Pull to refresh

My feed

Type
Rating limit
Level of difficulty
Warning
To set up filters sign in or sign up
Article

How to create a better UX design for the users of younger generations

Level of difficultyEasy
Reading time5 min
Views560

Gen Z – a generation of young people born between the last few years of the 20th century and the first ten years of the 21st, are the primary users of a modern-day Internet. They started using technology since their early childhood, being almost constantly glued to their smartphones and tablets, which led to them being very demanding users that have their own requirements in UX. At the same time, they are known for their sense of humor and straightforwardness – which means they love using products that are both easy to navigate but full of interactive elements. Below we’ve collected a few things you should consider when creating a UX design aimed at a young audience.

Read more
Article

From Idea to Release: The Product Owner’s Role in Feature Development at Exante

Level of difficultyEasy
Reading time6 min
Views439

Why might a feature not get to production on time? What prevents the team from releasing before the deadline? Can the product owner influence the timeline?

In this article, I will try to answer these questions and suggest solutions for the processes we are implementing and improving within the product team at EXANTE.

Read more
Article

Selenium CAPTCHA Bypass with Tokens or Clicks? Continuing the Speed Comparison

Level of difficultyEasy
Reading time3 min
Views198

In my previous article, Puppeteer CAPTCHA bypass: Tokens or Clicks? Let’s Break It Down (which I also published on Dev.to), I compared two CAPTCHA bypass methods (clicks and tokens) using Puppeteer. I also announced that in the next article (this one), I would conduct a practical comparison of the same methods using Selenium. This will complete the CAPTCHA bypass picture, so to speak. Well, let’s not waste time and get straight to the point.

Read more
Article

Puppeteer CAPTCHA bypass by Token or Clicks: Which is Faster? A Practical Comparison

Reading time4 min
Views387

In my work, I often encounter various services designed to simplify tasks across different areas. I’m not talking about tools like GSA or A-Parser but about Zennoposter or BAS. I am no professor in automation, so I’ll explain in layman's terms: these services are essentially complex, multi-layered platforms that allow the creation of bots and scripts to perform almost any task without human intervention—a sort of “basic neural network.” By the way, such services existed long before neural networks became mainstream for everyday use.

While exploring BAS, I encountered a situation where many developers creating BAS scripts (ironically, developers developing) idealize CAPTCHA solving using clicks.

Read more
Article

Debugging SSH connections: A Comprehensive Guide

Level of difficultyMedium
Reading time14 min
Views715

SSH (Secure Shell) is the backbone of remote system administration and secure remote access, serving millions of developers and system administrators daily. However, when SSH connections fail, the cryptographic nature of the protocol can make debugging challenging. The complex interplay between authentication mechanisms, encryption algorithms, and network layers often obscures the root cause of connection issues. This complexity is further compounded by the protocol's security-first design, where error messages are intentionally vague to prevent potential attackers from gathering system information. Whether we're dealing with key authentication failures, network connectivity issues, or configuration mismatches, understanding the underlying SSH architecture becomes critical for effective troubleshooting.

SSH it!
Article

Understanding SSH Key Pairs: A Developer's Guide

Reading time5 min
Views477

In today's interconnected development world, secure authentication is not just a luxury—it's a necessity. Whether you're a seasoned DevOps engineer or a junior developer just starting your journey, understanding SSH key pairs is crucial for your daily workflow. They're the unsung heroes that keep our git pushes secure, our server access protected, and our deployments safe from prying eyes.

But let's be honest: SSH keys canbe confusing. With terms like “public key infrastructure,” “cryptographic algorithms,” and “key fingerprints” floating around, it's easy to feel overwhelmed. This guide aims to demystify SSH key pairs, breaking down complex concepts into digestible pieces that will help you make informed decisions about your security setup.

Read more
Article

Napkin AI tutorial: the ultimate guide to visualizing your ideas with AI

Level of difficultyEasy
Reading time2 min
Views1.5K

Napkin AI is an innovative artificial intelligence tool that transforms text descriptions into visual sketches and diagrams. Launched in 2023, this toolallows users to quickly convert their ideas into visual representations, similar to drawing on a napkin — hence the name. In this tutorial, I will walk you through its top features and provide a video demonstration.

Read more
Article

How can a manual tester understand an automation tester, and vice versa?

Level of difficultyEasy
Reading time3 min
Views487

When we go abroad for vacation or meet a foreigner on the street who doesn’t speak Russian but is trying to ask, “Where is the restroom? How do I get to…”, we wonder how to explain things to them in Russian in a way they would understand.

I asked myself a similar question when trying to explain something to a colleague using SQL while they were working with Java. The main goal of my work was to create a quality test model. Without it, there would be no proper regression testing later on.

I started by building a framework filling it with test cases. We held a meeting where we discussed priority of positive and negative test cases briefly. When developing the test scenarios, I used the incremental model, but as practice showed, this approach also required an iterative method. For example, it is like having the outline of the Mona Lisa first, then adding colors, painting the background, and so on.

It’s better to maintain the checklist in Excel format to add columns, write notes, and more. And let’s not forget that, as we take on the role of Leonardo da Vinci, we use different colors and get creative.

I am a manager by profession specializating in Production Management. My motivator is the Theory of Constraints (TOC) methodology, which focuses on identifying and managing the key constraint of a system to determine the efficiency of the entire system as a whole:

Read more
Article

Lifecycle of an IT product using the example of Telepathy – a brain-computer interface (BCI) from Nueralink

Level of difficultyEasy
Reading time12 min
Views739

1. The purpose of the IT product Telepathy – the brain-computer interface of  Nueralink

The UN General Assembly Resolution of 22.03.2024 No. A/78/L.49 “Harnessing the Potential of Safe, Secure and Trustworthy Artificial Intelligence Systems for Sustainable Development” [1] confirms (paragraph 5) that"human rights and fundamental freedoms must be respected, protected and encouraged throughout the life cycle of artificial intelligence systems"and to all Member States of the United Nations and, where appropriate, In such cases, other interested parties should"refrain from using or stop using artificial intelligence systems that cannot be operated in accordance with international law or that create undue risks to the enjoyment of human rights, particularly for those in vulnerable situations,”at the same time"The rights that people have offline must also be protected online, including throughout the life cycle of artificial intelligence systems".

The artificial intelligence (“AI”) systems currently being created, tested and deployed are covered by the broader concept of information technology product (“IT product”).

In turn, the author of the term artificial intelligence, Stanford University professor John McCarthy, defined intelligence as"computing part the ability to achieve goals in the world", and AI is like"science and technology of creation intelligent machines, especially intelligent computer programs". At the same time, the same author predicts or laments that"Once this works, no one else will will not call it AI."[20]

Read more
Article

The Implicit Reparameterization Trick in Action: Python Library for Gradients Computation

Level of difficultyMedium
Reading time3 min
Views356

The explicit reparameterization trick is often used to train various latent variable models due to the ease of calculating gradients of continuous random variables. However, due to its peculiarities, explicit reparameterization trick is not applicable to several important continuous standard distributions, such as mixture, Gamma, Beta and Dirichlet.

An alternative method for calculating reparameterization gradients relies on implicit differentiation of cumulative distribution functions. The implicit reparameterization trick is much more expressive and applicable to a wider class of distributions

This article provides an overview of various reparameterization tricks and announces a new Python library, irt.distributions, for sampling from various distributions using the implicit reparameterization trick.

Read more
Article

PostgreSQL 18: Part 1 or CommitFest 2024-07

Level of difficultyMedium
Reading time10 min
Views610
Read more →
Article

How I Made Learning Simple with Text-to-Audio Podcasts Using NotebookLM

Reading time3 min
Views804

Have you ever felt overwhelmed trying to make sense of dense notes or wished you could listen to them like a podcast while on the go? In this article, I’ll share the tool that could help you turn text into engaging audio podcasts; I believe it could help you learn new things faster and more effectively.

Read more
Article

How to add a card to Apple Wallet in React Native?

Reading time4 min
Views913

Mobile developers can use Apple Wallet and Google Wallet integrations for different types of apps.

Once we already wrote our own library for Apple Wallet in React Native because we couldn't find anything ready to use. But now that Google Wallet is fully released, it's time to update it.

Now, this library provides integration with both Apple Wallet on iOS and Google Wallet on Android. It allows you to add, remove, and check for existing passes on iOS, and add passes to Google Wallet on Android.

Read more
Article

Hybrid people — determination of the status of persons who have undergone medical intervention using AI toolkit

Reading time4 min
Views859

Dear Colleagues and Friends, 

Since I am only an IT college student so I have not been involved in any serious project in the IT field. However, I hope that my student membership in AСM allows me to share my views with established professionals and thus join a broad and constructive discussion on AI issues. 

Over the past couple of years, the topic of harmonious development of technologies based on the fruits of AI has attracted everyone's close attention. In an effort to understand the current stage of development of this technology and its perception by society and the government, I attended a lot of online events (including extremely enriching ACM Talks webinars), read dozens of articles in the professional and business press, studied regulations AI issues by EU, US and UN.

However, I do not see or feel that this collective search has harmonized the views on AI development expressed by inventors, representatives of the business community, IT specialists, and current and future users of AI products.

As a future IT professional, I would like to see less confrontation and more solidarity regarding the global technological breakthrough.

As an accomplished legal professional, I see that now is an important moment to move from honing the principles of working with AI to formulating and implementing (somewhat proactively) specific mechanisms for the implementation of AI products, as well as establishing fair and responsible regulation of their social and legal consequences. 

In the context of the above, I offer for consideration my views on two aspects of the development and implementation of AI technologies:

Read more
Article

«Where, where have you gone», or searching for missing stations on public transport routes in OpenStreetMap

Level of difficultyMedium
Reading time6 min
Views896

OpenStreetMap (OSM) is a global project formed around a geographic information database which is being filled by all comers — both enthusiasts and interested companies. Anybody can contribute, but the openness has its downside: incorrect edits often get into the database. Hence plenty of validators of OSM data have been written which allow to maintain the data quality at an acceptable level.

Since 2016 there exists an open source subway preprocessor that validates (generates error reports) rapid transit routes in OSM for completeness and logical/topological errors, and converts them into formats that are suitable for routing and rendering, e.g. GTFS. Besides OSM data it takes a list of public transport (PT) networks which contains the checking information about the number of lines, stations etc. per a PT network. The preprocessor has successfully proven itself in the preparation of PT data for applications such as Maps.me and Organic Maps.

In this article, I would like to share an approach to detecting one of the types of errors that occur quite often in OSM data and automatic detection of which is somewhat challenging. It's an accidental loss of a station from a route. The source code of the validator and the described algorithm are open source. But first, let's define the concepts used to represent PT data in OpenStreetMap.

Read more
Article

Regulation of computing power, joint insurance of AI products, and protection of hybrid people

Reading time7 min
Views665

Issues of cooperation in the field of regulation of computing power, joint insurance of AI products, and determining the social status and protection of persons with a hybrid nervous system (hybrid people) 

Dear Colleagues and Friends,

In furtherance of the discussion on the topic of "Key technology policy issues will be grappling with in 2025", let me outline some mullings at the intersection of the theory and practice of computer science, law, and neuroethics.

«Our society and thus each individual has the possibility to (help) decide how the world, in which we want to live with artificial intelligence in the future, should look. Philosophy, law, and technology play a central role in the discourse that has to be conducted for this purpose» (from Fraunhofer IAIS’s report «Trustworty use of AI»).

 Essential idea of that proposals - drawing from the deep technical expertise of the computing community, to provide to policy leaders and stakeholders nonpartisan theses on policy gaps in the field of neuroethics, development and implementation of ML/AI tools. It is preferable that this regulation be a harmonious symbiosis of legal norms both at the state level and at the level of socially responsible professional communities.

The approach mentioned in paragraph 6.2 of The CEN-CENELEC Focus Group Report: Road Map on Artificial Intelligence (AI) and, in fact, focused on autonomous self-regulation of AI tools (systems) seems inappropriate to current risks and treats: “An alternative approach is that the system itself ensures that modifications of its functionality due to self-learning have no negative impact on assessment topics like safety or fairness”.  Further, in the same place, the potential ineffectiveness of the certification system for AI tools is actually recognized: “For artificial intelligence systems that learn as they are used, the problem is that the behavior of the system changes continuously and will require a new conformity assessment each time.”

Read more
1
23 ...