Pull to refresh

My feed

Type
Rating limit
Level of difficulty
Warning
To set up filters sign in or sign up
Article

Context switching

Level of difficultyEasy
Reading time4 min
Views122

Hi! My name is Slava. I am currently working as a leading Product and Senior Project Manager at Uzum Bank. One of the leading digital banks in Uzbekistan.

We are growing fast. Really fast. Speaking in numbers, our interest income has increased x10 over the past year (!).

And, as in any similar projects with rapid growth, we constantly lack qualified personnel. So I and my colleagues always have a lot of work to do.

I have two teams with completely different products, and I also manage some projects as a project manager. And I have my own small business – an online tea and coffee shop. And in conclusion, I am the father of two small children)

So, I hope this makes it clear to you that I have faced all the problems, such as working at night, lack of sleep, working in a noisy environment, calls with crying children in the background, calls during breakfast on the wheels, when I take a child to kindergarten (never do that!) etc. and so on and so forth XD

You can ask me: how do you manage to do everything?
The answer is simple: I don't XD

But. This forces me to build a system that helps me quickly switch between different types of tasks, focus quickly and complete them over and over again.

So, today I want to tell you about one of the things, that can completely ruin your day. And sometimes – whole week. It's called "context switching".

Read more
Rating0
Comments0
Article

Machine Learning and Data Science: Academia vs. Industry

Level of difficultyMedium
Reading time8 min
Views72K

Machine Learning (ML) technologies are becoming increasingly popular and have various applications, ranging from smartphones and computers to large-scale enterprise infrastructure that serves billions of requests per day. Building ML tools, however, remains difficult today because there are no industry-wide standardised approaches to development. Many engineering students studying ML and Data Science must re-learn once they begin their careers. In this article, I've compiled a list of the top five problems that every ML specialist faces only on the job, highlighting the gap between university curriculum and real-world practice. 

Read more
Total votes 1: ↑1 and ↓0+1
Comments0
Article

Как я НЕ стал разработчиком, или О проблемах на пути начинающего специалиста

Level of difficultyEasy
Reading time11 min
Views11K

Привет, Хабр!

Меня зовут Дмитрий. Я успел отучиться в колледже, поступить в университет, окончить стажировку в Ozon Tech, перейти в штат и по сей день не прекращаю учиться, учиться и ещё раз учиться. Сейчас я работаю младшим аналитиком информационной безопасности в отделе Compliance и безопасности данных.

Это история о том, как я пару лет пытался войти в разработку, но зашёл не в ту дверь и остался, о постоянном обучении, а также о том, как найти то, что тебе по душе, и при чём тут стажировка.

Read more
Total votes 40: ↑36 and ↓4+35
Comments22
Article

The Salmon Project: how to counter Internet censorship effectively using proxies with user trust levels

Level of difficultyMedium
Reading time4 min
Views139

Governments in many countries restrict citizens' access to information and services on the Internet in one way or another. Combating such censorship is an important and difficult task. Usually simple solutions cannot boast about high reliability or long-term efficiency. More complex methods of overcoming blocks have disadvantages in terms of usability, low performance, or they do not allow you to maintain the quality of Internet use at the proper level.

A group of American scientists from the University of Illinois has developed a new method of overcoming blocks, which is based on the use of proxy technology, as well as segmenting users by trust level to effectively identify agents working for censors. We present you with the main theses of this work.

Description of the approach

Scientists have developed the Salmon tool, a system of proxy servers operated by volunteers from countries without restrictions on Internet use. In order to protect these servers from blocking by censors, the system uses a special algorithm for assigning a level of trust to users.

The method involves exposing potential censor agents that pose as ordinary users in order to find out the IP address of the proxy server and block it. In addition, countering Sybil attacks is carried out through the requirements to provide a link to a valid social network account when registering in the system or to receive a recommendation from a user with a high level of trust.

How it works

It is assumed that the censor is a state–controlled body that has the ability to take control of any router within the country. It is also assumed that the task of the censor is to block access to certain resources, and not to identify users for further arrests. The system cannot prevent such a course of events in any way – the state has plenty of opportunities to find out what services citizens use. One of them is the use of honeypot servers to intercept communications.

It is also assumed that the state has significant resources, including human ones. The censor can solve tasks that require hundreds and thousands of full-time employees.

A few more basic theses:

Read more
Total votes 1: ↑1 and ↓0+3
Comments0
Article

How to create a LEGO animation without getting burned out?

Level of difficultyEasy
Reading time4 min
Views246

Hello everyone, this is Denis Weber.

Today I’m going to talk about what happens if you combine LEGO and the iconic movie Terminator 2. I’ll show you how I created a real LEGO trailer and what came out of it. I like doing such large-scale projects and if you have any cool ideas, let me know in the comments.

If you prefer the video format, you can watch it here.

Read more
Total votes 2: ↑2 and ↓0+2
Comments0
Article

Utilizing Wearable Digital Health Technologies for Cardiovascular Monitoring

Level of difficultyMedium
Reading time17 min
Views248

Wearable Digital Health Technologies for Monitoring in Cardiovascular Medicine

This review article presents a three-part true-life clinical vignette that illustrates how digital health technology can aid providers caring for patients with cardiovascular disease. Specific information that would identify real patients has been removed or altered. Each vignette is followed by a discussion of how these methods were used in the care of the patient.

Read more
Total votes 6: ↑3 and ↓3+2
Comments0
Article

How to choose a proxy network for business: 3 practical tips

Level of difficultyEasy
Reading time2 min
Views320

Masking an IP address with a use of a proxy is necessary not only to circumvent censorship on the Internet and watch TV series. In recent years, proxies have been increasingly used to solve corporate objectives from application testing under load to competitive intelligence. Habr has a good overview of the various options for using proxies in the business sector.

Today we will talk about what to pay attention to when choosing a proxy network for solving such corporate objectives.

Read more
Total votes 1: ↑1 and ↓0+3
Comments0
Article

Overview: Six ways to use residential proxies for solving corporate objectives

Level of difficultyEasy
Reading time5 min
Views414

IP address masking may be required for various tasks – from accessing blocked content to bypassing anti-bot systems of search engines and other online resources. We found an interesting post about how this technology can be used to solve corporate objectives.

There are several options of implementing a proxy:

Read more
Total votes 1: ↑1 and ↓0+3
Comments0
Article

How to increase capacity of drive from 32 to 256 GB for Asus E200H laptop

Level of difficultyEasy
Reading time5 min
Views702

Hi Everyone.

Recently I got Asus E200H laptop, which I would like to use as a portable computer to work with a high-precision equipment.

Within the scope of the article we will perform the experiment about the upgrade of the default 32 GB eMMC capacitor to 256 GB and will test it.

Have a nice reading!

Read more
Total votes 4: ↑4 and ↓0+6
Comments0
Article

How to practice user empathy in UX design and make product more accessible

Level of difficultyEasy
Reading time6 min
Views298

According to the Oxford Dictionary, empathy is “the ability to understand and share the feelings of another”. In UX, there is a special term “user empathy”. It refers to the ability of UX designers to fully understand what users need from a particular software product. Having user empathy and basing design solutions around users” comfort is one of the most true indicators of a designer”s professionalism. Without that, any product a designer works on has a high chance of turning out to be pointless. Apart from having empathy as a soft skill in general, there are several ways a designer can practice user empathy through different UX methods and techniques. In this article we would like to talk on how a UX designer can treat users with empathy and make the product more accessible for different groups of target audience.

Read more
Total votes 2: ↑2 and ↓0+4
Comments0
Article

VS Code Extensions You Need in 2024: My Top Picks

Level of difficultyEasy
Reading time2 min
Views1.5K

Welcome to my latest article. If you haven't caught my previous ones, I highly recommend checking them out for some really useful content. Today, I'm excited to dive into something special: my top 10 favorite VS Code extensions. These tools are incredibly popular among developers globally, and I believe they're essential for anyone serious about coding.

Read more
Total votes 3: ↑1 and ↓2+1
Comments4
News

Machines are learning to lie: The Dark Side of Intelligent Systems

Reading time1 min
Views402

Recent research published in the journal Patterns has shown examples of how artificial intelligence (AI) systems are learning to manipulate information and deceive people. The concept of deception by AI dates back to Alan Turing's famous 1950 paper, which introduced the "Imitation Game" - a test that evaluates whether a machine can demonstrate human-like intelligence.

Read more
Total votes 1: ↑1 and ↓0+3
Comments0
Article

Top 10 Google Sheets Features to Enhance Your Productivity

Level of difficultyEasy
Reading time3 min
Views1.1K

It's been a while since my last appearance, but I'm excited to be back and to share something truly special with you. In this article, we'll explore my top 10 Google Sheets features that are guaranteed to boost your productivity, speed up your workflow, and make your data handling more efficient. So, without further ado, let's dive into these game-changing tools!

Read more
Total votes 3: ↑3 and ↓0+4
Comments1
Article

Simple complex programming

Level of difficultyMedium
Reading time5 min
Views850


I always pay attention to assessing the complexity of programming in a particular language. Programming is indeed not an easy task and this is perceived as a fact and usually does not require any confirmation.


But the concept of “complexity” is akin to the term “heap”. For some, five coconuts is not so much, but for someone who ate one and “didn’t want any more,” this means that even one coconut will be too much for him.


The same goes for the complexity of programs. It seems that the constant increase in the complexity of programs is obvious to everyone and is observed in all areas of application of IT technologies, and programming languages themselves become more and more complex as they develop, but assessing “complexity” using numerical metrics is a problem. obviously a thankless task, but also “You can’t manage what you can’t measure...”


Typically, talk of “complexity” only implies value judgments without any numerical evaluation. And since I am personally interested in the issue of the complexity of programming languages, I decided to calculate the complexity of implementing the gcc compiler on some conditional “parrots”. What if we could see some patterns of difficulty changing over time?

Read more →
Total votes 3: ↑3 and ↓0+4
Comments0
Article

Building blocks in programming languages

Level of difficultyMedium
Reading time5 min
Views535

Practically all programming languages are built either on the principle of similarity (to make like this one, only with its own blackjack) or to realize some new concept (modularity, purity of functional calculations, etc.). Or both at the same time.


But in any case, the creator of a new programming language doesn't take his ideas randomly out of thin air. They are still based on his previous experience, obsession with the new concept and other initial settings and constraints.


Is there a minimal set of lexemes, operators, or syntactic constructs that can be used to construct an arbitrary grammar for a modern general-purpose programming language?

Read more →
Total votes 2: ↑1 and ↓1+2
Comments0
Article

What is to see under the Black Sun of Giedi Prime?

Level of difficultyEasy
Reading time6 min
Views876

The director Denis Villeneuve and cinematographer Greig Fraser in their Dune: Part Two movie made a curious decision to film the scenes on the surface of the Giedi Prime planet in the infrared spectrum. It turned out to have interesting aesthetics and there are some interesting related physics to discuss and speculate about how realistic the look of it is.

Read more
Total votes 5: ↑5 and ↓0+7
Comments0
1
23 ...