Firefox will by default block the shadowing of users

Firefox will by default block the shadowing of users Not everyone clearly understands how they are monitored on the Internet. Someone knows about cookies and transparent pixels, but forgets about fingerprinting through HTML5 tags and other methods. Marketing companies are inventing new ways to track users, and we often help in this by accessing your Google and Facebook accounts. After this, tracking on other sites becomes a trivial task through the buttons Like and the scripts of affiliate advertising networks.
 
 
Unfortunately, ad blockers and scripts are not installed on every computer, and these scripts not only threaten security, but also slow down the loading ...
+ 0 -

Computer vision in industry. Lecture in Yandex

Computer vision in industry. Lecture in YandexMachine learning continues to penetrate the industry beyond the Internet industry. At the conference Data & Science " The world through the eyes of robots "Alexander Belugin from the company" Tsifra "spoke about successes, challenges and topical tasks along the way. The introduction of technologies such as computer vision requires serialization and a product approach that reduces the cost of single implementations. The fact is that there are a lot of types of tasks at work. From the report you can learn about the products, world trends and experience of Alexander's team in the areas of industrial ...
+ 0 -

Why do you need Splunk? Monitoring the operation of IT infrastructure

Why do you need Splunk? Monitoring the operation of IT infrastructure  
 
 
How did the server shutdown affect the health of the infrastructure as a whole?
 
Can you predict the deterioration of the infrastructure?
 
What impact does critical service have on the system?
 
 
In this article we will talk about how Splunk can help in finding answers to these questions.
 
system. Splunk , specializing in the collection of real-time logs, processing and performing complex searches, rapid analysis of data and the creation of dynamic dashboards and alerts.
 
 
In previous articles, we already wrote about how Splunk can be used for ...
+ 0 -

When NASA refuses to fly on Soyuz?

When NASA refuses to fly on Soyuz?  
 
The other day, the media outraged news , that NASA in April 2019 is completing a contract for flights of astronauts Russian ships Soyuz to the International Space Station. The news was mixed. Someone rejoiced that Russia at last Has disconnected gas left America without access to space. Someone explained that the US refused, because they now have their own modern foreign cars from SpaceX and Boeing, and Roscosmos services are no longer required.
 
 
The reality is a bit more prosaic.
 
repayment of debts for the floating ...
+ 0 -

Mystery of the hole in the "Soyuz"

The morning of August 30 was not very kind for the ISS crew. It was found a leakage of air from the station, so astronauts and astronauts had to look for a leak and eliminate it. The hole was found in the domestic compartment of the Union of MS-0? and, despite the fact that it has already been successfully closed, disputes about its possible cause remain on the Internet. Is this a common blow to micrometeorite or space debris?
 
 
Mystery of the hole in the "Soyuz"  
"Union MS-09" (left), docked to the ISS, photo NASA
 
Enter , you are welcome.
In your opinion, the correct version is
The ...
+ 0 -

Analysis of requests for services using machine learning

Analysis of requests for services using machine learningIn the framework of product support, we constantly handle calls from users. This is a standard process. And like any process, it needs to be critically evaluated and improved on a regular basis.
 
We know about some systematically problems that are good to solve and, if possible, without attracting additional resources:
 
 
errors in dispatching requests: we get something "foreign", other teams sometimes get something "our".
 
It is difficult to estimate the "complexity" of an application. If the application is difficult - it can be passed to a strong analyst, and with a simple one - and the beginner ...
+ 0 -

Can BE-4 be a copy of NK-33

Can BE-4 be a copy of NK-33It's no secret that the US is now a space boom. True, this boom is very specific.
 
 
For example, the SLS missile reminds me very much of the Energy rocket. Yes, I'm aware that Energia-Buran is a clone of the Shuttle's Shuttle, but a more successful clone, so do not tell me about it in the comments.
 
 
Dream Chaser strongly resembles the Soviet BOR. They were enlarged and planned to be launched instead of Buran.
 
 
The US space star Falcon-9 looks very much like Zenith, it is only necessary to put the RED-107/108 quarters up to maximum instead of the RD-170. True Merlin's prototype was Fastrac ...
+ 0 -

Sorting by choosing

Sorting by choosing

 
 
What is the idea of ​​sorting by choice?
 
 
 
In the unsorted subarray, a local maximum (minimum) is searched.
 
The maximum found (minimum) changes places with the last (first) element in the subarray.
 
If there are unsorted subarrays in the array - see item 1.
 
 
library sorting Other articles were planned for inserting algorithms: solitaire sorting, sorting by Jung table, sorting by eversion, etc.
 
 
However, now the trend is non-linearity, therefore, without writing yet all publications about sorting inserts, today I'll start the parallel branch about sorting by choice. I will do the ...
+ 0 -

Application for the framework for the multiplatform bot

Application for the framework for the multiplatform bot
 
 
Chatbotas are tightly integrated into our information life, in all self-respecting social networks and messengers there is support for bots, for their development and use, they provide a convenient API, everything for the convenience of users and programmers. Now, to create a bot in Telegram, you do not even need to know any programming language. There are services that allow you to design a bot using the web interface. And it's really good, but more recently I was faced with a problem and was surprised that on this whole wave of chatbot's popularity, which are now not just a cool feature, but also an ...
+ 0 -

We upload the data into Excel. Civilized

There are tasks in the IT industry, which are against the backdrop of success in big data , machine learning , blockchain and other fashion trends look completely unattractive, but for dozens of years do not cease to be relevant to the whole army of developers. It will be about the old as the world task of forming and unloading Excel-documents, which everyone who ever wrote applications for business came across.
 
 
We upload the data into Excel. Civilized  
 
is especially known. Apache POI . Developers of Apache POI have done a titanic work on reverse engineering of binary formats of MS Office documents, and continue ...
+ 0 -