Pull to refresh

Development

Show first
Period
Level of difficulty

Python Clean Code: Stop Writing Bad Code — Lessons from Uncle Bob

Level of difficultyEasy
Reading time4 min
Views10K

Are you tired of writing messy and unorganized code that leads to frustration and bugs? You can transform your code from a confusing mess into something crystal clear with a few simple changes. In this article, we'll explore key principles from the book "Clean Code" by Robert C. Martin, also known as Uncle Bob, and apply them to Python. Whether you're a web developer, software engineer, data analyst, or data scientist, these principles will help you write clean, readable, and maintainable Python code.

Read more

Ladybird Browser: First Impressions & Easy Installation Guide

Level of difficultyEasy
Reading time4 min
Views7.8K

In this article, I would like to introduce a new web browser called Ladybird. This ambitious open-source project aims to revolutionize the browsing experience. Although it hasn't been officially released, I had the opportunity to test it on Ubuntu. In this article, I'll show you what it looks like and explain how you can run it on your computer.

Read more

Data labeling – training on cats

Level of difficultyEasy
Reading time8 min
Views563

At some point while diving deeper into automation processes you are faced with the need for data labeling, although just a couple of weeks ago, the phrases data labeling and you were standing at a party called "Earnings on the Internet" in different rooms. Or it would be better to say that you were standing by the pool, and the data labeling was on the third floor, smoking on the balcony with experts in the field of machine learning. How did we meet? Probably, someone pushed it off the balcony into the pool, and I helped it out, soaking my clothes along the way.

Read more

CacheBrowser experiment: bypassing the Chinese firewall without a proxy by caching content

Level of difficultyMedium
Reading time7 min
Views1.2K

Today, a significant portion of all content on the Internet is distributed with the use of CDNs (Content Delivery Networks). At the same time, there is no research on how various censors extend their influence on such networks. Scientists from the University of Massachusetts analyzed possible methods of blocking CDN content using the example of the practices of the Chinese authorities, and also developed a tool to bypass such blocks.

We (specialists from proxy service) have prepared an overview material with the main conclusions and results of this experiment (translate of this material).

Read more

How to deploy Next.js to Firebase hosting quickly in 2024: a beginner's guide

Level of difficultyMedium
Reading time2 min
Views730

In this tutorial, I’ll show you how to deploy a full-stack JavaScript web app into Firebase. We’ll deploy a Next.js application to Firebase hosting. I’ll show you a quick and efficient process that can be completed in 5 minutes. 

Read more

How to Save on Your Netflix Subscription: A Step-by-Step Guide Using Proxies and Antidetect Browser

Level of difficultyEasy
Reading time3 min
Views918

Corporations that dominate the market can impose their conditions on customers. This is also the case with everyone's favorite Netflix. When you make good content and you are sure that your audience wants to consume your content, you can start to increase the subscription price gradually. But the distribution of subscription costs around the world is unequal. This happens not only with Netflix, it happens with many big corporations: Microsoft, Sony, etc.

Naturally, everyone wants to watch high-quality content, but no one wants to overpay for it. And that led to creation of different schemes, for example, the one I'm going to describe here.

The essence of the scheme is simple – you buy a subscription for another region while staying in your home region. Of course, you can do this, but before I describe the scheme in detail, you should understand that Netflix is not as simple as it seems. When buying a subscription, for example, as a user from Pakistan, you should know that only the content that is allowed in that country will be available to you. Meaning, any sign of eroticism in movies, for example, is forbidden there.

And now this scheme appears in a completely opposite light. You can use my scheme if you want to access content that is blocked in your country, but you need to be prepared that the price will not be the same as for your region.

Top Three cheapest countries (in terms of the Netflix subscription price)

Read more

Dual Reliability Requests

Level of difficultyMedium
Reading time9 min
Views916

We are requesting 20,000,000 euro to place 900 orders on the exchange. What could go wrong?

Today, I will explain how to avoid losing billions in client money when executing large transactions on the exchange. This discussion focuses on an often overlooked and largely invisible problem that arises when handling large requests, particularly HTTP requests, which may not be fully executed. It's surprising how little attention is given to this issue and how few tools there are to address it.

Our task was to implement large-scale management of exchange orders, not just within a single exchange but globally, and to ensure it operates reliably. In this story, you'll encounter clients, servers, and cats. Stories are always more enjoyable with cats.

Read more

How to Build an AI Image Analyzer with Project IDX and Gemini API: A Simple Guide

Level of difficultyEasy
Reading time3 min
Views834

Do you want to know how to build an AI image analyzer? Then read this article till the end! I'm going to show you how to build AI analyzer tools really simply, so you almost don't have to have any prior knowledge. I will take you step by step, and we will use Project IDX and the Gemini API. This means you don't have to set up anything; everything we will do is on the cloud. If you're ready, then let's get started!

Read more

cgroups: how to eliminate the “noisy neighbor” effect in PostgreSQL

Level of difficultyMedium
Reading time6 min
Views498

If you've ever run multiple instances of PostgreSQL or other software on a single machine (whether virtual or physical), you've probably encountered the "noisy neighbor" effect — when instances disrupted each other. So, how do you make them get along? We’ve got the answer!

Read more

DASTing SAML: Breaking Trust, One Assertion at a Time

Level of difficultyHard
Reading time14 min
Views1.3K

My name is Ilya and I’m a Core Developer at Bright Security. In Bright we work on a DAST (Dynamic Application Security Testing) solution that helps development teams find and fix vulnerabilities early, straight from CI/CD. My own path began in full-stack engineering, but almost a decade of shipping production code drew me ever deeper into application security. In this article I’m explaining key approaches on what SAML actually is and how we detect it in Bright using DAST.

Read more

How to Choose the Optimal Authentication Solution for Your Application

Level of difficultyMedium
Reading time3 min
Views1.5K

In today's digital world, where applications process increasing amounts of sensitive data, ensuring reliable user authentication is critical. Authentication is the process of verifying the identity of a user who is trying to access a system. A properly chosen authentication method protects data from unauthorized access, prevents fraud, and increases user confidence.

However, with the development of technology, new authentication methods are emerging, and choosing the optimal solution can be difficult. This article will help developers and business owners understand the variety of authentication approaches and make informed choices.

Read more

Replit 101: Learn to Use Replit Agent and Deploy Your First App

Level of difficultyEasy
Reading time4 min
Views5K

Did you know that coding tools have evolved so rapidly that they're now shaping the future of programming itself? As technology advances, platforms like Replit are leading the charge, making coding more accessible and collaborative than ever before. In this article, I'll show you what Replit is and how to use it.

Read more

Two problems why you are not selling Internationally

Level of difficultyMedium
Reading time2 min
Views2.3K

My name is Paul Karol and I work as a director in a Russian IT company that mostly sells their products in the international market.

I have been deeply involved in a project and I haven’t had time to write here lately.  

But out of this work came an understanding of two very large Mistakes that are being made that prevent your pre-sales from succeeding. 

I’m going to go into deeper detail on each one of these issues in the next articles, but I will introduce them here now.

Let me make you a promise….. if you correct these two issues, your software and development projects will sell.  

**I have a proven track record. If these areas are fixed the company begins to sell 150 % more than they’ve ever sold in the past. 

150% more profits! 

Read more

Tree-sitter and Preprocessing: A Syntax Showdown

Level of difficultyMedium
Reading time5 min
Views1.2K

According to the description,


Tree-sitter is a parser generator tool and an incremental parsing library. It can build a concrete syntax tree for a source file and efficiently update the syntax tree as the source file is edited.

But how does Tree-sitter handle languages that require a preprocessing stage?

Read more →