ITKarma

Development

How to live and work with a psychiatric diagnosis. Part 2: practical issues

Carrie Fisher, known for the role of Princess Leia, has been fighting bipolar disorder all her life - she was not helped by medication, only by electroshock...

Why do you need a personal brand + manual for the lazy

Many people wrinkle their nose from the phrase "personal brand". Before their eyes immediately appears a picture of a merry empty-headed salesman who vparivaet himself all around without need. But this is not so...

“I quit my business and became a developer at 43”

The Internet is replete with fascinating stories about people who quit hired work for their own business. Sergey Parakhin, a developer from the EPAM Moscow office, has a different situation...

I enter IT or IT enters me

It was the usual gray St. Petersburg (rainy Moscow) evening, it was the n th day of self-isolation - the day on which I decided to change my profession, and therefore my life. But rewind a little back. . ...

Why monetizers do not have a soul, and toxic team members are the most effective

July 7, at 20:00 in our social networks will be a live broadcast with Vyacheslav Dreer. Glory monetizer, game designer and game producer with 12 years of experience. He worked in the gaming divisions of web mani, mail...

DevOps Starter Guide

What is the importance of DevOps, what does it mean for IT professionals, a description of methods, frameworks and tools. Much has happened since the term DevOps became entrenched in the IT world...

You were fired from work. Survival instruction

I am not hr and not a lawyer. I am an ordinary worker who has faced different situations and am learning to deal with them. I hope this text and my experience will help you...

My ten years in game dev

Hello! My name is Nico Tuason, I am an indie game developer from the Philippines. This year marks ten years from the moment I began my journey in game dev...

Without "Hello world!" and in IT?

Petrovich was an old experienced CTO - he still remembered punch cards, and the number of programming languages ​​that he knew was approximately equal to the number of languages ​​that had sunk into oblivion of natural selection i...

Calls do not solve any problems. They are needed only by people who cannot write code.

The very first working phoning in my life aroused complex feelings. On the one hand, it was pretty cool - I spoke with the Americans from Microsoft as an equal member of the team, they listened to me, and it raised my self-esteem...

Blockchain and standard databases. Is there any difference

This time I want to talk about what I see the differences between the blockchain and conventional database systems. Of course I don’t think that I found the answer, consider it my thoughts...

Podcast: “I like to investigate attacks on quantum key distribution systems”

This is the third release of our new podcast. Anton Kozubov, leader of the theoretical group laboratories of quantum processes and measurements of ITMO University. We discussed his work, projects and industry specifics...

Personal data, rights of PD subjects

We all use the phone, go to work or for interviews, use bank cards or just travel around the Internet. Often without even thinking about the fact that we leave a trace of personal data...

Bug bounty Ozon questions and answers

We launched a public bug bounty program on HackerOne - now you can get a reward for the vulnerabilities found on the Ozon website, and at the same time help the company, the service of which is used by friends, acquaintances and r...

Security Week 28: vulnerability in powerline extender

Don't you think that there has been less research on vulnerabilities in home routers? It does not seem to us, and recently poorly protected devices that transmit data via electrical wires have been added to routers...

Mobile device and application security: five popular attack scenarios and security methods

Image: Unsplash Modern mobile devices are very complex, and this gives attackers the ability to conduct attacks. Literally everything can be used to hack your smartphone - from Wi-Fi and Bluetooth to speaker and microphone...

5 stages of inevitability of adoption of ISO/IEC 27001 certification. Bargain

The third stage of emotional response to changes is bargaining. Having dealt with our anger and emotional component, we began to think about what really needs to be done to ensure that everything worked for us...

(Without) smart devices: top 10 OWASP IoT vulnerabilities

It is no secret that the implementation of security mechanisms for IoT devices is far from perfect. Known smart device vulnerability categories are well described in the Top IoT Vulnerabilities 2018...

IS outsourcing, internal security. Where to go to the customer

Today we decided to talk about whether companies are ready to outsource internal security. For many years it was believed that no. But the situation is changing...

Incident Response: What SOC owes you

You can know little about SOC, but it will still be intuitively clear that in his work two things are most important: identifying incidents and responding to them...