Machine learning with Node.js using the Tensorflow.js

library. 3r3888. 3r3-31. Hello everyone, colleagues! 3r33875.  3r3888. 3r33875.  3r3888. Perhaps the fans of the library Tensorflow, already noticed in our preorder this book is , also looked at the possibilities of machine and deep learning in the browser, especially since the topic was did not ignore and himself Francois Chollet . We invite those interested in the cat section, where it is described how images are recognized using the Tensorflow.js library. 3r33875.  3r3888. 3r314. 3r3645. 3r33875.  3r3888. 3r33875.  3r3888. TensorFlow.js - A new version of the popular open source ...
+ 0 -

John Romero: Reflection on DOOM

 
3r3-31. John Romero: Reflection on DOOM 3r33112.  
3r33112.  
The year 1993 turned out to be more generous for wonders than all the previous ones. This was the only time we set ourselves the task of creating a game that was as good as possible at that time. We did not set ourselves such tasks either before DOOMa or after. It was the perfect time to do the impossible. 3r33112.  
3r33112.  
We naively compiled an implausible list of technological miracles that we planned to create, and boldly stated in a press release in January 1993 that DOOM would be the main source of falling world performance. We really believed in it and worked ...
+ 0 -

Building a jetpack /hoverboard: rescue systems

Building a jetpack /hoverboard: rescue systems
3r37474.  
3r37474.  
I recently threw a cry in facebook 3r36363. and in 3r3133. Group "Severe techie" with a request to suggest what are the rescue systems at high speeds and at low altitudes. That's what managed to dig for this issue. The spread is large - from fiction to space systems, let's see what can be useful derived from this. 3r37474.  
3r37474.  
K-36DM
3r33434. from Alexander Shaenko [/i] 3r37474.  
3r37474.  
...
+ 0 -

Source: "Conway's Law"

Source: "Conway's Law" 3r33737.  3r33770. 3r33737.  3r33770. Author's note 42 years after publication:
 3r33770. 3r33737.  3r33770. 3r33434. Perhaps most noteworthy in this article is that it was published thanks to the statement described in the third paragraph from the end. To ease the difficulty of overcoming the previous 45 paragraphs, I will voice it in a free form now:
 3r33770. 3r33737.  3r33770. 3r3409. Any organization designing a system (interpreted here more broadly than just an information system) will inevitably create such a model that will repeat the communication structure of the organization itself. [/b] 3r33737...
+ 0 -

Encryption downloader for STM32

In this article I would like to write about my experience of creating a bootloader for STM32 with firmware encryption. I am an individual developer, so the code below may not meet any corporate standards 3r33386.  
 
In the process of work, the following tasks were set: 3r33386.  
 
 
Provide the user update the device from the SD card.
 
Ensure control of the integrity of the firmware and exclude the recording of incorrect firmware in the memory of the controller.
 
Provide firmware encryption to exclude device cloning.
 
 
The code was written in Keil uVision using the stdperiph, fatFS and tinyAES ...
+ 0 -

Smart clouds, smart enterprises: how AI transforms the cloud computing industry

Smart clouds, smart enterprises: how AI transforms the cloud computing industry  
 
It seems that the latest addition to the ever-expanding collection of buzzwords in the field of IT - artificial intelligence (AI) means everything for everyone. No matter what industry you look at - from retail to finance, from manufacturing to healthcare, AI is advertised as “changing the rules of the game” and solving a multitude of problems.
 
 
This rush already leads to real changes: it is expected that global expenditures on cognitive systems and artificial intelligence systems will increase annually by 1.5 times by 2021. And one of the areas in which the influence of AI is already being felt ...
+ 0 -

Forced optimization of PostgreSQL queries

 3r-33199. 3r3-31. What to do when there is a closed source application that does not access the database in the most optimal way? How to pull requests without changing the application, and possibly the database itself? 3r3186.  3r-33199. 3r3186.  3r-33199. If you haven't asked such questions, you are a very successful and strict DBA :)
 3r-33199. Well, if you ask, let me share my suffering and experience. 3r3186.  3r-33199.
3r3186.  3r-33199. 3r3186.  3r-33199.

Need to store more data, or setting a problem

3r3186.  3r-33199. 3r3186.  3r-33199. This section can be safely browsed if the history ...[/h]
+ 0 -

How to get an internship at Google

How to get an internship at Google 
3r3-31. 3r33338. A week ago, we talked about our educational programs where in the comments we were told about the importance of internships and practical experience. It is impossible to disagree with this, since theoretical knowledge must be reinforced by practice. With this post we open a series of articles about summer internships for students: how the guys get there, what they do there and why it is good. 3r33333. 3r33336.  
3r33338. In the first article I will tell you how to successfully go through all the stages of interviews and get an internship at Google. 3r33333. 3r33336.  
3r33338...
+ 0 -

24 recipes for a startup to succeed at a huge global exhibition, using the example of Web Summit 2018

 3r33477. 3r3-31. 3r33430. The first acquaintance
3r33462.  3r33477. 24 recipes for a startup to succeed at a huge global exhibition, using the example of Web Summit 2018 3r33462.  3r33477. 3r33462.  3r33477.
For those who are interested in the 24 recipes themselves - they are at the end of the article. 3r33462.  3r33477. 3r33462.  3r33477.
Web Summit 2018 in Lisbon is a very large-scale event, I attended this for the first time and very much surprised me. Firstly, the fact that the planned number of visitors of the summit is 70K, with a population of the city of 600K, that is, in principle, every tenth person should be a participant of the summit. In fact, we began to feel the scale of the event when ...
+ 0 -

Russia plans to introduce additional control over payments on the Internet

Russia plans to introduce additional control over payments on the Internet  
Source: CMS Magazine
 
 
Payment aggregators in Russia are planned to be put under control, they will have to deal with the identification of sites in order to make illegal transfers impossible, in particular, in favor of the casino. About this reports RBC. The aggregators will be controlled by banks and non-bank credit organizations (NPOs).
 
 
The changes will be introduced if amendments to the law “On the National Payment System” are passed to the State Duma by the head of the Financial Market Committee Anatoly Aksakov, the first deputy chairman of the Federation Council's budget and financial ...
+ 0 -