Search
Write a publication
Pull to refresh

My feed

Type
Rating limit
Level of difficulty
Warning
To set up filters sign in or sign up
Post

Как разводят венчурных капиталистов на бабки по поводу процессоров

Когда в СМИ публикуют статью про новый революционный процессор, но в статье нет бенчмарок, тут все понятно: статью можно игнорировать, это просто мусорный набор символов на экране. А если бенчмарки есть? Тут тоже не все так просто. Лет 10 назад был стартап, который показывал венчурным капиталистам слайды, что их революционно гибкий процессор (который динамически выделял потоки) по тактам в 3 раза быстрее чем старшее ядро ARM. Измерение было с помощью симуляции на уровне регистровых передач и в качестве бенчмарки была то ли Dhrystone, то ли CoreMark/MHz. Но они "забыли" указать на слайдах, что если синтезировать их процессорное ядро c библиотекой ASIC на том же техпроцессе, на котором и ядро ARM, против которого они конкурируют - то статический анализ тайминга покажет, что максимальная тактовая частота, которую они могут использовать - втрое меньше, чем у ARM. То есть втрое лучше по тактам умножаем на втрое хуже по частоте = никакого улучшения. Об этом факте я случайно услышал на парти - человек сказал цифру и я сложил два плюс два, то бишь умножил 3 на 1/3.

Также замечу что развод на бабки VC ничуть не менее аморален, чем развод на бабки пенсионеров по телефону, так как в фонды VC вкладывают в том числе и частные пенсионные фонды.

Tags:
Total votes 12: ↑11 and ↓1+13
Comments11
Article

The Collatz conjecture as a fail of world math

Reading time4 min
Views2.1K

/Sandbox 23.12.2024/

On 17.10.2024, the article “A new inherent approach to solving the Collatz 3n+1 problem and its analogues” was published on the Academia.edu website [1]. The second link is for those who find it easier to read in Russian “Новый внутренне присущий подход к решению проблемы Коллатца 3n+1 и ее аналогов” [2].

The English version was originally intended for the arXiv preprint platform, but they suggested first publishing in a peer-reviewed mathematical journal. Attempts to access other platforms HAL, Qeios, and ResearchGate were met with the requirement for affiliation, which an independent researcher does not have.

The process took almost two months — more than the research itself from idea to text. As a result, the article ended up on the Academia site, which is free from “face control”. I think it will be useful for anyone interested in the Collatz conjecture to read it. Exclusively for Habr, this short text summarizing the content and meaning of the publication.

Read more
Article

Google Keyword Scraping: A Detailed Guide to Building a Free Google Scraper

Level of difficultyEasy
Reading time8 min
Views1.7K

Any SEO expert knows the pain of collecting Google keyword data. It’s one thing if you can count all the queries on one hand, but what if they number in the thousands? How do you check the search volume in Google for each keyword? Frankly, once you hit tens of thousands of keywords, it’s enough to make your head spin. You’ll be tempted to reach for outdated, familiar tools, only to find modern reality throwing a curveball: the old formula of Key Collector + Google Ads + a few proxies simply doesn’t cut it anymore. We’re entering a new era, and without direct access to the official API, things get grim and complicated fast.

Read more
Article

Rabbit Testing: A Multifaceted Approach to Quality Assurance

Level of difficultyMedium
Reading time4 min
Views1.2K

In the fast-paced world of software development, ensuring the quality and reliability of applications is crucial. With the ever-increasing complexity of software systems, it becomes essential to adopt a comprehensive and structured approach to testing. One such approach can be encapsulated in the acronym "RABBIT," where each letter stands for a distinct branch of testing. This multifaceted strategy covers various testing methodologies that together create a robust framework for quality assurance. This article explores each branch of RABBIT testing in detail, providing insights into their significance, implementation, and appropriate use cases.

Read more
Post

Я сохраняю историческое наследние на Wikimedia Commons, например газеты 19 века, но их очень много - буду рад если вы присоединитесь, научу как там делать.

Вот например страница одной старой газеты https://commons.wikimedia.org/wiki/Category:Minskie_eparhialnye_vedomosti

Исторические данные важно сохранять - многое мы уже потеряли. Где-то библиотеки выкладывают на своих сайтиках отсканированное, где-то генеалоги за свои деньги заказывают сканы и потом публикуют в Google Drive, что-то берется с archive.org. Может у вас дома есть газеты 19 века?

Вот тут всё что я загрузил.

Например, одна из текущих задач - Могилевские Губернские Ведомости. В идеале их нужно не только загрузить, с правильным проставлением категорий по годам, но и вынуть тексты для другого сервиса ru.wikisource.org

Авторское право для газет 19 века уже истекло, так что это все легально.

Пример ценного
Пример ценного

Пишите кто тоже хочет загружать на Коммонс и спасать историю, делать её доступнее для анализа людьми и машинами.

Tags:
Total votes 4: ↑4 and ↓0+4
Comments2
News

Electronic Arts поделился технологиями, а Google разработал умные очки (опять) и чип на 105 кубитов: дайджест новостей

Reading time3 min
Views2K

Apple представила новые патенты в сфере виртуальной реальности Vision Pro, самый быстрый чип от Google вызвал вопросы, а у индийских фермеров возникли проблемы с CRISPR. Рассказываем в нашем дайджесте про эти и другие наиболее важные новости в сфере интеллектуальной собственности.

Read more
Article

Grok AI 2: How to Get Started with This AI Tool

Level of difficultyEasy
Reading time3 min
Views3.4K

Grok AI is a new and exciting artificial intelligence created by xAI, a company founded by Elon Musk in 2023. It works closely with X (formerly Twitter), offering cutting-edge tools for chatting, image creation, and more. In this article, we’ll break down what Grok AI is, how to use it, and what it can do.

Read more
Article

How to bypass CAPTCHA the smart way: hybrid strategies for success

Level of difficultyEasy
Reading time14 min
Views2.3K

Automation can be an exhilarating, albeit exhausting, journey‑especially for those just dipping their toes into it. The tasks are often labeled as “interesting” or “non‑standard,” which, let”s be honest, often translates to “challenging” or even “impossible.” Among these challenges, one question halts around 50% of novice automators in their tracks: How to bypass CAPTCHA!

Read more
Article

How AI is Shaping the Future of Robotics and Workplace Safety

Reading time2 min
Views1.4K

The robotics industry is undergoing a significant transformation, moving beyond static systems and rigid programming to dynamic, adaptive solutions powered by artificial intelligence (AI). With these advancements, robots are increasingly capable of real-time decision-making and learning, opening up new opportunities to enhance workplace safety and efficiency.

Read more
Article

How to Choose the Optimal Authentication Solution for Your Application

Level of difficultyMedium
Reading time3 min
Views1.6K

In today's digital world, where applications process increasing amounts of sensitive data, ensuring reliable user authentication is critical. Authentication is the process of verifying the identity of a user who is trying to access a system. A properly chosen authentication method protects data from unauthorized access, prevents fraud, and increases user confidence.

However, with the development of technology, new authentication methods are emerging, and choosing the optimal solution can be difficult. This article will help developers and business owners understand the variety of authentication approaches and make informed choices.

Read more
Article

How to create a better UX design for the users of younger generations

Level of difficultyEasy
Reading time5 min
Views2K

Gen Z – a generation of young people born between the last few years of the 20th century and the first ten years of the 21st, are the primary users of a modern-day Internet. They started using technology since their early childhood, being almost constantly glued to their smartphones and tablets, which led to them being very demanding users that have their own requirements in UX. At the same time, they are known for their sense of humor and straightforwardness – which means they love using products that are both easy to navigate but full of interactive elements. Below we’ve collected a few things you should consider when creating a UX design aimed at a young audience.

Read more
Article

From Idea to Release: The Product Owner’s Role in Feature Development at Exante

Level of difficultyEasy
Reading time6 min
Views4.5K

Why might a feature not get to production on time? What prevents the team from releasing before the deadline? Can the product owner influence the timeline?

In this article, I will try to answer these questions and suggest solutions for the processes we are implementing and improving within the product team at EXANTE.

Read more
Article

Selenium CAPTCHA Bypass with Tokens or Clicks? Continuing the Speed Comparison

Level of difficultyEasy
Reading time3 min
Views689

In my previous article, Puppeteer CAPTCHA bypass: Tokens or Clicks? Let’s Break It Down (which I also published on Dev.to), I compared two CAPTCHA bypass methods (clicks and tokens) using Puppeteer. I also announced that in the next article (this one), I would conduct a practical comparison of the same methods using Selenium. This will complete the CAPTCHA bypass picture, so to speak. Well, let’s not waste time and get straight to the point.

Read more
Article

Puppeteer CAPTCHA bypass by Token or Clicks: Which is Faster? A Practical Comparison

Reading time4 min
Views1.4K

In my work, I often encounter various services designed to simplify tasks across different areas. I’m not talking about tools like GSA or A-Parser but about Zennoposter or BAS. I am no professor in automation, so I’ll explain in layman's terms: these services are essentially complex, multi-layered platforms that allow the creation of bots and scripts to perform almost any task without human intervention—a sort of “basic neural network.” By the way, such services existed long before neural networks became mainstream for everyday use.

While exploring BAS, I encountered a situation where many developers creating BAS scripts (ironically, developers developing) idealize CAPTCHA solving using clicks.

Read more
Article

Debugging SSH connections: A Comprehensive Guide

Level of difficultyMedium
Reading time14 min
Views3.8K

SSH (Secure Shell) is the backbone of remote system administration and secure remote access, serving millions of developers and system administrators daily. However, when SSH connections fail, the cryptographic nature of the protocol can make debugging challenging. The complex interplay between authentication mechanisms, encryption algorithms, and network layers often obscures the root cause of connection issues. This complexity is further compounded by the protocol's security-first design, where error messages are intentionally vague to prevent potential attackers from gathering system information. Whether we're dealing with key authentication failures, network connectivity issues, or configuration mismatches, understanding the underlying SSH architecture becomes critical for effective troubleshooting.

SSH it!