“BIAN Reference Model” for the banking industry or how to stop reinventing the wheel

“BIAN Reference Model” for the banking industry or how to stop reinventing the wheel 3r33333. 3r3-31.
3r33333. Since I noticed that you, Caesar, have already built a lot and are continuing to build, I have developed certain rules so that you yourself can assess the quality of both existing and future buildings. 3r33354. 3r33350.  3r33333. 3r33350.  3r33333. Vitruvius, architect of the Roman Empire
link . Also during the translation, I will allow myself to deviate from the original and give my comments where I deem it necessary. 3r33350.  3r33333.
3r33350.  3r33333. [h2] 1. Introduction to BIAN (Banking Industry Architecture Network) 3-333246. 3r33350.  3r33333. 3r33352. Banking ...[/h]
+ 0 -

Amazon Cloud Services and Investment Portfolio Analysis

Amazon Cloud Services and Investment Portfolio Analysis 3r31220. 3r3-31. Recently, there has been high volatility in stock markets when, for example, a stable paper of a well-known company can lose several percent at once on the news of sanctions against its leadership or, on the contrary, fly to the skies on a positive report and investors' expectations about super-profit dividends.
 3r31220.
 3r31220. How to determine whether the ownership of this security brought in income or only loss and disappointment?
 3r31220.
 3r31220. 3r31181. 3r311. 3r31216. (Source) 3r3–31209.
 3r31220.
 3r31220. In this article I will tell you how to determine and visualize ..
.
+ 0 -

Fiasco. The story of one homemade IoT

Fiasco. The story of one homemade IoT 3r33479. 3r3-31. Most articles are written according to the principle “I /we did it /and look how cool it is!”. The same publication is dedicated to a failed project. Welcome to the category
 3r33479. Development of smart devices on the example of a floor heating controller on ESP8266
 3r33479.

Start from a distance


 3r33479.
I live in a small house that is built according to my project. Layout - eurotreshka, corridor, kitchen-living room on the first floor, bathroom, children's room and bedroom on the second. From non-standard - walls arbolit, the foundation of UWB, heating only TP...[/h]
+ 0 -

DDR SDRAM - design features and signal integrity

DDR SDRAM - design features and signal integrity  3r3118.
 3r3118. 3r3111. Designing electronic devices using fast DDR SDRAM memory modules requires special attention to the problem of signal integrity. The article describes the modern modeling tool for solving such problems. 3r33112.
 3r3118.
3r314.
 3r3118. Today, almost all modern electronics are equipped with memory modules. Servers, computers, smartphones, game consoles, GPS-navigators and most other devices are designed based on processors and FPGAs. Such devices require high-speed, high-bandwidth memory or dual frequency data transfer (DDR) memory. With each new generation of DDR SDRAM (synchronous ...
+ 0 -

Infinite localization, or how we translate the map in real time

Infinite localization, or how we translate the map in real time 3r33448.  
3r33448.  
What happens when your product starts to be sold in another country with its own language and cultural characteristics? Most likely, it is waiting for localization. In most cases, you only need to translate the resource files so that the menus and interface elements are in the language familiar to the user. But what to do if the basis of what you are selling is data, of which there are a lot, they come in constantly, in a large volume and require regular translation. And not in one language, but in several. 3r33448.  
3r33448.  
Under the cut, you will find the story, as this issue ...
+ 0 -

Course MIT "Security of computer systems." Lecture 9: "Security of Web-applications", part 3

Course MIT "Security of computer systems." Lecture 9: "Security of Web-applications", part 3

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Depths of SIEM: correlations "out of the box". Part 2. Data schema as a reflection of the "world" model

This is the second article in the series, which is devoted to the methodology for creating correlative correlation rules for SIEM systems. In the previous article we set ourselves this task, described the benefits that will be obtained when implementing it, and also listed the main problems that stand in our way. In this article, we will begin to search for solutions and start with the problem transformation of the "world" model , as well as its manifestations at the stage of normalization of events.
 
 
Depths of SIEM: correlations "out of the box". Part 2. Data schema as a reflection of the "world" model ...
+ 0 -

How to collect corporate services on one online platform: the story of "MegaFon.Business"

How to collect corporate services on one online platform: the story of "MegaFon.Business"Each telecom operator has a large set of tariffs and services that are designed for corporate clients. Such services can be several dozen. Usually users in them are difficult to understand - the difficulties arise already at the stage of connection. We have to "crawl through" countless landings, authorizations, application forms and lines of small print. We wanted everything to become simple and understandable. To this end, we decided to create a platform "MegaFon.Business." About how we collected the ecosystem of solutions for corporate clients and what eventually turned out, we will tell in this ...
+ 0 -

Course MIT "Security of computer systems." Lecture 9: "Security of Web-applications", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

If you are in Kazan or Novosibirsk and want to design the chips, as in Cupertino

If you are in Kazan or Novosibirsk and want to design the chips, as in CupertinoGentlemen! In the photo, Irina, a girl from Novosibirsk, looks at the museum exposition about personal computers from the 1980s. It was then, in the 1980s, that there was finally a very unpleasant gap between Western electronics and the Soviet electronics. If in the 1970s Soviet electronics simply lagged behind by 7 years (judging by the release dates of DEC PDP-11 and CM-4), then in the 386th it simply died.
 
 
At the same time, in the late 1980s, the West developed a technology of logical synthesis from the languages ​​of the Verilog and VHDL equipment description. This technology became mainstream ...
+ 0 -