How AI Assistants Are Changing the Game in Software Development — Using Cursor as an Example
Hello, tekkix!
Hello! Today we continue to implement encryption. In this article, we will look at the Magma cipher algorithm, which was developed and used in the USSR.
Hello, tekkix! I am Sasha Pimanov, a leading iOS developer at MTS Digital. Today I want to share a selection of open-source tools for both beginner and experienced developers.…
The anonymous Hidden Lake network is a unique and rather peculiar project in its field, as it is based on completely different methods and approaches to traffic anonymization…
Dmitry Rozhkov, manager of the Kubernetes services team and creator of the popular YouTube channel Senior Software Vlogger, shared his experience testing AI assistants…
In 2024, the logical programming language Prolog turned fifty years old! As a tribute, I would like to tell in a small historical essay about the scientific context of…
I will briefly introduce the age encryption tool. We will learn to encrypt both personal and corporate backups with one simple command, and then argue about why openssl…
We would like to share our experience in developing Visionatrix — an add-on to ComfyUI, which we are creating together, and what comes out of it
This is all we needed.
It has been more than a year since I wrote the article - Anonymous network in 200 lines of Go code. Reviewing it one autumn evening, I realized how terrible everything…
Disclaimer: the words used like "port", "hack" and "reverse" do not mean that the article is intended exclusively for geeks! I try to write so that it is understandable…
OpenAI's o1 series models are new large language models trained with reinforcement to perform complex reasoning. The o1 models think before answering and can create a…
In this article, I will tell you how SolriXML automates the processing of XML files, transforming complex data structures into user-friendly formats. When it comes to…