Sofa as the limit of the capabilities of a lazy employee in the turquoise paradigm

Here it is. Comfortable, soft (or hard - to someone like it), with armrests, pillows, which are more suitable just under the ear, and not under the elbow. The perfect sofa. And most importantly, is at your work.
 
 
He is completely free, there is never a queue to him, it's your sofa and nobody else, but you work and do not notice it exactly until you suddenly want to lie down.
 
 
And then there is a thought experiment: try to lie down on your sofa in your organization in a working, of course, time.
 
 
Sofa as the limit of the capabilities of a lazy employee in the turquoise paradigm ...
+ 0 -

Meeting with Vitaly Fridman (Smashing Magazine) in the office Wrike

Meeting with Vitaly Fridman (Smashing Magazine) in the office Wrike  
 
Wrike Tech Club called on Vitaly Fridman's open meeting, a notable figure in the field of web development and UX-design, the founder and chief editor of Smashing Magazine. In addition to Vitaly's lecture, we organized a round table with Egor Gilev (UX-director of Wrike) and other invited experts on modern front-end, UX-design and UI-development.
 
 
For those who could not come, we publish video recordings of the report and the round table.
 
 

Speech by Vitaly Fridman


 
+ 0 -

As we at Tinkoff used Windows Hello to authenticate the user

As we at Tinkoff used Windows Hello to authenticate the user

 
Windows Hello - a technology for biometric authentication of the user by fingerprint, eye retina, three-dimensional face scanning and even the venous palm pattern.
 
In the field of financial services, it is important to ensure an unmistakable and secure authentication of the user. For authorization, we use a two-factor system from the login and password bundle or the phone number and password with the confirmation by the code sent to the attached mobile phone number. To further simplify access to the authorized zone, a 4-digit PIN is used.
 
 
After authorization and creation of the PIN-code...
+ 0 -

Vulnerability Mikrotik allows you to get a list of all users via winbox

Vulnerability Mikrotik allows you to get a list of all users via winboxMikrotik's devices have become widespread due to their price in relation to the functionality. But there were no mistakes in the software either. And this time a serious bug emerged.
 
March 2? one of the users of the forum Mikrotik reported on the detection of suspicious activity of mikrotik routers with the use of telnet ports (TCP port 23), TR-069 (TCP port 7547) and WINBOX (TCP 8291).
 
Employees of the company referred to a bug that was closed a year ago. Later it turned out that this is a new vulnerability and on April 2? the company Mikrotik ...
+ 0 -

Security Week 18: cipher hysterics

Security Week 18: cipher hysterics It was a difficult week for the means of exchanging encrypted messages. The funds seemed to work, but in one they will find a hole, then in another, what a problem. It all began on Monday, when a group of European researchers announced serious vulnerabilities in a number of mail clients that support encryption according to OpenPGP or S /MIME standards ( , News ). Announced, shared information with the most important people "under the embargo": in a world of vulnerabilities, they do it so that the vendors that have come under the distribution can, for example, issue a patch. And also - that "especially important ...
+ 0 -

From Chrome, the "Protected" icon will disappear for HTTPS sites, and this is correct

From Chrome, the "Protected" icon will disappear for HTTPS sites, and this is correct  
 
A few months ago, the developers of Chrome announced , which in July 2018 will begin to be marked as unsafe all HTTP pages. The "Not secure" icon appears in the address bar next to the URL.
 
 
This is an important innovation, because people are taught to avoid sites that have not installed a TLS certificate to encrypt traffic. After all, these sites really endanger users. For example, providers and other intruders can inject advertisements, cryptomayers and other malicious content into unencrypted traffic. In a survey on Habré ...
+ 0 -

Magic link or a story about how we simplified the life of the user

In the article, I will share my personal experience of developing and implementing "magic links". I'll tell you why they are needed in our project, how they function and in the end even cry because the lack of such functionality in the large systems used by me makes me angrily tear my hair.
 
 
The code will only be in one place, because the main purpose of the article is to tell about the idea itself, and not to show how beautiful the code is.
 
 
Magic link or a story about how we simplified the life of the user  
 
 
 

Introductory blah blah


 
Sometimes it's much easier to read and learn someone else's experience than to rack your brain and your own soklasishnikam ...[/h]
+ 0 -

Synchronization of the command with SCRUM

As it seems to me, one of the biggest problems in the scrame is the complete dissynchronism between people in the team. I have not yet managed to see any stable solution to this problem. Of course, there are standard tools, but not always they give answers to all the questions and close all the holes.
 
 
Synchronization of the command with SCRUM
 
 
I propose to visit us and see how the "Online Mortgage" team of Alfa-Bank is struggling with the problem of synchronization.
 

 
The article was prepared by the members of our team: Marina , Dima ...
+ 0 -

Improving the quality of images using a neural network

Today, I want to talk about an interesting approach to improve image quality. The official name of the Super Resolution approach.
 
Improvement of image quality by software methods is known from the beginning of the appearance of digital images, but in the last 3 years there has been a qualitative jump caused by the use of neural networks.
 
 
Improving the quality of images using a neural network  
 
An example of improving image quality using Super Resolution technology.
 
arxiv.org/pdf/???v3.pdf
 
Image Super-Resolution Using Deep Convolutional Networks
 
[2] arxiv.org/pdf/???.pdf
 
Image Restoration ...
+ 0 -