Patterns for testers. Proxy (substituent)

Before that's all


 
Hey. I am Dima and I do not know the patterns. As for the tester, do not say that it is problematic. How for the automation ? Well, let's be honest, you can also live.
 
From chat rooms, conferences and communication with colleagues, it is understandable: the main pattern - PageObject - is learned, what else is needed?
 
 
And here here was a big such paragraph of reflections about why we, in fact, do not use design patterns: we do not know them or on them and without them is not bad? There were also deeper stories that patterns are not for you, but for decades proven knowledge ...[/h]
+ 0 -

One two Three! Chat bot from Google Sheets on the example of PvP-game for Alisa

One two Three! Chat bot from Google Sheets on the example of PvP-game for Alisa
 
Appearing, Alice attracted users with unexpectedly qualitative synthesis of speech and chat-bot. Today from it await useful skills and interesting games with a backend that can take into account the context of the user and implement a wide range of scenarios. This article discusses creating a skill based on Google Sheets, well-known to many tools with great potential for small chat bots.
 
 
Playing with a real person can be more interesting than with a virtual character, so as an example we will develop a multiplayer game for Alice.
 
...
+ 0 -

The model of polynomial regression

In simple terms, the regression model in mathematical statistics is built on the basis of known data, in whose role pairs of numbers appear. The number of such pairs is predetermined. If we imagine that the first number in the pair is the value of the coordinate
The model of polynomial regression
, and the second -

, then the set of such pairs of numbers can be represented on the plane in a Cartesian coordinate system in the form of a set of points. These pairs of numbers are not taken by chance. In practice, as a rule, the second number depends on the first. To construct a regression means to select a line (more precisely, a function) that approximates (approximates) ...
+ 0 -

Why go to the IT-magistracy

"And we are not bad without a magistracy "


 
 
Bill Gates has no higher education - only two years of study in the bachelor's program of Harvard University
 
Steve Jobs studied for only 1 semester in college
 
Pavel Durov has a diploma of a specialist philologist, and the founders of Yandex - Arkady Volozh and Ilya Segalovich studied geologists
 
 
This list could be continued and make sure that without a special magistracy in the field of information technology, you can very well succeed in the field of IT.
 
 
But this is not entirely true. Let's try to prove it.
 
 
Why go to the IT-magistracy
 
...[/h]
+ 0 -

Experience of developing a SPA on VueJS + Nuxt

Our company is mainly engaged in the development of online stores and we want to share our experience developing the project on a bundle of VueJS + Nuxt + Laravel.
 
https://github.com/nuxt/nuxt.js/issues/805 .
 
The problem occurred when we in the asyncData method of our pages did several requisitioning.
 
 
Experience of developing a SPA on VueJS + Nuxt  
 
Fortunately, nuxt developers quickly solved this problem, and at the moment the process consumes about 40mb of memory.
 
 

Interesting problems and their solutions


 
Articles with components
 
In the control panel of the site, it is possible to add articles and insert into ...[/h]
+ 0 -

A fresh study of Telegram indicators after blocking: subscribers are growing, coverage is falling

A fresh study of Telegram indicators after blocking: subscribers are growing, coverage is falling  
 
The non-profit organization Radio Frequency Spectrum today is presented a study of the audience of the TOP-50 channels of Telegram, which was blocked in Russia in April.
 
 
The study is based on calculations of the average growth rates of the main channel indicators after the messenger is blocked on the territory of Russia. The most informative indicators by the authors are the number of subscribers and the average coverage of one post. According to the researchers, the average coverage of the post is a key indicator, because it reflects the volume of the active audience of the channel.
 
 
The ...
+ 0 -

C #: backward compatibility and overload

Hello colleagues!
 
 
We remind everyone that we have got an excellent book by Mark Price " C # 7 and .NET Core.Cross-platform development for professionals ". Please note: before you is the third edition, the first edition was written in version 6.0 and did not appear in Russian, and the 3rd edition appeared in the original in November 2017 and covers version 7.1.
 
C #: backward compatibility and overload  
After the release of such a compendium, which passed a separate scientific revision for checking backward compatibility and other correctness of the material, we decided to translate an interesting article by John Skeet about what known ...
+ 0 -

The problem of the innovator, or why it is necessary to refer to the experience of other people

The problem of the innovator, or why it is necessary to refer to the experience of other people
 
 
Those of us who are endowed with a creative vein and like to translate their ideas into reality often face the "innovator problem".
 
 
There is this feeling that you are standing at the sources of something great, beautiful, that no one has ever done before you! Before you - spaces for creativity, where everything can be done as you see it! Well, how, brothers!
 
 
Only there is a nuance Most likely, someone all the same already did something similar. And, probably, more than once. And, perhaps, even successfully (we recall the recent history with " ...
+ 0 -

Cisco StealthWatch or classic corporate network protection (FW, IPS, ACL, NAC, AV, SIEM)?

Cisco StealthWatch or classic corporate network protection (FW, IPS, ACL, NAC, AV, SIEM)?
 
 
The structure of almost any IB system includes traditional systems (individually or in combination):
 
 
• Firewall
 
• Intrusion Prevention System (IPS)
 
• Access control lists (ACL)
 
• Network Access Control System (NAC)
 
• Antivirus systems (Antivirus /Antimalware)
 
• Management systems of the IB event (SIEM)
 
 
All these systems are good both individually for solving their problems, and in complex. However, there are various classes of tasks to provide IS, which the system data can not solve, alas. Moreover, the traditional network perimeter, where traditional means of protection in the modern ...
+ 0 -

Skynet, hello: artificial intelligence has learned to see people through walls

Skynet, hello: artificial intelligence has learned to see people through walls  
 
After the discovery of X-ray radiation, he was taken for a long time for the miracle of miracles. In principle, many X-rays still seem to be something very unusual, almost a fantasy. But in our time there are more interesting things. For example, a group of scientists from MIT taught AI to feel people through walls.
 
 
The project, within the framework of which such a system was developed, was named " RF-Pose ". AI does not just feel that someone is behind the wall, the machine even "sees" what a person is ...
+ 0 -