Copying data from a website using R and the library rvest

Copying data from a website using R and the library rvestTo conduct data analysis, you must first collect this data. There are many different methods for this purpose. In this article we will talk about copying data directly from a website, or about scraping. Habré has several articles on how to make a copy using Python. We will use the language R (ver.???) and its library rvest. As an example, consider copying data from Google Scholar (GS). GS Is a search engine that searches for information not on the entire Internet, but only in published articles, or patents. This can be very useful. For example, when searching for scientific articles on certain ...
+ 0 -

Load testing "non-HTTP". Part 2 Gatling

In the first part of Article We conducted a comparative analysis of the Java load facilities for JMeter , left XML test plans and reached 30K RPS from one machine, loading a "non-HTTP" service using the example Apache Thrift .
 
 
In this article, consider another tool for load testing - Gatling and, as promised earlier, we will try to increase its productivity in dozens of times.
 
 
Load testing "non-HTTP". Part 2 Gatling documentation .
 
 
[h3] Selection ...[/h]
+ 0 -

6 interesting bugs I encountered while doing the game for VKontakte

6 interesting bugs I encountered while doing the game for VKontakte
 
 
I like to make games, this is my hobby. In total, about a year in my free time I did a game on jаvascript for VKontakte. Currently, the game is completed, launched, moderated VKontakte and is available in the games catalog. This is not an article of the kind "how I made the game," but a story about the problems that I encountered while it was being created. I hope that this information will help someone to avoid difficult situations in their projects. I know about some bugs in advance, it would be much easier, and maybe I would make other decisions about the code. Welcome to the catalog for details.
 
...
+ 0 -

How large the data will change the automotive industry

From self-controlled machines to transport, connected to the Internet of things: Big data forever transform the ways of our movement.
 
 
How large the data will change the automotive industry  
 
The rapidly expanding Internet Things include more and more devices that have an Internet connection. Usually under such devices we imagine portable electronic devices, household appliances and audio-visual equipment. However, car manufacturers have entered the game, and now they are using the market for their own purposes.
 
 
The Wi-Fi that captured the car sphere opened completely new possibilities - the machines use a direct internet connection for GPS navigation...
+ 0 -

Writing a Telegram bot for Habrahabr

Writing a Telegram bot for HabrahabrIn this article, I want to talk about how the writing of the Telegram bot was done, which could send articles to Habrahabr, first to Python, and then to Go, and what came of it.
was used. pyTelegramBotAPI , for parseing RSS-feeds - feedparser
 
In the process of working, the structure became much more complicated: now the bot not only sent new articles, but also could filter out those articles that did not contain tags to which the user was subscribed. The implementation was very simple: the SQLite database was used, in which there were only 2 columns (id and tags), good, Python3 had ...
+ +1 -

The task about forEach (ps :: println) from SKB Contour

At the conference JBreak I did not read the tasks of the sponsors specifically. Well, of course, except hell from Excelsior : these guys all set the heat. And then they brought me a sheet from SKB Kontur, look, they say, laugh. I laughed: the first task really looked so naively formed and underdetermined, that I did not even want to go to the stand and convince the employees of the company. I almost forgot about it, but here on Khabr appeared the author's analysis of this problem, not devoid of some depth. Even ...
+ 0 -

A sentence was handed down to Russian hackers who attacked US stock exchanges

A sentence was handed down to Russian hackers who attacked US stock exchanges  
 
In the period from 2005 to 201? a group of Russian hackers hacked system of more than 16 companies and stole 160 million credit and debit card numbers. Among the victims were the Nasdaq exchange, Citigroup bank, JetBlue airline, Visa payment system and other, no less large organizations. The activities of hackers were called "the largest cyberattack in the history of the United States." have used vulnerabilities in the software and introduced malicious code. The program was not just ...
+ 0 -

Training FastTrack. "Networking basics." "The basis of data centers." Part 1. Eddie Martin. December, 2012

About a year ago, I noticed an interesting and fascinating series of lectures by Eddie Martin, which is incredibly intelligible, thanks to his history and examples from real life, as well as his tremendous experience in teaching, allows him to gain an understanding of quite complex technologies.
 
 
Training FastTrack. "Networking basics." "The basis of data centers." Part 1. Eddie Martin. December, 2012  
 
We continue the cycle of 27 articles on the basis of his lectures:
 
 
Training FastTrack. "Networking basics." "Understanding the OSI model." Part one. Eddie Martin. December, 2012
 
 
Training FastTrack. "Networking basics." "Understanding ...
+ 0 -

How to increase the throughput of networks in the data center: the new chip PSE-3

How to increase the throughput of networks in the data center: the new chip PSE-3is presented.At the OFC conference, which will be held next week in San Diego, Nokia will present a new optical transceiver PSE-? providing a data transfer rate of 200 Gbit /s for a wavelength for underwater cables, 400 Gbps in metro and 600 Gbps for links in data centers. Representatives of Nokia claim that PSE-3 in some cases will allow Increase network capacity by 65% ​​compared to existing solutions, while reducing power consumption by 60%.  More about the technology we'll tell you about the cut.     /photo Groman123 CC    How does the chip  The new chip is a commercial implementation ...
+ 0 -

Design by Introspection

What if we could arrange the atoms one by one as we please?
 
Richard Feynman
How many programming paradigms can you name? List on this Wikipedia page contains not less than 76 titles. This list can be supplemented by another approach, called Design by Introspection. Its main idea is to actively use simple metaprogramming tools and type introspection (compilation time) to create elastic components.
 
The author of this approach is Andrei ...
+ 0 -