In addition to crypto-currencies: what else is used for blocking

In addition to crypto-currencies: what else is used for blockingAccording to Research and Markets, the size of the global block-market by 2023 will grow up to $ 6 billion at an average annual growth rate of 48%. Over the past two years, we have seen an increase in investments in companies engaged in the development of blocking applications for the financial sector.
 
 
For example , Chain of San Francisco, which is creating a block-based solution for financial institutions, attracted almost 44 million investments from various ...
+ 0 -

Operating system in JavaScript? JsOS

Greetings, Khabarovsk!
 
Do you think it's possible to create a full-fledged operating system in the jаvascript programming language, from which you can boot?
 
The answer is correct!
 
Operating system in JavaScript? JsOS
 
Today I want to tell you about the project JsOS .
runtime.js , but after the closure of the latter, became an independent project.
 
Currently,
the project is under construction
, so any contribution is welcome.
 
Let's consider the basic structure of the project.
 
JsOS consists of two parts (levels):
 
 
The low level (the kernel) consists of parts written in C ++ and Assembler. Used for basic loading and transfer ...
+ 0 -

And we'll count you. In Russia, universal labeling of goods

And we'll count you. In Russia, universal labeling of goodsis coming.   The system of universal labeling of goods will soon work in Russia. Until 202? it will have to cover all major groups of industrial products: from clothing and footwear to food. Now the Ministry of Industry and Trade and the Ministry of Economic Development are working on the creation of a global system. they write Vedomosti . In the list there are a variety of products: perfumes, tires, blouses and coats, baby food, rice, pasta, tea, coffee, canned goods, meat and fish products, beer, juices, mineral water, household chemicals, bedding and dairy products. A version sent to the government ...
+ 0 -

How to write an exchange with 50 suppliers and not go crazy

Suppliers are different. Some are ready to adapt to our format - others are not; Some exchange SOAP'om - others REST'om; some work with product codes - others with offer IDs; some are ready to give the status on order - others are not; some have reference books, the elements of which you need to compare with your own - others do not. In general, very different.
 
 
How to write an exchange with 50 suppliers and not go crazy

 
Data exchange with suppliers needs to be automated. 21st century in the yard. It is clear that in an ideal world it is necessary to convene a conference of suppliers and consumers in this industry (in my case these are auto parts), on which ...
+ 0 -

In the EU, the new regulations for the protection of PD

In the EU, the new regulations for the protection of PDcome into force.In late May, the European Union plans to tighten the requirements for the processing of personal data. More about the innovations and reactions of IT companies - under the cut.     /photo Stock Catalog CC    What is GDPR  General Data Protection Regulation is a data protection regulation, which is designed to toughen, including regulation of the PD scope within the EU. It will enter into force on May 2? 2018 and will replace Data Protection Directive, the directive adopted in 1995.  The GDPR will concern any companies and organizations that somehow process PD citizens of the EU (including ...
+ 0 -

Confrontation W3C and WHATWG: Apple, Google, Microsoft, Mozilla object to DOM 4.1

As everyone knows, there are two HTML specifications: W3C ( consortium, World Wide Web ) And WHATWG (Apple, Google, Microsoft and Mozilla, de facto authors of the HTML5 standard). This week there was an open conflict between the creators of the specifications.
 
 
The situation developed as follows. It all began with the fact that the W3C fork made the specification of the live standard WHATWG DOM and named it DOM 4.1. Then W3C made incompatible changes to it and announced the fork as the official specification, although in fact all the important work was done in the WHATWG version.
 
 
Some ...
+ 0 -

The history of information security in China: we begin to deal with laws and regulations

In 201? China presented a modern version of the national strategy on cybersecurity. Its main message is the use of any means to ensure the sovereignty of national cyberspace. In the new series of articles we will tell you about which tools China uses to ensure information security in the country.
 
 
Let's start with a general overview of the various classifications and laws.
 
 
The history of information security in China: we begin to deal with laws and regulations

 
/Flickr / Surian Soosay / CC
 
 

Multilevel protection system


 
In ...[/h]
+ 0 -

IPO and $ 250 million: HeadHunter will be released on Nasdaq

IPO and $ 250 million: HeadHunter will be released on Nasdaq
 
 
HeadHunter plans to hold an IPO and raise $ 250 million. The organization is already
filed
documents to the US Securities and Exchange Commission (SEC) and plans to place American depositary receipts (ADR) on the Nasdaq exchange. The stock has an HHR ticker. is in the top ten most popular services to find work in the world according to the platform SimilarWeb.
 
 
 
 
In 201? the Elbrus Capital private equity fund bought HeadHunter from Mail.Ru Group for 10 billion rubles, the valuation of the asset within the ...
+ 0 -

Implementation of processing of commands on CallTable with modules on modern C ++

In this article I will describe the process of developing a class "call tables" and applying the resulting class to extend the functionality of the program using modules.
 

On the problem


 
There is a server that accepts commands. At the input, it gets the index of the command and its parameters, performs the actions, and returns the result. Command indexes are consistent: ???? etc. At startup, the server has several basic commands (in my case 20), the others are added by modules during operation. To solve this problem, CallTable is well suited.
 
...[/h]
+ 0 -

How the Internet of things shifts the analyst to the periphery of

In the Internet of Things (IoT) era, the tasks of processing, filtering and analyzing data as close as possible to their source are becoming more urgent, since it allows you to act remotely instead of forwarding these data to data centers or clouds for filtering and analysis.
 
 
Another reason for deploying analytics tools on the periphery of the network is that there are new uses for the Internet of things today, and in many cases, the amount of data generated at the periphery places such high demands on bandwidth and processing power that available resources are not can satisfy them. How the Internet of things shifts the analyst to the periphery of ...
+ 0 -