Mobile application helps to detect depression and other psychological problems in the very early stages.

Mobile application helps to detect depression and other psychological problems in the very early stages. A visit to the doctor is not required for the diagnosis - a person's condition is assessed by the patterns of his usual behavior [/i] 3r3384.  3r3394. 3r3384.  3r3394. Many people suffer from depression and other "mental" diseases. Only in the USA about 45 million people have problems with the so-called mental health, and the treatment of each person in this case is strictly individual. But technology helps solve the problem. In particular, smartphones, of course, not by themselves, but with specialized software. 3r3384.  3r3394. 3r3384.  3r3394. Startup Mindstrong Health decided to turn the smartphones of ...
+ 0 -

The principle of least action. Part 2

 3r3755. 3r3-31. The principle of least action. Part 2 last time
We briefly reviewed one of the most remarkable physical principles - the principle of least action, and stopped on an example that seemed to contradict it. In this article we will deal with this principle in a little more detail and see what happens in this example. 3r33737.  3r3755. 3r311.
3r33737.  3r3755. This time we need a little more math. However, I will again try to explain the main part of the article at an elementary level. I will highlight a bit more strict and difficult points, they can be skipped without prejudice to the basic understanding of the article. 3r33737...
+ 0 -

MIT course "Security of computer systems". Lecture 12: "Network Security", part 2

MIT course "Security of computer systems". Lecture 12: "Network Security", part 2 3r? 3572. 3r3-31.

Massachusetts Institute of Technology. Lecture course # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014

3r???.  3r? 3572. Computer Systems Security is a course on the development and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and security methods based on the latest scientific work. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware protection and security in web applications. 3r???.  3r? 3572. 3r???...[/h]
+ 0 -

Voltmeter for batteries: a pocket gadget for a smartphone with crocodiles

 3r3187. 3r3-31. FTlab is known in many ways as a manufacturer of mobile semiconductor sensors with a Jack connector, each of which determines either the level of ultraviolet radiation, or temperature and humidity, or electromagnetic radiation, and even the level of radiation. 3r3173.  3r3187. 3r3173.  3r3187. The devices have a rather limited applicability due to their characteristics, and are rather something like a toy for a geek, but nevertheless they work for themselves within the stated features. 3r3173.  3r3187. 3r3173.  3r3187. Voltmeter for batteries: a pocket gadget for a smartphone with crocodiles ...
+ 0 -

“We are a team of Android P engineers. Ask us!”

 3r3611. 3r3-31. 3r? 3597. “We are a team of Android P engineers. Ask us!” 3r3600. 3r33595.  3r3611. 3r? 3597. July 1? 2018 Reddit passed a round of questions from the Android developer community and answers from the Android team of engineers on the latest innovations of the framework (but not limited to this list): 3r300600. 3r33595.  3r3611. 3r33333.  3r3611.
Android Jetpack
 3r3611.
Kotlin
 3r3611.
Notifications
 3r3611.
Power - app standby, app restrictions
 3r3611.
Display cutout
 3r3611.
Actions and Slices
 3r3611.
Compatibility and non-SDK interface restrictions
 3r3611.
Android P Beta devices, Project Treble
 3r3611. 3r33356. 3r33595.  3r3611...
+ 0 -

Vulnerability in jQuery plugin actively exploited by hackers

 
3r3-31. Vulnerability in jQuery plugin actively exploited by hackers
 
 
Vulnerability in the popular plugin. jQuery File Upload active. operated attackers to introduce malicious files and seize control of servers. The plugin and more than 7800 forks are used in a huge number of projects, CRM systems, WordPress plugins, Drupal add-ons, Joomla components and many other applications.
 
discovered this vulnerability a few years ago:
 
 
3r3342.
+ 0 -

Criteria of the human mind, from the point of view of one programmer

Criteria of the human mind, from the point of view of one programmer 3r3162. 3r3-31. Consciousness. Many copies are broken on this topic. We are inspired by the jerk of digital technology and the growth of computing power with caution we expect the appearance of the first artificial intelligence. As it will be? Perhaps in some garage, someone's computer will display the question: "Who am I?". Or the mega corporation of good /evil will put a big black box on its sidelines, which from time to time will secretly take all the decisions in this corporation I have not a very rich imagination, and therefore I will leave up thinking up the options for creating AI for ...
+ 0 -

Data-mining and Twitter

 3r? 3516. 3r3-31. 3r3502. Among social networks, Twitter is more suitable for extracting text data due to the hard limit on the length of the message in which users are forced to put all the most essential.
3r?500.  3r? 3516. 3r3502. 3r3164. I suggest to guess what technology is framed by this cloud of words? 3r3165.
3r?500.  3r? 3516. 3r3502. Data-mining and Twitter
3r?500.  3r? 3516. 3r3502. Using the Twitter API, you can extract and analyze a wide variety of information. An article on how to do this using the programming language R.
dressing in the US Congress 3r3504. in the wake of the investigation ...
+ 0 -

Local NPM repository in 5 minutes with its packages and caching

Good day!
 
 
Sooner or later, organizations have problems with the proliferation of js modules between projects, the time has come when this question has arisen in our company.
 
 
Copy and paste the code is the way to the dark side, so it was decided to write not just js code, but create from it npm packages to distribute between their projects.
 
 
The search for free, private npm repositories led to a dead end, and the use of private repositories on 3r3166. npm
requires a fee (and this is not our mentality).
 
 
Since the office has a server that always works (almost), it was decided to deploy ...
+ 0 -

Metamorphosis of the attributes of the class

 3r33150. 3r3-31. A short note from the “You Warned” series
 3r33150. The transition from classical programming languages ​​to Python delivers a lot of surprises. 3r3138.  3r33150. We read documentation:
 3r33150.
For example, it is important to say that
3r3138.  3r33150. 3r3138.  3r33150. Let's try to play
 3r33150. 3r3122. class Vessel:
#class attribute
vtype = "boat"
3r33150. #instance attribute
def __init __ (self, name):
self.name = name
3r33130.
3r3138.  3r33150.
3r330. 3r3138.  3r33150. Create two objects and check the values ​​of all attributes: 3r3138.  3r33150. 3r3122.
+ 0 -