Habr
1.25K subscribers
2.06K photos
3 files
1.64K links
Habr.com ⬝ English edition
Download Telegram
Bitcoin (BTC)’s Low Volatility Will Lead to the Next Crypto Bull Run.

Curiosity has taken over the crypto space. Every potential trader wants to know when the next crypto bull run will start. Since December 2017, it has been stuck in a crypto winter: http://amp.gs/4bs3
Dependency Injection in Flutter.

“It looks like the library inject.dart does everything that we need for now, so I’d like to share some info on how you can use this library in your project”: http://amp.gs/R1mD
• How to publish packages to npm
• A Guide to CSS counter
• 14 of the best JavaScript APIs
• Webpack upgrade from 3 to 4
• A React-based Web video player
• Your Angular app as Progressive Web App

Frontend Weekly Digest (25 — 31 Mar 2019): http://amp.gs/R1Ro
New feature in Git 3: closures.

Git developers are going to introduce a new command to close “homeless” branches. How to use this command, what benefits does it give and what do IT companies think? Let’s answer these and other questions: http://amp.gs/R1Mu
A Simple Way to Talk To Your Website.

The tool is sleeping in your browser, and you are not even aware. We are talking about Google’s Web Speech API. Let us first look at some essential elements of speech before we delve deeper into Google Web Speech API: http://amp.gs/RYn5
External Interrupts in the x86 system. Part 1.

This article is about the interrupt delivery process from external devices in the x86 system. It tries to answer what is PIC and what is it for, what is the purpose of LAPIC, and many other questions: http://amp.gs/RtQb
Last year, direct losses from the illegal copying of consumer electronics were about $0.5 trillion.

In this article, we will talk about one of the most cost-effective protection methods in terms of hardware costs — physical unclonable functions: http://amp.gs/Rm7c
How to write the home address right?

“In my previous article, we just skimmed the surface of objects. Let’s continue our reconnaissance. Today’s topic is a tough one. It’s not quite BIG DATA, but it’s still the data not easy to work with”: http://amp.gs/RmuQ
Exploiting signed bootloaders to circumvent UEFI Secure Boot.

“I wanted to make a bootable USB flash drive with various computer recovery software that would boot without disabling Secure Boot. Let’s see how this can be achieved”: http://amp.gs/Rm5Y
Disposable pattern (Disposable Design Principle), Pt. 2.

“I feel I’m going to open the Pandora’s box for you. Let’s talk about special types — SafeHandle, CriticalHandle and their derived types”: http://amp.gs/Rp1K
Web application firewalls.

Modern WAF is popular because it has a wide range of covered tasks, so web application developers can rely on it for various security issues, but with the assumption that this solution cannot guarantee absolute protection: http://amp.gs/RpRU
.NET Core Workers as Windows Services.

“In .NET Core 3.0 we are introducing a new type of application template called Worker Service. This template is intended to give you a starting point for writing long running services in .NET Core”: http://amp.gs/RpQH
How to use methodtable of the another type for fast call of the private methods.

“I would like to show you an example of using StructLayout for something more interesting than examples with bytes, ints, and other primitive types”: https://habr.com/en/post/446478/
Checking the Roslyn Source Code.

“We’re as keen as mustard about the code quality of this project. Now let’s test it once again and find out some new and interesting issues (but let’s hope that nothing significant) that PVS-Studio will be able to find”: http://amp.gs/RnIz
Indexes in PostgreSQL — 5 (GiST).

In the previous articles, we discussed PostgreSQL indexing engine, the interface of access methods, and two access methods: hash index and B-tree. In this article, we will describe GiST indexes: http://amp.gs/RnPL
“For international engineering company Microsoft’s Azure IP Advantage program is a great tool for reducing IP risks in transition to Industry 4.0”.

Microsoft expands Azure IP Advantage Program with new IP benefits for Azure IoT innovators and startups: http://amp.gs/RnHC
How iOS Developers Are Seeking To Up The Ante With Cloud Computing.

As a platform, many enterprises are leveraging iOS to realize the benefits of cloud computing. This is one aspect of digital transformation that has been rocking the entire industry: http://amp.gs/RG1v
Memoization Forget-Me-Bomb.

Memoization is a super simple thing — just memoize which result you have got from a first function call, and use it instead of calling it the second time — don’t call real stuff without reason, don’t waste your time: http://amp.gs/RGe5
How I discovered an easter egg in Android’s security and didn’t land a job at Google.

Google loves easter eggs so much, that you could find them in virtually every product of theirs. But sometimes you can find an easter egg in the most unlikely of places: http://amp.gs/RxRa
Memory and Span, pt. 2.

A human by nature cannot fully understand the purpose of a certain instrument until he or she gets some experience. So, let’s turn to some examples: http://amp.gs/Rxa6