Pull to refresh


Show first
Rating limit

«If I had a heart...» Artificial Intelligence

Reading room Artificial Intelligence Science fiction

Most people fear of artificial intelligence (AI) for the unpredictability of its possible actions and impact [1], [2]. In regard to this technology concerns are voiced also by AI experts themselves - scientists, engineers, among whom are the foremost faces of their professions [3], [4], [5]. And you possibly share these concerns because it's like leaving a child alone at home with a loaded gun on the table - in 2021, AI was first used on the battlefield in completely autonomous way: with an independent determination of a target and a decision to defeat it without operator participation [6]. But let’s be honest, since humanity has taken in the opportunities this new tool could give us, there is already no way back – this is how the law of gengle works [7].

Imagine the feeling of a caveman observing our modern routine world: electricity, Internet, smartphones, robots... etc. In the next two hundred years in large part thankfully to AI humankind will undergo the number of transformations it has since the moment we have learned to control the fire [8]. The effect of this technology will surpass all our previous changes as a civilization. And even as a species, because our destiny is not to create AI, but to literally become it.

... more, give me more, give me more ...
Rating 0
Views 2.3K
Comments 0

Utilitarian blockchain. 1. Assets

Decentralized networks Research and forecasts in IT Finance in IT Cryptocurrencies

In the modern world, the term " **blockchain** " is steadily associated with cryptocurrencies, NFTs, mining, trading and financial pyramids. However, even among programmers and IT people there is not always a clear understanding of what it is and what it is for.

This article attempts to look at this still relatively new element of the information and human space in practical and slightly philosophical aspects.

> **Disclaimer**: The article will use simple language to explain non-trivial concepts, so non-critical distortion of technical details is possible.
Read more →
Rating 0
Views 657
Comments 0

How to mimic Agile correctly?

Agile *

A similar article should have appeared earlier, about ten or fifthteen years ago, when Agile was just starting to be implemented in companies. How many mistakes, problems, conflicts could be avoided if managers immediately approached the issue correctly ...

But during this time, the experience of "implementing" Agile in different conditions, in different companies has accumulated, which should be generalized and widely disseminated.

Read more
Rating 0
Views 804
Comments 0

Simple rest based kogito microservice with several embedded pmml models

Java *Business Models Kubernetes *

In previous post I've described an example of kogito-based microservice on quarkus in native mode, containing one embedded pmml model with decision tree. While it can be successfully used for prototyping purposes, in the real life microservice might contain several prediction models. From the first view I've got an impression, that inclusion of several models should be a trivial extension of the prototype with one model. We were completely wrong in our assumption, that's the reason, why I've decided to write this post. Another reason, is absence of guides, in which 2 (or more models) are put inside DMN diagrams in kogito framework.

Read more
Total votes 1: ↑1 and ↓0 +1
Views 844
Comments 0

Enterprise Identity Management Processes. Part I: Employee on-boarding

ERP-systems *

This is the first in series of articles dedicated to detailed overview of processes and components of enterprise identity and access management (IAM). These articles are designed to help technical architects and system designers to better understand what is involved in complex business processes which drive identity management and provide detailed review of all critical components.

Solid understanding of identity management business processes before implementation of a new IAM system very often makes a difference between success and failure and it must be worked out and agreed to by all key participant before implementation can start.

This review does not address specific software configurations and settings required to support these processes and workflow, but any modern identity management software will be able to support them.

Diagram below documents workflow for an employee on-boarding which is one of the core identity management processes to support new employee who is joining the company. The flow is designed to be integrated into existing hiring process and provide logical and physical access to an employee by day one of the employment.

Read more
Total votes 1: ↑1 and ↓0 +1
Views 930
Comments 1

How PVS-Studio prevents rash code changes, example N4

PVS-Studio corporate blog C++ *Development Management *

Blender, PVS-Studio, std::clamp
If you regularly use a static code analyzer, you can save time on guessing why the new code doesn't work as planned. Let's look at another interesting error — the function broke during refactoring, and no one noticed that. No one — except for PVS-Studio that can automatically scan the project and email the report to us.

Read more →
Total votes 2: ↑1 and ↓1 0
Views 554
Comments 0

A new writing method/technology (“dendrowriting”), as exemplified by the YearVer site

Language localisation *Brain

Several years have passed since the appearance of the first text markup language that supports “dendrowriting”, but no worthwhile piece of text demonstrating the advantages of the new writing method/technology has yet appeared.

The largest “dendrotext” was a couple of paragraphs in the pqmarkup documentation, consisting of only ~1300 characters and available only in Russian.

In English there was no “dendrotext” at all, as such [apart from small insertions in the documentation for the 11l programming language (e.g., ‘Boolean type’ in Built-in types)].

But last year...
Read more →
Rating 0
Views 420
Comments 0

Introduction to Engineering

Programming *System Analysis and Design *Studying in IT IT career Systems engineering

This is a set of chapters for young engineers. We give practical advice and discuss goals, challenges and approaches used in modern software engineering.

Along with classical foundations this article contains original ideas of conceptualizing engineer's work with emphasis on bringing order to the situation and finding an insight. Engineering is approached as work in uncertainty with other people which requires special skills. Non-obvious complications regarding modern production in big companies are discussed.

This article is based on 15 years of experience in engineering and management in high-tech industries.

Read more
Rating 0
Views 978
Comments 3

IT risk management

Information Security *Development Management *Project management *Finance in IT

When you have an IT, which supports all aspects of your organization automated performance and you have a firm confidence that IT executes well, there is always a chance that something could go wrong in technology or in related IT processes. Depending on complexity of IT environment varieties of risks scenarios could arise. This article as a summary of different faithworthy sources aims to help you in getting high level understanding on what could go wrong and how you can predict it in a more conscious way.

My name is Max Tornov and I have been working in various IT areas for a long period of time, since then, for over 13 years I am working in the area of IT risk management with specialization in IT audit and internal control effectiveness assessment.

I am sure that at the present the topic of Information Technologies risk management became more vital. Organization’s efficiency in IT risk management directly affects the achievement of various organization’s goals, goals which have dependency on IT, those goals may include reliability and efficiency of business processes, the organization's compliance with regulatory requirements, the integrity of financial reporting, and many others.

I sincerely hope that this material will be useful to you and may give you some new ideas that you can contribute to the benefit of your personal development and the development of your organization's risk management culture.

Read more
Total votes 2: ↑2 and ↓0 +2
Views 909
Comments 0

Японский дизайн — больше, чем минимализм

Alconost corporate blog Web design *Language localisation *Graphic design *Reading room

Проблема, с которой я, как дизайнер презентаций, сталкиваюсь чаще всего, — это необходимость втиснуть большой объем информации на минимальное количество слайдов (так хочет клиент) и при этом разместить информацию эстетически привлекательно.

«Это невозможно» — думаю я, переставляя текстовые блоки, словно игрок в Тетрис. Но внезапно мне приходит мысль, что именно в этом преуспели японцы. Просто взгляните на их меню, на их журналы, брошюры или даже на улицы японских городов. 

Тем не менее, когда я ищу в Гугле словосочетание «японский дизайн», всё, что мне выдает поисковик, — это статьи про минимализм в сочетании с фото симметричных садов камней, чайных чашек нейтральных тонов и деревянных интерьеров, в которых могла бы, кажется, жить Мари Кондо.

Почему лишь такой подход является синонимом японского дизайна, если мы говорим о стране, известной одновременно магазинами MUJI и Don Don Donki, дзен-садами и хаотичной рекламой?

Читать далее
Total votes 7: ↑6 and ↓1 +5
Views 2.4K
Comments 1

How to choose a static analysis tool

PVS-Studio corporate blog Information Security *Development Management *Project management *Software

Tools to improve and control code quality can be a key success factor in a complex software project implementation. Static analyzers belong to such tools. Nowadays, you can find various static analyzers: from free open-source to cross-functional commercial solutions. On the one hand, it's great – you can choose from many options. On the other hand – you have to perform advanced research to find the right tool for your team.

Read more
Total votes 4: ↑2 and ↓2 0
Views 1K
Comments 0

5 Startups Altering The Financial Sector Using Quantum-Inspired Algorithms

Start-up development

It’s a harsh reality that any investment or security that you have is subject to systematic risk, that’s just the nature of the financial world, with mispricing — causing a divergence between the market price of a security and the fundamental value of that security — a guilty party quite often. This is brought about by the world we now live in, information-heavy, with masses of unstructured data sets and with an infinite number of possible outcomes.

Luckily, there are now methods in place that can combat some of these difficulties and, with any luck, bring the investor a healthy return on their investment.

And it comes in the form of Al-driven, quantum-inspired solutions fuelled by state-of-the-art processors that are able to leverage the unique attributes of quantum physics to solve some of the most, up to now, unsolvable problems, with a handful of startups at the forefront of it.

These include Adaptive Finance Technologies, QuantFi and Zapata Computing which, to a greater or lesser degree, have their own unique approach to investment strategies in the global markets in securities pricing, portfolio optimization, equities, derivatives and the like.

We’ll look now, just at a handful of these whose data readers will be able to find on TQD’s very own data platform, The Quantum Insider (TQI), starting off with the three already mentioned before moving on:

Read more
Total votes 1: ↑0 and ↓1 -1
Views 482
Comments 0

How to detect a cyberattack and prevent money theft

Positive Technologies corporate blog Information Security *Programming *Research and forecasts in IT

Money theft is one of the most important risks for any organization, regardless of its scope of activity. According to our data, 42% of cyberattacks on companies are committed to obtain direct financial benefits.  You can detect an attack at various stages—from network penetration to the moment when attackers start withdrawing money.  In this article, we will show how to detect an attack at each of its stages and minimize the risk, as well as analyze two common scenarios of such attacks: money theft manually using remote control programs and using special malware—a banking trojan.

Read more
Rating 0
Views 1.2K
Comments 0

Best Digital Communication API Platform Reviewed and Compared (2022)

Instant Messaging *API *Technical Writing *

Digital communication APIs and SDKs! the most powerful tool in the era of digitalization. Unlike other tools, these real time communication APIs have spread their impact over all industries and have successfully grabbed the attention of proficient developers too.

Based on the demand and need of developers to know more about these digital communication APIs and SDKs concerning their market availability with pricing, features and functionalities, I have posted this article to get you some clarity with research on the top most real time chat API and SDK providers. So, let’s start over.

Read more
Total votes 1: ↑0 and ↓1 -1
Views 939
Comments 0