Pull to refresh

My feed

Type
Rating limit
Level of difficulty
Warning
To set up filters sign in or sign up
Article

I Taught a Virtual Camera to Behave Like a Human Operator: How a Face Tracking Algorithm for Shorts/Reels Works

Level of difficultyHard
Reading time14 min
Reach and readers377

In the previous article I described my “anime factory” in detail — a pipeline that automatically turns episodes into finished Shorts. But inside that system there is one especially important module that deserves a separate deep dive: a virtual camera for automatic reframing.

In this article, I will break down not just an “auto-crop function,” but a full virtual camera algorithm for vertical video. This is exactly the kind of task that looks simple at first glance: you have a horizontal video, you need to turn it into 9:16, keep a person in frame, and avoid making the result look like a jittery autofocus camera from the early 2010s.

But as soon as you try to build it not for a demo, but for a real pipeline, engineering problems immediately show up:

Read more
Article

CUBA: Why It Saved My Hackathons and Killed My Production Projects

Level of difficultyMedium
Reading time4 min
Reach and readers442

If you have ever done enterprise Java development, you have probably heard of CUBA Platform. And no — this is not about the Caribbean.

CUBA is a full-stack Java framework for rapid development of business applications: CRM, document management, ERP-like systems, internal tools, and everything commonly called “enterprise.”

I worked with it in several hackathons and in a couple of real projects. And I have mixed feelings about it — that is exactly why I am writing this.

Read more
Article

How I Built an “Anime Factory”: a System That Automatically Turns Episodes into YouTube Shorts

Level of difficultyMedium
Reading time18 min
Reach and readers412

Hi, Habr!

Over the past few months, I have been building a system that I internally call an “anime factory”: it takes a source episode as input and produces a ready-to-publish YouTube Short with dynamic reframing, subtitles, post-processing, and metadata.

What makes it interesting is not just the fact that editing can be automated, but that a significant part of this work can be decomposed into engineering stages: transcription, audio and scene analysis, strong-moment discovery, “virtual camera” control, and a feedback loop based on performance metrics.

In this article, I will show how this pipeline is structured, why I chose a modular architecture instead of an end-to-end black box, where the system broke, and which decisions eventually made it actually usable.

Read more
Article

Bulletproof VPNs: What Are They and Why You’re Not Their Audience

Reading time6 min
Reach and readers2.6K

In November, 2025 Russia-based web host Media Land was sanctioned by several countries as a bulletproof service — the one hackers relied on to launch DDoS attacks and attack businesses in the United States and in allied countries. “Bulletproof” may refer to a VPN as well, as it usually means abuse resistant and private. Xeovo explains how genuinely reliable anonymous VPNs and hostings differ from bulletproof services — and why the real bulletproof operators are often not those who call themselves that.

Read more
Article

Async Logging Is Not a Silver Bullet — What Actually Limits Performance

Level of difficultyMedium
Reading time4 min
Reach and readers1.7K

Async logging is often treated as an obvious optimization.

It isn’t.

It just moves the cost somewhere else.

This idea sounds simple: synchronous logging blocks, async logging doesn’t — so it must be faster.

But once you look at what actually happens inside the system, the picture becomes very different.

Libraries like Quill are built around asynchronous pipelines. Others, like spdlog, support both synchronous and asynchronous modes. Some systems — including logme — deliberately mix synchronous formatting with asynchronous output.

Despite these differences, they all run into the same fundamental constraints.

Read more
Article

Quantum Mechanics May Describe Not Reality Itself, But the Mechanism of Its Emergence

Level of difficultyMedium
Reading time7 min
Reach and readers3.2K

Quantum mechanics is one of the most successful theories in the history of science.

It underlies atomic physics, semiconductors, lasers, and modern quantum technologies.

However, nearly a century after its development, a peculiar situation remains:

we can predict experimental results with remarkable precision, yet we still do not fully understand what quantum theory actually represents.

Does it describe physical reality “as it is,” or does it instead describe the structure of conditions under which observable facts become possible?

In this article, I propose the following hypothesis:

quantum theory does not describe reality itself, but the conditions and mechanisms through which observable reality emerges.

Read more
Article

10 UX principles that define usability of any software product

Level of difficultyEasy
Reading time4 min
Reach and readers4.5K

The main goal of UX design is to create a usable, accessible and aesthetically pleasing product that helps people solve certain problems in their everyday routine. To achieve that, UX designers should follow UX principles and guidelines that are aimed at creating user-friendly intuitive interfaces and have stood the test of time. Even though each UX project might have its own guidelines and heuristic evaluations based on its peculiarities, some principles serve as a common UX basis in any situation. 

Read more
Article

Can AI Help You Remember What You Learn? My Experience Testing Recall

Level of difficultyEasy
Reading time4 min
Reach and readers10K

Every week, I watch tutorials, save articles, bookmark tools, and collect ideas I want to come back to later. But a few days later, the problem shows up: I may remember the topic, but not the details. I know I saw something useful, but I cannot explain it clearly or apply it with confidence.

Read more
Article

Why the Chat Control Act keeps coming up and why we shall not forget about it

Level of difficultyEasy
Reading time5 min
Reach and readers8K

The Art of Comeback of the European Bureaucracy 

On November 26, Members of the European Parliament rejected the Chat Control Act in its current version, i.e, mandatory scanning of the user traffic before it gets encrypted. Lawmakers, however, will hardly give up: requirement for mandatory scanning shall be reconsidered every three years. Xeovo explains what is the story behind this law and why, in reality, there’s little justification for passing it.

Read more
Article

PostgreSQL cost model: estimating the cost of flushing temp buffers to disk

Level of difficultyMedium
Reading time8 min
Reach and readers5.5K

Today I present results from the first step towards enabling temporary tables in PostgreSQL parallel query execution: benchmarking sequential writes and reads of temp buffers. I added functions to the PostgreSQL system catalog to measure buffer flush operations and ran a set of tests. For the planner, I estimated the cost coefficient of flushing a temporary table buffer page to disk relative to the existing DEFAULT_SEQ_PAGE_COST. I also estimated the cost of a simple scan of temp buffers (a dry-run). Measurements show that sequential writes are about 30% slower than reads. Based on these results, I propose a cost formula. I also ran a limited “dry-run” style estimate and measured write speed when table blocks are distributed across memory pages randomly.

Read more
Article

LoRa Module (P2P Private Protocol) Parameters

Level of difficultyMedium
Reading time21 min
Reach and readers5K

If you are using a LoRa module for point-to-point (P2P) communication or building your own private protocol, understanding and correctly configuring each parameter is the key to successful communication.

After reading this article, you will learn:

• How Should the LoRa Over-the-Air (PHY) Modulation and Packet Format Parameters Be Configured, and Why?

• The meaning of RF front-end parameters and how to tune them

• Chip-level control parameters: operating modes, clocks, power supply, calibration, and more

• A quick-reference "must-match" table and a list of common issues

Note: This article covers only LoRa (P2P/Private Protocol) parameters. If you need information on LoRaWAN protocol-layer parameters (e.g., ADR, DevEUI, join procedures), please refer to "LoRaWAN Protocol Layer Parameters".

Before starting configuration, verify that your device has selected PacketType = LoRa. The LR2021 supports multiple modulation types—including LoRa, LR-FHSS, FLRC, FSK/GFSK, OQPSK, and OOK. When using P2P LoRa communication, you must first switch to LoRa mode; all subsequent modulation and packet structure commands will then be interpreted in LoRa mode.

If you select the wrong PacketType (e.g., FLRC or GFSK mode), the chip will not interpret the SF, BW, and CR parameters in LoRa mode, The result is that the transmitted data cannot be decoded by the receiving end at all.

Read more
Article

What will enterprise databases look like in the age of AI

Level of difficultyEasy
Reading time5 min
Reach and readers7.7K

There’s a dangerous illusion that “vanilla” open source is a silver bullet for enterprise systems. A real-world stress test of recent years has shown the opposite: when familiar giants like Oracle step aside, plain PostgreSQL often turns into a pumpkin under true enterprise workloads.

Mark Rivkin, Head of technical consulting at Postgres Professional, shares his personal perspective on why teams end up reinventing the wheel — adding millions of lines of code to the core — and why the future belongs to converged database systems.

Disclaimer: this article reflects the author’s independent expert opinion.

Read more
1
23 ...