2 years, 12 months ago
Hi, Habr! Second day of online broadcast of the main Chrome-action of this year: Google Chrome Dev Summit 2015 will begin very soon!
In a night nothing happened to geography, Palo Alto both was on other party of the globe, and is. Forward translation will take place in not the most convenient time (the beginning — at 20:30 on Moscow time), but even if you will not be able to look at it on the air, videos will become available tomorrow.
2 years, 10 months ago Good afternoon! Our command is engaged more than a year in development of an e-mail client Moyofis for the Android platform (applications Moyofis we is developed for all popular platforms).
Today we want to tell about technologies which we use in development of our e-mail client. Namely, about Dependency Injection mechanisms in the form of Dagger 2 library. In article we will describe the main parts of library and we will tell how to use them in the Android-project.
The concept of the Internet on magnets consists in that not to depend on the software, the protocol or a method of data transmission. Not important how you receive the file having a magnet you can will make sure that you received that you ordered.
For creation and updating of the magnetic website with a set of pages we need a digital signature. It is necessary to designate a source and to connect among themselves pages of the website. For its creation and use it is possible to use GnuPG packet.
3 years agoFrom the translator: I present to yours transfer system VM. However I did not manage to open a question as deeply as it is provided in this work. Therefore I decided to share transfer with readers. Vendors of operating systems face this problem one or two of time a decade: they need to transfer the user base from an old operating system on their very different new OS, or they need to pass from one architecture of a CCP to another with saving of a possibility of start of old applications without modifications, and also to help third-party developers to port the applications on new OS.
Let's consider how it occurred in the last 30 years, on examples of MS DOS/Windows, Apple Macintosh, Amiga OS and Palm OS.
3 years ago
The NSA published data about the vulnerabilities in different software products found by them. From these data it is visible that 91% of such vulnerabilities in software go to the analysis to vendors for release of updates to products, and the intelligence agency leaves other 9% for itself "for the purpose of ensuring national security". Reuters specifies that charges of the NSA that concealment of data on vulnerabilities undermines immunity to cyberattacks for the companies of the USA using given software were the cause for the publication of data.
Data of the runaway agent of the NSA Edward Snowden, and also research of some families of malicious software by the different anti-virus companies show that the intelligence agency used different backdoors for receipt of the necessary information, and 0day exploits for their reserved installation. Stuxnet and Regin are those malicious applications on which speculation about their belonging to the NSA is conducted most actively.
2 years, 11 months ago
We invite all to join our webinar "Reduce a way from idea to the market with Databoom" which will take place on Wednesday, November 25, at 16 o'clock Moscow time. This webinar enters "week of webinars with startups" from Microsoft.
In this webinar we will in detail tell about the databoom service and we will show how databoom can be used for fast prototyping of applications.
2 years, 11 months ago
Such architecture is familiar to you? A round dance of the demons dancing between cache and storage.
What minuses of such architecture can be noted? Solving problems within such architecture, we face a heap of questions: what language (and?) to take what I/O framework to select how to synchronize cache and storage? Heap of infrastructure questions. And why to resolve infrastructure issues when it is necessary to solve a problem? Certainly, one may say, that we like certain X and Y technologies and to transfer these minuses to a framework of ideological. But it is impossible to deny the fact that data are had on somebody distance from a code (the picture higher) that adds latency that can reduce RPS.
The purpose of this article — to tell about alternative which is constructed based on Nginx as web server, balancer and Tarantool as App Server, Cache, Storage.
2 years, 10 months ago
Information technologies become an integral part of products and services of new IT style in which business expects to receive the requested resources under new applications almost instantly. IT resources, in a paradigm of new requirements from modern applications, have to be selected, used, return and be reused automatically from the general pool of nodes of calculations, storage, and a network.
2 years, 11 months ago
Friends, you to me, of course  , will not believe, but there was Drupal 8. Recently many questions on what to esteem, look, listen for studying of the eight arrive. Very many feel not quite surely and ask questions: to pass to it or not to pass, Drupal or not, and to all other is live.
In this article I will express the opinion on this sore and a topic of the day, and also I will share with you as a bonus the list of useful materials which gathered based on all previous releases of the Drupal-digest and which, I hope, you will be helped.