Pull to refresh

My feed

Type
Rating limit
Level of difficulty
Warning
To set up filters sign in or sign up
Article

Overcoming the Absence of a Sandbox: Alternatives for Testing Third-Party API Integrations

Level of difficultyEasy
Reading time4 min
Views86

In today's fast-paced world of software development, integrating third-party APIs and services is a common practice. These integrations can enhance functionality, improve user experience, and provide additional features that would be time-consuming and costly to develop in-house. However, ensuring these integrations work seamlessly with your software is crucial, and this is where the importance of a test environment, or sandbox, comes into play.

A sandbox environment allows developers to test the integration between their software and third-party services without risking the stability and security of the production environment. This controlled setting enables thorough testing, helping to uncover issues before they affect end-users. By covering as many test cases as possible, developers can ensure robust and reliable integrations.

But what if your third-party provider, such as a bank or government e-system, does not offer a sandbox environment? This scenario can pose significant challenges, but there are several strategies you can employ to mitigate these issues.

Read more
Total votes 1: ↑1 and ↓0+1
Comments0
Article

Optimizing IT Services: The Case for Reducing 24/7 Operations in B2B Services

Level of difficultyEasy
Reading time5 min
Views151

In the world of IT services, the idea that operations must run 24/7 is often taken for granted. However, for business-to-business (B2B) services, this assumption needs to be rethought. By reconsidering the need for around-the-clock processing services, companies can achieve significant benefits in efficiency, security, and sustainability.

Read more
Total votes 1: ↑1 and ↓0+2
Comments1
Article

From Scratch to AI Chatbot: Using Python and Gemini API

Level of difficultyEasy
Reading time3 min
Views599

In this article, we are going to do something really cool: we will build a chatbot using Python and the Gemini API. This will be a web-based assistant and could be the beginning of your own AI project. It's beginner-friendly, and I will guide you through it step-by-step. By the end, you'll have your own AI assistant!

Read more
Total votes 1: ↑1 and ↓0+1
Comments3
Post

Artery AT32F407 и scanf()

Речь пойдет об отладке AT-START-F407 V1.3. В составе платы находится программатор/отладчик AT-Link-EZ V1.2, который подключается по USB к ПК, где он виден как COM порт.

Его же можно использовать для целей отладки, а именно выводить информацию на ПК с помощью printf(). На эту тему а Artery есть AN0015_Printf_Debug_Demo, описанные там переопределения уже содержатся в файле at32f403a_407_board.c:

FILE __stdout;

#define PUTCHAR_PROTOTYPE int fputc(int ch, FILE *f)

PUTCHAR_PROTOTYPE
{
  while(usart_flag_get(PRINT_UART, USART_TDBE_FLAG) == RESET);
  usart_data_transmit(PRINT_UART, (uint16_t)ch);
  while(usart_flag_get(PRINT_UART, USART_TDC_FLAG) == RESET);
  return ch;
}

Все что нужно сделать, это добавить в код функцию инициализации uart_print_init(115200), где 115200 скорость COM порта.

Аналогичным образом можно с консоли передавать данные в МК с помощью функции scanf(). (На эту тему я не нашел AN). Добавим в файл at32f403a_407_board.c:

FILE __stdin;

#define GETCHAR_PROTOTYPE int fgetc(FILE * f)

GETCHAR_PROTOTYPE
{
  uint8_t cha = 0;
  usart_flag_clear(PRINT_UART, USART_ROERR_FLAG);  // Clear Overrun flag
  while(usart_flag_get(PRINT_UART, USART_RDBF_FLAG) == RESET);	
  cha = usart_data_receive(PRINT_UART);  
  usart_data_transmit(PRINT_UART, (uint16_t)cha); // Echo 
  return cha;
}

Все работает? Нет. Надо еще вызвать функцию

usart_receiver_enable(PRINT_UART, TRUE);

scanf("%d", &k);
k = 2*k;
printf(" \n\r You entered = %d", k);

И, теперь все работает.

Tags:
+2
Comments0
Post

Написал ебилд (это инсталлятор для Gentoo Linux) игры Gigalomania - клон известной Mega-Lo-Mania. Люблю эту игру, но печально видеть что оригинал выглядит значительно лучше. Пишу сюда чтобы сказать вам - вдруг вы или знакомый хотите потренироваться в создании визуального дизайна игр, улучшить портфолио на этом некоммерческом проекте - автор на странице игры написал что ждет вас:

Help wanted!

...

Graphics artists - Whilst most of the "placeholder" graphics have now been removed, there's still plenty of room for improvement, so please let me know.

Игра относительно простая, текстур там относительно немного. Механика классная.

а выглядит плохо
а выглядит плохо

Может знаете еще в какое комьюнити можно написать?

Сайт игры: https://gigalomania.sourceforge.net/

Спасибо.

Tags:
+3
Comments0
Article

How to build and run calculator from Windows XP using GCC x64?

Level of difficultyHard
Reading time63 min
Views573

Hi Everyone!

In this article we a little bit will analyze of code of Windows XP and will compile the calculator application using GCC x64 in Windows 10 environment. We will look what kind of errors I faced during the build and the methods how to solve them. At the end we will launch the build of the calc.exe application.

Have a nice reading!

Read more
Total votes 5: ↑5 and ↓0+6
Comments0
Article

Want to eliminate Agile? Define requirements

Reading time6 min
Views757

Sometimes it seems that jokes about management implementing Agile to do more with less aren't far from the truth. I've rarely seen development teams understand Agile as anything more than a set of ceremonies, most often associated with Scrum.

In my experience, attempts to optimize team performance often boil down to changing the internal processes within the team itself. Meanwhile, critical decisions are made outside the team, remaining in a waterfall model. This creates a disconnect: on one hand, company management strives for the flexibility of Agile, while on the other, they continue to follow rigid patterns, limiting the team and preventing it from fully realizing its potential.

Read more 🔥
Total votes 1: ↑1 and ↓0+1
Comments0
Article

Context switching

Level of difficultyEasy
Reading time4 min
Views557

Hi! My name is Slava. I am currently working as a leading Product and Senior Project Manager at Uzum Bank. One of the leading digital banks in Uzbekistan.

We are growing fast. Really fast. Speaking in numbers, our interest income has increased x10 over the past year (!).

And, as in any similar projects with rapid growth, we constantly lack qualified personnel. So I and my colleagues always have a lot of work to do.

I have two teams with completely different products, and I also manage some projects as a project manager. And I have my own small business – an online tea and coffee shop. And in conclusion, I am the father of two small children)

So, I hope this makes it clear to you that I have faced all the problems, such as working at night, lack of sleep, working in a noisy environment, calls with crying children in the background, calls during breakfast on the wheels, when I take a child to kindergarten (never do that!) etc. and so on and so forth XD

You can ask me: how do you manage to do everything?
The answer is simple: I don't XD

But. This forces me to build a system that helps me quickly switch between different types of tasks, focus quickly and complete them over and over again.

So, today I want to tell you about one of the things, that can completely ruin your day. And sometimes – whole week. It's called "context switching".

Read more
Rating0
Comments0
Article

Machine Learning and Data Science: Academia vs. Industry

Level of difficultyMedium
Reading time8 min
Views74K

Machine Learning (ML) technologies are becoming increasingly popular and have various applications, ranging from smartphones and computers to large-scale enterprise infrastructure that serves billions of requests per day. Building ML tools, however, remains difficult today because there are no industry-wide standardised approaches to development. Many engineering students studying ML and Data Science must re-learn once they begin their careers. In this article, I've compiled a list of the top five problems that every ML specialist faces only on the job, highlighting the gap between university curriculum and real-world practice. 

Read more
Total votes 14: ↑14 and ↓0+14
Comments0
Article

The Salmon Project: how to counter Internet censorship effectively using proxies with user trust levels

Level of difficultyMedium
Reading time5 min
Views279

Governments in many countries restrict citizens' access to information and services on the Internet in one way or another. Combating such censorship is an important and difficult task. Usually simple solutions cannot boast about high reliability or long-term efficiency. More complex methods of overcoming blocks have disadvantages in terms of usability, low performance, or they do not allow you to maintain the quality of Internet use at the proper level.

A group of American scientists from the University of Illinois has developed a new method of overcoming blocks, which is based on the use of proxy technology, as well as segmenting users by trust level to effectively identify agents working for censors. We present you with the main theses of this work.

Description of the approach

Scientists have developed the Salmon tool, a system of proxy servers operated by volunteers from countries without restrictions on Internet use. In order to protect these servers from blocking by censors, the system uses a special algorithm for assigning a level of trust to users.

The method involves exposing potential censor agents that pose as ordinary users in order to find out the IP address of the proxy server and block it. In addition, countering Sybil attacks is carried out through the requirements to provide a link to a valid social network account when registering in the system or to receive a recommendation from a user with a high level of trust.

How it works

It is assumed that the censor is a state–controlled body that has the ability to take control of any router within the country. It is also assumed that the task of the censor is to block access to certain resources, and not to identify users for further arrests. The system cannot prevent such a course of events in any way – the state has plenty of opportunities to find out what services citizens use. One of them is the use of honeypot servers to intercept communications.

It is also assumed that the state has significant resources, including human ones. The censor can solve tasks that require hundreds and thousands of full-time employees.

A few more basic theses:

Read more
Total votes 1: ↑1 and ↓0+3
Comments0
Article

How to create a LEGO animation without getting burned out?

Level of difficultyEasy
Reading time4 min
Views408

Hello everyone, this is Denis Weber.

Today I’m going to talk about what happens if you combine LEGO and the iconic movie Terminator 2. I’ll show you how I created a real LEGO trailer and what came out of it. I like doing such large-scale projects and if you have any cool ideas, let me know in the comments.

If you prefer the video format, you can watch it here.

Read more
Total votes 2: ↑2 and ↓0+2
Comments0
Article

Utilizing Wearable Digital Health Technologies for Cardiovascular Monitoring

Level of difficultyMedium
Reading time17 min
Views314

Wearable Digital Health Technologies for Monitoring in Cardiovascular Medicine

This review article presents a three-part true-life clinical vignette that illustrates how digital health technology can aid providers caring for patients with cardiovascular disease. Specific information that would identify real patients has been removed or altered. Each vignette is followed by a discussion of how these methods were used in the care of the patient.

Read more
Total votes 6: ↑3 and ↓3+2
Comments0
Article

How to choose a proxy network for business: 3 practical tips

Level of difficultyEasy
Reading time2 min
Views416

Masking an IP address with a use of a proxy is necessary not only to circumvent censorship on the Internet and watch TV series. In recent years, proxies have been increasingly used to solve corporate objectives from application testing under load to competitive intelligence. Habr has a good overview of the various options for using proxies in the business sector.

Today we will talk about what to pay attention to when choosing a proxy network for solving such corporate objectives.

Read more
Total votes 1: ↑1 and ↓0+3
Comments0
Article

Overview: Six ways to use residential proxies for solving corporate objectives

Level of difficultyEasy
Reading time5 min
Views526

IP address masking may be required for various tasks – from accessing blocked content to bypassing anti-bot systems of search engines and other online resources. We found an interesting post about how this technology can be used to solve corporate objectives.

There are several options of implementing a proxy:

Read more
Total votes 1: ↑1 and ↓0+3
Comments0
1
23 ...