Before reading these tips you ought to read the documentation for Kotlin and to study the language on the website try.kotlinlang.org. Since these tips are directed to use Kotlin to develop for Android, you also must be experience with the Android SDK. It is also advisable to get acquainted with the Kotlin plugin and use Kotlin with Android Studio from JetBrains (the makers of Kotlin)
the Procedure of registration of SIM cards has not changed for over two decades. In comparison with other technologies forever. While some are seriously discussing the possibility of teleportation, while others trudge to the office of the operator or his partner, stand in line and lose almost half an hour on that slow employee scores in the accounting system, passport data. And then another hour waiting for a purchased SIM card is activated in the billing system, so that it could be called. The project GoldenSIM and ABBYY far from teleportation, but reduces the half-hour to one and a half minutes. Details under the cut
Hi, Habr! I continue to experiment with formats and offer to your attention a new edition of the grocery list. It doesn’t matter who you are, the most important is your interest in digital and a desire to learn a little more about product management. I will write a lot about it, but not only. The main news will be from various product sources and associations that I tell on my channel. Briefly go through the categories: best product, track development, the history of life. As a bonus, will tell, how did ProductFest and what is the mind’s doing my head now. Read more →
In our office was held a traditional meeting of the backend developer — Java meetup Jam.
Talk, how can I use Gradle plugins to optimize build infrastructure to automate the release cycle. Discussed the pros and cons of existing approaches to concurrency in distributed systems. And in the end raised the problem of automation of monitoring.
For those who wanted to attend the meetup, but couldn’t, as well as for everyone to learn the experience of Yandex.Money and expert Hazelcast, video of three reports under the cat.
In the previous text we are told about the most serious hacker attacks on IOT devices. But the brackets were no obvious solution to intruders directed not against the corporations and against ordinary people.
Analysts at Trend Micro say that the compromised IoT devices typically use: 1. for the organization of DDOS-attacks; 2. as a VPN node, through which hackers go online to harder to calculate. Read more →
A set of instructions for the SGX (Software Guard eXtensions) allows an application to create enclaves — region in the virtual address space is protected from read and write from outside the area by other processes, including the operating system kernel. Enclaves are isolated at the hardware and software levels: this memory is physically separated from the rest of the processor memory and is encrypted.
Attack Plundervolt (CVE-2019-11157) uses the OS interface to control voltage and frequency of the processor of Intel — the same interface that is used for overclocking CPU overclocking. Changing the CPU voltage, it extracts the data from the enclave, including encryption keys.
This article provides a simple explanation of how to work with async/await, with short code examples. If you have already used this method, it is unlikely that you will learn something new — approx. pens.
Promises (from the British Promise — the promise) is very similar to the promises of real life.
After the promise is made, we get the obligation to perform “something” in the future and can make any further plans based on this
As in real life, promises can be kept or broken
Promises are not ready, we can work with their results only after promises kept
Hello! From October to December held a series of conferences on artificial intelligence – AI Journey. Earlier in November, we summed up the international competition on creation of General or strong AI artificial general intelligence (AGI). I want to reassure you that we have not created a strong AI, but approached it using the robot college student test. Participants were asked to train their algorithms so that they could pass the final exam on the Russian language. In the end, the decision of the winners received the “Quartet”.
Under the cut, among others you will find the recordings of Jurgen Schmidhuber — author of on LISP; Anna Veronica Dorogush — the leader of the development of machine learning CatBoost; Ben Herzl, who coined the term robot college student test.