Developers Club geek daily blog

Take-off and falling of SVG

1 year, 2 months ago
imageSVG — the markup language of scalable vector graphics entering a subset of XML was created in 1999, but only in the 2011th it was included in recommendations of W3C. Amazingly, but in eleven years (from 2000 to 2011) SVG did not undergo essential changes. Nevertheless, it nevertheless managed to gain trust and wide recognition of developers.

One of such developers watching evolution of SVG from the moment of its emergence up to now carried out digression to history of development of language. Just now, after many years, he managed to understand the reasons of progress and failures of SVG. The author collected all the supervision and conclusions in the chronicle "Take-off and falling of SVG". The post is prepared especially for the corporate PayOnline block, the company which is engaged in the organization of payments on the websites and in mobile applications. Further directly transfer.


Somewhere in 1998 my former colleague at that time working in Adobe glanced in my office to tell me about absolutely new technology. She knew that it will be interesting to me. The speech then went about PGML or "Precision Graphics Markup Language" which represented no other than Adobe variation on XML for vector graphics. John Uornok, one of founders of Adobe, then told about it the following:

Read more »


We test the Russian E-Class server platform from "T-platform"

1 year, 3 months ago
In the previous article about domestic producers of server hardware I tried to unveil features of all cycle of production and assembly of servers. Results of last vote showed that you trust products of A-brands more. But, as we know, very few people make component parts independently — for this purpose there are already checked global manufacturers. And one of the main differences of A-brands, in addition to service, is development of unique design of the body, motherboard, discrete controllers, writing of own BIOS and FW.
In one of projects of the STSS company on delivery of server hardware, I faced the server platform designed at us in Russia.
I want to devote this article just to this domestic development from the T-Platformy company.
The E-Class server platform is based on the advanced V210 motherboard under Intel Xeon E5-2600V3 processors.
It is developed in Russia with perspective of transfer of production of electronic payments on the territory of the Russian Federation. The motherboard provides the high level of information security thanks to a possibility of installation of modules of a trusted boot in a form factor of mPCIe which meet the requirements of FSTEC and FSB for the information protection which is trade or state secret.

Read more »


Shortcuts in JavaScript

1 year, 3 months ago


Learning any programming language, it is useful to know about its features and to be able to use effectively language constructions. I want to share with you shortcuts for JS. These reductions in certain cases can facilitate reading a code, and also it is essential to reduce its quantity. However it is necessary to remember that they can play a dirty trick with you and if to use them everywhere, your code will stop being read and supported.

Read more »


How to make the password reliable and memorable

1 year, 3 months ago
Passwords guard our data. And degree of their reliability plays an important role. It is clear, that and to crack the difficult password it will be difficult. There is a lot of only personal accounts and systems demanding authorization. And to remember tens if not hundreds of different combinations from characters — are almost impossible.



How to make the password more reliable and at the same time not to forget it? There are several options …

Read more »


Bizagi — system of modeling, development and execution of business process. The description with an example

1 year, 3 months ago
I wrote this article throughout article about BPM systems. And here I want to tell about the principles of work of BPMS on the example of specific system — Bizagi. I will try to explain how there is a process of modeling, development and execution of business process in this system on a practical example.

Bizagi: Model. Build. Run

Read more »


What is BPMS

1 year, 3 months ago
Today in domestic business the new type of the software for business process management, namely, BPMS systems gains popularity. And, naturally, their emergence raised many questions. Why they are necessary? How they work? In what their fundamental difference from other options of automation of business?

When I for the first time faced BPMS, I also had all listed above questions. I far understood not at once why the new tool why it is impossible to implement all business processes, necessary for successful work, in already available systems of accounting or CRM, and in what fundamental difference of BPMS from other options of automation of business processes is necessary.

In this article I want to tell about what is BPMS systems why they are necessary and what process approach differs from traditional methods of work in. I will not speak about technical aspects of BPMS (about modeling and development of business processes), the following article will be devoted to it. Now I will try to reveal entity and sense of BPMS the most simple and clear language:

Read more »


Saundskvotting — a new type of fraud with domains

1 year, 3 months ago
There was a new kind of cybersquatting named with a saundskvotting (from English "soundsquatting"). The action essence also consists in illegal use of domain names, only by means of homophones — words of identical sounding and at the same time different writing (for example, "eight" and "ate" — are written differently, and aurally it is difficult to distinguish them). Internet swindlers or saundskvotter select popular domains and find to them conformable names. As a result they receive the websites to which attendance thanks to conformable similarity to popular resources is guaranteed.



Read more »


Young hackers 414s

1 year, 4 months ago
The name of command 414s sounds so as if it is some fashionable rock group of the 80th. But heroes of this history became famous not for music, and computer crackings at all. By means of normal home computers they hacked about ten computer systems of serious organizations, such as Los-Alamossky National laboratory to New Mexico, the Oncological center Memorial Sloan-Kettering in New York, as well as school of the city of Milwaukee. Young hackers had so a good time and only satisfied the unreasonable inquisitiveness.

The command 414s consisted of group of teenage supporters. But the public only six young men, age from 16 to 22 years opened. The group on a twist of fate gathered — their meeting and a close acquaintance was promoted by research club of boy scouts which was sponsored by the known company IBM. The main objective of this organization was to teach kids to use computers. And pupils exceeded any expectations. So exceeded that since 1983 got under close attention of FBI and became famous for the whole world.



Read more »


Solar energy for date-tsetrov

1 year, 4 months ago
General curiosity was initiated by news from the Apple company about construction of a new data-center worth about 2 billion dollars which will receive energy only from renewable sources. It means to provide with energy the area more than 100 thousand sq.m. The project is one of the most expensive. The considerable part of power supply will be made by solar energy of the local company Salt River Project which has production volume about 70 MW.



Read more »


As people with sight violation use the Internet and modern technologies. Research of Yandex

1 year, 4 months ago
Today, on November 13, International day of blind people. It is dated for birthday of the teacher Valentin Gayui which in 1784 opened on personal means the first-ever school for blind children. It is not a holiday, but the memorial urged to remind society of existence by a number of people with sight violations. In the modern world the most part of life of people moved to on-line that opened before people with restrictions of health new opportunities, but also generated new challenges.

Диаграмма по данным таблицы 5

To work with computer devices and to use the Internet, people with violations of sight apply auxiliary technologies which actually are their white cane in digital space. However work of such users with the computer equipment has the specifics in comparison with ordinary able to see people. In particular, among them a few other devices, operating systems and browsers, than in the market in general are most popular. It means that thinking of availability of the services to blind persons, it is necessary to consider these features.

The problem is that to take information on technical preferences blind and visually impaired often just there is no place. There are corresponding researches of English-speaking audience, but on the RuNet such information is absent. Therefore we decided to conduct research of technical preferences of users of the RuNet with violations of sight which most important results we want to share with all.

Read more »