Pull to refresh

All streams

Show first
Rating limit
Level of difficulty

The key to Sales Conversion of an American CEO or CFO

Reading time 1 min
Views 208

i’m writing this series articles to spearhead the new marketing campaign for into the American market. I will be covering a wide range of topics that will allow us to position the company in the proper way so that is excepted as a provider of High-quality software in America.


The key to converting an American CEO or CFO is the trigger point for the American business culture. The trigger point for America is responsibility.   This means in business you must be responsible. You also look for business partners that are responsible.  


But let’s take this into the newest more powerful view that we need to have now.  

The scene from the point of you of the CFO sitting at the head of the financial controls of a large hospital conglomerate. Put yourself in the mind of the CFO. What are they concerned about?  


As an American CFO they will be very concerned about whether they are being responsible in their job and responsible to the hospital, staff, shareholders, patients and the management above them. 


And this is how we get our foot in the door in this American niche market. If we present ourselves as offering something that “May” give an answer to specific problems that they know that they have, they must give us a chance to present a Presale. The reason is because they are responsible, and if there is a solution as an American Director you must explore that solution.


It would be irresponsible to not explore a potential solution.



Then it’s a simple case to actually give value in the presale meeting and convince them that we can deliver some thing that will benefit their business and profits.

Read more
Total votes 6: ↑0 and ↓6 -6
Comments 0

Top 10 Best Free Partition Manager Software for Windows PC/Laptop

Level of difficulty Medium
Reading time 12 min
Views 401

If you are searching for free partition manager software for your Windows PC, then Download the Top and best Partition Manager Software on Windows PC/Laptop.

It is a software program that lets us create, delete, shrink, expand, split, or merge partitions on our hard drives or other storage devices. Without extra software, a hard drive will be partitioned into Windows. But we can’t resize or combine them without any extra help.

The important aspect of owning a PC is to manage your hard-drive partitions very effectively. Based on categories, it divides data to allow people. For example, you can keep your multimedia files, work folders, and your programs in different partitions and install them on your system drive.

If you use your PC to double or triple-boot into various operating systems as a power user. Your SSD or HDD must be divided into smaller partitions; otherwise, it is impossible.

In 2020, in managing software partitions effectively. We help you with Windows and Linux by compiling a list of the best free partition software. So let’s read more to get the free partition manager Windows 10/8/7.

Read more
Rating 0
Comments 1

List in Java | Interface, Methods, Example

Level of difficulty Easy
Reading time 4 min
Views 181

In this topic, we will learn about what is a List in Java. How to create a List in Java? What are the methods of List in Java? The List is an interface in Java. It is extending the Collection interface in Java. This List interface is present in the java.util package in Java. A list represents a group of individual objects as a single entity where duplicates are allowed and insertion order is preserved.

Read more
Rating 0
Comments 0

Anonymous identification for groups

Level of difficulty Hard
Reading time 13 min
Views 167

The identification protocol based on the pairing function, resistant to impersonation and compatible with the instant digital signature (IDS) mode, was studied in this article. This protocol uses prover's and verifier's public keys. As a result, there is no anonymity, since certificates including personal data of their owners are issued for the mentioned keys. This article contains a description and analysis of new anonymous identification protocols for groups.

Read more
Rating 0
Comments 0

Roadmap for Managing Chaos — Planing Migration from a Monolith to Microservices

Reading time 22 min
Views 254

Roadmap for Managing Chaos - Planing Migration from a Monolith to Microservices

This article tries to provide some insight into the complexities of transitioning from monolithic architectures to microservices. Our goal is to offer a high view perspective on the various considerations and challenges that arise during such migrations, terms and keywords you will encounter and their role in this endeavor.

Read more
Rating 0
Comments 0

UX Designer Job Interview: 10 questions to answer, 5 questions to ask

Level of difficulty Easy
Reading time 6 min
Views 164

No matter how many degrees you have or how high your experience level is, your recruiters need to evaluate your knowledge of UX design as a whole. But keep in mind that a job interview is not an exam, so here you are expected not to recite the textbook definitions learned by heart, but rather share your personal understanding of UX and your role as a designer in general. Consider talking about how you define UX, what creates value in the design, what are the necessary parts of a UX design process, what are the current trends in UX. You might also be asked to explain the difference between UI and UX to see how you understand the role of each in the development process.

Read more
Rating 0
Comments 0

React — Higher Order Components (HOC)

Level of difficulty Medium
Reading time 5 min
Views 807

In the ever-evolving realm of web development, mastering advanced concepts is essential for creating robust and flexible applications. In this article, we'll delve into one of these foundational React concepts: Higher-Order Components, commonly known as HOCs. 

Whether you're a seasoned developer seeking advanced techniques or a curious beginner eager to learn, we'll walk through the creation and application of HOCs step by step. Get ready to enrich your development toolkit with this powerful approach while discovering how to enhance the readability, reusability, and maintainability of your code.

Learn it
Rating 0
Comments 0

Python Lives in Excel

Level of difficulty Medium
Reading time 5 min
Views 541

There was already news on Habr about this significant event. Indeed, it resembles a retelling of the official Microsoft press release, but that's how the 'news' should be.

Read more
Rating 0
Comments 0

High-performance network library using C++20 coroutines

Level of difficulty Medium
Reading time 17 min
Views 13K

Asynchronous programming is commonly employed for efficient implementation of network interactions in C++. The essence of this approach lies in the fact that the results of socket read/write functions are not immediately available but become accessible after some time. This approach allows for loading the processor with useful work during the wait for data. Various implementations of this approach exist, such as callbacks, actors, future/promise, coroutines. In C++, these implementations are available as libraries from third-party developers or can be implemented independently.

Coroutines are the most challenging to implement as they require writing platform-dependent code. However, the recent version of the C++ 20 language standard introduces support for coroutines at the compiler and standard library levels. Coroutines are functions that can suspend their execution, preserving their state, and later return to that state to resume the function's work. The compiler automatically creates a checkpoint with the coroutine's state.

For a comprehensive understanding of C++ 20 coroutines, refer to this article. Below, we examine a code example using coroutines and describe important points applied during implementation.

Read more
Total votes 6: ↑4 and ↓2 +2
Comments 11

How sqlalchemy uses greenlet to call an async Python function from a normal function

Reading time 5 min
Views 485

The Python language has two kind of functions — normal functions that you would use in most cases, and async functions. The latter functions are used when performing network IO in an asynchronous manner. The problem with this division is that async functions can only be called from other async functions. Normal functions, on the other hand, can be called from any functions — however, if you call a normal function that does a blocking operation from an async function, it will block the whole event loop and all your coroutines. These limitations usually mean that when writing an using Python`s asyncio, you can`t use any of the IO libraries that you use when writing a synchronous application, and vice versa, unless a library supports usage both in sync and async applications.

Now, the question is, in case you are developing a large and complex library, that, say, allows users to interact with relational databases, abstracting away (some of) the differences between the SQL syntax and other aspects of these databases, and abstracting away the differences between the drivers for that database, how do you support both sync and async usage of your library without duplicating the code of your library? The way sqlalchemy is organized is that regardless of what database and driver for it you are using, you will be calling functions and methods related to Engine, Connection, etc classes, which will do some general work independent of database, then apply the logic specific to your database and finally, call the functions of your database driver to actually communicate with the database. If you are using Python`s asyncio, the database driver will expose async functions and methods, but the rest of the library that is driver‑independent would ideally remain the same. However, the issue is that that you can`t call the async functions of the driver from the normal functions of the core of the library.

Read more
Total votes 4: ↑4 and ↓0 +4
Comments 1

React Custom Hook: useTimeout

Level of difficulty Medium
Reading time 2 min
Views 1K

One of the significant advantages of this custom hook is that it ensures the callback function remains up to date even if it changes during component re-renders. By using a useRef to store the callback reference, the hook guarantees that the latest version of the function is always called.

Read more
Total votes 4: ↑2 and ↓2 0
Comments 1

A (more) accurate camera sensor dynamic range measurement

Reading time 7 min
Views 466

Hello, everyone! In this post, let's talk about how to (more) accurately measure the dynamic range of a camera sensor and what can be done with these measurements.

Of course, I am not an expert in computer vision, a programmer or a statistician, so please feel free to correct me in the comments if I make mistakes in this post. Here my interest was primarily focused on everyday and practical tasks, such as photography, but I believe the results may also be useful to computer vision professionals.

Read more
Rating 0
Comments 2

Dealing with sanctions and the other difficult question

Reading time 3 min
Views 620

In our last article we covered the anatomy of a presale meeting gone wrong. In that article we posed some questions for everyone to think about. What exactly does an American company wanting to hire a Russian custom software development company, feel about this Russian company? What are they afraid of? What are their concerns?

In the end we came up with five concerns.

1. Is the company a fly by night company, is the company a one-day company?

2. Will they be professional in supporting or developing the software that they've sold to us?

3. Will they have proper data security?

And now the two new ones that are because of the mess the world is in now...

4. Will they be able to complete the project on time? This includes proper internet access an infrastructure to support IT.

5. Where is your team located? Are you still located in Russia?

Now we're going to look at the last 2, number four and five.
However let's look at number 5 first.

Many IT companies today if they want to work with the United States or even Europe they must not have their developers located inside of Russia. Matter of fact it goes so far that if a developer is located in Russia and they're using a VPN and somehow the VPN is breached the credentials are canceled for that developer to work on the project.

It's for this reason that Russian IT companies are opening offices around the world. Let's look at Armenia as an example.

Wait a minute I have to go back for a second...... We must discuss how countries look to America Canada and Western Europe. I basically give them a score based on questions that are brought up in the mind of the American company or European company.

Read more
Total votes 6: ↑4 and ↓2 +2
Comments 2

React Custom Hook: useStorage

Level of difficulty Medium
Reading time 3 min
Views 1.3K

One of the key advantages of this custom hook is its simplicity. You can use it to store any type of data, such as strings, numbers, or even complex objects, with just a few lines of code. Additionally, useStorage handles the serialization and deserialization of data for you, so you don't have to worry about converting values to and from JSON.

Read more
Total votes 3: ↑2 and ↓1 +1
Comments 0

2. Information Theory + ML. Mutual Information

Reading time 11 min
Views 290

In Part 1, we became familiar with the concept of entropy.

In this part, we will delve into the concept of Mutual Information, which opens doors to error-resistant coding, compression algorithms, and offers a fresh perspective on regression and Machine Learning tasks.

It is an essential component that will pave the way, in the next section, for tackling Machine Learning problems as tasks of extracting mutual information between features and the predicted variable.

Here, there will be three interesting and crucial visualizations.

The first one will visualize entropy for two random variables and their mutual information.
The second one will shed light on the very concept of dependency between two random variables, emphasizing that zero correlation does not imply independence.
The third one will demonstrate that the bandwidth of an information channel has a straightforward geometric interpretation through the convexity measure of the entropy function.

In the meantime, we will prove a simplified version of the Shannon-Hartley theorem regarding the maximum bandwidth of a noisy channel. Let's dive in!

Read more
Total votes 2: ↑2 and ↓0 +2
Comments 0

How to make a destructible landscape in Godot 4

Level of difficulty Easy
Reading time 2 min
Views 600

In my just released game “Protolife: Other Side” I have the destructible landscape. Creatures that we control can make new ways through the walls. Also, some enemies are able to modify the landscape as well.

Let me describe how it may be done on the Godot engine.

Read more
Total votes 4: ↑3 and ↓1 +2
Comments 0