Google, Microsoft, Amazon and the World Bank create the first AI to eliminate hunger

 3r3179. 3r3-31. Google, Microsoft, Amazon and the World Bank create the first AI to eliminate hunger It's hard to believe, on the street in 201? but millions of people still starve every day. According to the UN, more than 20 million people have nothing to eat right now, and another 1.3 billion live in a state of permanent poverty, less than $ ??? a day, and are constantly concerned about survival. One lean season, one stupid decision of local authorities, and the whole region can become a disaster area. But even the best analysts in the world cannot predict exactly where this situation will arise. Therefore, the World Bank, the Red Cross, the United Nations and other international organizations ...
+ 0 -

Deliverance from illusions

I have long wanted to find a job related to the development of 3r3r78. CAD [/b] programs. Because it is interesting to me and because I have a lot of experience in this field (20 years). And in 2010 my dream came true and I got even more than I wanted.
 
And the first time I just fought in ecstasy. Favorite work, the opportunity to work at home. I had ambitious plans! At the very beginning I sketched this plan for myself in writing Cobalt Next Steps.
 
At the end of last year, Robert Bou, owner of the company
? came to Kiev. Ashlar-Vellum [/b] with wife Julie. And during lunch, I told him that ...
+ 0 -

Code of Conduct: why Linux kernel developers threatened to delete their code - we understand the conflict

In September, the Linux Foundation Board of Directors adopted a new code of conduct for Linux kernel developers - the Code of Conduct (CoC). As conceived by the authors, he had to solve the problems associated with discrimination and improve the emotional environment among the developers. 3r3189.  
3r3189.  
Some programmers called it an attempt at over-regulation and began to threaten to remove the code they wrote from the Linux kernel. More information about the situation - below. 3r3189.  
3r3189.  
Code of Conduct: why Linux kernel developers threatened to delete their code - we understand the conflict
3r3189...
+ 0 -

Visualize FHIR - the IT standard for medicine

 3r3113. 3r3-31. Visualize FHIR - the IT standard for medicine . We create IT solutions in the field of medicine, we use Clojure as the main development language, and also (depending on the project /module) Python, jаvascript, Go, C, C #, Rust, Objective-C, etc. 3r399.  3r3113. 3r399.  3r3113. An important place in our technological stack is occupied by the international standard 3r315. FHIR
(Fast Healthcare Interoperability Resources), which defines the format of storage /exchange /provision of medical information in electronic form and includes the specification 3r3r177. RESTful API
client-server interaction. 3r399.  3r3113. 3r399.  3r3113. Some ...
+ 0 -

Import substitution, fairy tales continue (continued)

Import substitution, fairy tales continue (continued)Having a little continued the study of the issue of "import substitution" on the basis of newly appeared information (tests, search for a solution), I came to the disappointing conclusion that earlier I was an optimist. In reality, things are much worse (in general, like in a fairy tale) than further, the worse. According to the comments of colleagues commenting on the first article 3–3–34. "Import substitution, the voice crying in the wilderness" 3r-3345. I cite references to regulatory documents calling us to “Patriotism”. The number of documents is growing, but there is only one problem, or ...
+ 0 -

How to fix the gender gap in technology

Article 3–3–35. How to Fix the Gender Gap in Tech
author Clara Marie Schroeder draws attention to the problem of women's non-participation in technology. I thought that this is even more relevant for the CIS countries.

 3r366.
 3r366. How to fix the gender gap in technology
 3r366. reduced from 24% to 22% 3r3356. .
 3r366.
 3r366. For comparison, in 1995 this number was
was
significantly higher - 37%. This tells us that it is not enough just to inspire girls to learn programming, we need to talk more about what prevents them from building a career in this field.
 3r366.
 3r366. To talk about gender inequality in technology...
+ 0 -

Amazon gave up and raised employee wages

 3r3190. 3r3-31. Amazon gave up and raised employee wages that are going on behind the closed doors of Amazon’s warehouses, and introducing a new bill to Congress specifically directed against him, the other day, he nevertheless said that he was raising the minimum wage for all Amazon employees in the United States and Britain. On such a decision, according to rumors, the online store will lose several billions every year. But do not discount the old Jeff, he has a cunning plan. thanked senator on twitter. 3r3174. 3r33175.  3r3190. 3r3171. Amazon shares at the exit of the news fell by 2%. Such an indulgence company is unlikely to ...
+ 0 -

IaaS for developing services: who and why switched to virtual infrastructure

IaaS for developing services: who and why switched to virtual infrastructure 3r3165. 3r3-31. We already wrote about how IaaS use companies from the financial sector and e-commerce , as well as production organizations 3r3136. . Today we will tell you how an IaaS provider can help companies developing applications and systems integration services. 3r3151.  3r3165. 3r3151.  3r3165.
3r311.
NTNU CC 3r3154.
3r3151.  3r3165. 3r3151.  3r3165. 3r3114. Implement SAP HANA 3r3117. 3r3151.  3r3165. Like 3r3335. celebrate
at IBM, SAP HANA has a pretty ...
+ 0 -

Fascinating cryptography or research on the topic of reversible encryption in PHP

One of the main truths of cryptography is that you should not invent anything in this area if you are not a professional. This is partly true, because all the best has long been invented, suffered and used for more than a decade in the field of information technology. The other side of the truth is that the development of some area of ​​knowledge occurs only with a constant influx of fresh ideas and original solutions in it.
 
 
For obvious reasons, we will not attack the giants of industrial cryptography like AES, but plunge into our own cryptographic research with blackjack and jokes.
 
...
+ 0 -

Conference DEFCON 22. Group GTVHacker. We crack everything: 20 devices in 45 minutes. Part 1

Amir Etemadi: I welcome everyone and welcome to the presentation of GTVHacker "Hacking everything: 20 devices in 45 minutes". We are the creators of the original Google TV products since 201? as well as products such as Chromecast, Roku and Nest, and we also release exploits for all Google TV devices.
 
 
Conference DEFCON 22. Group GTVHacker. We crack everything: 20 devices in 45 minutes. Part 1  
 
So, who are we? I am an Accuvant Labs researcher, created by the GTVHacker group, CJ is the group leader and a security systems researcher, and sometimes also a technology developer. Hans Nielsen works as a senior security consultant for Matasano, and Mike Baker develops firmware and is a co-founder ...
+ 0 -