Just add water: H2O.ai to Azure

Hello, Habr! Over the past few years, interest in the technologies of machine learning and artificial intelligence has grown rapidly. The H2O.ai solution is becoming increasingly popular in this area: it supports fast algorithms of machine learning in memory and recently received support for in-depth training. Today we will talk about the development using H2O.
 
 
Just add water: H2O.ai to Azure
 
 
Rapid, scalable and reliable solutions of these categories are increasingly being considered as necessary means to ensure the success of the business.
 
 
Developers H2O.ai seek to create a fast, scalable ...
+ 0 -

Remote control of the heating system

Remote control of the heating systemInternet of things (IoT, Internet of Things) is a promising direction, analysts say. One of the main trends of IoT is home automation or, as marketers like to say, the creation of a "smart home".
 
 
Let's leave alone the verbal exercises and consider a specific project.
 
 

Statement of the problem


 
I live in my own house not far from Moscow. In addition to the obvious advantages of this type of residence, there are some nuances. If in an apartment house most management tasks are undertaken by a management company, then in their own house they have to be solved independently.
 
 
One of such ...[/h]
+ 0 -

OpenVINO Toolkit - to look at the world with an uncomplicated look

OpenVINO Toolkit - to look at the world with an uncomplicated look  
 
Just yesterday the new version of was released. Open Visual Inference & Neural Network Optimization (OpenVINO) toolkit (formerly Intel Computer Vision SDK) - a set of libraries, optimization tools and information resources for developing software that uses computer vision and Deep Learning. The goal of OpenVINO is to accelerate the process of creating computer vision systems, providing programmers with an integrated development environment, and optimizing the code of these products, which requires large computational costs, for a variety of hardware platforms (CPU, GPU, FPGA) Intel.
 
 
Under ...
+ 0 -

Development of its visualization plug-in for Grafana

Development of its visualization plug-in for Grafana  
Grafana is a handy tool for visualizing and monitoring temporary data from a variety of sources. In this post, I want to tell you the key concepts of developing your plug-in.
 
You can create your own plug-in for convenient development of temporary data visualization, use the Grafan engine to create queries or to expand the graphs functionality for your needs.
 
Installation
 
 
Download and run Grafana in any way: https://github.com/grafana/grafana
 
After starting through bin /grafana-server the folder should appear. data  

 

...

+ 0 -

There is work in RnD, or how to get away from monotonous and small tasks

Recently we decided to allocate RnD-activity Nexign (formerly Peter-Service) to a separate division, distributed to three cities in Russia - Moscow, St. Petersburg and Novosibirsk. Since then, we are actively looking for new professionals for him, who will determine the shape of our key decisions in the future. In this post, we will talk in detail about how RnD Nexign works and who we are looking forward to in our team.
 
 
There is work in RnD, or how to get away from monotonous and small tasks  
posts .
 
 
Within the whole RnD, we are ready to create teams for those open-source solutions, in which we see the prospect for the development of products. Any specialist...
+ 0 -

The casino was hacked through a thermostat in the aquarium

The casino was hacked through a thermostat in the aquarium  

The aquarium at the entrance to the Silverton hotel-casino in Las Vegas (approximately the same was in the casino that was hacked)

 
 
If you need to get into the local network of a well-protected casino - what will you do in place of the hacker? Will you try to find the passwords of users and the administrator? Will you get biographical information about the employees, send them personal letters on behalf of relatives with personal attachments, which they will surely open - and put themselves a Trojan? Will you scan the server ports exposed to the outside? Yes, these methods have been effective for ...
+ 0 -

It's not Android for you. Features of development under Wear OS

It's not Android for you. Features of development under Wear OS  
 
On March 1? Google renamed the operating system for portable Android Wear electronics and began distributing it under the name Wear OS to attract a new audience. The company has published new design guides and updated Documentation . When I started developing the application for the clock, I did not find any Russian-language publication on this topic. Therefore, I want to share my experience and tell more about Wear OS, what it consists of and how to work with it. All those who are not indifferent to mobile technologies ask under the rules.
...
+ 0 -

How the Internet of things shifts the analyst to the periphery of

In the Internet of Things (IoT) era, the tasks of processing, filtering and analyzing data as close as possible to their source are becoming more urgent, since it allows you to act remotely instead of forwarding these data to data centers or clouds for filtering and analysis.
 
 
Another reason for deploying analytics tools on the periphery of the network is that there are new uses for the Internet of things today, and in many cases, the amount of data generated at the periphery places such high demands on bandwidth and processing power that available resources are not can satisfy them. How the Internet of things shifts the analyst to the periphery of ...
+ 0 -

"Micro-Digest": 4 news from the world of developments for IoT

Today we have prepared a digest, in which we collected several news from the sphere of "chip building" for IoT. We will tell you about new devices for data encryption, the smallest computer in the world from IBM and about NVIDIA solution, which simplifies the integration of deep learning systems into microprocessors.
 
 
"Micro-Digest": 4 news from the world of developments for IoT

 
/photo Santi CC
 
 

The smallest computer in the world from IBM


 
At the IBM Think 2018 conference in March, the company introduced the smallest computer in the world. Its dimensions are ...[/h]
+ 0 -

Variants of storage of cryptographic keys

Variants of storage of cryptographic keys The popularity of PKI-based solutions continues to grow - more and more sites are migrating to HTTPS, enterprises are introducing digital certificates for user and computer authentication, S /MIME proves its validity both for encrypting e-mail and as a way to verify the source of messages to counter phishing. But encryption and authentication in these applications are practically meaningless without proper key management.
 
 
Every time you issue a digital certificate from a certification authority (CA) or a self-signed certificate, you need to generate ...
+ 0 -