• Date Processing Attracts Bugs or 77 Defects in Qt 6

      PVS-Studio & Qt 6
      The recent Qt 6 release compelled us to recheck the framework with PVS-Studio. In this article, we reviewed various interesting errors we found, for example, those related to processing dates. The errors we discovered prove that developers can greatly benefit from regularly checking their projects with tools like PVS-Studio.

      Read more →
    • Enrolling and using Token2 USB Security keys with UserLock MFA

        UserLock provides two-factor authentication & access management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrators to secure, monitor and respond to all users' access, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance.

        Read more
      • Koyaanisqatsi: The WYSIWYG-style byte-code CPU

          Draft diagram of core

          SVG-File (actual draft)

          Lyrics


          Ancient times are known to everyone not with immortal works from Homer's only, but also with the Pythagorean multiplication table, Euclidean geometry and the Archimedes screw and the Pi, which we learned to use only relatively recently. In antiquity the art was not only to be able to write poetry and prose, but to design catapults or battering tools also, now there are rigid frameworks, when the discovering the new another beautiful formula is a formal words play only.
          Mathematics rules the modern world completely, cynically intertwining with the world of art, intruding with calculations in all spheres of our recreation and everyday life, when the colors of masterpieces turning into poisonous colours.
          Read more →
        • Just for Fun: PVS-Studio Team Came Up With Monitoring Quality of Some Open Source Projects

            Static code analysis is a crucial component of all modern projects. Its proper application is even more important. We decided to set up a regular check of some open source projects to see the effect of the analyzer's frequent running. We use the PVS-Studio analyzer to check projects. As for viewing the outcome, the choice fell on SonarQube. As a result, our subscribers will learn about new interesting bugs in the newly written code. We hope you'll have fun.

            Читать далее
          • How to Get Nice Error Reports Using SARIF in GitHub

              Let's say you use GitHub, write code, and do other fun stuff. You also use a static analyzer to enhance your work quality and optimize the timing. Once you come up with an idea - why not view the errors that the analyzer gave right in GitHub? Yeah, and also it would be great if it looked nice. So, what should you do? The answer is very simple. SARIF is right for you. This article will cover what SARIF is and how to set it up. Enjoy the reading!

              Читать далее
            • Ads
              AdBlock has stolen the banner, but banners are not teeth — they will be back

              More
            • Top 5 Best Secure Video Streaming Platforms of 2021

                In this modern era of technological advancements, it is important to connect with people who matter the most to your business i.e. customers. Are you searching for a secure online video platform for your business?

                Do you know what is secure streaming!

                Well, various online video platforms can help you in providing seamless videos to your customers. But what we need is a secure online video platform that can also protect our digital content from various e-hazards. Read on to know more about some of the most secure online video platforms in the market.

                Read more
              • Algorithms in Go: Dutch National Flag

                • Tutorial

                The flag of the Netherlands consists of three colors: red, white and blue. Given balls of these three colors arranged randomly in a line (it does not matter how many balls there are), the task is to arrange them such that all balls of the same color are together and their collective color groups are in the correct order.

                For simplicity instead of colors red, white, and blue we will be dealing with ones, twos and zeroes.

                Let's start with our intuition. We have an array of zeroth, ones, and twos. How would we sort it? Well, we could put aside all zeroes into some bucket, all ones into another bucket, and all twos into the third. Then we can fetch all items from the first bucket, then from the second, and from the last bucket, and restore all the items. This approach is perfectly fine and has a great performance. We touch all the elements when we iterate through the array, and then we iterate through all the elements once more when we "reassamble" the array. So, the overall time complexity is O(n) + O(n) ~= O(n). The space complexity is also O(n) as we need to store all items in the buckets.

                Can we do better than that? There is no way to improve our time complexity. However, we can think of a more efficient algorithm in regard to space complexity. How would we solve the problem without the additional buckets?

                Let's make a leap of faith and pretend that somehow we were able to process a part of the array. We iterate through part of the array and put encountered zeroes and ones at the beginning of the array, and twos at the end of the array. Now, we switched to the next index i with some unprocessed value x. What should we do there?

                Read more
              • A bit about our currently nameless game company, and what we’re working on at the moment

                  Hey everyone! I represent a game studio without a name, and the project we’re working on goes by the technical name of "CGDrone". I started writing this article earlier today, having tortured myself for ages with sketches, colours, algorithms and correcting bugs in rotations based on quaternions (the last one just about finished me off). You can probably understand I needed a break.

                  I’ve often come across stories people have posted online about how they made their game, the difficulties they faced, and the result they achieved at the end. Likewise, our team has its own story, and I’d like to share a bit about it.

                  Read more
                • Damned if you do, damned if you don’t: how tech companies can cut through passive-aggressive media

                    Entrepreneurs make for easy targets. Whatever your business is doing, it’s guaranteed to ruffle some feathers. But don’t be quick to blame the public. Most times, being sceptical of change is only logical.

                    Even those who buy into your product will probably expect it to fail. 20% of businesses shut their doors during their first year, and less then half survive for more than five. We may not know these numbers, but we know it from experience — most of them overpromise, underdeliver and ultimately disappoint.

                    As such, it’s no surprise that the internet is full of passive-aggressive tech coverage. No matter what you do, your business is going to be attacked and demeaned. No one is immune.

                    Look no further than the original iPhone’s early reviews. It generated a lot of negative coverage for the sake of negative coverage. CNET’s main complaints revolved over a lack of physical buttons, completely missing the entire point of having a touchscreen. A Techcrunch columnist went even further and outright damned it to failure. Sounds funny now, but 14 years ago these people were dead serious.

                    Of course, these days everyone is an expert and the comment sections matter more than the articles they follow. Unlike traditionally restrained media professionals, the overconfident amateurs on popular UGC platforms openly take pleasure in attacking whatever they come across. It might be their way of letting off steam from being bullied at work or having financial difficulties, but no matter the reason, you still have to deal with a bunch of people trying to paint you in a negative light. And that’s not easy.

                    Continue Reading
                  • 10+ Biggest Remote Tech Jobs Aggregators Comparison

                      There is a myriad of articles about where to find remote jobs, particularly in tech. Some of them are outdated and most of them don't provide detailed reviews. So that's why I decided to do my own research. I did a basic search by "React" skill (where possible) and expected to see mostly "Frontend Developer" vacancies.

                      Read more
                    • Speech Analytics: Benefits and its New Importance in Telecommunication Technology

                        Speech analytics is the process of analysing recorded speech, such as phone calls, to gather customer information to improve communication and future customer interaction. Speech analytics as a technology has been evolving especially rapidly over the last few years. It gives the ability to structure and analyse previously lost streams of insight-rich data, such as phone conversations. Empowered with this technology, operations can gather incredibly valuable business intelligence to drive call delivery performance improvements. It’s smart in that it automatically identifies focus areas in which customer service or sales teams may need additional call training which then, in turn, improves the call’s successful outcome. Speech analytics, as a process, can isolate buzzwords and phrases used most frequently within a given time period, plus indicate usage is trending up or down. This data is highly useful to call managers to spot changes in consumer behaviour so that action can be taken to improve customer satisfaction.

                        Zadarma is a leading global VoIP provider and offers a smart speech analytics feature as part of their incredibly easy to use telecommunications offering. The tool is free as part of the wider PBX phone system bundles, included in the free recognition minutes. Zadarma’s analytics feature allows data access to every internal or external call conversation. The benefits of speech analytics include:

                        Read more
                      • Finding Typos in the GTK 4 Project by PVS-Studio

                          0793_GTK_4_continue/image1.png


                          You may have already read a recent article about the first PVS-Studio run and filtration of warnings. We used the GTK 4 project as an example. It's about time we worked with the received report in more detail. Our regular readers may have already guessed that this article will be a description of errors found in the code.

                          Read more →
                        • How I create browser applications inside browsers

                          • Translation

                          GitJS


                          In 2013 Canonical tried to crowdfund Ubuntu Edge smartphone. Its main feature could be the ability to use the smartphone as a full-fledged PС. Unfortunatly, the crowdfunding campaign did not accumulate enough money, so a dream of having a universal device remained to be the dream.


                          I've been searching for universality, too, on the software side, not the hardware one. Today I can confidently say I found the necessary combination: Git and JavaScript.


                          As you know, I have already described the benefits of browser applications (nCKOB static site generator) and the benefits of using Git instead of yet another back-end with API (GitBudget to track personal spendings). Once GitBudget was out, I spent the remaining 2020 to build a system allowing one to create browser applications right inside browsers. GitJS is the name of that system.

                          Read more →
                        • Coins classifier Neural Network: Head or Tail?

                            Home of this article: https://robotics.snowcron.com/coins/02_head_or_tail.htm

                            The global objective of these articles is to build a coin classifier, capable of scanning your pocket change and find rare / valuable coins. This is a second article in a series, so let me remind you what happened earlier (https://habr.com/ru/post/538958/).

                            During previous step we got a rather large dataset composed of pairs of images, loaded from an online coins site meshok.ru. Those images were uploaded to the Internet by people we do not know, and though they are supposed to contain coin's head in one image and tail in the other, we can not rule out a situation when we have two heads and no tail and vice versa. Also at the moment we have no idea which image contains head and which contains tail: this might be important when we feed data to our final classifier.

                            So let's write a program to distinguish heads from tails. It is a rather simple task, involving a convolutional neural network that is using transfer learning.

                            Same way as before, we are going to use Google Colab environment, taking the advantage of a free video card they grant us an access to. We will store data on a Google Drive, so first thing we need is to allow Colab to access the Drive:

                            Читать далее
                          • Implementing Offline traceroute Tool Using Python

                            • Translation

                            Hey everyone! This post was born from a question asked by an IT forum member. The summary of the question looked as follows:


                            • There is a set of text files containing routing tables collected from various network devices.
                            • Each file represents one device.
                            • Device platforms and routing table formats may vary.
                            • It is required to analyze a routing path from any device to an arbitrary subnet or host on-demand.
                            • Resulting output should contain a list of routing table entries that are used for the routing to the given destination on each hop.

                            The one who asked a question worked as a TAC engineer. It is often that they collect or receive from the customers some text 'snapshots' of the network state for further offline analysis while troubleshooting the issues. Some automation could really save a lot of time.


                            I found this task interesting and also applicable to my own needs, so I decided to write a Proof-of-Concept implementation in Python 3 for Cisco IOS, IOS-XE, and ASA routing table format.


                            In this article, I’ll try to reconstruct the resulting script development process and my considerations behind each step.


                            Let’s get started.

                            Read more →