Habr
1.24K subscribers
2.08K photos
3 files
1.66K links
Habr.com ⬝ English edition
Download Telegram
Privacy on Mobile: a practitioner’s checklist

Privacy has always been a high-stakes game, but the AI wave and our data-hungry economy have turned our phones into the main playing field. Every digital crumb is an asset. While some users are savvy, relying solely on "user awareness" is a losing strategy. The first line of defense isn't the user; it's the developer.

This isn't just another compliance lecture. It's a practitioner's mental model for how to frame decisions around privacy from the ground up. Let's dive into the concrete checklists and practical examples that help build that defense.
Why "Test Everything" Destroys Your Data Quality (And 4 Tips to Fix It)

That "test everything" principle? It’s not improving data quality—it’s actively destroying it. Teams get buried in hundreds of useless alerts, creating so much noise that the really important signals get lost. Just ask Google and Monzo; they've already abandoned this approach.

The smart move is shifting from blanket testing to precise, targeted checks at nodes with the greatest impact radius. It turns out one well-placed test at the source is worth more than a hundred checks downstream. Let's dig into the four tips for making that shift and building products that actually work.
22 Affordable VPS/VDS Hosting Providers for Personal and Business Use (2025-2026)

Finding a VPS that is cheap, fast, and reliable often feels like an impossible triangle—you usually only get to pick two. When you're launching a pet project or scaling a business, picking the wrong host means future downtime and serious headaches.

We've reviewed 22 trusted providers relevant for 2025-2026, comparing them by the metrics that actually matter: real pricing (no hidden fees), uptime guarantees, features, and whether their support actually responds. Let's see who truly delivers on the balance of price and performance.
LLM as a Resonance-Holographic Field of Meanings

Ask an LLM the same question twice, and you might get a flash of novel insight followed by something completely banal. We constantly argue: is it truly creative, or just a statistical parrot? Some see sparks of a new mind, while others (correctly) point out it's just an archive. The confusing part is that both arguments feel right.

This paradox might exist because we keep trying to analyze the LLM as a standalone object, which could be the wrong approach entirely. The crucial question isn't what the model knows or can do, but what it fundamentally is. Let's explore this "resonance-holographic" perspective.
What is design thinking and how to implement it in UX design

Design thinking is a customer-focused, non-linear iterative approach to finding creative solutions. It’s the process that guides cross-functional teams to deeply study their users, tackle complex problems, and genuinely think outside the box to build an intuitive, human-centered product.

It's less a rigid formula and more a mindset for driving real innovation. Let's dive into the core stages, principles, and goals of this important process and see the positive impact it can have on your design teams.
The LLM's Narrative Engine: A Critique of Prompting

If an LLM is a vast "holographic field" of probabilities, how does it decide what to say? A static landscape is just potential; something must drive the movement from one specific answer to the next. This is where the Narrative Engine hypothesis comes in.

This engine describes the dynamics of the LLM's "mind," not just its static structure. It's the mechanism that forces its probabilistic calculations to follow coherent pathways, essentially binding it to the rules of a story. This perspective changes everything about prompting: we aren't programming a machine, we are initiating a narrative. Let's delve into this critique.
StarRocks vs. ClickHouse, Apache Druid, and Trino

In the big data era, OLAP databases force a difficult compromise. Some systems are impressive in wide-table queries but struggle with complex ones. Others support flexible multi-table queries but are held back by slow speeds, forcing engineers to flatten complex data models just to get real-time performance.

This compromise is no longer good enough. New business requirements demand an OLAP system that can deliver excellent performance in both wide-table and multi-table scenarios. The goal is to reduce the engineering workload and enable real-time queries on any data dimension, without worrying about data construction. Let's see how the modern contenders compare.
Forget the hype: Why choose a career in C?

In an era dominated by high-level abstractions and rapid development, C often looks like a relic. It's the language of "dangerous" pointers and tedious manual memory management. When modern tools promise safety and speed, why would anyone willingly choose this "outdated" path?

Perhaps because those "dangers" are actually its greatest strengths. A programmer with 22 years of experience argues that C isn't about quick wins, but about fundamental control and a deep, philosophical understanding of how computers actually work. It's a "bastion of calm" in a world of hype.

Let's dive into this defense of a classic.
Exposed: Custom column types

Exposed is a handy SQL library for Kotlin, but what happens when standard SQL types just don't cut it? You might need to support specific database features, like PostgreSQL's enum or ltree, or perhaps you want to map a column directly to a domain-specific type that truly fits your business logic.

This is exactly where custom column types shine. By implementing your own, you gain precise control over how data is stored and retrieved, all while maintaining that crucial type safety. It’s a powerful way to make the database align perfectly with your code, not the other way around.

Let's dive into the implementation for a PostgreSQL enum.
Comparison: StarRocks vs Apache Druid

Apache Druid has long been a staple for real-time analytics, but let's be honest: today's analytical demands are becoming incredibly sophisticated. As data performance needs evolve, even established solutions are facing new challenges. This is where StarRocks makes its entrance—a high-performance, open-source analytical database designed specifically to meet these advanced enterprise needs.

It's not just about replacing an incumbent; it's about a shift in capabilities. StarRocks promises robust performance for contemporary workloads, but how does it really stack up against a well-known veteran like Druid? We're looking beyond the hype at core functionalities, strengths, and benchmark results.

Let's dig into the practical examples and see which database best fits your needs.
AWS SageMaker: Choosing the Right Inference Type for ML Models

Deploying a model in AWS SageMaker seems simple until you hit that one critical question: which inference type should you choose? You're faced with four options—Real-Time, Serverless, Batch Transform, and Asynchronous. At first glance, the differences aren't obvious, yet picking the wrong one can be a costly mistake, leaving you paying for 24/7 idle instances or forcing users to endure a painful 30-second cold start.

The right choice isn't about which is "best," but which is right for your specific task. It all hinges on four key factors: payload size, expected latency, traffic patterns, and whether you're willing to pay for idle time. Understanding these trade-offs is the key to optimizing both performance and your AWS bill.

Let's dig into the specs, practical examples, and pricing models for each.
AI-Powered Social Engineering

Those clumsy phishing emails with bad grammar and spelling mistakes? They're quickly becoming a thing of the past. The new threat is AI-generated: perfectly crafted, hyper-personalized, and deployed at a massive scale. Attackers are now using AI not just for convincing social engineering, but to discover zero-day vulnerabilities and generate polymorphic malware that evades traditional detection.

But this is a full-blown arms race. Defenders are firing back with the same technology, leveraging AI for real-time behavioral analysis to spot anomalies, enhance threat intelligence to predict attacks, and automate incident response to contain threats in milliseconds. It’s AI versus AI, and the most dangerous position to take is believing it's someone else's problem.

Let's dive into the stats, strategies, and code behind this new digital battlefield.