Habr
1.24K subscribers
2.08K photos
3 files
1.66K links
Habr.com ⬝ English edition
Download Telegram
Audio over Bluetooth: most detailed information about profiles, codecs, and devices

The mass market of smartphones without the 3.5 mm audio jack changed headphones industry, wireless Bluetooth headphones have become the main way to listen to music and communicate in headset mode for many users.

Bluetooth device manufacturers rarely disclose detailed product specifications, and Bluetooth audio articles on the Internet are contradictory and sometimes incorrect. They do not tell about all the features, and often publish the same false information.

Let's try to understand the protocol, the capabilities of Bluetooth stacks, headphones and speakers, Bluetooth codecs for music and speech, find out what affects the quality of the transmitted audio and the delay, learn how to capture and decode information about supported codecs and other device features.

https://habr.com/ru/post/456182/
Bluetooth stack modifications to improve audio quality on headphones without AAC, aptX, or LDAC codecs

Some wireless headphone users note low sound quality and lack of high frequencies when using the standard Bluetooth SBC codec, which is supported by all headphones and other Bluetooth audio devices. A common recommendation to get better sound quality is to buy devices and headphones with aptX or LDAC codecs support. These codecs require licensing fees, that's why devices with them are more expensive.

It turns out that the low quality of SBC is caused by artificial limitations of all current Bluetooth stacks and headphones' configuration, and this limitation can be circumvented on any existing device with software modification only.

https://habr.com/ru/post/456476/
Security of mobile OAuth 2.0

Popularity of mobile applications continues to grow. So does OAuth 2.0 protocol on mobile apps. It's not enough to implement standard as is to make OAuth 2.0 protocol secure there. One needs to consider the specifics of mobile applications and apply some additional security mechanisms.

In this article, I want to share the concepts of mobile OAuth 2.0 attacks and security mechanisms used to prevent such issues. Described concepts are not new but there is a lack of the structured information on this topic. The main aim of the article is to fill this gap.

https://habr.com/ru/company/mailru/blog/456702/
WSL 2 is now available in Windows Insiders

We’re excited to announce starting today you can try the Windows Subsystem for Linux 2 by installing Windows build 18917 in the Insider Fast ring! In this blog post we’ll cover how to get started, the new wsl.exe commands, and some important tips. Full documentation about WSL 2 is available on our docs page.

https://habr.com/ru/company/microsoft/blog/456202/
Simple story behind Refresh and Access tokens

Nowadays security schema that lays on two tokens quite common. There are a lot of information about theme in the Internet. There are often only description what is Refresh and Access tokens and how to usem.

To understand concept behind tokens I would like to do one simple thought experiment.

https://habr.com/ru/post/456968/
“Sometimes it happens that behind a nondescript, at first glance, warning lies hell”.

How to quickly check out interesting warnings given by the PVS-Studio analyzer for C and C++ code: https://amp.gs/Oe2D
Key factors of a Successful Team Enablement.

The enablement team plays a key role in the initial and ongoing success of employees. When training is set up properly, the company starts receiving value from the new employee much sooner: https://amp.gs/Oe6L
A drawing bot for realizing everyday scenes and even stories.

New AI technology can understand a natural language description, sketch a layout of the image, synthesize the image, and then refine details based on the layout and individual words provided: https://amp.gs/O7Bp
• How to Section Your HTML
• Optimizing Google Fonts Performance
• Drop caps & design systems
• Introduction to Vue lifecycle hooks
• Just — a build task definition library, and much more

Frontend Weekly Digest (17 — 23 June 2019): https://amp.gs/O7Ed
AvaloniaUI features using the custom MessageBox.

AvaloniaUI is a delightful framework to which you want to return again and again. So let’s go back to it again and look at some of the features with my message box: https://amp.gs/O7iB
WBOIT in OpenGL: transparency without sorting.

This post is about weighted blended order-independent transparency (WBOIT) — the trick that was covered in JCGT in 2013: https://amp.gs/O7Mx
How RICE Scoring Model Enhances Product Feature Prioritization.

A powerful prioritization framework such as RICE model helps to consider each factor about a project and combine the factors in a consistent way: https://amp.gs/OyDP
It’s high time to become part of an open source project.

It’s not a new idea, but It’s fantastic to combine learning and building your projects with an open source that you are actively developing: https://amp.gs/Oh1T
How to speed up LZ4 decompression in ClickHouse?

In many cases, all the potentially time-consuming computations are already well optimized, plus the user wrote a well thought-out query. Then all that’s left to do is to perform decompression: https://amp.gs/OgfY
How to save $58 in 5 minutes.

Many of you will take a flight to a place far from your everyday routine at home. Before this hot vacation season starts, we should discuss an interesting and useful method on how to save money using a VPN: https://amp.gs/OgUE
“The 'T\x65s\x74' literal will be encoded in different of ways, depending on the compiler. A similar logic had to be added in the analyzer. As a result, we’ve made a new diagnostic rule”.

The dangers of using multi-character constants: https://amp.gs/Og3P
EvilParcel vulnerabilities analysis.

These vulnerabilities are found in various Android system classes. Errors in these classes make it possible to substitute information during the data exchange between apps and the system: https://amp.gs/OEmS
Simplify working with parallel tasks in C#.

Async/await pattern has significantly simplified working with asynchronous operations in C#. However, this simplification relates only to the situation when asynchronous operations are executed consequently: https://amp.gs/O97t
How to Repair a Backyard Swimming Pool in 7 Hours Using the Critical Path Method?

Although the CPM is often criticized today, its foundations continue to be popular among project managers all over the world: https://amp.gs/O9wk
Airbus reaches new heights with the help of Microsoft mixed reality technology.

Microsoft’s mixed reality technology can be used to help Airbus production workers access information and instructions while their hands are occupied: https://amp.gs/O4pt
"Figuring out the future of distributed data systems".

The big interview with Martin Kleppmann, a researcher in distributed systems at the University of Cambridge, and the author of the highly acclaimed "Designing Data-Intensive Applications": https://amp.gs/OUpG