Developers Club geek daily blog

Чему сфера технологий научилась у Линуса Торвальдса

3 years, 11 months ago


Джим Землин внес лепту в развитие трех крупнейших технологических трендов последнего десятилетия: мобильных вычислений, вычислений в облаке и открытого ПО. Будучи исполнительным директором Фонда Линукс, он применяет свой опыт для ускорения внедрения систем Линукс и поддержки будущего вычислительных систем. Землин сотрудничает с крупнейшими технологическими компаниями в мире, и они вместе формируют будущее вычислений на серверах, в облаке и новых мобильных устройствах.

Землин ? признанный в блогосфере автор статей о Линукс и открытом ПО. Его комментарии об изменениях в технологической экономике регулярно цитируют СМИ. Землин также консультирует разнообразные стартапы и входит в руководящие советы таких организаций, как Глобальный Экономический Симпозиум, Открытое ПО для Америки и Китайский Союз в Поддержку Открытого ПО.

Read more »


Показы ?Кремниевой долины? с Бобуком, вице-президентом ABBYY, основателем QIWI и другими парнями из IT + обучение + бесплатные коды на онлайн-версию

3 years, 11 months ago
?Кремниевая долина? ? это сериал про шестерых молодых разработчиков в Сан-Франциско, пытающихся начать свой бизнес. Пилот был снят в 2013 году, и канал HBO (который ?Игра престолов?) сначала профинансировал создание сезона, а потом ? ещё и сразу второго.


Узнаёте Гугл?

Уж не помню, кто из нас притащил эту заразу в коворкинг, но через 5 минут ?перекура? мы взяли и написали Амедиатеке ? правообладателю в России.

Через 20 минут мы вышли на их главную по PR, а она на встрече со своим руководством договорилась устроить показы в #tceh с приглашёнными ?звёздами? отечественного IT-бизнеса. Сейчас расскажу, что получилось.

Read more »


Copyright against gunpowder and arbalest

3 years, 12 months ago
image

I often write about parallels in history. Because, in my opinion, everything is interconnected: has told? And?, and you were already called? B?; has whispered very quietly? ZYCh?, and the loud in reply is already heard? YAT?. The copyright in this sense represents the most fertile field for the analysis.

Let's take, for example, one of the most widespread points of panel of standard license agreements? will lock transfers of object to the third party. If you never read agreements (I by profession should read them), I will tell, what this situation is nearly the most important effect of your click on? I have read and I accept?.

The modern copyright is constructed that having bought disk without the author's consent, the user cannot copy it, arrange public show; the program downloaded online cannot be transferred to the friend. In Art. 25 of the Law of Ukraine? About copyright and adjacent the rights? it is called? reproduction in house conditions for the personal purposes or circle of family?. Article 26 of the Act of the Russian Federation? About copyright and allied rights? does not contain the touching term? family circle?, ordering to trade on object of copyright only. Justifications this prohibition can find the weight and therefore I will not quote them in legal and okoloyuridichesky literature. I suggest to look in history back.

Read more »


Ice Bucket Challenge as atonement of sins

4 years ago
image


Recently I was called on Ice Bucket Challenge. I think, it is excessive to speak where I have friendly sent the author of this call.

Nevertheless, I am grateful to it since he has set me thinking: and that it everything around from mind of poskhodila with Ice Bucket Challenge? Why this charitable campaign has gained universal popularity? Every day on the planet starts set of charity events, and any of them still did not make such mad success.

I have found answers to these questions.

Read more »


The analysis of the flowed-away passwords of Gmail, Yandex and Mail.Ru

4 years ago
Quite recently bases of passwords of popular mail services have got to public access [1,2,3] and today we will analyze them and we will answer number of questions about quality of passwords and possible source (or sources). Also we will discuss metrics of quality of separate passwords and all selection.

Some anomalies and patterns of bases of passwords, perhaps are not less interesting, they will be able to shed light that could be data source and how this selection is dangerous from the point of view of the normal user.

Formally, we will consider the following questions: passwords in base are how reliable and whether they could be collected by dictionary attack? Whether there are signs of phishing attacks? Whether could? leak? given to be the only data source? Whether this base during the long period or data only could be accumulated? the fresh??

Structure of article:

  1. Description of data
  2. Non-valid passwords and not - passwords
  3. Distribution of length of passwords
  4. Distribution of reliability of passwords
  5. Dictionary attack
  6. Top of passwords
  7. Selection of Gmail
  8. Selection of Rambler
  9. Analysis of open sources
  10. Conclusion

Read more »


Microsoft buys the Minecraft company developer for 2 billion US dollars

4 years ago


On the horizon one of the most large deals in the game world has loomed: the Microsoft corporation, apparently, closes the transaction on acquisition of Mojang, the Minecraft developer, for 2 billion US dollars.

Officially the corporation does not report about it, equally, as well as Mojang, but murder will out: at once some known mass media were written that the transaction is close to closing.

Read more »


Than designers are worse than musicians?

4 years ago
image
Not so long ago I happened to be present on the next round table about problems of the organizations of collective management (OCM). These organizations (if who does not know) generally are engaged in that raise money with cafe-bars-restaurants for the music sounding there, and distribute them between authors. The payment is raised even if the owner of bar has bought disk. Purchase of the physical medium does not exempt the owner of bar from payment of this collecting.

Representatives of these complained to the EYE about the low level of the income, and on different harmony repeated the phrase that the author has to have the right to receive money for the work. The example of the western countries where the mechanism of receiving remuneration for use of allied rights works was given and brings in to authors the good income. Again, participating in legislative discussions, I heard complaints about the people and its legal culture. Like, authors at us are good, but the country not such, and the people culture did not leave.

I not iron? too was upset for authors. Has become sad. But here I was visited by thought. And after all to designers is even worse.

In particular, we will follow example charges for the music sounding at restaurants. In this question array of problems: distribution conditions, definition who exactly will collect, etc. But I want to stop on the principle which is the basis for collecting.

Read more »


Your anonymous publications in Secret after all are not anonymous

4 years ago


? White hacker? Ben Kaudill (Ben Caudill) has already half eaten up the sandwich, it depends accidentally would reach for the iPhone, has several times run finger over the screen, and then has given him to me with words? You have written it??

Yes, I have written it, but nobody had to learn about it. It showed me one of my posts in Secret, the popular application which allows to share anonymously the most intimate secrets with the friends, I repeat? nobody will know that the secret belongs to you. Some minutes ago I have given to Kaudill the e-mail address and it was everything that it was required to it to find my secret, eating greedily sandwich in the heat of slow lunch in Palo Alto.

Frankly speaking, my secret was quite boring, but the general flow in Secret consists from quite sharp and frivolous messages? hearings from the Silicon valley or deeply personal recognitions as:? He has made me the proposal, but I have been forced to refuse. I thought, what is it? that's nothing unusual?, but my heart is broken now?. Kaudill could enter e-mail address or phone number of any user of Secret into that moment and to read its secrets.

Read more »


As sanctions will affect the Russian market of online advertizing

4 years ago
image

The foreign policy situation in the world continues to remain very intense, and many users of RuNet continue to discuss how sanctions can affect different aspects of life in the country. It is really interesting question as sanctions and crisis situation can have impact even on those areas where especially did not wait for it? for example, in online advertizing.

Read more »


Interaction with hi-tech the world Intel eyes

4 years ago
Technology corporations show the vision of the future from time to time? both far, and close. Not once or twice Microsoft, IBM, Intel, HP and other large techno corporations showed how they see the world, technologies and people of the future. By itself, this vision is updated, in process of development of technologies.

The other day the Intel corporation has decided to show that can already represent our world in year - another. Actually, the majority from shown it is possible to organize already now, but and usual for many of us it is impossible to call such conditions universal in any way.

Intel sees the world wireless, mobile, organized and reliable. Some of the provided technologies, as well as it was told above, are already developed, others? are developed. Anyway, it is worth examining possible option of development of technologies, agree.

Here and video:

Read more »