GraphQL without N+1 is easy. N1Loader is a must.
N1Loader is designed to provide a simple way for avoiding N+1 issues of any kind. Gladly, it’s super easy to integrate with your GraphQL API: https://amp.gs/jlRDU
N1Loader is designed to provide a simple way for avoiding N+1 issues of any kind. Gladly, it’s super easy to integrate with your GraphQL API: https://amp.gs/jlRDU
Lexical Analysis in 11l.
This article discusses the lexical analyzer, which is an integral part of any compiler. The task of the lexical analyzer is to split the source code of the program into tokens: https://amp.gs/jldBP
This article discusses the lexical analyzer, which is an integral part of any compiler. The task of the lexical analyzer is to split the source code of the program into tokens: https://amp.gs/jldBP
Information is changed by entropy.
We cannot delete information; we can only change it by increasing its entropy: https://amp.gs/jliuj
We cannot delete information; we can only change it by increasing its entropy: https://amp.gs/jliuj
Idiomatic Event Loop in C++.
Sometimes programming with mutexes gets too complicated and messy. Maybe you need to meet a new friend — the Event Loop pattern: https://amp.gs/jl2e7
Sometimes programming with mutexes gets too complicated and messy. Maybe you need to meet a new friend — the Event Loop pattern: https://amp.gs/jl2e7
Two Factor Authentication — More Security, Less Effort
Two-factor authentication is measurably one of the best ways to secure access to your data. Unfortunately a lot of people’s experience is that it’s inconvenient or just plain annoying. But it doesn’t have to be. If done well it can be both more convenient and more secure than having to use a password: https://amp.gs/jlLpV
Two-factor authentication is measurably one of the best ways to secure access to your data. Unfortunately a lot of people’s experience is that it’s inconvenient or just plain annoying. But it doesn’t have to be. If done well it can be both more convenient and more secure than having to use a password: https://amp.gs/jlLpV
How to mimic Agile correctly?
A similar article should have appeared earlier, about ten or fifthteen years ago, when Agile was just starting to be implemented in companies. So many mistakes, problems and conflicts could be avoided: https://amp.gs/jlcws
A similar article should have appeared earlier, about ten or fifthteen years ago, when Agile was just starting to be implemented in companies. So many mistakes, problems and conflicts could be avoided: https://amp.gs/jlcws
“In this guide, I’d like to share with you tips and tricks about ActiveRecord preloading and how you can enhance it to the next level”
Enhanced ActiveRecord preloading: https://amp.gs/jl6mS
Enhanced ActiveRecord preloading: https://amp.gs/jl6mS
“In previous articles we discussed query execution stages and statistics. Last time, I started on data access methods, namely Sequential scan. Today we will cover Index Scan”
Queries in PostgreSQL. Index scan: https://amp.gs/jlbu8
Queries in PostgreSQL. Index scan: https://amp.gs/jlbu8
“Hello, I am Aleksandr Ivanov, CTO at Quadcode. We came to Habr to show the Fintech ‘kitchen’; we’ve been at it for 8 years, so we can already share our experience”
Fintech in practice — how Quadcode develops technology for trading and banking: https://amp.gs/jBGfR
Fintech in practice — how Quadcode develops technology for trading and banking: https://amp.gs/jBGfR
Wi-Fi and CWMP (TR-069) / USP (TR-369) protocols: frequecy optimization attempt
The growing number of Wi-Fi devices still remains that leads to the overcrowded spectrums. It means increasing of demand for some optimization routines for utilization of resources: https://amp.gs/jBGOC
The growing number of Wi-Fi devices still remains that leads to the overcrowded spectrums. It means increasing of demand for some optimization routines for utilization of resources: https://amp.gs/jBGOC
“Some time ago I discovered that Django has the ability to auto-register ModelAdmins. Since this is not common knowledge and carries a number of benefits, I decided to write an article about it”
Django ModelAdmins autoregister: https://amp.gs/jBPJZ
Django ModelAdmins autoregister: https://amp.gs/jBPJZ
“Ignoring the existence of multiple meanings of sign sequences has always led to the collapse of hopes and the death of people, communities and even civilizations. The history of world civilizations, in particular, is a description of the triggers of misunderstanding”
Collective meaning recognition: https://amp.gs/jBhvU
Collective meaning recognition: https://amp.gs/jBhvU
“In this article I’ll try to grasp the whole history of CAPTCHA recognition, from heuristics to the contemporary automated recognition systems. We’ll figure out, if a CAPTCHA is still alive”
Text-based CAPTCHA in 2022: https://amp.gs/jBUcW
Text-based CAPTCHA in 2022: https://amp.gs/jBUcW
iOS security testing & reverse engineering guide
This article is probably one of the most useful, structured and interesting guides on the iOS platform: https://amp.gs/jBdGI
This article is probably one of the most useful, structured and interesting guides on the iOS platform: https://amp.gs/jBdGI
“Below is a retrospective on how I restored the Node’s functionality. As the saying goes, any resemblance to actual events, locales or persons is purely coincidental”
An Antidote to Absent-Mindedness, or How I Gained Access to an OpenShift Node without an SSH Key: https://amp.gs/jB3iU
An Antidote to Absent-Mindedness, or How I Gained Access to an OpenShift Node without an SSH Key: https://amp.gs/jB3iU
“This year we created six game hosts, each with a flag. To get the flag, participants had either to exploit a vulnerability on the server or to fulfill another condition”
IDS Bypass at Positive Hack Days 11 — writeup and solutions: https://amp.gs/jBL1s
IDS Bypass at Positive Hack Days 11 — writeup and solutions: https://amp.gs/jBL1s
Detecting attempts of mass influencing via social networks using NLP. Part 1
In this article, we will cover the data collection process, preprocessing, feature extraction, classification itself and the evaluation of the models’ performance: https://amp.gs/jn8wr
In this article, we will cover the data collection process, preprocessing, feature extraction, classification itself and the evaluation of the models’ performance: https://amp.gs/jn8wr
Detecting attempts of mass influencing via social networks using NLP. Part 2
Now, it’s time to look more deeply into the datasets to find some patterns using exploratory data analysis and topic modelling: https://amp.gs/jn851
Now, it’s time to look more deeply into the datasets to find some patterns using exploratory data analysis and topic modelling: https://amp.gs/jn851
“This is an article that describes my vision of building a system that actively uses Go as the main programming language and SOA/microservices as a design paradigm”
ArGOtecture: https://amp.gs/jnT8w
ArGOtecture: https://amp.gs/jnT8w
Multilingual Text-to-Speech Models for Indic Languages
In this article, we shall provide some background on how multilingual multi-speaker models work and test an Indic TTS model that supports 9 languages and 17 speakers: https://amp.gs/jnTlM
In this article, we shall provide some background on how multilingual multi-speaker models work and test an Indic TTS model that supports 9 languages and 17 speakers: https://amp.gs/jnTlM