BlogHide Resteemskrishtopa (67)in life • 7 years agoHow I spent a year, developing Blockchain projects, winning hackathons and dancing.Hi, guys. It’s been really long time. A lot of things changed and a lot of work was done. The whole year I did my best to develop in blockchain, working in blockchain team, creating the whole…resteemedcrypto.tickets (32)in blockchain • 7 years agoUp Close And Personal: An Interview With Crypto.Tickets’ Cofounder Katerina KirillovaAnother day, another ICO. But for the Crypto.Tickets team, it’s months of relentless planning (hopefully) coming to fruition. whatever happens next, for cofounder Katerina Kirillova , it’s…krishtopa (67)in programming • 8 years agoCode Optimization: MemoryMost programmers think that computing system is a processor which executes instructions and a memory that stores instructions and data for the processor. In this simple model, the memory is…krishtopa (67)in programming • 8 years agoBloom Filter for web developersIt is a data structure that allows you to verify belonging of an element to the set, without storing this element itself. There is a possibility of false-positive response, but a negative response…krishtopa (67)in science • 8 years agoThe algorithm of polynomials real roots calculationThe basic idea of this algorithm is very simple and can be described in two sentences. A real root of the polynomial can always be calculated on the area of monotonic variation of the polynomial…krishtopa (67)in popularscience • 8 years agoOptimization of transmission delayLow latency - an important factor that ensures reliable operation and high performance of networks. Applications for real-time communication and streaming are highly dependent on the waiting time.…krishtopa (67)in popularscience • 8 years agoQuantum communication: perspectivesTelegraph replaced pigeon mail. Radio replaced the telegraph. Radio, of course, will not disappear, but there are other data transmission technologies - wired and wireless. Generations of…krishtopa (67)in technology • 8 years agoPaaS, DBaaS, SaaS ... What does it mean?Over the past few years, a lot of new terms related to the telecommunications sector appeared in the English language. We often work with the terms that are connected with the "cloud" sphere. And if…krishtopa (67)in popularscience • 8 years agoHow your WhatsApp Messages are secured with end-to-end encryptionEnd-to-end encryption provides the highest level of protection for users who are seriously concerned about data privacy. For private data management you no longer have to rely on third-party…krishtopa (67)in security • 8 years agoRetroShare - a tool for private communication and data exchangeRetroshare - a cryptographically secure decentralized platform for anonymous communication and file sharing. The system allows you to organize separate server less Friend-to-Friend network or a…krishtopa (67)in popularscience • 8 years agoHave you ever heard about Data Mining methods?The rapid development of information technology, in particular, progress in methods of data collection, storage, and processing has allowed many organizations collect massive amounts of data that…krishtopa (67)in popularscience • 8 years agoThe easiest hacking method - Brute forceThe easiest hacking method - Brute force Brute force - one of the most popular methods of hacking passwords on servers and in various programs. Program-cracker tries to get access to a program…krishtopa (67)in popularscience • 8 years agoHow to recognize data on your credit cardRecognition of data from the credit card is a highly actual and very interesting task from the standpoint of algorithms. Well implemented card recognition software can save people from the need to…krishtopa (67)in popularscience • 8 years agoMonte Carlo simulation - the best risk analysing methodMonte Carlo method can be defined as a method for simulating random variables with the purpose of calculation the characteristics of their distributions. The Monte Carlo method have a…krishtopa (67)in popularscience • 8 years agoBig Data - modern and problematic method of data storage and analyzingDigital technologies are presented in all areas of human life. The amount of data recorded in the global warehouse is growing every second, which means that storage conditions and new opportunities…krishtopa (67)in popularscience • 8 years agoThe fastest sort method - FlashSortThere are numerous sorting methods, each of which has its advantages and disadvantages. Sorting algorithms are widely used in programming, but sometimes developers do not even think what algorithm…krishtopa (67)in popularscience • 8 years agoThe best way to analyze a huge amount of corporate data - Decision treeThe rapid development of information technology and progress in methods of data collection, storage, and processing has allowed many organizations collect massive amounts of data that must be…krishtopa (67)in popularscience • 8 years agoGreat image compression method - JPEGUsing of new classes of images is the main trend in recent years. Older algorithms no longer meet the requirements of archiving. Many of the images were not compressed, although they had obvious…krishtopa (67)in popularscience • 8 years agoDijkstra’s algorithm of finding optimal pathsOne of the common tasks of graph theory is the one in which you need to find the most optimal path between two points. It can be solved on the plane as the graph in which the vertices - cities - are…krishtopa (67)in popularscience • 8 years agoIP-telephony or global modern way of communicationIP-telephony - a modern technology of voice data transmission via the Internet. Previously, there were two separate systems: telephony and the Internet, which worked on various cable systems. If to…