Habr
1.26K subscribers
2.06K photos
3 files
1.64K links
Habr.com ⬝ English edition
Download Telegram
“Hello, I am Aleksandr Ivanov, CTO at Quadcode. We came to Habr to show the Fintech ‘kitchen’; we’ve been at it for 8 years, so we can already share our experience”

Fintech in practice — how Quadcode develops technology for trading and banking: https://amp.gs/jBGfR
Wi-Fi and CWMP (TR-069) / USP (TR-369) protocols: frequecy optimization attempt

The growing number of Wi-Fi devices still remains that leads to the overcrowded spectrums. It means increasing of demand for some optimization routines for utilization of resources: https://amp.gs/jBGOC
“Some time ago I discovered that Django has the ability to auto-register ModelAdmins. Since this is not common knowledge and carries a number of benefits, I decided to write an article about it”

Django ModelAdmins autoregister: https://amp.gs/jBPJZ
“Ignoring the existence of multiple meanings of sign sequences has always led to the collapse of hopes and the death of people, communities and even civilizations. The history of world civilizations, in particular, is a description of the triggers of misunderstanding”

Collective meaning recognition: https://amp.gs/jBhvU
“In this article I’ll try to grasp the whole history of CAPTCHA recognition, from heuristics to the contemporary automated recognition systems. We’ll figure out, if a CAPTCHA is still alive”

Text-based CAPTCHA in 2022: https://amp.gs/jBUcW
iOS security testing & reverse engineering guide

This article is probably one of the most useful, structured and interesting guides on the iOS platform: https://amp.gs/jBdGI
“Below is a retrospective on how I restored the Node’s functionality. As the saying goes, any resemblance to actual events, locales or persons is purely coincidental”

An Antidote to Absent-Mindedness, or How I Gained Access to an OpenShift Node without an SSH Key: https://amp.gs/jB3iU
“This year we created six game hosts, each with a flag. To get the flag, participants had either to exploit a vulnerability on the server or to fulfill another condition”

IDS Bypass at Positive Hack Days 11 — writeup and solutions: https://amp.gs/jBL1s
Detecting attempts of mass influencing via social networks using NLP. Part 1

In this article, we will cover the data collection process, preprocessing, feature extraction, classification itself and the evaluation of the models’ performance: https://amp.gs/jn8wr
Detecting attempts of mass influencing via social networks using NLP. Part 2

Now, it’s time to look more deeply into the datasets to find some patterns using exploratory data analysis and topic modelling: https://amp.gs/jn851
“This is an article that describes my vision of building a system that actively uses Go as the main programming language and SOA/microservices as a design paradigm”

ArGOtecture: https://amp.gs/jnT8w
Multilingual Text-to-Speech Models for Indic Languages

In this article, we shall provide some background on how multilingual multi-speaker models work and test an Indic TTS model that supports 9 languages and 17 speakers: https://amp.gs/jnTlM
“With a clearly defined goal in mind, we figured, what could possibly go wrong? Nearly everything it turns out. Making a game for the first time presented challenges — let’s talk about the most critical and difficult aspects”

Blood, sweat and pixels — releasing a mobile game with no experience: https://amp.gs/jntLa
What are neural networks and what do we need them for?

Artificial neural networks are a software code that imitates the work of a brain and is capable of self-learning. Like a biological network, an artificial network also consists of neurons, but they have a simpler structure: https://amp.gs/jnln7
“I know that my article can help a designer who spends a lot of time working and not feeling his or her growth. This article has some tips on how to start building your soft skills”

Don’t be a sensitive designer: https://amp.gs/jnCtl
Stress-testing: How Testers Live in a Turbulent World of Bugs

Lidiya Yegorova, Innotech’s “Scoring conveyor” team QA-Lead shared her practices on how to minimize the stress while testing: https://amp.gs/jnCxR
Q2 2022 DDoS attacks and BGP incidents

The second quarter of the year has ended and, as usual, we take a look back at the mitigated DDoS attacks activity and BGP incidents that occurred between April and June 2022: https://amp.gs/jnRc9
The Systems Engineering Methodology for Startups

In this article, we’ll make a brief overview of this methodology and highlight how it can help entrepreneurs to encompass and structure the process of creating and developing a startup: https://amp.gs/jndAz
Testing is one of the key processes in development. However, without analysis it is tough to say how effective testers really are.

Innotech’s lead tester-engineer Pavel Petrov shared a number of metrics that are being used in project work: https://amp.gs/jnNIY
Four UX failings that e-commerce can fix with design

It’s crucial to reduce the number of useless clicks, and increase the number of clicks that deliver the feeling of success. Let’s have a look at the main problems that can make a visitor feel not happy: https://amp.gs/jnb43
Queries in PostgreSQL. Hashing

“The previous article focused on the nested loop join, and in this one I will explain the hash join. I will also briefly mention group-bys and distincs”: https://amp.gs/jGzy1