About porting the project MIPSfpga

About porting the project MIPSfpga  
 
The transfer of software from one computer architecture to another in principle, with some reservations, is relatively simple. Here, such well-known tools as autoconf /automake /libtool /gnulib come to the rescue. To assemble the program from the sources on some Raspberry /ARM is as easy as on a PC with Ubuntu /x86-64.
 
 
And here is how to force the FPGA project developed for one card to work on another board? There, the FPGA itself can be different and on the board, completely different components can stand. A simple recompilation of the project is indispensable.
 
 
I'll tell you about my experience ...
+ 0 -

Patterns of design in Cocos2d-x

Hello, Habr! I present to your attention the translation of the article " Design Patterns in Cocos2d-x " By Aleksei Pinchuk.
 
 
The article will be interesting for developers Cocos2d-x and those who study patterns. It is made in the form of a brief summary, in which you can quickly see where a particular pattern is applied in Cocos2d-x. The purpose of this article is not a complete description of each pattern.
 
Link to the original Hello, Habr! I present to your attention the translation of the article " Design Patterns in Cocos2d-x " By Aleksei Pinchuk.  The article will be interesting for developers Cocos2d-x and those who study patterns. It is made in the form of a brief summary, in which you can quickly see where a particular pattern is applied in Cocos2d-x. The purpose of this article is not a complete description of each pattern.  Link to the original ...
+ 0 -

Hessian-Free optimization with TensorFlow

Good afternoon! I want to talk about the optimization method known as Hessian-Free or Truncated Newton and its implementation using the deep learning library - TensorFlow. It takes advantage of the second-order optimization methods and does not need to consider the matrix of second derivatives. This article describes the HF algorithm itself, as well as its work for training the network of direct distribution on MNIST and XOR datasets.
 
Hessian-Free optimization with TensorFlow  
GitHub .
 
 

Results of


 
As a result, the implementation of the HF algorithm in Python was created using the TensorFlow library. During the ...[/h]
+ 0 -

As I parse the database C-Tree, developed 34 years ago

As I parse the database C-Tree, developed 34 years ago

 
I recently came to the task of supplementing the functionality of one fairly old program (there is no source code for the program). In fact, it was necessary just to periodically scan the database, analyze the information and, based on this, make mailings. The whole problem was that the application was working with the c-tree database and written already in 1984.
 
 
Having rummaged on a site of the manufacturer of the given DB some odbc the driver was found, however I did not manage to connect it in any way. Numerous googling also did not help to connect to the database and get data. Later it was ...
+ 0 -

Marvin Minsky "The Emotion Machine": Introduction

Marvin Minsky "The Emotion Machine": Introduction

 
Nora Joyce to her husband James: "Why do not you write a book that people understand?"
I hope this book will be useful to those interested in the work of human thinking, those who want advice on its development or try to design intelligent machines. It will be useful to those who want to learn more about artificial intelligence. And also to psychologists, neurologists, informatics specialists, philosophers, as it develops new ideas on which they work.
 
 
We all admire the achievements in science, art and literature, but rarely recognize our achievements in everyday life. We recognize what we see...
+ 0 -

Release of Yii ??? and database extensions with fixed vulnerabilities

Today, we are releasing Yii updates for several recent versions of 2.0.x and official extensions to support non-relational databases to fix the vulnerabilities found. Patches fix the problem in ActiveRecord layer methods: findOne () and findAll () , which can tolerate SQL injection if the incoming data is not properly prepared.
 

We view this as a vulnerability in Yii because the documentation for these methods did not contain an explicit warning that in some cases the transmission of unfiltered user data could be dangerous. We thank ...

+ 0 -

The difficulties of registering in Skype without a phone

The difficulties of registering in Skype without a phone In order to continue to use Skype as a classical program, one of the requirements must be fulfilled: simplicity of registration (one-factor, without a telephone and other redundant actions). Consider the current problems of using Skype and the story of how to do without a phone.
 
Actually, MS would be happy to strangle this freedom than they are systematically engaged in. Something keeps them from blocking all the exits to the end. For example, Google does not strive to strangle, although it could. There are, apparently, a lot of services in the world that do not let say to MS-sheep, "We just do it like everyone ...
+ 0 -

We speed up the assembly and delivery time of the java web application

TLTD
 
 
removed jar from the project assembly
 
replaced it with a touch, which is 7 times faster
 
 
We speed up the assembly and delivery time of the java web application
 
Details and result under the cut.
gradle-fatjar-plugin - is no longer supported by
 
shadow - managed to collect them, but he uses the same method as above, so this did not give an increase in the speed of
 
gradle-one-jar - I could not run at all, honestly, I probably needed to just spend more time
 
Then I got the idea, even you can say the challenge. And how to run applications without jar? I just had an unpacked archive, in order to try this.
 
It turned out not difficult:
 
...
+ 0 -

PVS-Studio - additional insurance of medical software

PVS-Studio - additional insurance of medical software Errors in the software can lead not only to material losses, but also damage the health of people. For example, artists on the stage of the theater can get injured, if suddenly one of the scenery starts to fall on the stage at the wrong time. However, the relationship between errors in the code and the health damage in the medical software is more obvious. Let's talk on this topic.
 
In order to increase the reliability and security of bank software, use PVS-Studio " Our list of customers has been replenished with several companies creating the appropriate software. The article suddenly turned out ...
+ 0 -

PowerShell Empire: advanced post-exploitation of Windows systems

PowerShell Empire: advanced post-exploitation of Windows systems
 
 
PowerShell Empire is a unique post-operational PowerShell agent built on the basis of crypto-reliable connections and flexible architecture. Empire provides the ability to run PowerShell agents without having to use powershell.exe, with the quick launch of post-operational modules that range from keyloggers to Mimikatz, and allows you to successfully avoid network discovery, all in one convenient and flexible framework.
 
global update , containing many corrections and additions.
 
 
To work with a remote Windows system...
+ 0 -