ITKarma

All flows

Review of the article Visual Transformers - a new approach to training computer vision models based on visual tokens

This work is interesting because the authors in it propose a new approach to training models in images - to use not only pixels and convolutions, but also present images in the form of visual tokens and train transformers on them...

Hydrodynamic modeling (CFD) on terrain with MantaFlow and visualization of results in ParaView

Discipline Computational fluid dynamics (CFD) or, in Russian, Computational fluid dynamics studies the behavior of various flows, including vortex ones...

Move an object evenly along a curve

In the process of developing a game in completely different genre categories, it may be necessary to "launch" any game object along a smooth curve at a constant or controlled speed, be it a truck moving from city A to city B, a mi...

Interview with the creators of the neural network Nikolai Ironov: how it works, what is the trick in general, and why everyone calls him Kolya

Hereinafter - screenshots from artlebedev. ru, unless otherwise specified Recently we met with the guys from the Art...

A small investigation into the Twitter hacker investigation (updated)

Everyone probably remembers how more than 50 large Twitter accounts (Musk, Gates, Obama, Apple, etc. ) were hacked about 2 weeks ago...

Russian state sites: an illusion of security

In 2016, we asked ourselves: how many federal government websites support HTTPS? We found out , are you ready? In fact - 2 (in words: two, Karl!) Sites out of 85. Formally - 32 supported, ie...

Algorithmizing music

It is believed that composing music is a creative activity where algorithms cannot be applied. Indeed, one can often hear from composers about muse, illumination and the golden ratio, but not about dry rules...

Habr Pro webcast # 4: UFO summoned them. How do new authors feel in our club

Hello! We continue to collect applications for our competition " TechnoText " and today decided to look at the topic of techno authorship not from those who have been writing for a long time and successfully, but from the side of ...

Building the architecture of the social environment

Introduction You are all a system that knows so much. You decide what is good and what is bad. Likewise, you decide what is funny and what is not...

How to Analyze the Photo Studio Market with Python (1/3). Data parsing

There is a huge amount of open data on the Internet. With the right collection and analysis of information, important business problems can be solved...

Consciousness and the brain

Consciousness is a reflection by the subject of reality, his activity, himself. It is generated not by nature, but by the person himself and the surrounding world, family, society...

About the role of a front-end developer

Hello, Habr! We present to your attention a translation of an article by MediaMonks front-end developer Ronald Mendes...

How JIT Compilers are Implemented

In this article, we'll talk about the implementation details and operation of various JIT compilers, as well as optimization strategies. We will discuss in sufficient detail, but we will omit many important concepts...

RIPE Atlas

Good day to all! I want to devote my debut article on habr to a very interesting topic - the RIPE Atlas Internet quality control system...

Track React application errors with Sentry

Today, I'm going to walk you through real-time error tracking in a React app. A frontend application is not typically used for bug tracking...

"Preparing for a QA Interview" starter pack or the biggest testing question and answer cheat sheet

163 pages of a mixture of answers to questions from real interviews, translation of interesting content from foreign resources and aggregation of material from domestic ones...

Dolls die for people

Article 2010 Until the early 1990s, progress in road safety was minimal. Despite the fact that interest in improving passenger protection has been high since this concept, the results were incredibly low...

What is an XSS vulnerability and how can a tester not miss it

In my observation, quite a lot of testers have ever heard such a thing as an XSS vulnerability. But few people can simply and fingerlessly tell at an interview about her. Or effectively check the website for this vulnerability...

You added only two lines. Why did it take two days?

At first glance, the question seems reasonable, but it makes some terrible assumptions: lines of code=force lines of code=value all lines of code are equal None of this is true...

Transparent testing processes on a remote site

We publish an article by Anastasia Sharikova - QA Lead in Bookmate and a teacher of the professional course "QA Lead" , with whose program we invite get to know you! We also invite you to a free trial open lesson “Beizer test cove...