krishtopa(25)•in #life•2954 days agoHow I spent a year, developing Blockchain projects, winning hackathons and dancing.Hi, guys. It’s been really long time. A lot of things changed and a lot of work was done. The whole year I did my best to develop in blockchain, working in bloc...4krishtopa(25)•in life•2954 days agoHow I spent a year, developing Blockchain projects, winning hackathons and dancing.Hi, guys. It’s been really long time. A lot of things changed and a lot of work was done. The whole year I did my best to develop in blockchain, working in bloc...4
crypto.tickets(25)•in #blockchain•3021 days agoUp Close And Personal: An Interview With Crypto.Tickets’ Cofounder Katerina KirillovaAnother day, another ICO. But for the Crypto.Tickets team, it’s months of relentless planning (hopefully) coming to fruition. whatever happens next, for cofound...8crypto.tickets(25)•in blockchain•3021 days agoUp Close And Personal: An Interview With Crypto.Tickets’ Cofounder Katerina KirillovaAnother day, another ICO. But for the Crypto.Tickets team, it’s months of relentless planning (hopefully) coming to fruition. whatever happens next, for cofound...8
krishtopa(25)•in #programming•3332 days agoCode Optimization: MemoryMost programmers think that computing system is a processor which executes instructions and a memory that stores instructions and data for the processor. In thi...9krishtopa(25)•in programming•3332 days agoCode Optimization: MemoryMost programmers think that computing system is a processor which executes instructions and a memory that stores instructions and data for the processor. In thi...9
krishtopa(25)•in #programming•3336 days agoBloom Filter for web developersIt is a data structure that allows you to verify belonging of an element to the set, without storing this element itself. There is a possibility of false-positi...1krishtopa(25)•in programming•3336 days agoBloom Filter for web developersIt is a data structure that allows you to verify belonging of an element to the set, without storing this element itself. There is a possibility of false-positi...1
krishtopa(25)•in #science•3337 days agoThe algorithm of polynomials real roots calculationThe basic idea of this algorithm is very simple and can be described in two sentences. A real root of the polynomial can always be calculated on the area of mon...2krishtopa(25)•in science•3337 days agoThe algorithm of polynomials real roots calculationThe basic idea of this algorithm is very simple and can be described in two sentences. A real root of the polynomial can always be calculated on the area of mon...2
krishtopa(25)•in #popularscience•3339 days agoOptimization of transmission delayLow latency - an important factor that ensures reliable operation and high performance of networks. Applications for real-time communication and streaming are h...1krishtopa(25)•in popularscience•3339 days agoOptimization of transmission delayLow latency - an important factor that ensures reliable operation and high performance of networks. Applications for real-time communication and streaming are h...1
krishtopa(25)•in #popularscience•3340 days agoQuantum communication: perspectivesTelegraph replaced pigeon mail. Radio replaced the telegraph. Radio, of course, will not disappear, but there are other data transmission technologies - wired a...2krishtopa(25)•in popularscience•3340 days agoQuantum communication: perspectivesTelegraph replaced pigeon mail. Radio replaced the telegraph. Radio, of course, will not disappear, but there are other data transmission technologies - wired a...2
krishtopa(25)•in #technology•3344 days agoPaaS, DBaaS, SaaS ... What does it mean?Over the past few years, a lot of new terms related to the telecommunications sector appeared in the English language. We often work with the terms that are con...2krishtopa(25)•in technology•3344 days agoPaaS, DBaaS, SaaS ... What does it mean?Over the past few years, a lot of new terms related to the telecommunications sector appeared in the English language. We often work with the terms that are con...2
krishtopa(25)•in #popularscience•3353 days agoHow your WhatsApp Messages are secured with end-to-end encryptionEnd-to-end encryption provides the highest level of protection for users who are seriously concerned about data privacy. For private data management you no long...1krishtopa(25)•in popularscience•3353 days agoHow your WhatsApp Messages are secured with end-to-end encryptionEnd-to-end encryption provides the highest level of protection for users who are seriously concerned about data privacy. For private data management you no long...1
krishtopa(25)•in #security•3353 days agoRetroShare - a tool for private communication and data exchangeRetroshare - a cryptographically secure decentralized platform for anonymous communication and file sharing. The system allows you to organize separate server l...4krishtopa(25)•in security•3353 days agoRetroShare - a tool for private communication and data exchangeRetroshare - a cryptographically secure decentralized platform for anonymous communication and file sharing. The system allows you to organize separate server l...4
krishtopa(25)•in #popularscience•3356 days agoHave you ever heard about Data Mining methods?The rapid development of information technology, in particular, progress in methods of data collection, storage, and processing has allowed many organizations c...2krishtopa(25)•in popularscience•3356 days agoHave you ever heard about Data Mining methods?The rapid development of information technology, in particular, progress in methods of data collection, storage, and processing has allowed many organizations c...2
krishtopa(25)•in #popularscience•3361 days agoThe easiest hacking method - Brute forceThe easiest hacking method - Brute force Brute force - one of the most popular methods of hacking passwords on servers and in various programs. Program-cracker ...5krishtopa(25)•in popularscience•3361 days agoThe easiest hacking method - Brute forceThe easiest hacking method - Brute force Brute force - one of the most popular methods of hacking passwords on servers and in various programs. Program-cracker ...5
krishtopa(25)•in #popularscience•3362 days agoHow to recognize data on your credit cardRecognition of data from the credit card is a highly actual and very interesting task from the standpoint of algorithms. Well implemented card recognition softw...3krishtopa(25)•in popularscience•3362 days agoHow to recognize data on your credit cardRecognition of data from the credit card is a highly actual and very interesting task from the standpoint of algorithms. Well implemented card recognition softw...3
krishtopa(25)•in #popularscience•3367 days agoMonte Carlo simulation - the best risk analysing methodMonte Carlo method can be defined as a method for simulating random variables with the purpose of calculation the characteristics of their distributions. The Mo...8krishtopa(25)•in popularscience•3367 days agoMonte Carlo simulation - the best risk analysing methodMonte Carlo method can be defined as a method for simulating random variables with the purpose of calculation the characteristics of their distributions. The Mo...8
krishtopa(25)•in #popularscience•3368 days agoBig Data - modern and problematic method of data storage and analyzingDigital technologies are presented in all areas of human life. The amount of data recorded in the global warehouse is growing every second, which means that sto...3krishtopa(25)•in popularscience•3368 days agoBig Data - modern and problematic method of data storage and analyzingDigital technologies are presented in all areas of human life. The amount of data recorded in the global warehouse is growing every second, which means that sto...3
krishtopa(25)•in #popularscience•3371 days agoThe fastest sort method - FlashSortThere are numerous sorting methods, each of which has its advantages and disadvantages. Sorting algorithms are widely used in programming, but sometimes develop...0krishtopa(25)•in popularscience•3371 days agoThe fastest sort method - FlashSortThere are numerous sorting methods, each of which has its advantages and disadvantages. Sorting algorithms are widely used in programming, but sometimes develop...0
krishtopa(25)•in #popularscience•3372 days agoThe best way to analyze a huge amount of corporate data - Decision treeThe rapid development of information technology and progress in methods of data collection, storage, and processing has allowed many organizations collect massi...9krishtopa(25)•in popularscience•3372 days agoThe best way to analyze a huge amount of corporate data - Decision treeThe rapid development of information technology and progress in methods of data collection, storage, and processing has allowed many organizations collect massi...9
krishtopa(25)•in #popularscience•3373 days agoGreat image compression method - JPEGUsing of new classes of images is the main trend in recent years. Older algorithms no longer meet the requirements of archiving. Many of the images were not com...2krishtopa(25)•in popularscience•3373 days agoGreat image compression method - JPEGUsing of new classes of images is the main trend in recent years. Older algorithms no longer meet the requirements of archiving. Many of the images were not com...2
krishtopa(25)•in #popularscience•3377 days agoDijkstra’s algorithm of finding optimal pathsOne of the common tasks of graph theory is the one in which you need to find the most optimal path between two points. It can be solved on the plane as the grap...5krishtopa(25)•in popularscience•3377 days agoDijkstra’s algorithm of finding optimal pathsOne of the common tasks of graph theory is the one in which you need to find the most optimal path between two points. It can be solved on the plane as the grap...5
krishtopa(25)•in #popularscience•3380 days agoIP-telephony or global modern way of communicationIP-telephony - a modern technology of voice data transmission via the Internet. Previously, there were two separate systems: telephony and the Internet, which w...0krishtopa(25)•in popularscience•3380 days agoIP-telephony or global modern way of communicationIP-telephony - a modern technology of voice data transmission via the Internet. Previously, there were two separate systems: telephony and the Internet, which w...0