
If your code has many nested executions of stored procedures, you can benefit from building popular "flame diagram" of the execution time which is de facto standard for performance profiling.
If your code has many nested executions of stored procedures, you can benefit from building popular "flame diagram" of the execution time which is de facto standard for performance profiling.
Storing all your data in one place might seem convenient, but it’s often impractical. High costs, database scalability limits, and complex administration create major hurdles. That’s why smart businesses rely on Information Lifecycle Management (ILM) — a structured approach that automates data management based on policies and best practices.
With Postgres Pro Enterprise 17, ILM is now easier than ever, thanks to the pgpro_ilm extension. This tool enables seamless data tiering, much like Oracle's ILM functionality. Let’s dive into the challenges of managing large databases, how ILM solves them, and how you can implement it in Postgres Pro Enterprise 17.
Check Yourself:
– Does your mindset hold you back?
– Do you try to look smarter than you are?
– Do you avoid difficult tasks to not seem "incompetent"?
– Do you believe success is all about talent, not effort?
– Do you think working harder means you're less talented?
If you said yes to these,
Hey everyone! I'm super excited to share something cool I've been playing around with: Google AI Studio. It's like a playground where you can build stuff with Google's AI models. So, if you're curious and want to dip your toes into the world of AI, follow along! I'll show you the basics.
Author: Sergey Lukyanchikov, C-NLTX/Open-Source
Disclaimer: The views expressed in this document reflect the author's subjective perspective on the current and potential capabilities of jBPM.
This text presents jBPM as a platform for orchestrating external AI-centric environments, such as Python, used for designing and running AI solutions. We will provide an overview of jBPM’s most relevant functionalities for AI orchestration and walk you through a practical example that demonstrates its effectiveness as an AI orchestration platform:
We developed very fast scientific graphics using matplotlib and python >>source at my x.com/twitter
How did engineers in the past manage to measure electrical power without modern microchips and DSPs? This article explores the Energomera CE6806P, a device created in 2006 for verifying electricity meters, yet built using 1980s-era technology.
We’ll take a closer look at its design, principles of operation, and how discrete-analog solutions were used to achieve high accuracy. The Energomera is a fascinating example of engineering and ingenuity, giving us a unique perspective on the evolution of electrical measurement devices.
While pg_probackup 3 is still in the works and not yet available to the public, let’s dive into what’s new under the hood. There’s a lot to unpack — from a completely reimagined application architecture to long-awaited features and seamless integration with other tools.
A lot of people around me spend time trading on the stock market. Some trade crypto, some trade stocks, others trade currencies. Some call themselves investors, others call themselves traders. I often see random passersby in various cities and countries checking their trading terminals on their phones or laptops. And at night I sometimes write analytical or backtesting software—well, I did up until recently. All these people share a common faith and a set of misconceptions about the market.
In this article, I'll take you through everything you need to know about Hugging Face—what it is, how to use it, and why it's a game-changer in the ever-evolving landscape of artificial intelligence. Whether you're a seasoned data scientist or an enthusiastic beginner eager to dive into AI, the insights shared here will equip you with the knowledge to Hugging Face's full potential.
Lately, tons of new Telegram channels, bots, and mini-apps in English have been popping up. Just a year ago, this trend was barely starting — most English-speaking users couldn’t even tell the difference between a Telegram channel and a group.
And now? They’re all in, growing their channels, bots, and mini-apps like crazy. Telegram is turning into a massive platform.
Confusion with Reddit
I've had a Reddit account since 2016. I only read and posted in the Python forum (1 million subscribers!). Yesterday, I unexpectedly received a shadow ban. This means that my comments and posts are invisible to others. Essentially, it's read-only.
I created several new accounts from different IPs and devices. It turned out that email verification is no longer required. This process takes 15 seconds. On some accounts, I verified the email, but it didn't help. Here's an example of a newly created account without email verification, and it's still active because nothing has been done on it: https://www.reddit.com/user/No-Half8140/
If you have the ability to receive a verification code via email like dff35fghf@hfhlltgf.com, you'll automatically get a free PRO version of the account, which includes advanced statistics and other perks. However, the account remains in a "pre-ban" state.
Upon testing, I found that all new accounts are in this "pre-ban" state. This means you can change your avatar, read, vote, and the accounts are visible when logged out or from a private browser window.
However, attempting to post on your own wall (which automatically appears upon registration), write any comment in any discussion thread (even in /askReddit and /NewToReddit), create a post in any group, invite someone as a moderator to your wall, or follow someone without karma results in an instant shadow ban. The account becomes invisible from a private window and logged-out devices, the avatar turns red, and it cannot be changed.
The symptoms are the same for all IPs and languages (English, Polish, Russian). ChatGPT says that this is how it is now, and a ban is very likely. However, I see some activity in groups about Moscow and St. Petersburg, which means people somehow manage to pass this test... But how?
AI Reddit is going wild!
Often at work, I encounter services that provide offerings such as resident proxies. Yet, I have never delved deeply into the topic. I have always simply consumed the product “as is,” as some lazy authors like to say.
I have a general understanding of how this type of service works at a layman’s level, and I became interested in exploring the topic more deeply and attempting to share the conclusions I reached through a deeper understanding of what resident proxies are. Let’s see what comes out of it. No recommendations here—just the subjective, evaluative opinion of yet another “specialist.”
Proxy servers are intermediaries between your device and the internet, allowing you to hide your real IP address and alter the appearance of your connection. Think of it as a white camouflage coat in snowy weather, if we speak in very simplistic terms. Let’s start from that—options for camouflage. However, comparing with camouflage coats would be rather dull; instead, let’s recall animals and insects that use camouflage and try to draw a parallel. In fact, I’ve already done so.
Add animated own logo to your Matplotlib scientific graphics for branding purposes
For many years, the PostgreSQL community was skeptical about using this database management system (DBMS) for high-transaction environments. While PostgreSQL worked well for lab tests, mid-tier web applications, and smaller backend systems, it was believed that for heavy transactional loads, you’d need an expensive DBMS designed specifically for such purposes. As a result, PostgreSQL wasn’t particularly developed in that direction, leaving a range of issues unanswered.
However, the reality has turned out differently. More and more of our clients are encountering problems that stem from this mindset. For example, in the global PostgreSQL community, it’s considered that 64 cores is the maximum size of a server where PostgreSQL can run effectively. But we’re now seeing that this is becoming a minimum typical configuration. One particular bottleneck that has emerged is the transaction counter, and this is a far more interesting issue. So, let’s dive into what the problem is, how we solved it, and what the international community thinks about it.
Have you ever heard of Gemini Code Assist? It’s an AI-powered coding assistant from Google that helps with writing, completing, and debugging code. The best part? It’s now free for individuals, freelancers, and students!
In this article, I’ll show you how to set up and use Gemini Code Assist inside VS Code. Whether you’re new to coding or an experienced developer, this tool can save you time and make coding easier. Let’s get started!
Obsidian vault
Собрал своё платное хранилище для Obsidian и записал к нему объёмную видеоинструкцию (≈12 часов).
Хранилище объединяет в себе:
Базу знаний
Проектную систему
Систему управления делами
Систему контактов
Периодические заметки
Видеоинструкция направлена то, чтобы наглядно объяснить работу основных механик хранилища, а также чтобы раскрыть разные аспекты рабочего процесса.
Работа с системой будет рассмотрена в следующих контекстах (возможно позже я рассмотрю другие контексты):
Абитуриент/первокурсник биоинформатик (чтение и заметки)
Начинающий программист, готовящийся к стажировке и программист в корпорации (проектная система)
Инди-программист (структура хранилища)
Сравнительная таблица моих материалов на Habr и видеоинструкции:
Можно сказать, что видео будет расширять и конкретизировать материал, который был написан мною на Habr. Также хочу отметить, что в видеоинструкции сделан оооочень большой упор на процесс чтения и добычу заметок.
Более подробное описание хранилища. Можете также посмотреть открытое обсуждение данного хранилища и инструкции.
Anti-detect browsers emerged as a response to the spread of browser fingerprinting technologies – the covert identification of users based on a combination of their device’s parameters and environment. Modern websites, besides using cookies, track IP addresses, geolocation, and dozens of browser characteristics (such as Canvas, WebGL, the list of fonts, User-Agent, etc.) to distinguish and link visitors. As a result, even when in incognito mode or after changing one’s IP, a user can be detected by their “digital fingerprint” – a unique set of properties of their browser.
In fact, when I first started my journey in these internet realms, my expertise in digital security was evolving—and continues to grow—and I eventually came to understand browser fingerprints. At first, I believed cookies—collected by those pesky search engines that tracked what I viewed—were to blame, then I learned about browser fingerprints and long denied that I needed to learn to work with and understand them. Really, just when you finally figure out proxies, learn how to change and preserve cookies, here comes a new twist. Moreover, it turns out that fingerprints are also sold, and the price is not exactly low. In short, money is made on everything! But that’s beside the point now!
An anti-detect browser is a modified browser (often based on Chromium or Firefox) that substitutes or masks these properties (fingerprints), preventing websites from unequivocally identifying the user and detecting multi-accounting.
Proxy servers have long become an integral part of the modern network. They are used to enhance anonymity, bypass blocks, balance loads, and control traffic. However, not everyone understands that there is a fundamental difference between HTTP(S) proxies and SOCKS proxies. In this article, I will attempt to examine in detail the technical aspects of both types, review their advantages and limitations, and provide examples of configuration and usage – though this part is more of an elective (optional, if you will, but I really feel like including it).
EMACS 30.1 вышел 24 февраля и вчера добрался до Андроид. Двумя способами - как пакет Termux и как загрузка с F-Droid. Не с play Store наверно из-за JIT.
Это же великий EMACS, так что это точно инфоповод к посту.
Но есть вопрос к знатокам - зачем EMACS на Андроид права на ВСЁ? Есть предположение: если EMACS есть операционная система по случаю редактирующая текст, то тогда ему нужны права на всё, что только может вознамериться делать любое его расширение, то есть просто на всё, но от этого менее страшно не становится.
Права с F-Droid:
android.permission.ACCEPT_HANDOVER
Allows the app to continue a call which was started in another app.
android.permission.ACCESS_ADSERVICES_AD_ID
android.permission.ACCESS_ADSERVICES_ATTRIBUTION
android.permission.ACCESS_ADSERVICES_CUSTOM_AUDIENCE
android.permission.ACCESS_ADSERVICES_TOPICS
access location in the background
This app can access location at any time, even while the app is not in use.
access approximate location only in the foreground
This app can get your approximate location from location services while the app is in use. Location services for your device must be turned on for the app to get location.
access precise location only in the foreground
This app can get your precise location from location services while the app is in use. Location services for your device must be turned on for the app to get location. This may increase battery usage.
access extra location provider commands
Allows the app to access extra location provider commands. This may allow the app to interfere with the operation of the GPS or other location sources.
read locations from your media collection
Allows the app to read locations from your media collection.
view network connections
Allows the app to view information about network connections such as which networks exist and are connected.
android.permission.ACCESS_NOTIFICATIONS
access Do Not Disturb
Allows the app to read and write Do Not Disturb configuration.
view Wi-Fi connections
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
recognize physical activity
This app can recognize your physical activity.
answer phone calls
Allows the app to answer an incoming phone call.
android.permission.AUTHENTICATE_ACCOUNTS
pair with Bluetooth devices
Allows the app to view the configuration of the Bluetooth on the phone, and to make and accept connections with paired devices.
access Bluetooth settings
Allows the app to configure the local Bluetooth phone, and to discover and pair with remote devices.
advertise to nearby Bluetooth devices
Allows the app to advertise to nearby Bluetooth devices
connect to paired Bluetooth devices
Allows the app to connect to paired Bluetooth devices
discover and pair nearby Bluetooth devices
Allows the app to discover and pair nearby Bluetooth devices
access body sensors (like heart rate monitors)
Allows the app to access data from sensors that monitor your physical condition, such as your heart rate.
Access body sensor data, like heart rate, while in the background
Allows the app to access body sensor data, such as heart rate, temperature, and blood oxygen percentage, while the app is in the background.
send sticky broadcast
Allows the app to send sticky broadcasts, which remain after the broadcast ends. Excessive use may make the phone slow or unstable by causing it to use too much memory.
directly call phone numbers
Allows the app to call phone numbers without your intervention. This may result in unexpected charges or calls. Note that this doesn't allow the app to call emergency numbers. Malicious apps may cost you money by making calls without your confirmation.
take pictures and videos
This app can take pictures and record videos using the camera while the app is in use.
android.permission.CAPTURE_CONSENTLESS_BUGREPORT_ON_USERDEBUG_BUILD
change network connectivity
Allows the app to change the state of network connectivity.
И ещё много-много всего что не лезет в формат поста.