Habr
1.26K subscribers
2.06K photos
3 files
1.64K links
Habr.com ⬝ English edition
Download Telegram
Understanding the Differences Between Kafka and RabbitMQ: in Simple Terms

Pavel Malygin, Lead System Analyst at Innotech, dives into the topic of message brokers and explains how they are used: https://amp.gs/jGbtk
«Hi everyone! My name is Dmitrii Konstantinov and this is a personal story of experience and growth in a cozy startup»

Startup story — how to pivot mobile apps and business from «beauty Uber» to «beauty coworking»: https://amp.gs/jxI9Q
How Can I Start My Own IPTV Provider?

IPTV is quickly rising to the top of the list of TV viewing options for viewers worldwide. This indicates a developing market for service providers and a potential new source of income. But how can you set up an IPTV service? Mware Solutions can assist you in establishing the required infrastructure for a successful entry into this cutthroat market: https://amp.gs/jx8Zq
“Hello! My name is Mikhail Emelyanov, I am embedded software engineer, and I was inspired to write this little roadmap on the capabilities of Python language by a certain commonality among the existing Python tutorials found on the web”

Python Junior Plus, or The beginner’s Roadmap to becoming a Python programmer: https://amp.gs/jx1Z6
The On-Line Encyclopedia of Integer Sequences today

You can encounter integer sequences all around combinatorics, number theory, and recreational mathematics. And if there is a multitude of objects of the similar form, then one can create an index for these objects. The On-Line Encyclopedia of Integer Sequences, OEIS, is such an index.

This article covers the On-Line Encyclopedia inclusion criteria, its editorial process, its role in mathematics, and its future: https://amp.gs/jxY29
Clicker game by using FPGA and Verilog

Games can give positive emotions and provide relaxation to a person. However, the main purpose of this project is to get a better understanding of the Verilog language: https://amp.gs/jxxlk
How to exchange a secret key over an insecure network (EC-Diffie-Hellman algorithm)

Let’s say you want to send an encrypted message to your friend in order to avoid it being intercepted and read by a third party. You generate a random secret key and encrypt the message with it. Let’s say you use AES. But how do you let your friend know the key to decrypt it?

In this article, we will explore how the Elliptic-Curve Diffie-Hellman algorithm works under the hood. The article includes the implementation of this algorithm from scratch, written in Python: https://amp.gs/jxxO8
Asymmetric horizontal distribution for time series

The goal of paper is to demonstrate non-trivial approaches to give statistical estimate for forecast result. Idea comes from probability cone concept. A probability cone is an indicator that forecasts a statistical distribution from a set point in time into the future. This article provides alternative approaches using machine learning, regression analysis: https://bit.ly/3YwhczD
«We are the first year students studying Computer Science in Innopolis University and we would like to share our experience in developing a Verilog program to create the greatest Memory Game that has ever existed on the FPGA board»

MemGame: https://bit.ly/3jl6oUT
Testing a Monitor using DE10-Lite

In order not to buy a defective monitor, it is highly recommended to check it before buying. DE10-Lite is great for this because of a compact size and the presence of a VGA connector: https://bit.ly/3jfonfm
Product Backlog Refinement. Is it worth the effort or a simple waste of your team's time?

Vladimir Zolotopupov, Head of Analytics for Innotech's Automation Department, shares his team's experience and describes how they handle the PBR process: https://habr.com/en/company/innotech/blog/707418/?utm_source=telegram.me&utm_medium=social&utm_campaign=14755658
Make first deb-src package by example cri-o

Everything looks pretty simple. You should make a source-package with a source code, instructions how to build, patches, control files and some additional files that you may need: https://bit.ly/3innRfc
BGP Route Leak prevention and detection with the help of the RFC9234

A BGP route leak is an unintentional propagation of BGP prefixes beyond the intended scope that could result in a redirection of traffic through an unintended path that may enable eavesdropping or traffic analysis, and may or may not result in an overload or complete drop (black hole) of the traffic. Route leaks can be accidental or malicious but most often arise from accidental misconfigurations: https://bit.ly/3H9rAqm
How To Select Photos in React Native

In this tutorial, we will learn how to select photos in a React Native application using the popular library react-native-image-picker. We will cover setting up a new React Native project, installing the library, getting permissions for the camera and library, and selecting and taking photos: https://bit.ly/3H64Yak
Mail.ru Cloud Solutions announces Mail.ru owned solution for automating Hybrid Cloud deployments based on AWS

The solution enables companies to automatically deploy federated Kubernetes clusters simultaneously using Amazon Web Services and MCS resources: https://bit.ly/3WkArKh
Creating a custom CRM to launch KFC into the future of customer-defined service

The customer loyalty management system helps KFC’s franchisees increase their revenue and become the fast food restaurant of the future: https://bit.ly/3He58MY
Building a GPT-like Model from Scratch with Detailed Theory and Code Implementation

Unlock the power of Transformer Networks and learn how to build your own GPT-like model from scratch. In this in-depth guide, we will delve into the theory and provide a step-by-step code implementation to help you create your own miniGPT model. The final code is only 400 lines and works on both CPUs as well as on the GPUs: https://bit.ly/3YjVLkD
"Following last year's cyberattacks, even previously laid-back people are now concerned about cybersecurity. That's why we decided to make the twelfth Positive Hack Days information security forum even more open and large-scale"

Positive Hack Days 12 will be held in Gorky Park on May 19–20: https://bit.ly/40ioPug
Q4 2022 DDoS Attacks and BGP Incidents

Now that 2022 has come to an end, we would like to share the DDoS attack mitigation and BGP incident statistics for the fourth quarter of the year, which overall saw unprecedented levels of DDoS attack activity across all business sectors.

In 2022, DDoS attacks increased by 73.09% compared to 2021.

Let's take a closer look at the Q4 2022 data: https://bit.ly/3JvuU0J
Database selection cheat sheet: SQL or NoSQL?

This is a series of articles dedicated to the optimal choice between different systems on a real project or an architectural interview: https://bit.ly/3HXp7zQ