• Bitcoin for Starbucks Coffee Poses Significant Tax Filing Issues

      A while ago, Starbucks announced that it was entering into a partnership with the United States cryptocurrency-based platform, Bakkt. Two days ago, new details about the partnership revealed that Starbucks, the United States coffee giant, may start accepting Bitcoin Bakkt payments because of the equity deal. The news was initially reported by The Block, a cryptocurrency news outlet.

      Bitcoin Bakkt Payments On Starbucks


      image

      In August last year, Starbucks became one of the founding partners of Bakkt. Now, the coffee giant will install the Bitcoin Bakkt software that will allow customers make payments for their products in Bitcoin. The report from The Block stated that even if the payments will be made in cryptocurrencies, no Bitcoin will be left on the chain. They will be converted into fiat instantly.

      Bitcoin (BTC) Price Today – BTC / USD

      image

      The entire cryptocurrency industry has been waiting for the release of Bakkt which is currently in its final stages. The platform is expected to support the massive adoption of cryptocurrencies around the globe. The platform will most likely be launched this year. Among other things, it is going to provide issuance for physically-delivered Bitcoin futures contracts. Right now, the main thing that is holding the platform back is regulatory approval from the CFTC. As soon as the United States Commodities Futures Trading Commission gives its approval, the platform will go live. This is expected to happen later this year.
      Read more →
    • VShard — horizontal scaling in Tarantool



        Hi, my name is Vladislav, and I am a member of the Tarantool development team. Tarantool is a DBMS and an application server all in one. Today I am going to tell the story of how we implemented horizontal scaling in Tarantool by means of the VShard module.

        Some basic knowledge first.

        There are two types of scaling: horizontal and vertical. And there are two types of horizontal scaling: replication and sharding. Replication ensures computational scaling whereas sharding is used for data scaling.

        Sharding is also subdivided into two types: range-based sharding and hash-based sharding.

        Range-based sharding implies that some shard key is computed for each cluster record. The shard keys are projected onto a straight line that is separated into ranges and allocated to different physical nodes.

        Hash-based sharding is less complicated: a hash function is calculated for each record in a cluster; records with the same hash function are allocated to the same physical node.

        I will focus on horizontal scaling using hash-based sharding.
        Read more →
      • Приложение Дурак для Windows Store


          Поль Сезанн, «Игроки в карты»

          Давным-давно, в Windows 95 была игра Microsoft Hearts. Игра в карты по сети, с оппонентами по всему миру. Если мне не изменяет память, то в Windows for Workgroups 3.11 (да, я застал все эти артефакты!) была версия для игры по локальной сети, с использованием так называемого NetDDE.
          И мне захотелось сделать что-то похожее...
        • Factors of the Bitcoin’s value

          Introduction


          In the modern world, new technologies become important factors of the development of financial sphere of world economy. Emergency of such cryptocurrency as Bitcoin is connected with both great opportunities and certain risks for the users of this cryptocurrency. The aim of the present work is to determine the main factors which affect the price of Bitcoin.
          Read more →
        • Cryptocurrency market valuation to hit $1 trillion this year -Cryptocurrency Predictions 2019

            Cryptocurrency market valuation to hit $1 trillion this year. The market cap of cryptocurrency seems to just increase. Even though some of the individual ones are falling but cumulatively, the market cap seems to increase year-on-year.

            According to the CEO of Kraken, Jesse Powell, cryptocurrencies would see accelerated growth. They would be able to pull back from the bottom to new highs.

            According to him, there are many businesses revolving around cryptocurrencies now. Also, there are many people in the know-how of cryptocurrency is no
            Read more →
          • Most common misconceptions in popular physics

              Somewhere in an alternative Universe, based on MWI, I became a genius in physics. But in our Universe, I just read professional publications in physics, trying to keep myself up to date, meanwhile working as pizza delivery guy as DBA. Because of a slightly deeper knowledge of the subject it is almost impossible for me to watch the Discovery channel and other popular TV shows and the YouTube videos. I see nothing but oversimplifications, lies, and half-truths and can’t enjoy the shows.

              I decided to compile a list of the most popular misconceptions. And the winner is...., or course, this one:

              The Big Bang


              Usually it is pictured like this:

              image
              Read more →
            • Использование Fastify и Preact для быстрого прототипирования веб-приложений

              • Translation
              Автор материала, перевод которого мы сегодня публикуем, хочет поделиться рассказом о том, какими технологиями он пользуется для быстрой разработки прототипов веб-приложений. В число этих технологий входят библиотеки Fastify и Preact. Он, кроме того, пользуется библиотекой htm. Она легко интегрируется с Preact и используется для описания элементов DOM с использованием понятных конструкций, напоминающих JSX. При этом для работы с ней не нужен транспилятор вроде Babel. Продемонстрировав инструментарий разработки прототипов и методику работы с ним, автор материала покажет как упаковывать такие приложения в контейнеры Docker. Это позволяет легко демонстрировать приложения всем, кому они интересны.


              Читать дальше →
              • +21
              • 7.2k
              • 3
            • Indexes in PostgreSQL — 2

              • Translation

              Interface


              In the first article, we've mentioned that an access method must provide information about itself. Let's look into the structure of the access method interface.

              Properties


              All properties of access methods are stored in the «pg_am» table («am» stands for access method). We can also get a list of available methods from this same table:

              postgres=# select amname from pg_am;
              
               amname
              --------
               btree
               hash
               gist
               gin
               spgist
               brin
              (6 rows)
              

              Although sequential scan can rightfully be referred to access methods, it is not on this list for historical reasons.

              In PostgreSQL versions 9.5 and lower, each property was represented with a separate field of the «pg_am» table. Starting with version 9.6, properties are queried with special functions and are separated into several layers:

              • Access method properties — «pg_indexam_has_property»
              • Properties of a specific index — «pg_index_has_property»
              • Properties of individual columns of the index — «pg_index_column_has_property»

              The access method layer and index layer are separated with an eye towards the future: as of now, all indexes based on one access method will always have the same properties.
              Read more →
            • Digital Forensics Tips&Tricks: How to Find Active VPN Connection in the Memory Dump

                Sometimes you can meet a case when a cyber-attacker uses VPN to establish a reliable channel between C2 server and infected IT-infrastructure. And, as Threat Intelligence experts say, attackers often use native Windows VPN connection tools and Windows .pbk (phonebook) files. Lets find out how we can detect it using a memory dump.

                What is .pbk file and how does it look inside? It's just a text file with a lot of different parameters using when VPN connection is establishing.

                image

                Read more →
              • Levelord, an Ordinary Moscow Resident: Interview with the Creator of Duke Nukem

                  RUVDS together with Habr.com continues the series of interviews with interesting people in computer field. Previously we met Boris Yangel, who heads AI development of Yandex’s Alice voice assistant.

                  Today we bring you an interview with Richard (Levelord) Gray — level designer of such legendary games as Duke Nukem, American McGee Alice, Heavy Metal F.A.K.K.2, SiN, and Serious Sam. And he is the one who coined the famous phrase «You are not supposed to be here». Richard was born and spent most of his life in USA, but several years ago he moved to Moscow to his russian wife and daughter.

                  These who speak to Richard are Nick Zemlyanskiy, editor of Habr.com, and Nikita Tsaplin, co-founder and managing partner of RUVDS company.


                  → Text and video in Russian
                  Read more →
                • NodeJS logging made right


                    What's nagging you the most when you think about logging in NodeJS? If you ask me I'm gonna say lack of of industry standards for creating trace IDs. Within this article we'll overview how we can create these trace IDs (meaning we're going to briefly examine how continuation local storage a.k.a CLS works) and dig deep into how we can utilize Proxy to make it work with ANY logger.

                    Read more →
                  • Developer’s Guide to Building AI Applications

                      Create your first intelligent bot with Microsoft AI


                      Artificial intelligence (AI) is accelerating the digital transformation for every industry, with examples spanning manufacturing, retail, finance, healthcare, and many others. At this rate, every industry will be able to use AI to amplify human ingenuity. In this e-book, Anand Raman and Wee Hyong Tok from Microsoft provide a comprehensive roadmap for developers to build their first AI-infused application.


                      Using a Conference Buddy as an example, you’ll learn the key ingredients needed to develop an intelligent chatbot that helps conference participants interact with speakers. This e-book provides a gentle introduction to the tools, infrastructure, and services on the Microsoft AI Platform, and teaches you how to create powerful, intelligent applications.

                      Read more →
                    • Indexes in PostgreSQL — 1

                      • Translation

                      Introduction


                      This series of articles is largely concerned with indexes in PostgreSQL.

                      Any subject can be considered from different perspectives. We will discuss matters that should interest an application developer who uses DBMS: what indexes are available, why there are so many different types of them, and how to use them to speed up queries. The topic can probably be covered in fewer words, but in secrecy we hope for a curious developer, who is also interested in details of the internals, especially since understanding of such details allows you to not only defer to other's judgement, but also make conclusions of your own.

                      Development of new types of indexes is outside the scope. This requires knowledge of the C programming language and pertains to the expertise of a system programmer rather than an application developer. For the same reason we almost won't discuss programming interfaces, but will focus only on what matters for working with ready-to-use indexes.

                      In this article we will discuss the distribution of responsibilities between the general indexing engine related to the DBMS core and individual index access methods, which PostgreSQL enables us to add as extensions. In the next article we will discuss the interface of the access method and critical concepts such as classes and operator families. After that long but necessary introduction we will consider details of the structure and application of different types of indexes: Hash, B-tree, GiST, SP-GiST, GIN and RUM, BRIN, and Bloom.

                      Before we start, I would like to thank Elena Indrupskaya for translating the articles to English.
                      Things have changed a bit since the original publication. My comments on the current state of affairs are indicated like this.
                      Read more →
                      • +21
                      • 11.3k
                      • 8