Cryptography of the Middle Ages: from alchemical ciphers to magic squares
Among the bright symbols of the Middle Ages are sorcerers, witches, and alchemists who "enchant and turn mercury into gold." Cryptography at this time also went hand…
Among the bright symbols of the Middle Ages are sorcerers, witches, and alchemists who "enchant and turn mercury into gold." Cryptography at this time also went hand…
Throughout 2024, we have witnessed a lot of high-profile hacks, leaks, failures, and just funny news from the world of information security. For the New Year, we traditionally…
Hello, tekkix! My name is Andrey Chernov, I am a Java architect at SberTech, where I develop the architecture of microservices. Now I will talk about the nuances of working…
New Year's holidays are a great time to rewatch movies or reread books about Harry Potter. Under the light of the Christmas tree garland, you can once again immerse yourself…
We are currently experiencing a revolutionary period when neural networks and AI are no longer something distant and alien, and are becoming more and more firmly established…
Hello, tekkix! My name is Natali Dubotolkova, I am a senior secure software development engineer at Basis. I want to talk about how we thought about integrating the work…
Hello, this is Elena Kuznetsova, an automation specialist at Sherpa Robotics. Today I have translated an article for you dedicated to security in the field of artificial…
Faces and names mentioned in this blog are real and used with their permission. Some details have been edited or hidden to protect the privacy of others.
Hello, my name is Egor and I am a Tech Lead at IdaProject :) I am engaged in strategy, processes, and teams in the direction of backend development.
For most developers, tests are the least favorite part of the job. Recently, we confirmed this by surveying more than 400 developers at the Joker and Heisenbug conferences…
Creating innovations quickly and flexibly can be done in a startup or a small company, but what if you are an industrial giant with more than 25 factories across the…
Hello everyone! The classic approach to authorization is when its control is placed inside a specific service in the form of static rules. That is, the role and rights…
There are tons of articles on the internet about how to blink an LED on esp8266. We propose to consider the same task, but on an alternative microcontroller - stm32.
Hello, tekkix! My name is Vladimir Krylov. I am a professor of mathematics, a scientific consultant at Artezio, and the author of the Ai4Dev Telegram channel. Our team…
At every technical conference lately, the word "agents" is sure to be mentioned. They are presented in different ways: as the next step after RAG, as a silver bullet…
For decades, backups have primarily protected us from physical equipment failure and accidental data corruption. A good backup system should survive a fire, a flood,…
There was already an interview on tekkix about Next Generation Firewall from Solar, which touched on the technical aspects of developing such solutions. There was also…