“Hello! My name is Mikhail Emelyanov, I am embedded software engineer, and I was inspired to write this little roadmap on the capabilities of Python language by a certain commonality among the existing Python tutorials found on the web”
Python Junior Plus, or The beginner’s Roadmap to becoming a Python programmer: https://amp.gs/jx1Z6
Python Junior Plus, or The beginner’s Roadmap to becoming a Python programmer: https://amp.gs/jx1Z6
The On-Line Encyclopedia of Integer Sequences today
You can encounter integer sequences all around combinatorics, number theory, and recreational mathematics. And if there is a multitude of objects of the similar form, then one can create an index for these objects. The On-Line Encyclopedia of Integer Sequences, OEIS, is such an index.
This article covers the On-Line Encyclopedia inclusion criteria, its editorial process, its role in mathematics, and its future: https://amp.gs/jxY29
You can encounter integer sequences all around combinatorics, number theory, and recreational mathematics. And if there is a multitude of objects of the similar form, then one can create an index for these objects. The On-Line Encyclopedia of Integer Sequences, OEIS, is such an index.
This article covers the On-Line Encyclopedia inclusion criteria, its editorial process, its role in mathematics, and its future: https://amp.gs/jxY29
Clicker game by using FPGA and Verilog
Games can give positive emotions and provide relaxation to a person. However, the main purpose of this project is to get a better understanding of the Verilog language: https://amp.gs/jxxlk
Games can give positive emotions and provide relaxation to a person. However, the main purpose of this project is to get a better understanding of the Verilog language: https://amp.gs/jxxlk
How to exchange a secret key over an insecure network (EC-Diffie-Hellman algorithm)
Let’s say you want to send an encrypted message to your friend in order to avoid it being intercepted and read by a third party. You generate a random secret key and encrypt the message with it. Let’s say you use AES. But how do you let your friend know the key to decrypt it?
In this article, we will explore how the Elliptic-Curve Diffie-Hellman algorithm works under the hood. The article includes the implementation of this algorithm from scratch, written in Python: https://amp.gs/jxxO8
Let’s say you want to send an encrypted message to your friend in order to avoid it being intercepted and read by a third party. You generate a random secret key and encrypt the message with it. Let’s say you use AES. But how do you let your friend know the key to decrypt it?
In this article, we will explore how the Elliptic-Curve Diffie-Hellman algorithm works under the hood. The article includes the implementation of this algorithm from scratch, written in Python: https://amp.gs/jxxO8
Asymmetric horizontal distribution for time series
The goal of paper is to demonstrate non-trivial approaches to give statistical estimate for forecast result. Idea comes from probability cone concept. A probability cone is an indicator that forecasts a statistical distribution from a set point in time into the future. This article provides alternative approaches using machine learning, regression analysis: https://bit.ly/3YwhczD
The goal of paper is to demonstrate non-trivial approaches to give statistical estimate for forecast result. Idea comes from probability cone concept. A probability cone is an indicator that forecasts a statistical distribution from a set point in time into the future. This article provides alternative approaches using machine learning, regression analysis: https://bit.ly/3YwhczD
«We are the first year students studying Computer Science in Innopolis University and we would like to share our experience in developing a Verilog program to create the greatest Memory Game that has ever existed on the FPGA board»
MemGame: https://bit.ly/3jl6oUT
MemGame: https://bit.ly/3jl6oUT
Testing a Monitor using DE10-Lite
In order not to buy a defective monitor, it is highly recommended to check it before buying. DE10-Lite is great for this because of a compact size and the presence of a VGA connector: https://bit.ly/3jfonfm
In order not to buy a defective monitor, it is highly recommended to check it before buying. DE10-Lite is great for this because of a compact size and the presence of a VGA connector: https://bit.ly/3jfonfm
Product Backlog Refinement. Is it worth the effort or a simple waste of your team's time?
Vladimir Zolotopupov, Head of Analytics for Innotech's Automation Department, shares his team's experience and describes how they handle the PBR process: https://habr.com/en/company/innotech/blog/707418/?utm_source=telegram.me&utm_medium=social&utm_campaign=14755658
Vladimir Zolotopupov, Head of Analytics for Innotech's Automation Department, shares his team's experience and describes how they handle the PBR process: https://habr.com/en/company/innotech/blog/707418/?utm_source=telegram.me&utm_medium=social&utm_campaign=14755658
Make first deb-src package by example cri-o
Everything looks pretty simple. You should make a source-package with a source code, instructions how to build, patches, control files and some additional files that you may need: https://bit.ly/3innRfc
Everything looks pretty simple. You should make a source-package with a source code, instructions how to build, patches, control files and some additional files that you may need: https://bit.ly/3innRfc
BGP Route Leak prevention and detection with the help of the RFC9234
A BGP route leak is an unintentional propagation of BGP prefixes beyond the intended scope that could result in a redirection of traffic through an unintended path that may enable eavesdropping or traffic analysis, and may or may not result in an overload or complete drop (black hole) of the traffic. Route leaks can be accidental or malicious but most often arise from accidental misconfigurations: https://bit.ly/3H9rAqm
A BGP route leak is an unintentional propagation of BGP prefixes beyond the intended scope that could result in a redirection of traffic through an unintended path that may enable eavesdropping or traffic analysis, and may or may not result in an overload or complete drop (black hole) of the traffic. Route leaks can be accidental or malicious but most often arise from accidental misconfigurations: https://bit.ly/3H9rAqm
How To Select Photos in React Native
In this tutorial, we will learn how to select photos in a React Native application using the popular library react-native-image-picker. We will cover setting up a new React Native project, installing the library, getting permissions for the camera and library, and selecting and taking photos: https://bit.ly/3H64Yak
In this tutorial, we will learn how to select photos in a React Native application using the popular library react-native-image-picker. We will cover setting up a new React Native project, installing the library, getting permissions for the camera and library, and selecting and taking photos: https://bit.ly/3H64Yak
Mail.ru Cloud Solutions announces Mail.ru owned solution for automating Hybrid Cloud deployments based on AWS
The solution enables companies to automatically deploy federated Kubernetes clusters simultaneously using Amazon Web Services and MCS resources: https://bit.ly/3WkArKh
The solution enables companies to automatically deploy federated Kubernetes clusters simultaneously using Amazon Web Services and MCS resources: https://bit.ly/3WkArKh
Creating a custom CRM to launch KFC into the future of customer-defined service
The customer loyalty management system helps KFC’s franchisees increase their revenue and become the fast food restaurant of the future: https://bit.ly/3He58MY
The customer loyalty management system helps KFC’s franchisees increase their revenue and become the fast food restaurant of the future: https://bit.ly/3He58MY
Building a GPT-like Model from Scratch with Detailed Theory and Code Implementation
Unlock the power of Transformer Networks and learn how to build your own GPT-like model from scratch. In this in-depth guide, we will delve into the theory and provide a step-by-step code implementation to help you create your own miniGPT model. The final code is only 400 lines and works on both CPUs as well as on the GPUs: https://bit.ly/3YjVLkD
Unlock the power of Transformer Networks and learn how to build your own GPT-like model from scratch. In this in-depth guide, we will delve into the theory and provide a step-by-step code implementation to help you create your own miniGPT model. The final code is only 400 lines and works on both CPUs as well as on the GPUs: https://bit.ly/3YjVLkD
"Following last year's cyberattacks, even previously laid-back people are now concerned about cybersecurity. That's why we decided to make the twelfth Positive Hack Days information security forum even more open and large-scale"
Positive Hack Days 12 will be held in Gorky Park on May 19–20: https://bit.ly/40ioPug
Positive Hack Days 12 will be held in Gorky Park on May 19–20: https://bit.ly/40ioPug
Q4 2022 DDoS Attacks and BGP Incidents
Now that 2022 has come to an end, we would like to share the DDoS attack mitigation and BGP incident statistics for the fourth quarter of the year, which overall saw unprecedented levels of DDoS attack activity across all business sectors.
In 2022, DDoS attacks increased by 73.09% compared to 2021.
Let's take a closer look at the Q4 2022 data: https://bit.ly/3JvuU0J
Now that 2022 has come to an end, we would like to share the DDoS attack mitigation and BGP incident statistics for the fourth quarter of the year, which overall saw unprecedented levels of DDoS attack activity across all business sectors.
In 2022, DDoS attacks increased by 73.09% compared to 2021.
Let's take a closer look at the Q4 2022 data: https://bit.ly/3JvuU0J
Database selection cheat sheet: SQL or NoSQL?
This is a series of articles dedicated to the optimal choice between different systems on a real project or an architectural interview: https://bit.ly/3HXp7zQ
This is a series of articles dedicated to the optimal choice between different systems on a real project or an architectural interview: https://bit.ly/3HXp7zQ
HDR in CSS
High Dynamic Range allows for a wider range of colours and brightness levels. This technology works on displays that support HDR format. Nowadays web advantage of display gamuts such as Display P3 and Rec. 2020, which can display a much larger color space than traditional sRGB displays. It is 50% more colours.
CSS is ready to fix it (at least for Apple users). Find colour gamuts comparison, code examples and device support overview below: https://bit.ly/3ldw4nf
High Dynamic Range allows for a wider range of colours and brightness levels. This technology works on displays that support HDR format. Nowadays web advantage of display gamuts such as Display P3 and Rec. 2020, which can display a much larger color space than traditional sRGB displays. It is 50% more colours.
CSS is ready to fix it (at least for Apple users). Find colour gamuts comparison, code examples and device support overview below: https://bit.ly/3ldw4nf
"In this guide, I will highlight some of the most common cases of technical debt and suggest methods for solving them"
Technical debt mini-guide. How to pay it off: https://bit.ly/40GgIbq
Technical debt mini-guide. How to pay it off: https://bit.ly/40GgIbq
"In this article I will talk about my attempt to create flexible, compact and beautiful modular prototyping framework"
Building set for embedded developers: https://bit.ly/3lm4Zyz
Building set for embedded developers: https://bit.ly/3lm4Zyz
From Zero to Hero: LeetCode
"In this article, I want to write about my experience of interacting with the LeetCode platform, and describe my preparation for an interview in FAANG similar companies by breaking it down into levels": https://bit.ly/3In83Du
"In this article, I want to write about my experience of interacting with the LeetCode platform, and describe my preparation for an interview in FAANG similar companies by breaking it down into levels": https://bit.ly/3In83Du