Custom router for browser testing

It's not really about testing, but more about parsing sites through browsers. Nothing new and interesting, except the self-described router-hub and performing nodes.
 
 

Why a hub router?


 
Because it registers in itself the nodes and redirects requests from outside to a particular node.
 
Link to the project repository
 
 

The result is


 
The post turned out to be more like an instruction manual, but nevertheless, I believe that this project can be useful.
 
 

P.S. Some refinements


 
This is the first project that I started writing on GOLANG, so if anyone has suggestions or comments ...[/h][/h][/h]
+ 0 -

Prime Minister of India Narendra Modi: we will send the flag of the country into space aboard the "Gagannyan" in 2022

Prime Minister of India Narendra Modi: we will send the flag of the country into space aboard the "Gagannyan" in 2022  
Photo of the fully assembled GSLV-F08 booster inside the vertical assembly building, Shriharikota. Photo source: PTI File Photo
 
 
Today Indian Prime Minister Narendra Modi said during a speech dedicated to the Independence Day of India that in 202? in honor of the 75th anniversary of the country's gaining independence, the Gaganyaan spacecraft ("Gaganian", "heavenly ship") will fly with a manned mission.
 
in his hand. national tricolor ; most likely, it will happen in 202? during the celebration ...
+ 0 -

Step-by-step instructions on how to restore access to Linux Amazon EC2 instance with the loss of the pem-file

Step-by-step instructions on how to restore access to Linux Amazon EC2 instance with the loss of the pem-fileIf, when creating a Linux instance in AWS, there was not created a key pair (KeyPair) for accessing it via SSH, or they were lost, you need to perform a number of operations to gain access to the machine. You can not add keys to the already started instance via the AWS console. There are two ways in which we can restore SSH access to the instance.
 
 
The first method is creating an image of (Amazon Machine Image) from the existing instance and the subsequent launch of a new instance based on it, but with the creation of the key. Thus, in fact, the existing machine will be cloned with the ...
+ 0 -

Specter and Meltdown are no longer the most dangerous attacks on the Intel CPU. The researchers reported the vulnerability of Foreshadow

Specter and Meltdown are no longer the most dangerous attacks on the Intel CPU. The researchers reported the vulnerability of Foreshadow  
 
Earlier this year, the information space shocked the news about Specter and Meltdown - two vulnerabilities using speculative code execution to gain access to memory ( articles and translations on this topic on Habré: .3 , .1 , 3r3r???r3r3116., .3 , .4 , .5 , .6 , .7 , .8 And in search you can find a dozen other ). At about the same time...
+ 0 -

Main conferences on the Internet of things in 2018-2019. Russia and the world

Main conferences on the Internet of things in 2018-2019. Russia and the world  
Linux Foundation Open IoT Summit. Portland, 2018
 
 
On the eve of our fifth conference "Internet of Things" we compiled a list of the most ambitious IoT events in Russia and in the world. In doing so, we were guided by the ratings PTC University , Hewlett Packard Enterpise and Sam Solutions .
 
 
Below is a list of events that will take place in Russia, Europe, the United States and Asia in the near future. Within each section, events are arranged in chronological ...
+ 0 -

Seven problems of implementing Scrum, about which we did not know

Hello, Habr! My name is Maxim Lyuttsau, in Promsvyazbank I work as a product owner. Almost a year the development of a new Internet bank "My Business" we are using the methodology of Scrum, and in this connection I have already managed to fill cones. In this post I would like to tell you about the most painful of them, as well as about what means to us eventually helped. That you could avoid such troubles.
 
 
Seven problems of implementing Scrum, about which we did not know  
 

Some employees are fundamentally against the changes


 
The Scrum methodology was adopted in our bank to accelerate development and reduce TTM. When the introduction began, it turned out that ...[/h]
+ 0 -

Parsing the pattern "Module" in JavaScript

In many programming languages, there are mechanisms that allow you to hide, for example, the methods and properties of classes. jаvascript does not have built-in tools that allow, without additional effort, to achieve such effects. However, such things can be imitated using other language features.
 
 
Parsing the pattern "Module" in JavaScript

 
The material we are translating today is devoted to analyzing the design pattern "Module", which allows you to hide private information in closures, giving access only to what the developer decided to make publicly available. This article is intended mainly for beginning programmers - for those who...
+ 0 -

Drawing with Render Targets in Unreal Engine

Drawing with Render Targets in Unreal Engine
 
Render target is, in fact, a texture in which you can write while the application is running. From the engine's point of view, they store information such as the base color, normals and ambient occlusion.
 
 
From the perspective of the user, render target is mainly used as a kind of additional camera. You can set the scene capture (scene capture) at some point and save the image in render target. Then you can display the render target on the mesh, for example, to simulate the surveillance camera.
 
 
After the release of the ??? version of the engine, Epic added the ability to render the material directly ...
+ 0 -

How open APIs of banks change the financial world

The financial sphere is undergoing a digital revolution. Conservative banks follow modern trends and begin to provide third parties with information that was previously considered a banking secret. Why this happens, to whom and why it is needed - we will understand this article.
 
 

Disclosure of bank data


 
The trend originated in Europe, for example, in Germany, since 201? the Open Bank Project is developing - a project that supports the disclosure of banking data and is supported by the country's largest banks.
 
 
In Great Britain in September 201? with the support of public authorities...[/h]
+ 0 -

IoT architecture - first look under the hood

The concept of IoT (Internet of Things) has long been a part of the IT-schnik lexicon. Although I did not find such a hub, I hope this will be fixed soon :)
 
However, until now, many people confuse the IoT architecture with the automation architecture, where the main task is to obtain information from sensors, and on their basis control of the actuators is carried out.
 
IoT architecture - first look under the hood
 
 
IT architecture includes two seemingly incompatible things: on the one hand - a large number of peripherals with low computing power, low power consumption, high response speed to events, and on the other hand - cloud servers with high ...
+ 0 -