PinnedPublished inMachine Learning WorldTips for quick optimization of Linux servers for high loads1. Netfilter connection trackingJun 4, 2023Jun 4, 2023
PinnedPublished inMachine Learning WorldMotivation systemsToday we will talk about motivation systems, where I want to show few ways of developing such in your company and their pros/cons.Aug 1, 2021Aug 1, 2021
PinnedWriting Proof Of Work Blockchain full-node from scratchIn this article, I want to cover a simplified but working example of decentralized Blockchain based on Proof Of Work algorithm, some sort…May 23, 2021May 23, 2021
How to build ideal Government with AI, Blockchain, Distributed computingIn this article, I want to tell about ideal management of a state using 100% digitalization and automation of processesFeb 11, 20242Feb 11, 20242
Как создать идеальное Правительство с помощью ИИ, Блокчейна и Распределенных вычислений(English version)Feb 11, 20241Feb 11, 20241
Social Engineering. How Phishing works.Social engineering, or as it’s called in a cultured society, behavioral biology, is the most important tool of any hacker. It is often used…Feb 8, 2024Feb 8, 2024
Mastering AWS DynamoDB | Data & Schema modelingAre you ready to dive deep into the world of NoSQL databases? Dive in with us as we unpack the intricacies of Amazon Web Services’…Feb 8, 2024Feb 8, 2024
Madman TheoryToday, we’ll delve into politics through the lens of Game Theory. And we’ll discuss one of the quite strange, but at the same time, in…Feb 8, 2024Feb 8, 2024
Social Engineering. PhishingSocial engineering, or as it’s called in a cultured society, behavioral biology, is the most important tool of any hacker. It is often used…Feb 4, 2024Feb 4, 2024