## Localization of applications in iOS. Part 1. What do we have?

Localization of applications in iOS

Part 1. What do we have?

Guide to working with localized string resources

Introduction

Several years ago I plunged into the magical world of iOS development, which, with its whole essence, promised me a happy future in IT. However, deepening in particular the platform and development environment, I encountered many difficulties and inconveniences in solving seemingly trivial tasks: "Apple's innovative conservatism" sometimes makes developers to be very sophisticated in order to satisfy the unbridled "I WISH" of the customer.

One of these problems is ...
+ 0 -

## Numerical methods for solving equations of elliptic type

### Introduction

The most common equation of the elliptic type is the Poisson equation.

Many problems of mathematical physics are reduced to the solution of this equation, for example, problems of the stationary temperature distribution in a solid, diffusion problems, problems of the distribution of an electrostatic field in a nonconducting medium in the presence of electric charges, and many others.

To solve elliptic equations in the case of several measurements, numerical methods are used that allow one to transform differential equations or their systems into systems of algebraic equations...[/h]
+ 0 -

## In string theory, a much smaller number of

Universes can be dispensed with. <{full}>

Source of the image: Juergen Faelchle /Shutterstock

As some modern physicists say, the problem of string theory (hereafter TC) is that too many Universes are needed for its work. According to the TS, there is

versions of the surrounding world, each with its own laws of physics. But if before us lies such a range of options for the world order, how to adapt the theory to explain the principles of our reality?

of the dark energy
(hereinafter referred to as FC), which is still considered the main driving force of inflationary expansion of space. However, some scientists have a desire to destroy "extra" dimensions; while they say that this is not a step back, but, on the contrary, a serious breakthrough in the improvement of the TS. Alas, the rest of the scientific community still believes that ...
+ 0 -

## In the wake of the hacking tp-link

Hacking with the substitution of dns is a fairly common method of attack. First of all because of its simplicity. The essence of the attack in changing the dns address in the network equipment settings of the victim to the dns server address of the attacker with the purpose of returning false ip. And already further, who in that much - from the trivial phishing pages of social networks for the theft of passwords to the alleged provider of stubs with payment requirements.

The most interesting in all this I think are the ways that bots, one way or another, get on the routers. And today I'll tell ...
+ 0 -

## 16 DevOps conferences in 201? whose performances are worth seeing

In general, there are much more such conferences, but these can be called flagships. They are held in different parts of the world and, of course, I do not encourage them to visit personally. What is the use? Viewing video, audio or presentations can help to discern technological innovations, the general vector of technology movement and, perhaps, already start to introduce something new in your organization. I do it in such a sequence: I go to the conference website, watch the program, select useful performances for myself, start to google them and then look for Youtube, Slideshade, Speakerdeck ...
+ 0 -

+ 0 -

## Testing of caching technology for RAID arrays Adaptec

Solutions for working with RAID arrays from hard drives have been used for a long time. In general, they continue to be popular in many areas, when a relatively inexpensive, fault-tolerant, large-capacity array is required. Given the size of modern hard drives, their speed, as well as other reasons, the greatest practical interest is arrays of RAID6 (or RAID6? if there are many disks). But this type of arrays has a low performance on random writes and it's not easy to do anything with it.

Of course, in this case we are talking about the speed of the "raw volume". In real life, it is added to ...
+ 0 -

## "Sberbank" introduced a virtual woman and a contactless beer faucet

Photo: RIA Novosti /Yevgeny Biyatov

"Sberbank" introduced several innovative robotic systems, which can be widely used in the future.

The first of them is Robot Nick , created in the center of robotics "Sberbank". It is reported that this is the "avatar for the artificial intelligence of the bank." Nika will be able to communicate with a person in natural language: "Behind this robot is one of the most powerful interactive agents - iPavlov. We are actively developing this project, but in our robotics laboratory we are preparing for him a physical embodiment - an avatar, which will be a ...
+ 0 -

## Orchestrated saga or how to build business transactions in services with the database per service

pattern.Hello! My name is Konstantin Evteev, I work in Avito as the head of the DBA unit. Our team develops Avito data storage systems, helps in the selection or issuance of databases and related infrastructure, supports Service Level Objective for database servers, and we are responsible for the efficient use of resources and monitoring, advising on design, and possibly developing micro services, strongly tied to storage systems, or services for the development of the platform in the context of storage. I want to tell you how we solved one of the challenges of the microservice architecture - conducting ...
+ 0 -

## AlterEgo: a device that can read (some) thoughts

In early April, a researcher at Massachusetts Institute of Technology Arnav Kapur twenty-four years old added to YouTube short video . The video shows how he walks around the campus, moving from one location to another; on the right side of his face a white plastic device is fixed.

First he passes by a row of bicycles parked near melted snowdrifts, his lips are closed, and on the screen are displayed not voiced thoughts. There appears the inscription: "Time?", And the male voice answers: "Ten hours thirty-five minutes." In the next scene Kapoor is shopping at a local store. The price of each ...
+ 0 -