What I don't like in C and C ++

What I don't like in C and C ++ 3r33300. 3r3-31. Please do not read professional C /C ++ programmers).
 3r33300.
 3r33300. In the article, I express my point of view, if you disagree - justify in the comments.
 3r33300. The purpose of this article is to point out the shortcomings of C and C ++, which I really dislike and encourage you to use the new version of the language or maybe even offer some ideas for improving the standard.
 3r33300.
 3r33300. Well, it's time to rekindle the holivar.
 3r33300. 3r314. 3r3188.
 3r33300. I think everyone knows that it’s awesome strings in C ++. Especially if we are talking about the old ...
+ 0 -

Vulnerability in API Google+ revealed private data of 52.5 million users

In October, on channel Information leaks , I wrote about the fact that Google discovered in their social network Google+ a potential data leak of 500 thousand users. 3r330.
 
3r311. 3r330.
 
And Google today said that they discovered another vulnerability in the Google+ API API that could lead to data leakage of 52.5 million users. 3r330.
 
The vulnerability existed for 6 days in November 2018 and allowed applications to retrieve information from user profiles (name, email address, gender, date of birth, age, etc.), even if this data was private. In addition, through the profile of ...
+ 0 -

China banned Apple

The Chinese chip maker Qualcomm claims to have won an injunction against Apple, which effectively prohibits the import of a number of iPhone models, from iPhone 6S to iPhone X.
 3r3365. 3r3355.  3r3365. The preliminary order issued by the Chinese court is the final step in the ongoing feud between the two technical giants over intellectual property. 3r3355.  3r3365. 3r3355.  3r3365. China banned Apple 3r3355.  3r3365. 3r3355.  3r3365. Original news . 3r366. 3r3365. 3r3365. 3r3365. 3r3633. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf ...[/o]
+ 0 -

Controller, easy! We take out the code in UIView

 3r???. 3r3-31. Do you have a big UIViewController? For many, yes. On the one hand, it works with data, on the other - with the interface. 3r3499.  3r???. 3r3499.  3r???. The tasks of separating logic from an interface are described in hundreds of articles about architecture: MVP, MVVM, VIPER. They solve the problem of data flow, but do not answer the question of how to work with the interface: in one place remains the creation of elements, layout, configuration, input processing and animation. 3r3499.  3r???. 3r3499.  3r???. Let's separate the view from the controller and see what loadView () ...
+ 0 -

Using an external wireless Buro H999 thermometer in conjunction with home-made

Using an external wireless Buro H999 thermometer in conjunction with home-madedevices.All good weather station Buro H146G with an external wireless thermometer H999. But here only to see the readings on her black LCD display, good lighting is required. And I would be better if the output of the temperature and humidity outside the window was displayed on fairly bright indicators. It is easy to make such an article, but you need to know the protocol of exchange with a wireless thermometer. There are already there were articles about the use of a wireless thermometer weather stations to obtain temperature and humidity over the air. But for Buro stations, the exchange protocol ...
+ 0 -

Come on! @ # With your “toxicity”

 3r3111. 3r3-31. IT is not a kindergarten. This is a place for adults, guided by logic and common sense. They do not need to be patronized, no need to follow the words, no need to worry that they will form complexes. If a person is incompetent, it is necessary to give him a clear understanding of this, and not to take care of his tender feelings to the detriment of everything else.
 3r3111.
 3r3111. So what the hell is my beautiful IT turning into a kindergarten "Fun Program Bear"?
 3r3111.
 3r3111. I fundamentally disagree neither with actively implanted ideas about work ethic, nor with ideas ...
+ 0 -

Digital events in Moscow from December 10 to 16

3r33333. A selection of key events in Moscow for the week. 3r33333. 3r33333.  
3r33333. Digital events in Moscow from December 10 to 16 3r33333. 3r33333.  
3r33333. 3r314. Attracting investment in a startup
3r33333. 3r33333.  
 
3r3323. December 10 (Monday) 3-33325. 3r33333.  
Blagoveshchensky Lane 10c2
 
free
 
Meeting for technology startups with the manager of the investment fund VC Startup Lab - Alexei Shabarshin. 3r33333.  
3r33337. 3r33333.  
3r33333. Alfa JS MeetUp 3r33333. 3r33333.  
 
3r3323. December 11 (Tuesday) 3r3325. 3r33333.  
Bolshaya Polyanka 2 /10s1
 
free
 
Alfa-Bank hosts a jаvascript dedicated development. 3r33333...
+ 0 -

Roadmap of math disciplines for machine learning, part1

Instead of the preface.


 
Suppose, sitting in the evening in a warm chair, you suddenly had a crazy thought: “Hmm, why don't I find out instead of random selection of hyperparameters of the model, and why it all works?” 3r33232.  
stepik.org/course/716
 
stepik.org/course/711
 
I did not look at the courses from the lecture hall of the Moscow Institute of Physics and Technology for analysis, but for the sake of completeness I will also give: 3r33275  
lectoriy.mipt.ru/course/Maths-Basic_Analysis
 
...[/h]
+ 0 -

PVS-Studio: support for MISRA C and MISRA C ++ coding standards

3r3154. PVS-Studio: support for MISRA C and MISRA C ++ coding standards
 
Starting from version 6.2? the PVS-Studio static code analyzer can classify its warnings according to the MISRA C and MISRA C ++ standards. Thanks to the support of these standards, it has become possible to effectively use the analyzer to improve the security, portability and reliability of programs for embedded systems.
 
3r311.
 
This year we took care of the support in the analyzer 3r315. PVS-Studio
standards like r3r317. CWE
and SEI CERT . Basically, support has been reduced to the classification ...
+ 0 -

Using DeviceLock DLP and Citrix Xen to control email on mobile devices

 3r3105. 3r3-31.
The professional community is seriously concerned about the risks of leaking restricted access information through corporate and personal mail from BYOD mobile devices. Practically at every data leakage conference, the question of controlling corporate mail on mobile devices running the most common Android and iOS platforms arises for most participants.
 3r3105.
Using DeviceLock DLP and Citrix Xen to control email on mobile devices
 3r3105.
Let's try to deal with this issue.
 3r3105.
DeviceLock Virtual DLP technology. allows you to intercept e-mail messages directly from an e-mail client application published to Citrix XenApp, which the user gains ...
+ 0 -