- ITMO University startup accelerator introduces Laeneco, a smart stethoscope
- Quantum communications: building 100% secure data transfer systems
SQL Server & Concurrency Control
What is a Transaction?
The standard definition of Transaction state that “Every Query batch that runs in a SQL server is a Transaction.”, this means any query you run on a SQL server will be considered as a Transaction it could either be a simple SELECT query or any UPDATE or ALTER query.
If you run a query without mentioning the BEGIN TRAN keyword then it would be considered as an Implicit transition.
If you run a query which starts with BEGIN TRAN and ends with COMMIT or ROLLBACK then it would be considered as Explicit Transaction.
How to develop and publish a smart-contract in the Telegram Open Network (TON)
What is this article about?
In this article, I will tell about my participation in the first (out of two so far) Telegram blockchain contest. I didn't win any prize. However, decided to combine and share the unique experience I have had from the start to finish line, so my observations could help anyone who is interested.
Since I didn't want to write some abstract code, instead make something useful. I created instant lottery smart-contract and website which shows smart-contract data directly from Telegram Open Network (TON) avoiding any middle storage layers.
The article will be particularly useful for those, who want to write their first smart-contract for TON but don't know where to start.
Using the lottery as an example, I will go from setting up the environment to publishing a smart contract, interacting with it. Moreover, I will create a website that will show smart-contract data.
Esoteric programming languages: a systematic approach
WAL in PostgreSQL: 2. Write-Ahead Log
The log
Sadly, there's no such thing as miracles: to survive the loss of information in RAM, everything needed must be duly saved to disk (or other nonvolatile media).
Therefore, the following was done. Along with changing data, the log of these changes is maintained. When we change something on a page in the buffer cache, we create a record of this change in the log. The record contains the minimum information sufficient to redo the change if the need arises.
For this to work, the log record must obligatory get to disk before the changed page gets there. And this explains the name: write-ahead log (WAL).
In case of failure, the data on disk appear to be inconsistent: some pages were written earlier, and others later. But WAL remains, which we can read and redo the operations that were performed before the failure but their result was late to reach the disk.
OpenToonz: inside and out
Almost four years have passed since the PVS-Studio team checked the OpenToonz source code. This project is a very powerful tool for creating two-dimensional animation. Since the last check, with its help, such animated works as Mary and the Witch Flower, Batman-Ninja, Promare and others were created. As large studios continue using Toonz, why not check the quality of the source code again?
Signpost: When Breakpoints are not Enough
Instruments for Apple's Xcode is a tool for performance analysis of an iOS application. In 2018 Apple introduced Custom Instruments — an opportunity to expand the standard set of instruments for application profiling. When existing tools are not enough, you can create new ones yourself — it will collect, analyze and display the data the way you need.
Technology Stack To Follow in 2020 For Startups
JavaScript, CSS, and HTML are some of the main technologies that help you to build robust app solutions. So, if you are looking to build smart web applications for your business, then I advise you to jump to my idea of cross-platform and open-source development frameworks right away.
Here is the list of the tech stacks for app developers to use in 2020.
Quantum communications at ITMO University: building 100% secure data transfer systems
Queue Implementation in JavaScript / Algorithm and Data Structure
SLAE — SecurityTube Linux Assembly Exam
SecurityTube Linux Assembly Exam (SLAE) — is a final part of course:
securitytube-training.com/online-courses/securitytube-linux-assembly-expert
This course focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec and can be useful for security engineers, penetrations testers and everyone who wants to understand how to write simple shellcodes.
This blog post have been created for completing requirements of the Security Tube Linux Assembly Expert certification.
Exam consists of 7 tasks:
1. TCP Bind Shell
2. Reverse TCP Shell
3. Egghunter
4. Custom encoder
5. Analysis of 3 msfvenom generated shellcodes with GDB/ndisasm/libemu
6. Modifying 3 shellcodes from shell-storm
7. Creating custom encryptor
The Worst Mistakes In Mobile App Development
Alright, so you have just planned to hire developers for a Mobile App which could potentially steer your business ahead. The reasons for your decision would be quite obvious on the surface. Mobile App development is a core part of today’s businesses. It provides a near-perfect platform to serve customers through the portable devices they own.
But it’s easy to be a sheep! If you really try to understand this market, you’ll realize that more than half of the apps fail to earn revenue, and a significant amount of them barely cross 1,000 downloads. As per a Gartner report, it was found that barely 0.01 percent apps will find financial success by the year 2018.
How to use Google docs offline with the new Microsoft Edge
GoROBO: an educational initiative from the ITMO University startup accelerator
Let’s talk about the educational environment they want to create, why they chose to build such an unusual startup, and what awaits GoROBO clubs in the future.
Legacy Languages still Pretty Hard to Beat
Evolution and development have always been the integral parts of every sector you come across. Same is the case with programming languages. Numerous up gradations and invention of entirely new languages have divided the world of programming into legacy and modern. But no matter what, legacy programming still makes the foundation of many software, web applications and AI based techniques.
The Little Scrollbar That Could Not
The new Windows Terminal version has been recently released. Everything would be fine, but performance of its scrollbar leaves a great deal to be desired. Time has come to poke it and have some mumbo jumbo dances with it.
Build apps for free with Azure Cosmos DB Free Tier
With Azure Cosmos DB Free Tier enabled, you’ll get the first 400 RU/s throughput and 5 GB storage in your account for free each month, for the lifetime of the account. That means that you can start small and grow with confidence, knowing your app will be running on a high-performance database service. You’ll only pay if your account exceeds 400 RU/s and 5 GB. Additionally, if your app has a lot of containers you can create up to 25 containers in a shared throughput database and have them all share the free 400 RU/s. You can have up to one free tier Azure Cosmos DB account per Azure subscription.
Analyze your builds programmatically with the C++ Build Insights SDK
Continuous integration and deployment for desktop apps with GitHub Actions
- Catch bugs early in the development cycle
- Improve software quality and reliability
- Ensure consistent quality of builds
- Deploy new features quickly and safely, improving release cadence
- Fix issues quickly in production by rolling forward new deployments
That’s why we created a sample application in GitHub to showcase DevOps for your applications using the recently released GitHub Actions.
New action to disrupt world’s largest online criminal network
Today, Microsoft and partners across 35 countries took coordinated legal and technical steps to disrupt one of the world’s most prolific botnets, called Necurs, which has infected more than nine million computers globally. This disruption is the result of eight years of tracking and planning and will help ensure the criminals behind this network are no longer able to use key elements of its infrastructure to execute cyberattacks.
A botnet is a network of computers that a cybercriminal has infected with malicious software, or malware. Once infected, criminals can control those computers remotely and use them to commit crimes. Microsoft’s Digital Crimes Unit, BitSight and others in the security community first observed the Necurs botnet in 2012 and have seen it distribute several forms of malware, including the GameOver Zeus banking trojan.
Hubs
Authors' contribution
alizar 91983.8marks 24166.6ru_vds 20270.3alexzfort 14179.0XaocCPS 10986.2pronskiy 10649.4m1rko 10382.0ptsecurity 9631.2Andrey2008 9612.2Jeditobe 9387.6