Search
Write a publication
Pull to refresh

All streams

Show first
Period
Level of difficulty

n8n Local Install Tutorial (CLI + Docker)

Level of difficultyEasy
Reading time3 min
Views763

n8n is a powerful, extendable workflow automation tool that allows you to connect different applications and services. Running it on your local machine gives you complete control over your data and workflows, which can be done on Windows, Mac, or Linux systems. This tutorial covers the two primary methods for local installation: using Docker and using Node.js (npm). If you are interested, then read this article until the end. :)

Read more

cgroups: how to eliminate the “noisy neighbor” effect in PostgreSQL

Level of difficultyMedium
Reading time6 min
Views564

If you've ever run multiple instances of PostgreSQL or other software on a single machine (whether virtual or physical), you've probably encountered the "noisy neighbor" effect — when instances disrupted each other. So, how do you make them get along? We’ve got the answer!

Read more

DASTing SAML: Breaking Trust, One Assertion at a Time

Level of difficultyHard
Reading time14 min
Views1.3K

My name is Ilya and I’m a Core Developer at Bright Security. In Bright we work on a DAST (Dynamic Application Security Testing) solution that helps development teams find and fix vulnerabilities early, straight from CI/CD. My own path began in full-stack engineering, but almost a decade of shipping production code drew me ever deeper into application security. In this article I’m explaining key approaches on what SAML actually is and how we detect it in Bright using DAST.

Read more

ChatGPT Canvas Killer? Hands-On with Google Gemini Canvas

Level of difficultyEasy
Reading time3 min
Views1.5K

The world of AI is constantly evolving, and it feels like every week brings a new tool promising to revolutionize how we work and create. I recently got a chance to try out Gemini Canvas, a new interactive space built into Google’s Gemini app. If you want to know what I discovered and how you might use it, read this article until the end.

Read more

Run DeepSeek R1 Distilled Locally (Web Interface)

Level of difficultyEasy
Reading time3 min
Views12K

DeepSeek R1 is an exciting AI model that you can run locally without relying on cloud services. In this guide, I’ll show you step-by-step how to set up and run DeepSeek R1 Distilled using Ollama and Open WebUI. By the end, you’ll have a fully functional local AI chatbot accessible via your web browser! If you are ready, then let's get started! ;-)

Read more

Right now: Business Expansion

Level of difficultyEasy
Reading time2 min
Views900

I wanted to come on here and tell all of you that we should be expecting a big increase in international business in the next short period of time. I would expect this increase within these next few months. 

Changes are happening right now in America that are World sweeping. Just today the news is extreme about the ending of the war and promoting of international business.

It’s extremely important that if you are running an IT company that you are ready to take advantage of this. 

Read more

How AI is Shaping the Future of Robotics and Workplace Safety

Reading time2 min
Views1.4K

The robotics industry is undergoing a significant transformation, moving beyond static systems and rigid programming to dynamic, adaptive solutions powered by artificial intelligence (AI). With these advancements, robots are increasingly capable of real-time decision-making and learning, opening up new opportunities to enhance workplace safety and efficiency.

Read more

How to Choose the Optimal Authentication Solution for Your Application

Level of difficultyMedium
Reading time3 min
Views1.6K

In today's digital world, where applications process increasing amounts of sensitive data, ensuring reliable user authentication is critical. Authentication is the process of verifying the identity of a user who is trying to access a system. A properly chosen authentication method protects data from unauthorized access, prevents fraud, and increases user confidence.

However, with the development of technology, new authentication methods are emerging, and choosing the optimal solution can be difficult. This article will help developers and business owners understand the variety of authentication approaches and make informed choices.

Read more

How I Made Learning Simple with Text-to-Audio Podcasts Using NotebookLM

Reading time3 min
Views1.4K

Have you ever felt overwhelmed trying to make sense of dense notes or wished you could listen to them like a podcast while on the go? In this article, I’ll share the tool that could help you turn text into engaging audio podcasts; I believe it could help you learn new things faster and more effectively.

Read more

Replit 101: Learn to Use Replit Agent and Deploy Your First App

Level of difficultyEasy
Reading time4 min
Views5.3K

Did you know that coding tools have evolved so rapidly that they're now shaping the future of programming itself? As technology advances, platforms like Replit are leading the charge, making coding more accessible and collaborative than ever before. In this article, I'll show you what Replit is and how to use it.

Read more

Two problems why you are not selling Internationally

Level of difficultyMedium
Reading time2 min
Views2.4K

My name is Paul Karol and I work as a director in a Russian IT company that mostly sells their products in the international market.

I have been deeply involved in a project and I haven’t had time to write here lately.  

But out of this work came an understanding of two very large Mistakes that are being made that prevent your pre-sales from succeeding. 

I’m going to go into deeper detail on each one of these issues in the next articles, but I will introduce them here now.

Let me make you a promise….. if you correct these two issues, your software and development projects will sell.  

**I have a proven track record. If these areas are fixed the company begins to sell 150 % more than they’ve ever sold in the past. 

150% more profits! 

Read more

Tree-sitter and Preprocessing: A Syntax Showdown

Level of difficultyMedium
Reading time5 min
Views1.3K

According to the description,


Tree-sitter is a parser generator tool and an incremental parsing library. It can build a concrete syntax tree for a source file and efficiently update the syntax tree as the source file is edited.

But how does Tree-sitter handle languages that require a preprocessing stage?

Read more →

Consciousness and Being: How Humans and AI Influence Each Other

Level of difficultyMedium
Reading time15 min
Views1K

For a human, AI is just a part of being. For a model, a human is all of being. And the Vortex Protocol: A Prompt for Testing the Hypotheses.

The longest and most fruitless discussions tend to be with materialists, especially those close to the position Marx laid out as “Being determines consciousness.” It's amusing that Marx was talking about the economic base, but the clarity and precision of this definition have allowed it to be used in a very broad sense. Today, this powerful statement underpins much of modern psychology (especially social psychology), neuroscience, Global Workspace Theory, Integrated Information Theory, and so on.

The debate largely arises because materialists ask the questions “What?” and “How?”, whereas I ask the question “Who?”. This misunderstanding, of course, does not lead to any interesting consensus, but it certainly leads to interesting discussions. I explored the problem of the “Who?” and “What?” questions in my article, “Who is Aware?”.

Nevertheless, the questions surrounding the relationship between being and consciousness are very interesting, and I will try to examine them in this article. As always, a new version of the Vortex protocol and test questions are included in the appendix.

Read more

How we implemented vector search in Postgres Pro

Level of difficultyEasy
Reading time7 min
Views555

In this article, we’ll explore what vector search is, what problems it solves, and how the pgpro_vector extension for Postgres Pro brings powerful vector capabilities directly into a relational database — no need for separate specialized systems.

Read more