Source: https://habr.com/ru/post/35439/More articles:Why and how to conduct backlog grooming in grocery teams?Books on design systemsMade an attack on MyEtherWallet, through the interception of Amazon DNS service using BGPGDPR as a weapon of mass destructionBackend optimization when switching to api-based architectureUbuntu 18.04 LTS: what's new?Solar JSOC Forensics: mining case on 32 non-existent hypervisorsHow to improve performance using serverless architectureOpen source and mentoring: writing code that saves livesrholang - programming language for distributed systemsAll Articles