡΡΡ Π² ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ, Π° Π½Π΅ ΠΊΡΠΈΠΏΡΡ/Π½Π΅Π΄Π²ΠΈΠΆ/ΠΊΡΡΡΠ΅ΡΠΊΠΈ ΠΎΡ ΠΏΠΈΠ²Π° (ΠΊΡΠΈΠΏΡΠ°, Π½Π΅Π΄Π²ΠΈΠΆ ΠΈ ΠΊΡΡΡΠ΅ΡΠΊΠΈ Ρ ΠΌΠ΅Π½Ρ, ΠΊΠΎΠ½Π΅ΡΠ½ΠΎ, Π΅ΡΡΡ): ΡΠ΅Π»Ρ ΠΊΠΎΠΌΠΌΠ΅ΡΡΠ΅ΡΠΊΠΈΡ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ β Π·Π°ΡΠ°Π±Π°ΡΡΠ²Π°ΡΡ Π΄Π΅Π½ΡΠ³ΠΈ, ΡΠ΅Π»Ρ Π²Π°Π»ΡΡΡ/ΠΊΡΡΡΠ΅ΡΠ΅ΠΊ β Π±ΡΡΡ ΡΡΠ΅Π΄ΡΡΠ²ΠΎΠΌ ΠΎΠ±ΠΌΠ΅Π½Π°, Π° Π½Π΅Π΄Π²ΠΈΠΆ/etc β Π·Π°ΠΌΠΎΡΠΎΠ·ΠΈΡΡ $ Π³Π΄Π΅-ΡΠΎ Π²ΠΎΠΊΡΡΠ³ ΠΈΠ½ΡΠ»ΡΡΠΈΠΈ, Π½Ρ ΠΈΠ»ΠΈ ΠΊΠ°ΠΊ-ΡΠΎ ΡΠ°ΠΊ, Ρ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ, Π° Π½Π΅ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΡ, ΡΠΈΠ»ΡΠ½ΠΎ Π½Π΅ Π±Π΅ΠΉΡΠ΅ Β―*(γ)*/Β― ΠΌΠΎΠΈ ΠΏΡΠΈΠ½ΡΠΈΠΏΡ ΠΈΠ½Π²Π΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΎΡ ΠΏΡΠΎΡΡΡΠ΅: Read... Read more βΊ
0
ΠΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΡ ΠΈΠ·ΠΌΠ΅Π½ΡΡΡ ΡΡΠ°Π³ΠΌΠ΅Π½ΡΡ ΠΠΠ Π²ΡΠ΅Π³Π΄Π° Π±ΡΠ»Π° ΡΠ²ΡΡΡΠΌ ΠΡΠ°Π°Π»Π΅ΠΌ Π±ΠΈΠΎΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ ΠΈ ΠΌΠ΅Π΄ΠΈΡΠΈΠ½Ρ. CRISPR ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ Π΄Π΅Π»Π°ΡΡ ΡΡΠΎ Ρ Π½Π΅Π²ΠΈΠ΄Π°Π½Π½ΠΎΠΉ ΡΠ°Π½Π΅Π΅ ΡΠΊΠΎΡΠΎΡΡΡΡ ΠΈ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡΡ. Π‘ΡΠΈΡΠ°ΠΉΡΠ΅, ΡΡΠΎ Π±ΠΈΠΎΠ»ΠΎΠ³ΠΈ ΡΠ°Π½ΡΡΠ΅ ΡΠ°Π±ΠΎΡΠ°Π»ΠΈ Π½Π° ΠΏΠΈΡΡΡΠ΅ΠΉ ΠΌΠ°ΡΠΈΠ½ΠΊΠ΅, Π° Π±Π»Π°Π³ΠΎΠ΄Π°ΡΡ CRISPR Π² ΠΎΠ΄Π½ΠΎΡΠ°ΡΡΠ΅ ΠΏΠ΅ΡΠ΅ΡΠ΅Π»ΠΈ Π½Π° MacBook. ΠΠ΅ Π·ΡΡ ΠΎΡΠΊΡΡΡΠΈΠ΅ ΡΡΠΎΠ³ΠΎ ΠΌΠ΅ΡΠΎΠ΄Π° Π² 2020 Π³ΠΎΠ΄Ρ ΡΠ΄ΠΎΡΡΠΎΠΈΠ»ΠΎΡΡ ΠΠΎΠ±Π΅Π»Π΅Π²ΡΠΊΠΎΠΉ ΠΏΡΠ΅ΠΌΠΈΠΈ ΠΏΠΎ Ρ ΠΈΠΌΠΈΠΈ.ΠΠΎΠ΄ ΠΊΠ°ΡΠΎΠΌ β ΡΠ°ΡΡΠΊΠ°Π· ΠΎ ΠΏΠΎΡΠ²Π»Π΅Π½ΠΈΠΈ CRISPR, ΠΏΡΠΈΠ½ΡΠΈΠΏΠ°Ρ ΡΠ°Π±ΠΎΡΡ ΠΈ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠΈ Π² Π½Π°ΡΡΠΎΡΡΠ΅ΠΌ ΠΈ Π±ΡΠ΄ΡΡΠ΅ΠΌ. ΠΠ°, Π²Ρ Π²ΡΠ΅ Π²Π΅ΡΠ½ΠΎ ΠΏΠΎΠ½ΡΠ»ΠΈ, ΡΡΠΎ... Read more βΊ
0
ΠΠ΅ΡΠ΅Π΄ Π²Π°ΠΌΠΈ Π±ΡΡΡΡΡΠΉ, ΡΠ΄ΠΎΠ±Π½ΡΠΉ ΠΈ ΠΎΡΠ·ΡΠ²ΡΠΈΠ²ΡΠΉ ΡΠ°ΠΉΡ? ΠΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ, ΡΡΠΎ Π½Π΅ ΡΠ΅Π·ΡΠ»ΡΡΠ°Ρ ΠΏΠ»ΠΎΠ΄ΠΎΡΠ²ΠΎΡΠ½ΠΎΠΉ ΡΠ°Π±ΠΎΡΡ ΠΌΠ½ΠΎΠΆΠ΅ΡΡΠ²Π° Π»ΡΠ΄Π΅ΠΉ, Π° Π²ΡΠ΅Π³ΠΎ Π»ΠΈΡΡ Π½Π°Π±ΠΎΡ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΡ ΠΈ ΠΈΠ½ΠΆΠ΅Π½Π΅ΡΠ½ΡΡ ΡΡΡΠΊΠΎΠ², Π½Π°ΠΏΡΠ°Π²Π»Π΅Π½Π½ΡΡ Π½Π° ΡΠ»ΡΡΡΠ΅Π½ΠΈΠ΅ Perceived Performance.Π Π±ΠΎΠ»ΡΡΠΈΠ½ΡΡΠ²Π΅ ΡΠ»ΡΡΠ°Π΅Π² Ρ ΡΠΎΡΡΠΎΠΌ ΡΠ΅Π°Π»ΡΠ½ΠΎΠΉ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ ΡΠ»ΡΡΡΠ°Π΅ΡΡΡ ΠΈ Perceived Performance. Π ΠΊΠΎΠ³Π΄Π° ΡΠ΅Π°Π»ΡΠ½Π°Ρ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡΠ΅Π»ΡΠ½ΠΎΡΡΡ Π½Π΅ ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ Ρ Π»Π΅Π³ΠΊΠΎΡΡΡΡ ΡΠ²Π΅Π»ΠΈΡΠ΅Π½Π°, ΡΡΡΠ΅ΡΡΠ²ΡΠ΅Ρ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΡ ΠΏΠΎΠ΄Π½ΡΡΡ Π²ΠΈΠ΄ΠΈΠΌΡΡ. Π ΡΠ²ΠΎΠ΅ΠΌ Π΄ΠΎΠΊΠ»Π°Π΄Π΅ Π½Π° Frontend Live 2020 Π±ΡΠ²ΡΠΈΠΉ ΡΠ°Π·ΡΠ°Π±ΠΎΡΡΠΈΠΊ Avito Frontend Architecture ΠΠ»Π΅ΠΊ Read more βΊ
0
One of our readers recommended paying heed to the Espressif IoT Development Framework. He found an error in the project code and asked if the PVS-Studio static analyzer could find it. The analyzer can't detect this specific error so far, but it managed to spot many others. Based on this story and the errors found, we decided to write a classic article about checking an open source project. Enjoy exploring... Read more βΊ
0
Most popular sources
![]() |
14% 3 |
![]() |
13% 6 |
![]() |
9% 1 |
![]() |
8% 2 |
![]() |
8% 0 |
View sources Β» |
LIKE us on Facebook so you won't miss the most important news of the day!
11.07.2025 08:36
Last update: 08:31 EDT.
News rating updated: 15:31.
What is Times42?
Times42 brings you the most popular news from tech news portals in real-time chart.
Read about us in FAQ section.