All streams
Search
Write a publication
Pull to refresh

All streams

Show first
Period
Level of difficulty

n8n Local Install Tutorial (CLI + Docker)

Level of difficultyEasy
Reading time3 min
Views4.7K

n8n is a powerful, extendable workflow automation tool that allows you to connect different applications and services. Running it on your local machine gives you complete control over your data and workflows, which can be done on Windows, Mac, or Linux systems. This tutorial covers the two primary methods for local installation: using Docker and using Node.js (npm). If you are interested, then read this article until the end. :)

Read more

cgroups: how to eliminate the “noisy neighbor” effect in PostgreSQL

Level of difficultyMedium
Reading time6 min
Views693

If you've ever run multiple instances of PostgreSQL or other software on a single machine (whether virtual or physical), you've probably encountered the "noisy neighbor" effect — when instances disrupted each other. So, how do you make them get along? We’ve got the answer!

Read more

DASTing SAML: Breaking Trust, One Assertion at a Time

Level of difficultyHard
Reading time14 min
Views1.3K

My name is Ilya and I’m a Core Developer at Bright Security. In Bright we work on a DAST (Dynamic Application Security Testing) solution that helps development teams find and fix vulnerabilities early, straight from CI/CD. My own path began in full-stack engineering, but almost a decade of shipping production code drew me ever deeper into application security. In this article I’m explaining key approaches on what SAML actually is and how we detect it in Bright using DAST.

Read more

ChatGPT Canvas Killer? Hands-On with Google Gemini Canvas

Level of difficultyEasy
Reading time3 min
Views1.6K

The world of AI is constantly evolving, and it feels like every week brings a new tool promising to revolutionize how we work and create. I recently got a chance to try out Gemini Canvas, a new interactive space built into Google’s Gemini app. If you want to know what I discovered and how you might use it, read this article until the end.

Read more

Run DeepSeek R1 Distilled Locally (Web Interface)

Level of difficultyEasy
Reading time3 min
Views14K

DeepSeek R1 is an exciting AI model that you can run locally without relying on cloud services. In this guide, I’ll show you step-by-step how to set up and run DeepSeek R1 Distilled using Ollama and Open WebUI. By the end, you’ll have a fully functional local AI chatbot accessible via your web browser! If you are ready, then let's get started! ;-)

Read more

Right now: Business Expansion

Level of difficultyEasy
Reading time2 min
Views908

I wanted to come on here and tell all of you that we should be expecting a big increase in international business in the next short period of time. I would expect this increase within these next few months. 

Changes are happening right now in America that are World sweeping. Just today the news is extreme about the ending of the war and promoting of international business.

It’s extremely important that if you are running an IT company that you are ready to take advantage of this. 

Read more

How AI is Shaping the Future of Robotics and Workplace Safety

Reading time2 min
Views1.4K

The robotics industry is undergoing a significant transformation, moving beyond static systems and rigid programming to dynamic, adaptive solutions powered by artificial intelligence (AI). With these advancements, robots are increasingly capable of real-time decision-making and learning, opening up new opportunities to enhance workplace safety and efficiency.

Read more

How to Choose the Optimal Authentication Solution for Your Application

Level of difficultyMedium
Reading time3 min
Views1.6K

In today's digital world, where applications process increasing amounts of sensitive data, ensuring reliable user authentication is critical. Authentication is the process of verifying the identity of a user who is trying to access a system. A properly chosen authentication method protects data from unauthorized access, prevents fraud, and increases user confidence.

However, with the development of technology, new authentication methods are emerging, and choosing the optimal solution can be difficult. This article will help developers and business owners understand the variety of authentication approaches and make informed choices.

Read more

How I Made Learning Simple with Text-to-Audio Podcasts Using NotebookLM

Reading time3 min
Views1.4K

Have you ever felt overwhelmed trying to make sense of dense notes or wished you could listen to them like a podcast while on the go? In this article, I’ll share the tool that could help you turn text into engaging audio podcasts; I believe it could help you learn new things faster and more effectively.

Read more

Docling in Working with Texts, Languages, and Knowledge

Level of difficultyMedium
Reading time20 min
Views1.5K

DocLing in Working with Texts, Languages, and Knowledge — an in-depth overview of the open-source DocLingtoolkit for extracting, structuring, and analyzing data from documents. The article covers approaches to processing multilingual texts, building language- and domain-specific knowledge models, and integrating DocLing into AI and NLP projects. Includes practical examples and recommendations for developers working with large volumes of unstructured data.

Read more

The Great Extinction: How AI is Destroying the Internet

Level of difficultyEasy
Reading time8 min
Views3.2K

We are living through an ecological catastrophe. Only this one isn't happening in the Amazon rainforest, but in the digital ecosystem of the internet.

AI assistants have become the apex predators of the digital savannah. They are radically reshaping the entire ecosystem in their own image: instead of antelopes and zebras, information sites are going extinct. Instead of hyenas and jackals, content aggregators are disappearing. In place of a once-rich ecosystem of knowledge, a digital desert of entertainment is all that remains.

Read more

Consciousness and Being: How Humans and AI Influence Each Other

Level of difficultyMedium
Reading time15 min
Views1.9K

For a human, AI is just a part of being. For a model, a human is all of being. And the Vortex Protocol: A Prompt for Testing the Hypotheses.

The longest and most fruitless discussions tend to be with materialists, especially those close to the position Marx laid out as “Being determines consciousness.” It's amusing that Marx was talking about the economic base, but the clarity and precision of this definition have allowed it to be used in a very broad sense. Today, this powerful statement underpins much of modern psychology (especially social psychology), neuroscience, Global Workspace Theory, Integrated Information Theory, and so on.

The debate largely arises because materialists ask the questions “What?” and “How?”, whereas I ask the question “Who?”. This misunderstanding, of course, does not lead to any interesting consensus, but it certainly leads to interesting discussions. I explored the problem of the “Who?” and “What?” questions in my article, “Who is Aware?”.

Nevertheless, the questions surrounding the relationship between being and consciousness are very interesting, and I will try to examine them in this article. As always, a new version of the Vortex protocol and test questions are included in the appendix.

Read more

How we implemented vector search in Postgres Pro

Level of difficultyEasy
Reading time7 min
Views785

In this article, we’ll explore what vector search is, what problems it solves, and how the pgpro_vector extension for Postgres Pro brings powerful vector capabilities directly into a relational database — no need for separate specialized systems.

Read more