Literary archiver

Literary archiverFirst of all, I congratulate all Orthodox and their sympathizers with Easter and the end of the great post, all the rest - with the onset of spring. In the sandbox, just a month ago, at last, my debut about programming in Cyrillic was drowned. I do not know what attracted the attention of readers to greenery, but commented on the sheets, like a real article. In his bed sheet TrllServ I suggested using the idea for archiving. I adore people who know how to find practical applications for ideas. Having unfolded the notepad, I tried to outline the algorithm based on the property of my encoding...
+ 0 -

How to beat a routine, or Finished application in Xcode for a couple of clicks

How to beat a routine, or Finished application in Xcode for a couple of clicksEach experienced developer has a set of tools to which he is accustomed and with whom it is convenient for him to work. This can be a simple environment setup, utilities for intermediate operations (for example, the Postman API test assistant), time-tested and personally developer libraries and snippets.
 
Also, many developers can have their own approach to implementing the chosen architecture. Therefore it is very useful to have in your arsenal the preparation of the application - a common skeleton, to which you will only have to add new modules, screens and features. In this article, I'll show ...
+ 0 -

Installation of IP-PBX 3CX in the cloud Microsoft Azure

Installation of IP-PBX 3CX in the cloud Microsoft AzureThis week we fulfilled another long-standing request of our users - added to the list of supported cloud platforms Microsoft Azure! Now you can add to your Azure services and the 3CX business telephony system in a couple of minutes. This will be especially convenient for organizations that already deploy their resources to Azure. Technical specialists will be able to use their experience with Azure, without the need to develop new platforms.
 
 
As you know, 3CX - it's not a classic cloud, and so-called. cloud-ready automatic telephone exchange. The main advantage of this approach is that you do ...
+ 0 -

UL 3223: the new standard of certification of data center

UL 3223: the new standard of certification of data centeris presented.The company for certification in the field of safety engineering Underwriters Laboratories (UL) presented a new standard for assessing the reliability of data centers - UL 3223. It describes the criteria that will allow owners of data centers to reduce the risk of failures in the work of the enterprise. More details about the standard - we will tell you further.     /photo Christina Xu CC   UL 3223 is directed to to ensure the reliability and security of the data center and contains parameters for assessing key components of the company's IT infrastructure. Developers ...
+ 0 -

We defeat Android Camera2 API using RxJava2 (part 2) &lt;{short}&gt; &lt;{full}&gt; <div class="post__text post__text-html js-mediator-article"> <img src="https://habrastorage.org/web/342/d66/230/342d6623018f4d7b8d0392137429a5ba.jpg" alt="image"><br

<{full}>
We defeat Android Camera2 API using RxJava2 (part 2)        
    
 This is the second part of  articles  , in which I show how the use of RxJava2 helps build logic over an asynchronous API. As such an interface, I chose the Android Camera2 API (and did not regret it!). This API is not only asynchronous, but it also contains unobvious implementation features, which are not really described anywhere. So the article will give the reader a double benefit.    
    
 For whom is this post? I expect that the reader is a sophisticated, but still an inquisitive Android developer. The basic knowledge of reactive programming is very desirable (        
    
 This is the second part of  articles  , in which I show how the use of RxJava2 helps build logic over an asynchronous API. As such an interface, I chose the Android Camera2 API (and did not regret it!). This API is not only asynchronous, but it also contains unobvious implementation features, which are not really described anywhere. So the article will give the reader a double benefit.    
    
 For whom is this post? I expect that the reader is a sophisticated, but still an inquisitive Android developer. The basic knowledge of reactive programming is very desirable (
 
 
This is the second part of
articles
, in which I show how the use of RxJava2 helps build logic over an asynchronous API. As such an interface, I chose the Android Camera2 API (and did not regret it!). This API is not only asynchronous, but it also contains unobvious implementation features, which are not really described anywhere. So the article will give the reader a double benefit.
 
 
For whom is this post? I expect that the reader is a sophisticated, but still an inquisitive Android developer. The basic knowledge of reactive programming is very desirable ( <{short}>  This is the second part of articles , in which I show how the use of RxJava2 helps build logic over an asynchronous API. As such an interface, I chose the Android Camera2 API (and did not regret it!). This API is not only asynchronous, but it also contains unobvious implementation features, which are not really described anywhere. So the article will give the reader a double benefit.  For whom is this post? I expect that the reader is a sophisticated, but still an inquisitive Android developer. The basic knowledge of reactive programming is very desirable (   This is the second part of ...
+ 0 -

What's new in PostgreSQL 11: INCLUDE-indexes

What's new in PostgreSQL 11: INCLUDE-indexes
 
 
The release of PostgreSQL 11 will not be held soon, only in October. But Fitchfreeze has already arrived, which means that we know what features were included in this release, and we can test them, gathering PostgreSQL from the branch master. Special attention deserves a feature called INCLUDE-indices . Patch Originally written Anastasia Lubennikova , and then dopylene Alexander Korotkov and Fedor Sigaev . Push it into ...
+ 0 -

Figma web-API - an interface that allows you to connect to other tools

The first step to an open design ecosystem is


 
 
Figma web-API - an interface that allows you to connect to other tools  
 
Today we are happy to launch platform Figma - A new way to improve design and design processes by connecting Figma to other tools, scripts and even web applications. We start with a new concept in the design world: web-API .
 
before the method of placing your projects in the blockhouse Ethereum. We also introduce new and improved integration with other design tools, such as Avocode , Haiku , Zeplin ...[/h]
+ 0 -

Is it possible to enter a closed door, or as a patch vulnerability

In the world, dozens of CVEs are published every day (according to 3r3r3? riskbasedsecurity.com
? 20832 CVEs were published in 2017). However, manufacturers of steel with great understanding and attention to the security reports, thanks to which the speed of closing bugs significantly increased (according to our feelings).
 
 
It became interesting for us to look at several products and understand, because of what there were vulnerabilities (learn from other people's mistakes). And also how the producers fix them and whether they always get it (running ahead - not always).
 
 
Is it possible to enter a closed door, or as a patch vulnerability ...
+ 0 -

Effective use of spot-instances AWS

Effective use of spot-instances AWS
 
Spot-instances - is essentially the sale of free at the moment resources with an excellent discount. At the same time, the instance can be turned off and taken back at any time. In the article, I will talk about the features and practices of working with this proposal from AWS.
https://github.com/opszero/seespot ). In short, the daemon looks at both /spot /termination-time and, optionally, in the healthcheck url of your service. Once AWS is ready to remove the instance, it is marked as OutOfService in ELB and can optionally perform the final CleanUP task.
 
So, we figured out how to handle the shutdown ...
+ 0 -

Explicit Proxy with AD Group + Interception Proxy authorization with MAC authorization

Explicit Proxy with AD Group + Interception Proxy authorization with MAC authorization

 
In many organizations, the network structure involves the use of terminal servers, personal computers, and mobile devices. In this publication we will talk about how to do this through the Squid proxy server, without writing once again the browser settings on each device. There are a lot of articles on configuring Squid, but everywhere a little. I decided to put everything together, and describe the working configuration from start to finish.
auth_param .
 
Also we add acl, which corresponds to all passed Kerberos-checking users ...
+ 0 -