1 year, 1 month ago
Passwords guard our data. And degree of their reliability plays an important role. It is clear, that and to crack the difficult password it will be difficult. There is a lot of only personal accounts and systems demanding authorization. And to remember tens if not hundreds of different combinations from characters — are almost impossible.
How to make the password more reliable and at the same time not to forget it? There are several options …
1 year, 1 month ago Yes, for some reason not all clients want to work in such convenient and black terminal, the panel completely does not satisfy their esthetic requirements, and in general — "where my such darling and convenient VNC?". question of a habit and taste
In this article an example of installation and the VNC server setup and a graphic cover (GUI) on the example of OC Debian 8 jessie will be reviewed.
Thanks to sensational scandal between the Target and Ashley Madison companies, cases when we become witnesses of how cooperation with third-party service providers can do harm to the "elastic" environment — where devices became frequent, services and applications regularly work in the intensive mode, thereby, giving to hackers an opportunity to get into networks of the enterprises. Here five of widespread threats of work-related "foreign" suppliers:
Recently in the West the tendency to decrease in use of the electric power with the NPP for the organization of power supply of large enterprises is observed. Russia nevertheless does not hurry to refuse peaceful atom pays more and more attention to development of the NPP and finding of opportunities for the most rational use of their resources.
News of construction of one of the largest and powerful data-centers of Russia directly near the Kalinin NPP became confirmation of it.
1 year, 1 month ago
There was a new kind of cybersquatting named with a saundskvotting (from English "soundsquatting"). The action essence also consists in illegal use of domain names, only by means of homophones — words of identical sounding and at the same time different writing (for example, "eight" and "ate" — are written differently, and aurally it is difficult to distinguish them). Internet swindlers or saundskvotter select popular domains and find to them conformable names. As a result they receive the websites to which attendance thanks to conformable similarity to popular resources is guaranteed.
So-called machine learning does not cease to surprise, however for mathematicians the success reason is still not absolutely clear.
Somehow few years ago at supper, to which I was invited, the outstanding specialist in the field of differential geometry Eugenio Calabi volunteered to devote me in a subtlety of very ironic theory about a difference between adherents of pure and applied mathematics. So, having reached a deadlock in the researches, supporters of a pure mathematics quite often narrow a perspective, trying to bypass an obstacle thus. And their colleagues specializing in applied mathematics come to a conclusion that current situation indicates the need to continue studying of mathematics for the purpose of creation of more effective tools.
I always liked such approach; thanks to it it becomes clear that applied mathematicians will always manage to involve new concepts and structures which continually appear within fundamental mathematics. Today, when the question of studying of "big data" – too volume or difficult information blocks which do not manage to be understood is on the agenda, using only traditional methods of data handling – the tendency especially does not lose the relevance.
As practice shows — the big part of clients does not monitor the used resources, the services rented by them in any way (especially it is noticeable on the cheap services VPS from $3). That is, after installation of system and setup of software, necessary for the project, the future of the server is assigned to a case. And, when there are problems with operability of the server, information for the analysis has not enough.
Except the set and configured logging in atop (which also meets not often), logs of system, it would be desirable to have more information with which it is possible to work.
"There are a lot of letters", "did not master": as shows experience, programming demands existence of certain capabilities which are possessed by only small percent of the population of the earth. The modern mode on express courses in this area generates more and more speculation on a subject that does not promote growth of number of the qualified programmers at all.
This post is prepared taking into account realities of Great Britain, and therefore it is absolutely logical that in other countries the situation can look differently, in particular, so far as concerns the social status of software developers.
Mass media do not cease to cover the topic of shortage of the qualified programmers ("programmers", "encoders", "software developers" as all terms mean one and too, I will use from as interchanged). Disputes over an occasion of the low level of qualification of programmers are constantly conducted. In fact we are simply not able to prepare the frames corresponding to "solid requests of tomorrow". Here what is written by The Telegraph:
"According to data of Scientific Council, by 2030 the number of specialists in the field of information communication technologies will grow by 39%, and in the report of O2 for 2013 it was noted that the satisfaction of demand for such specialists during the period till 2017 will require about 745 000 new employees.
Besides, by results of the researches conducted last year City &Guilds, three quarters of employers from the sphere of IT, computer and information services noted explicit shortage of qualified personnel while 47% of respondents declared inability of the operating education system to train good specialists".
1 year, 1 month ago
There comes the moment when virtual hosting to become insufficiently and your project and "to ask" on the server. Not always for new tasks you need a dedicated server at once, but at least it is worth beginning with the virtual server. At the same time many of you what as to save that begin to look for the partner(s) for lease of more productive service. Also, use of the free software is one of options of economy of the budget —.
Not to each of you, for example, will pleasantly sit in the console and to set necessary for software, or to make management of your websites through a touch the command line. At such moments many webmasters are come to the rescue by control bars a hosting and as it is pleasant when this panel — qualitative and free software. Quite recently we already told about one free software product, and today it will be a question of one more interesting control bar a hosting, namely of "coin" …
This publication is continuation of the material "As There Is a Rendering of a Frame in GTA V". Now the author considers questions of detailing, lighting and post-processing of a frame. Pleasant reading.
If we speak about absolute benefits of Rockstar over competitors, then indicators of the detail level of products of the company, definitely, above any praises. Los-Santos is the whole galaxy of various scenes of different extent of detailing / poligonalnosti, and all data are broadcast in real time and it for a minute does not block the loading screen. Just takes the breath away!
Fires of the night city
All sparks which are visible in the distance, real. You can closer approach and will see lamps which radiated light at distance.
With such statement Aaron Garbut, one of founders and art directors of Rockstar North, acted shortly before game release on PS3.
Whether so it? Let's consider here such night scene: