Let’s deploy to Openshift.
“I’d like to share my story about migration an application to Openshift. Also, as a result, I will compare some of the most popular solutions and tools for managing your application inside Openshift”: https://amp.gs/951Z
“I’d like to share my story about migration an application to Openshift. Also, as a result, I will compare some of the most popular solutions and tools for managing your application inside Openshift”: https://amp.gs/951Z
Lua In Moscow 2019 conference program.
On March 3, Mail. ru Group’s Moscow office will be hosting the third international Lua conference, Lua in Moscow 2019. The conference will include two parallel tracks — talks and workshops: https://amp.gs/9QX9
On March 3, Mail. ru Group’s Moscow office will be hosting the third international Lua conference, Lua in Moscow 2019. The conference will include two parallel tracks — talks and workshops: https://amp.gs/9QX9
Matt Burrough’s Pentesting Azure — Thoughts on Security in Cloud Computing.
“Below I share with you these pre-book thoughts, and will compare them in a future article with the ones I will learn — or confirm — after reading Matt’s book”: https://amp.gs/9cnd
“Below I share with you these pre-book thoughts, and will compare them in a future article with the ones I will learn — or confirm — after reading Matt’s book”: https://amp.gs/9cnd
NodeJS logging made right.
Let’s overview how we can create trace IDs (meaning we’re going to briefly examine how continuation local storage a.k.a CLS works) and dig deep into how we can utilize Proxy to make it work with ANY logger: https://amp.gs/48ZR
Let’s overview how we can create trace IDs (meaning we’re going to briefly examine how continuation local storage a.k.a CLS works) and dig deep into how we can utilize Proxy to make it work with ANY logger: https://amp.gs/48ZR
This week we issue a really huge selection of all the essential news you might have missed on Front-end development. Make sure to check the latest updates on CSS, HTML, and JavaScript.
Frontend Weekly Digest (25 Feb — 3 Mar 2019): https://amp.gs/48UX
Frontend Weekly Digest (25 Feb — 3 Mar 2019): https://amp.gs/48UX
Why does Dodo Pizza need 250 developers?
“In autumn, we announced we were going to expand our IT team from 49 to 250 developers. And immediately we were buried under an avalanche of questions — mostly, why a pizza chain needs so many software engineers”: https://amp.gs/48W9
“In autumn, we announced we were going to expand our IT team from 49 to 250 developers. And immediately we were buried under an avalanche of questions — mostly, why a pizza chain needs so many software engineers”: https://amp.gs/48W9
Eliminating opportunities for traffic hijacking.
While you read this, a route leak or a hijack is spreading over the networks. Why? Because BGP is not easy, and configuring a correct and secure setup is even harder: https://amp.gs/4TCe
While you read this, a route leak or a hijack is spreading over the networks. Why? Because BGP is not easy, and configuring a correct and secure setup is even harder: https://amp.gs/4TCe
How to vendor a git into another git.
Git-vendor is a perfect tool to vendor one git repo into another. It provides all required functionality for the best practices of vendoring — keeping provenance, providing visibility and updatability: https://amp.gs/4Tih
Git-vendor is a perfect tool to vendor one git repo into another. It provides all required functionality for the best practices of vendoring — keeping provenance, providing visibility and updatability: https://amp.gs/4Tih
Lazy loading of Feature Module from the node_modules folder.
If someone of you has tried create angular libraries, he may face the issue with lazy loading Feature Module from node_modules. Let’s dive deeper and go thru the dark water: https://amp.gs/4T5Z
If someone of you has tried create angular libraries, he may face the issue with lazy loading Feature Module from node_modules. Let’s dive deeper and go thru the dark water: https://amp.gs/4T5Z
Digital Forensics Tips&Tricks: How to Find Active VPN Connection in the Memory Dump
Sometimes you can meet a case when a cyber-attacker uses VPN to establish a reliable channel between C2 server and infected IT-infrastructure. And, as Threat Intelligence experts say, attackers often use native Windows VPN connection tools and Windows .pbk (phonebook) files. Lets find out how we can detect it using a memory dump: https://amp.gs/41eH
Sometimes you can meet a case when a cyber-attacker uses VPN to establish a reliable channel between C2 server and infected IT-infrastructure. And, as Threat Intelligence experts say, attackers often use native Windows VPN connection tools and Windows .pbk (phonebook) files. Lets find out how we can detect it using a memory dump: https://amp.gs/41eH
Indexes in PostgreSQL. Part 2.
In the first article, we’ve mentioned that an access method must provide information about itself. Let’s look into the structure of the access method interface: https://amp.gs/41MB
In the first article, we’ve mentioned that an access method must provide information about itself. Let’s look into the structure of the access method interface: https://amp.gs/41MB
Levelord, an Ordinary Moscow Resident: Interview with the Creator of Duke Nukem.
Today we bring you an interview with Richard «Levelord» Gray — level designer of some legendary games and the author of famous phrase «You are not supposed to be here»: https://amp.gs/4Ykf
Today we bring you an interview with Richard «Levelord» Gray — level designer of some legendary games and the author of famous phrase «You are not supposed to be here»: https://amp.gs/4Ykf
A lot of world’s leading companies experiment and implement IoT solutions for diverse operational areas. The growth of demand for IoT in both consumer and industrial uses is evident.
Review of Google IoT Platform: https://amp.gs/4m82
Review of Google IoT Platform: https://amp.gs/4m82
What determines the Revenue of Miners.
The earnings of cryptocurrency miners are determined by a number of factors including the size of mining reward, the price of the cryptocurrency, transaction volumes, network fees, mining equipment and cost of electricity: https://amp.gs/4mJy
The earnings of cryptocurrency miners are determined by a number of factors including the size of mining reward, the price of the cryptocurrency, transaction volumes, network fees, mining equipment and cost of electricity: https://amp.gs/4mJy
Most common misconceptions in popular physics.
“It is almost impossible for me to watch the Discovery channel. I see nothing but oversimplifications, lies, and half-truths. I decided to compile a list of the most popular misconceptions”: https://amp.gs/4p5C
“It is almost impossible for me to watch the Discovery channel. I see nothing but oversimplifications, lies, and half-truths. I decided to compile a list of the most popular misconceptions”: https://amp.gs/4p5C
VShard — horizontal scaling in Tarantool.
“Hi, my name is Vladislav, and I am a member of the Tarantool development team. Today I am going to tell the story of how we implemented horizontal scaling in Tarantool by means of the VShard module”: https://amp.gs/4lVd
“Hi, my name is Vladislav, and I am a member of the Tarantool development team. Today I am going to tell the story of how we implemented horizontal scaling in Tarantool by means of the VShard module”: https://amp.gs/4lVd
Developer’s Guide to Building AI Applications.
This e-book provides a gentle introduction to the tools, infrastructure, and services on the Microsoft AI Platform, and teaches you how to create powerful, intelligent applications: https://amp.gs/4lFL
This e-book provides a gentle introduction to the tools, infrastructure, and services on the Microsoft AI Platform, and teaches you how to create powerful, intelligent applications: https://amp.gs/4lFL
1C and Elastic Compute Service Alibaba Cloud.
Aliexpress has already become a household name in the whole world. But Alibaba Group is not only the Internet mall, but also the number one cloud computing service in China: https://amp.gs/4Btf
Aliexpress has already become a household name in the whole world. But Alibaba Group is not only the Internet mall, but also the number one cloud computing service in China: https://amp.gs/4Btf
This week we issue a really huge selection of all the essential news you might have missed on Front-end development. Make sure to check the latest updates on CSS, HTML, and JavaScript.
Frontend Weekly Digest (4-10 Mar 2019): https://amp.gs/4COc
Frontend Weekly Digest (4-10 Mar 2019): https://amp.gs/4COc
Crystal Blockchain Analytics: Investigating the Hacks and Theft Cases.
Bitfury shares analysis completed by its Crystal Blockchain Analytics engineering team on the movement of bitcoin from the Zaif exchange, Bithumb exchange and Electrum wallets: https://amp.gs/4Co5
Bitfury shares analysis completed by its Crystal Blockchain Analytics engineering team on the movement of bitcoin from the Zaif exchange, Bithumb exchange and Electrum wallets: https://amp.gs/4Co5
Angular vs React: Complete Library with a Framework.
Google and Facebook are the computerized behemoths who dependably contend. Their answers for designers Angular and React appear matches as well. Demand helps look at both: https://amp.gs/4kGW
Google and Facebook are the computerized behemoths who dependably contend. Their answers for designers Angular and React appear matches as well. Demand helps look at both: https://amp.gs/4kGW