Deep dive into the basic architecture of LPU Groq
In this article, we are going to analyze the architecture of the Tensor Streaming Processor TSP and its compiler, and then see how Groq built a reliable and high-performance…
In this article, we are going to analyze the architecture of the Tensor Streaming Processor TSP and its compiler, and then see how Groq built a reliable and high-performance…
We used to expect that machines would replace us in simple mechanical work, but areas such as art would always remain with humans. Now this statement can already be disputed.…
In the modern internet, many face the question of how to bypass blocks and protect personal data. And, while VPN applications are well-known, solutions like Shadowsocks,…
Hello, readers! Anastasia Berezovskaya, an application development security engineer at Swordfish Security, is with you. Today we will once again talk about the features…
Hello everyone, my name is Arseniy, I am a Data Scientist at Raft, and today I will tell you about Visual Language Models.
Linux as a server OS is considered a guarantee of reliability and security, it is popular with companies and ordinary users. However, no system is completely impervious…
Frameworks simplify development, eliminate chaos, and set clear boundaries when creating an application.
Hello, tekkix! This is Viktor Sergeev from the MTS Digital special projects team. Well, six months have passed, and we got what we were promised — we waited for Fedora…
In my previous article, I mentioned the implementation of a device that was developed to facilitate the process of setting up sensors by the maintenance staff, and the…
The S7 V30 module was originally designed for controlling industrial controllers but can also be used autonomously. In this article, I will try to reveal its potential…
This article was born as a result of combining ideas from a laboratory work in preparation for the CCNA exam by Cisco, and the Network Protocols in Linux course, which…
Hello everyone, I recently started studying the USB protocol on the STM32F103C8, namely HID devices. I am a person who does not really like theory, but loves to learn…
You apply the key card to the reader, and the office door opens. But what if such a pass can be hacked and copied by anyone?
This is the fourth article in the guide to developing multiplayer games, where I try to consistently and in one place gather the knowledge that will be required for conscious…
In 2024, the logical programming language Prolog turned fifty years old! As a tribute, I would like to tell in a small historical essay about the scientific context of…
In the life of every HR, sooner or later, HE appears... Security professional! And how to approach hunting people for this position is usually unclear.
The article is based on a year and a half of work on implementing neural networks in an open-source web application. It contains practical life hacks for solving real…
Hello! My name is Alexander Ustyuzhanin, and I am a developer in the YandexART team. Recently, I visited Milan for one of the largest international conferences on computer…