Is there life without architecture?

Is there life without architecture?

 
Most of the code for most modern applications was probably written in the time of Android 4.0. The applications survived the time ContentProvider, RoboSpice , various libraries and architectural approaches . Therefore, it is very important to have an architecture that will remain flexible not only to functional changes, but also ready for new trends, technologies and tools.
 
In this article, I would like to talk about the architecture of the IFunny application, the principles we adhere to, and how the major problems arising in the development process are being addressed.
...
+ 0 -

The effect of a small window on the user's memory, and what to do with it

The effect of a small window on the user's memory, and what to do with it
 
Even with the release of Windows Vista200? administrators faced a small but unpleasant problem: the warning of the expiry of the password was lonely appearing in the most inconspicuous corner of the screen. And this instead of the window is right in the center, as it was before!
 
Hence the change of passwords at the last moment, to the accompaniment of access failures; and indignation, why suddenly stopped working VPN, and what to do with it on a business trip. Of course, not a problem of the year, but a phenomenon intrusive and unpleasant. Therefore, we understand how to overcome it. ...
+ 0 -

The book "Swift. Basics of developing applications for iOS and macOS. 4 th ed. supplemented and revised "

The book "Swift. Basics of developing applications for iOS and macOS. 4 th ed. supplemented and revised " This book contains exhaustive information for everyone who wants to learn how to program in the wonderful language of Swift in order to create their own iOS-applications (including macOS, tvOS and watchOS) or programs for the Linux operating system. In the course of reading the book you will find not only theoretical information, but also a large number of practical examples and tasks, which you will deepen your knowledge of the studied material.
 
 
During a long and fruitful dialogue with many of you, a lot of ideas were developed, thanks to which the new edition became really useful. In comparison with ...
+ 0 -

Chinese hackers are behind numerous hacking of international companies

Chinese hackers are behind numerous hacking of international companies  
 
Recently, information security specialists from the company ProtectWise have stated that Chinese cyber intelligence is behind many hacking companies of the most different companies in the last ten years. Companies, to which the Chinese are implicated, are located in Europe, the US, Russia and many other countries. The actions of hackers from the Middle Kingdom would have remained unnoticed, were it not for the recent large-scale attack conducted to compromise corporate accounts in Office 365 and Gmail.
 
 
This attack was committed with a number of errors. The burglars left behind a lot of tracks on ...
+ 0 -

Welcome to the Android-meetup SuperJob

Another Mitap for Android developers in the SuperJob office.
 
 
Welcome to the Android-meetup SuperJob
 
 
Speakers and themes:
 
 
Anatoly Shukolyukov , senior developer of SuperJob, with the report "Creating Animations with Constraint Layout and ConstraintSet"
 
 
"I'll tell you how using the tool for creating complex UI interfaces ConstraintLayout, using a minimum of code, create beautiful animations and transitions"
 
fb-group SuperJob IT-meetup
 
 
Admission is free, the number of seats is limited.
 
 
Please, register with . Another Mitap for Android developers in the SuperJob office.    Speakers and themes:   Anatoly Shukolyukov , senior developer of SuperJob, with the report "Creating Animations with Constraint Layout and ConstraintSet"  "I'll tell you how using the tool for creating complex UI interfaces ConstraintLayout, using a minimum of code, create beautiful animations and transitions"  fb-group SuperJob IT-meetup   Admission is free, the number of seats is limited.  ☛ Please, register with . ...
+ 0 -

How to make a routing configuration file in React Router 4 (subtitles)

When react-router 4 only appeared, many experienced on two occasions:
 
 
How to render the routing in a separate file (configurations)
 
How to now live without an onEnter hook.
 
 
The video from Tyler McGinnis covers the first question.
 

here .When react-router 4 only appeared, many experienced on two occasions:  How to render the routing in a separate file (configurations) How to now live without an onEnter hook.  The video from Tyler McGinnis covers the first question.  here ...
+ 0 -

News Qt, June 2017 - May 2018

What's new appeared /happened in Qt for
half a year
almost a year with last article . Releases 5.9 and 5.1? as well as new tools, add-ons, platforms and transition to the licensing subscription model.
 
News Qt, June 2017 - May 2018
Conferences and exhibitions
 
 
Qt Contributors Summit 2017
 
Qt World Summit 2017
 
Qt on Embedded World 2018
 
 
What is new is
 
 
Changes in the commercial license
 
Changes on the site
 
Releases
 
 
???r3r31264.
 
???r3r31264.
 
 
Addons

 
 
Qt ...
+ 0 -

Briefly about Shadowsocks, or OpenVPN is not needed (in every house)

Nowadays, when all the bad elements and strive to get into your traffic and somehow foul, it became fashionable to encrypt traffic. Beginning is good and useful, but only do it often redundantly. If encryption of traffic to a trusted server, such as its VPS, is your only goal, then OpenVPN is too sophisticated for this purpose. Its a long time to set up, easy to detect, and most importantly - there are pitfalls, not knowing which you can get such a situation that the VPN is worth, and traffic is bypassed. All this is because OpenVPN was conceived more as a means of accessing a small network via ...
+ 0 -

ILV unlocked 3.5 million Google IP addresses

Tuesday was pleased with the slight decrease in the degree of marasmus: the ILV has removed from the registry about 3.5 million IP-addresses of Google.
 
 
Probably an amnesty for the Victory Day. Hooray, comrades!
 
 
ILV unlocked 3.5 million Google IP addresses  
 
If another ten and a half dollars are removed from the registry - in general it will be normal, until Whatsapp is banned will not decide .
 
 
Source , source , source . Tuesday was pleased with the slight decrease in the degree of marasmus: the ILV has removed from the registry about 3.5 million IP-addresses of Google.  Probably an amnesty for the Victory Day. Hooray, comrades!     If another ten and a half dollars are removed from the registry - in general it will be normal, until Whatsapp is banned will not decide .   Source , source , source . ...
+ 0 -

Unity, ECS and all-all-all

Unity, ECS and all-all-all
 
How many already had the manuals "How to make a game on Unity for 3 hours", "Doing Counter-Strike for the evening", etc.? The low entry threshold is undoubtedly the main plus and minus of Unity. Indeed, you can throw "assets", finish some simple "scripts", wrap the blue tape and it will even somehow work. But when the project is overgrown with game mechanics, a complex logic of behavior, problems with such an approach grow like a snowball. To introduce new mechanics, you need to rewrite the code in many places, constantly check and redesign the prefabs due to broken references to the components of logic...
+ 0 -