Introducing HoloLens 2.
On February 25, at the press event dedicated to the beginning of the exhibition of mobile technologies MWC 2019 in Barcelona, Microsoft presented to the world HoloLens 2: http://amp.gs/9FaF
On February 25, at the press event dedicated to the beginning of the exhibition of mobile technologies MWC 2019 in Barcelona, Microsoft presented to the world HoloLens 2: http://amp.gs/9FaF
Learning to Computer: How to Gain a New Skill.
“In this post, I’ll give you some advice that has served me well on my journey. My path is by no means the only path and depending on the situation you’re in might not be practical or right for you, but it is certainly a path, and I hope it helps you on your path to learning to computer”: http://amp.gs/9XGD
“In this post, I’ll give you some advice that has served me well on my journey. My path is by no means the only path and depending on the situation you’re in might not be practical or right for you, but it is certainly a path, and I hope it helps you on your path to learning to computer”: http://amp.gs/9XGD
“Today I’m going to tell you about a recent request concerning one false positive that even forced me to carry out a small investigation to solve the problem”.
False Positives in PVS-Studio — How Deep the Rabbit Hole Goes: http://amp.gs/9XDj
False Positives in PVS-Studio — How Deep the Rabbit Hole Goes: http://amp.gs/9XDj
You Do Not Need Blockchain: Eight Well-Known Use Cases And Why They Do Not Work.
A special category of cases is ‘blockchain use’ that seems logical and beneficial, but actually contains a problem that then spreads from one startup to another: http://amp.gs/9Wf9
A special category of cases is ‘blockchain use’ that seems logical and beneficial, but actually contains a problem that then spreads from one startup to another: http://amp.gs/9Wf9
Digital Forensics Tips&Tricks: Enhanced Command-line Auditing.
Let’s imagine a situation when cyber-attacker executes some commands remotely on the infected workstation using command line interface or a special USB-device like Teensy or Rubber Ducky: http://amp.gs/9WiC
Let’s imagine a situation when cyber-attacker executes some commands remotely on the infected workstation using command line interface or a special USB-device like Teensy or Rubber Ducky: http://amp.gs/9WiC
Implementation of the digital mobile-only bank in Kazakhstan.
The aim of the essay is to demonstrate the capabilities of the launching digital and mobile bank as Starling Bank uses the innovate approach as an Open API platform (Starling Bank): http://amp.gs/9azm
The aim of the essay is to demonstrate the capabilities of the launching digital and mobile bank as Starling Bank uses the innovate approach as an Open API platform (Starling Bank): http://amp.gs/9azm
Top Mobile App Development Companies for Enterprise & Startups.
Have a dependable outcome by profiting effective mobile app developers who are prepared to offer the best outcome for business contemplations: http://amp.gs/9ag6
Have a dependable outcome by profiting effective mobile app developers who are prepared to offer the best outcome for business contemplations: http://amp.gs/9ag6
Generating multi-brand multi-platform icons with Sketch and a Node.js script — Part #1.
“Well, actually it’s not that easy, but it can certainly be done. This post is a detailed explanation of how we did it, and what we discovered along the way”: http://amp.gs/9oLj
“Well, actually it’s not that easy, but it can certainly be done. This post is a detailed explanation of how we did it, and what we discovered along the way”: http://amp.gs/9oLj
Indexes in PostgreSQL. Part 1.
In this article we will discuss the distribution of responsibilities between the general indexing engine related to the DBMS core and individual index access methods, which PostgreSQL enables us to add as extensions: http://amp.gs/9MfI
In this article we will discuss the distribution of responsibilities between the general indexing engine related to the DBMS core and individual index access methods, which PostgreSQL enables us to add as extensions: http://amp.gs/9MfI
We’re in UltraHD Morty! How to watch any movie in 4K.
You don’t even need to write any code: all you need is around 100GB of free space and a bit of patience. The result is a sharp 4K image that looks better than any interpolation: http://amp.gs/9Mud
You don’t even need to write any code: all you need is around 100GB of free space and a bit of patience. The result is a sharp 4K image that looks better than any interpolation: http://amp.gs/9Mud
Let’s deploy to Openshift.
“I’d like to share my story about migration an application to Openshift. Also, as a result, I will compare some of the most popular solutions and tools for managing your application inside Openshift”: http://amp.gs/951Z
“I’d like to share my story about migration an application to Openshift. Also, as a result, I will compare some of the most popular solutions and tools for managing your application inside Openshift”: http://amp.gs/951Z
Lua In Moscow 2019 conference program.
On March 3, Mail. ru Group’s Moscow office will be hosting the third international Lua conference, Lua in Moscow 2019. The conference will include two parallel tracks — talks and workshops: http://amp.gs/9QX9
On March 3, Mail. ru Group’s Moscow office will be hosting the third international Lua conference, Lua in Moscow 2019. The conference will include two parallel tracks — talks and workshops: http://amp.gs/9QX9
Matt Burrough’s Pentesting Azure — Thoughts on Security in Cloud Computing.
“Below I share with you these pre-book thoughts, and will compare them in a future article with the ones I will learn — or confirm — after reading Matt’s book”: http://amp.gs/9cnd
“Below I share with you these pre-book thoughts, and will compare them in a future article with the ones I will learn — or confirm — after reading Matt’s book”: http://amp.gs/9cnd
NodeJS logging made right.
Let’s overview how we can create trace IDs (meaning we’re going to briefly examine how continuation local storage a.k.a CLS works) and dig deep into how we can utilize Proxy to make it work with ANY logger: http://amp.gs/48ZR
Let’s overview how we can create trace IDs (meaning we’re going to briefly examine how continuation local storage a.k.a CLS works) and dig deep into how we can utilize Proxy to make it work with ANY logger: http://amp.gs/48ZR
This week we issue a really huge selection of all the essential news you might have missed on Front-end development. Make sure to check the latest updates on CSS, HTML, and JavaScript.
Frontend Weekly Digest (25 Feb — 3 Mar 2019): http://amp.gs/48UX
Frontend Weekly Digest (25 Feb — 3 Mar 2019): http://amp.gs/48UX
Why does Dodo Pizza need 250 developers?
“In autumn, we announced we were going to expand our IT team from 49 to 250 developers. And immediately we were buried under an avalanche of questions — mostly, why a pizza chain needs so many software engineers”: http://amp.gs/48W9
“In autumn, we announced we were going to expand our IT team from 49 to 250 developers. And immediately we were buried under an avalanche of questions — mostly, why a pizza chain needs so many software engineers”: http://amp.gs/48W9
Eliminating opportunities for traffic hijacking.
While you read this, a route leak or a hijack is spreading over the networks. Why? Because BGP is not easy, and configuring a correct and secure setup is even harder: http://amp.gs/4TCe
While you read this, a route leak or a hijack is spreading over the networks. Why? Because BGP is not easy, and configuring a correct and secure setup is even harder: http://amp.gs/4TCe
How to vendor a git into another git.
Git-vendor is a perfect tool to vendor one git repo into another. It provides all required functionality for the best practices of vendoring — keeping provenance, providing visibility and updatability: http://amp.gs/4Tih
Git-vendor is a perfect tool to vendor one git repo into another. It provides all required functionality for the best practices of vendoring — keeping provenance, providing visibility and updatability: http://amp.gs/4Tih
Lazy loading of Feature Module from the node_modules folder.
If someone of you has tried create angular libraries, he may face the issue with lazy loading Feature Module from node_modules. Let’s dive deeper and go thru the dark water: http://amp.gs/4T5Z
If someone of you has tried create angular libraries, he may face the issue with lazy loading Feature Module from node_modules. Let’s dive deeper and go thru the dark water: http://amp.gs/4T5Z
Digital Forensics Tips&Tricks: How to Find Active VPN Connection in the Memory Dump
Sometimes you can meet a case when a cyber-attacker uses VPN to establish a reliable channel between C2 server and infected IT-infrastructure. And, as Threat Intelligence experts say, attackers often use native Windows VPN connection tools and Windows .pbk (phonebook) files. Lets find out how we can detect it using a memory dump: http://amp.gs/41eH
Sometimes you can meet a case when a cyber-attacker uses VPN to establish a reliable channel between C2 server and infected IT-infrastructure. And, as Threat Intelligence experts say, attackers often use native Windows VPN connection tools and Windows .pbk (phonebook) files. Lets find out how we can detect it using a memory dump: http://amp.gs/41eH