Pull to refresh

My feed

Type
Rating limit
Level of difficulty
Warning
To set up filters sign in or sign up
Article

Is a new wave of process excellence coming?

Level of difficultyEasy
Reading time6 min
Reach and readers447

It's a strange question to ask in 2026, when agents are at the top of most companies' agendas and calling yourself "AI-native" has become almost mandatory. Against that backdrop, process excellence sounds like a phrase from another era, when any system rollout was preceded by a separate phase: processes were described, aligned on, and prioritized, and only then would anyone decide what to actually automate.

And yet, the closer you look at how companies are currently deploying AI, the more you get the sense that we might be about to rediscover something we quietly skipped.

Read more
Article

Using the technologies of the future for the sake of the future itself — about the experience of the Sci-Fi club NX-01

Level of difficultyEasy
Reading time7 min
Reach and readers1.6K

«Sci-Fi ship on the orbit of black hole»

I've long been interested in science fiction, especially that which paints a positive vision of the future. I'm also passionate about artistic expression, even though I'm a software engineer. Somewhere between these two passions, in 2021, I came up with the idea to create an online club dedicated to sci-fi art in addition to my main job. It all started with selecting and posting materials, primarily from DeviantArt and, to a lesser extent, ArtStation. But with the rapid development of AI, especially in image generation, the club became more unique, as I was able to translate my ideas into art. Chat and code assistants are also used behind the scenes. AI is clearly the technology of the future, and using it in a project that promotes a positive vision of that very future seems more than suitable. I'd like to share this experience. There won't be any deep technical details about AI, this is more of an overview and presentation text.

Read more
Article

Meet the Developer: Hysteria

Level of difficultyEasy
Reading time4 min
Reach and readers1.1K


This is the pilot episode of our new interview series Meet the Developer, where we talk to the people behind anti-censorship tools. Our goal is to shine a light on the developers whose open-source solutions help millions of people stay connected.

In this first episode, we sit down with Toby, the lead developer of Hysteria, to discuss the project’s origins, technical challenges and his perspective on internet censorship.

Let’s start with an introduction. Tell us who you are and what you do.

Just call me Toby. I’m a software engineer. Previously, I have worked for a large company. But right now, I’m a co-founder of a startup with some friends.

Nice to meet you Toby! Would you like to share what type of startup it is, or is it a top secret project?

We are still in stealth mode.

Why did you decide to develop Hysteria?

It was originally a project I developed for myself when I was in college.
China’s global Internet connectivity has been notoriously bad for as long as I can remember (still not any better right now). Not just in the sense of censorship, but also in terms of connection quality.

For example, if you have a server in the US and want to connect to it from China, expect over 10-20% or more packet loss.

So if you set up a proxy server in another country to circumvent censorship, it would be painfully slow (the most popular tools back then were GoAgent and later Shadowsocks).

So Hysteria began as an attempt to improve my speed for watching YouTube videos.

It’s always great to see developers building something to solve their own challenges. I can relate to the packet loss issue. Either you suffer the packet loss, or you have to purchase an expensive server with CN2 routing, which will cost a lot.

Read the interview
Article

What’s my age again?

Level of difficultyEasy
Reading time5 min
Reach and readers2.4K

For three months the Online Safety Act has been gloriously defeating abiding companies. Shall we get prepared for blocking?

It’s been three months since the Online Safety Act’s major duties came into force in the UK, and so far, the only people not criticizing it seem to be the ones who wrote it. Demand for VPNs has skyrocketed, while a petition against the law collected nearly half a million signatures in just a few days. Still, there’s no sign of anyone in the government reconsidering it. Xeovo looks into who’s actually benefited, what the costs have been, and whether the promised results are showing up at all.

Read more
Post

Replys beta is open. Join today at replys.ai

You discuss. We update the specs and create the tasks.
In AI-first teams, the center of gravity is shifting.

Code gets written faster than ever. The real work moves upstream, into discussions. Sprint plannings. Stakeholder calls. Architecture debates. The thread where half the decisions actually get made.
That's where the product lives now. And that's where things fall through the cracks.

Replys makes sure they don't.

It listens to your team discussions, understands your existing documentation and tasks, and turns what was said into structured specs and tickets. Synced to Jira, Confluence, and Notion. Context-aware, so it updates what's already there instead of duplicating. Human review before anything gets pushed.
Every decision makes it into the docs. Every requirement makes it to the devs. Nothing gets lost between the meeting and the codebase.
Built for teams working on existing, complex products, not greenfield vibe coding.

If you're a PM, BA, or tech lead, we'd love to have you in the beta.
Link in the first comment.

#ProductManagement #BusinessAnalysis #AI

Tags:
0
Comments0
Article

I Taught a Virtual Camera to Behave Like a Human Operator: How a Face Tracking Algorithm for Shorts/Reels Works

Level of difficultyHard
Reading time14 min
Reach and readers4.9K

In the previous article I described my “anime factory” in detail — a pipeline that automatically turns episodes into finished Shorts. But inside that system there is one especially important module that deserves a separate deep dive: a virtual camera for automatic reframing.

In this article, I will break down not just an “auto-crop function,” but a full virtual camera algorithm for vertical video. This is exactly the kind of task that looks simple at first glance: you have a horizontal video, you need to turn it into 9:16, keep a person in frame, and avoid making the result look like a jittery autofocus camera from the early 2010s.

But as soon as you try to build it not for a demo, but for a real pipeline, engineering problems immediately show up:

Read more
Article

CUBA: Why It Saved My Hackathons and Killed My Production Projects

Level of difficultyMedium
Reading time4 min
Reach and readers3.5K

If you have ever done enterprise Java development, you have probably heard of CUBA Platform. And no — this is not about the Caribbean.

CUBA is a full-stack Java framework for rapid development of business applications: CRM, document management, ERP-like systems, internal tools, and everything commonly called “enterprise.”

I worked with it in several hackathons and in a couple of real projects. And I have mixed feelings about it — that is exactly why I am writing this.

Read more
Article

How I Built an “Anime Factory”: a System That Automatically Turns Episodes into YouTube Shorts

Level of difficultyMedium
Reading time18 min
Reach and readers2.7K

Hi, Habr!

Over the past few months, I have been building a system that I internally call an “anime factory”: it takes a source episode as input and produces a ready-to-publish YouTube Short with dynamic reframing, subtitles, post-processing, and metadata.

What makes it interesting is not just the fact that editing can be automated, but that a significant part of this work can be decomposed into engineering stages: transcription, audio and scene analysis, strong-moment discovery, “virtual camera” control, and a feedback loop based on performance metrics.

In this article, I will show how this pipeline is structured, why I chose a modular architecture instead of an end-to-end black box, where the system broke, and which decisions eventually made it actually usable.

Read more
Article

Bulletproof VPNs: What Are They and Why You’re Not Their Audience

Reading time6 min
Reach and readers4.2K

In November, 2025 Russia-based web host Media Land was sanctioned by several countries as a bulletproof service — the one hackers relied on to launch DDoS attacks and attack businesses in the United States and in allied countries. “Bulletproof” may refer to a VPN as well, as it usually means abuse resistant and private. Xeovo explains how genuinely reliable anonymous VPNs and hostings differ from bulletproof services — and why the real bulletproof operators are often not those who call themselves that.

Read more
Article

Async Logging Is Not a Silver Bullet — What Actually Limits Performance

Level of difficultyMedium
Reading time4 min
Reach and readers3K

Async logging is often treated as an obvious optimization.

It isn’t.

It just moves the cost somewhere else.

This idea sounds simple: synchronous logging blocks, async logging doesn’t — so it must be faster.

But once you look at what actually happens inside the system, the picture becomes very different.

Libraries like Quill are built around asynchronous pipelines. Others, like spdlog, support both synchronous and asynchronous modes. Some systems — including logme — deliberately mix synchronous formatting with asynchronous output.

Despite these differences, they all run into the same fundamental constraints.

Read more
Article

Quantum Mechanics May Describe Not Reality Itself, But the Mechanism of Its Emergence

Level of difficultyMedium
Reading time7 min
Reach and readers4.3K

Quantum mechanics is one of the most successful theories in the history of science.

It underlies atomic physics, semiconductors, lasers, and modern quantum technologies.

However, nearly a century after its development, a peculiar situation remains:

we can predict experimental results with remarkable precision, yet we still do not fully understand what quantum theory actually represents.

Does it describe physical reality “as it is,” or does it instead describe the structure of conditions under which observable facts become possible?

In this article, I propose the following hypothesis:

quantum theory does not describe reality itself, but the conditions and mechanisms through which observable reality emerges.

Read more
Article

10 UX principles that define usability of any software product

Level of difficultyEasy
Reading time4 min
Reach and readers5.4K

The main goal of UX design is to create a usable, accessible and aesthetically pleasing product that helps people solve certain problems in their everyday routine. To achieve that, UX designers should follow UX principles and guidelines that are aimed at creating user-friendly intuitive interfaces and have stood the test of time. Even though each UX project might have its own guidelines and heuristic evaluations based on its peculiarities, some principles serve as a common UX basis in any situation. 

Read more
Article

Can AI Help You Remember What You Learn? My Experience Testing Recall

Level of difficultyEasy
Reading time4 min
Reach and readers11K

Every week, I watch tutorials, save articles, bookmark tools, and collect ideas I want to come back to later. But a few days later, the problem shows up: I may remember the topic, but not the details. I know I saw something useful, but I cannot explain it clearly or apply it with confidence.

Read more
Article

Why the Chat Control Act keeps coming up and why we shall not forget about it

Level of difficultyEasy
Reading time5 min
Reach and readers8.8K

The Art of Comeback of the European Bureaucracy 

On November 26, Members of the European Parliament rejected the Chat Control Act in its current version, i.e, mandatory scanning of the user traffic before it gets encrypted. Lawmakers, however, will hardly give up: requirement for mandatory scanning shall be reconsidered every three years. Xeovo explains what is the story behind this law and why, in reality, there’s little justification for passing it.

Read more
Article

PostgreSQL cost model: estimating the cost of flushing temp buffers to disk

Level of difficultyMedium
Reading time8 min
Reach and readers6.3K

Today I present results from the first step towards enabling temporary tables in PostgreSQL parallel query execution: benchmarking sequential writes and reads of temp buffers. I added functions to the PostgreSQL system catalog to measure buffer flush operations and ran a set of tests. For the planner, I estimated the cost coefficient of flushing a temporary table buffer page to disk relative to the existing DEFAULT_SEQ_PAGE_COST. I also estimated the cost of a simple scan of temp buffers (a dry-run). Measurements show that sequential writes are about 30% slower than reads. Based on these results, I propose a cost formula. I also ran a limited “dry-run” style estimate and measured write speed when table blocks are distributed across memory pages randomly.

Read more
Article

LoRa Module (P2P Private Protocol) Parameters

Level of difficultyMedium
Reading time21 min
Reach and readers5.7K

If you are using a LoRa module for point-to-point (P2P) communication or building your own private protocol, understanding and correctly configuring each parameter is the key to successful communication.

After reading this article, you will learn:

• How Should the LoRa Over-the-Air (PHY) Modulation and Packet Format Parameters Be Configured, and Why?

• The meaning of RF front-end parameters and how to tune them

• Chip-level control parameters: operating modes, clocks, power supply, calibration, and more

• A quick-reference "must-match" table and a list of common issues

Note: This article covers only LoRa (P2P/Private Protocol) parameters. If you need information on LoRaWAN protocol-layer parameters (e.g., ADR, DevEUI, join procedures), please refer to "LoRaWAN Protocol Layer Parameters".

Before starting configuration, verify that your device has selected PacketType = LoRa. The LR2021 supports multiple modulation types—including LoRa, LR-FHSS, FLRC, FSK/GFSK, OQPSK, and OOK. When using P2P LoRa communication, you must first switch to LoRa mode; all subsequent modulation and packet structure commands will then be interpreted in LoRa mode.

If you select the wrong PacketType (e.g., FLRC or GFSK mode), the chip will not interpret the SF, BW, and CR parameters in LoRa mode, The result is that the transmitted data cannot be decoded by the receiving end at all.

Read more
1
23 ...