IT

Microsoft partners with Anthropic to create official C# SDK for Model Context Protocol

Microsoft is collaborating with Anthropic to create an official C# SDK for the Model Context Protocol (MCP). MCP has seen rapid adoption in the AI community, and this partnership aims to enhance the integration of AI models into C# applications. The SDK is being developed as an open-source project in the modelcontextprotocol GitHub organization, making […]The post Microsoft partners with Anthropic to create official C# SDK for Model Context Protocol appeared first on Microsoft for Developers.

Why F#?

If someone had told me a few months ago I’d be playing with .NET again after a 15+ years hiatus I probably would have laughed at this.1 Early on in my career I played with .NET and Java, and even though .NET had done some things better than Java (as it had the opportunity to learn from some early Java mistakes), I quickly settled on Java as it was a truly portable environment. I had some C# courses in the university and I wrote my bachelor’s thesis in C#. It was a rewrite of Arch Linux’s pacman, running on Mono. This was way back in 2007. ↩

Securing Developer Tools with Authentication Brokers

If you’ve used any applications that required connecting your personal Microsoft or Entra ID account, you’re probably familiar with the typical “authentication dance” – you see a browser window pop up, you enter your credentials, then you can close the browser, and the application is magically authenticated. The next application you launch does the same […]The post Securing Developer Tools with Authentication Brokers appeared first on Microsoft for Developers.

Updating my toolbox: Ghostty and Fish

Often when I’m setting up new computers I take a bit of time to evaluate my programming toolbox and make some (usually small) adjustments to it. In January I got myself a new mac mini M4 and for whatever reasons I got inspired to dive much deeper than usual. This time around I spent a lot of time playing with different terminals, editors (e.g. neovim and helix), shells, configuration managers (mostly chezmoi), etc.

OCaml’s Standard Library (Stdlib)

Every programming language comes with some “batteries” included - mostly in the form of its standard library. That’s typically all of the functionality that’s available out-of-the-box, without the need to install additional libraries. (although the definition varies from language to language) Usually standard libraries are pretty similar, but I think that OCaml’s a bit “weird” and slightly surprising in some regards, so I decided to write down a few thoughts on it and how to make the best of it.

Trading Addiction: How Millions of People Lose Years and Fortunes in the Markets

Tags: торговля, трейдинг, криптовалюты, биржа, акции, игромания, игровая зависимость A lot of people around me spend time trading on the stock market. Some trade crypto, some trade stocks, others trade currencies. Some call themselves investors, others call themselves traders. I often see random passersby in various cities and countries checking their trading terminals on their phones or laptops. And at night I sometimes write analytical or backtesting software—well, I did up until recently. All these people share a common faith and a set of misconceptions about the market. Read more

Hugging Face Tutorial: Unleashing the Power of AI and Machine Learning

Tags: hugging face, huggingface, huggingchat, llm, llm-модели, llm-приложения, transformers, how to, tutorial In this article, I'll take you through everything you need to know about Hugging Face—what it is, how to use it, and why it's a game-changer in the ever-evolving landscape of artificial intelligence. Whether you're a seasoned data scientist or an enthusiastic beginner eager to dive into AI, the insights shared here will equip you with the knowledge to Hugging Face's full potential. Read more

How to promote your Telegram channel, Telegram bot, and Telegram mini app: easy steps

Tags: telegram promotion, telegram channel, telegram bot, telegram mini app, telegram mini apps Lately, tons of new Telegram channels, bots, and mini-apps in English have been popping up. Just a year ago, this trend was barely starting — most English-speaking users couldn’t even tell the difference between a Telegram channel and a group.And now? They’re all in, growing their channels, bots, and mini-apps like crazy. Telegram is turning into a massive platform. Read more

What Are Resident Proxies and How Do They Work: A Detailed Guide for Beginners

Tags: residential proxy, proxy Often at work, I encounter services that provide offerings such as resident proxies. Yet, I have never delved deeply into the topic. I have always simply consumed the product “as is,” as some lazy authors like to say.I have a general understanding of how this type of service works at a layman’s level, and I became interested in exploring the topic more deeply and attempting to share the conclusions I reached through a deeper understanding of what resident proxies are. Let’s see what comes out of it. No recommendations here—just the subjective, evaluative opinion of yet another “specialist.”Proxy servers are intermediaries between your device and the internet, allowing you to hide your real IP address and alter the appearance of your connection. Think of it as a white camouflage coat in snowy weather, if we speak in very simplistic terms. Let’s start from that—options for camouflage. However, comparing with camouflage coats would be rather dull; instead, ...

The Future of PostgreSQL: How a 64-bit Transaction Counter Solves Scaling Issues

Tags: postgresql, postgres pro, postgres, xid For many years, the PostgreSQL community was skeptical about using this database management system (DBMS) for high-transaction environments. While PostgreSQL worked well for lab tests, mid-tier web applications, and smaller backend systems, it was believed that for heavy transactional loads, you’d need an expensive DBMS designed specifically for such purposes. As a result, PostgreSQL wasn’t particularly developed in that direction, leaving a range of issues unanswered.However, the reality has turned out differently. More and more of our clients are encountering problems that stem from this mindset. For example, in the global PostgreSQL community, it’s considered that 64 cores is the maximum size of a server where PostgreSQL can run effectively. But we’re now seeing that this is becoming a minimum typical configuration. One particular bottleneck that has emerged is the transaction counter, and this is a far more interesting issue. So, let’s...

Get Started with Gemini Code Assist in VS Code — Easy Tutorial

Tags: gemini ai, gemini, gemini code assist, github copilot alternative, copilot, vscode chat, vscode extension, vscode Have you ever heard of Gemini Code Assist? It’s an AI-powered coding assistant from Google that helps with writing, completing, and debugging code. The best part? It’s now free for individuals, freelancers, and students!In this article, I’ll show you how to set up and use Gemini Code Assist inside VS Code. Whether you’re new to coding or an experienced developer, this tool can save you time and make coding easier. Let’s get started! Read more

Anti-detect Browsers — How They Work, Which Anti-detect Browser to Choose, Personal Experience, and a Bit of Code

Tags: browser detection, fingerprint, fingerprinting, fingerprinting protection, anti detect browser, antidetect browser Anti-detect browsers emerged as a response to the spread of browser fingerprinting technologies – the covert identification of users based on a combination of their device’s parameters and environment. Modern websites, besides using cookies, track IP addresses, geolocation, and dozens of browser characteristics (such as Canvas, WebGL, the list of fonts, User-Agent, etc.) to distinguish and link visitors. As a result, even when in incognito mode or after changing one’s IP, a user can be detected by their “digital fingerprint” – a unique set of properties of their browser.In fact, when I first started my journey in these internet realms, my expertise in digital security was evolving—and continues to grow—and I eventually came to understand browser fingerprints. At first, I believed cookies—collected by those pesky search engines that tracked what I viewed—were to blam...

HTTP or SOCKS Proxy: Which One to Choose?A Dilettante’s Analysis of the Differences between HTTP(S) and SOCKS Proxies

Tags: http-proxy, socks proxy, socks5, socks 5 Proxy servers have long become an integral part of the modern network. They are used to enhance anonymity, bypass blocks, balance loads, and control traffic. However, not everyone understands that there is a fundamental difference between HTTP(S) proxies and SOCKS proxies. In this article, I will attempt to examine in detail the technical aspects of both types, review their advantages and limitations, and provide examples of configuration and usage – though this part is more of an elective (optional, if you will, but I really feel like including it). Read more

Equivalence Classes for QA from the Perspective of Mathematical Analysis

Tags: qa, qa testing, qa lead, qa managment, qa automation, qa mobile, qa strategy This article explores the concept of equivalence classes from the perspective of mathematical analysis and their application in QA testing. The author explains how properly defining equivalence classes helps optimize test design, reducing the number of test cases while maintaining thorough verification.Using the example of currency conversion from rubles to euros, the article demonstrates how to construct equivalence classes, verify their compliance with mathematical properties (reflexivity, symmetry, transitivity), and identify errors in data partitioning.This article is useful for QA engineers, developers, and analysts who want to gain a deeper understanding of logical testing principles and improve the efficiency of their test strategies. Read more

The myth of error-free programming

Tags: программирование There have been many discussions about which programming language is better in terms of security and correctness of source code (by "correctness and security" we mean the absence of various errors in the program that manifest themselves at the stage of its execution and lead to the issuance of an incorrect result or unexpected behavior). And some programming languages, such as SPARK or OCaml, were even specially developed to facilitate the proof of program correctness.Is it possible to write programs without errors at all? Read more →

What's New in Postgres Pro Enterprise 17: From Proxima to Intelligent Data Management

Tags: postgresql, postgres, databases, database optimization, query optimization, high performance, data security, data store Postgres Pro Enterprise 17 introduces major improvements in performance and scalability. The key feature of this new release is the proxima extension, which combines connection pooling, proxying, and load balancing within the database core. Developers also gain improved tools for managing message queues, optimizing queries, enhancing security, and utilizing smart data storage. Want to know how these and other features can impact your applications and simplify database administration?This article provides a brief overview of the release, accompanied by the links to more detailed information. Read more

HuggingChat from Hugging Face: A Free ChatGPT Alternative

Tags: artificial intelligence, huggingface, huggingchat, hugging face, chatgpt, chatgpt alternative Are you looking for a free alternative to ChatGPT? If so, you’re in the right place! In this article, I will introduce you to HuggingChat, an open-source AI chatbot from Hugging Face. Unlike other AI models like ChatGPT or Gemini, HuggingChat runs on various open-source models that you can explore, modify, and even fine-tune according to your needs. Let’s dive in! Read more

How to make a valuable UX Designer portfolio: 5 components to add, 5 mistakes to avoid

Tags: ux, designer, portfolio, career, portfolio ux Portfolio is one of the most important things a UX designer should have - it plays a defining role during the job application process. In professional circles it is even called a designer’s “calling card”. Portfolio is not just a collection of your work - it’s your way to present yourself, your problem-solving skills and your talent. No matter whether you’re a freelance designer who posts their portfolio online to attract clients, or if you prepare a portfolio for the HR team at a job interview, you should try to make it look both serious and interesting, while not overloading it with too much information. In this article we’ve collected a list of components that a good portfolio should contain and mistakes that should be avoided when compiling it - let’s discuss them. Read more

What the different between Residential Proxy, Mobile Proxy and Datacenter Proxies? A Dilettante’s Perspective

Tags: proxy, residential proxy, datacenter proxy, mobile proxy The topic of proxies has always been approached (at least, that’s how the publications I encountered did) from the standpoint of complex terminology, which often remains unclear to the layman—someone not particularly versed in these internet matters. I decided to delve into the issue, and here is what I came up with: Read more

PostgreSQL 18: Part 2 or CommitFest 2024-09

Tags: sql, postgresql, postgres, 18, commitfest Statistically, September CommitFests feature the fewest commits. Apparently, the version 18 CommitFest is an outlier. There are many accepted patches and many interesting new features to talk about.If you missed the July CommitFest, get up to speed here: 2024-07. Read more →

Naive Bayes Regression Using C# -- Visual Studio Magazine

Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the naive Bayes regression technique, where the goal is to predict a single numeric value. Compared to other machine learning regression techniques, naive Bayes regression is usually less accurate, but is simple, easy to implement and customize, works on both large and small datasets, is highly interpretable, and doesn't require tuning any hyperparameters.

How to bypass hCaptcha in Modern Times: Has Mavr Left and Been Replaced by a New One? Let's check «new» hcaptcha solver

Tags: hcaptcha, bypass captcha, hcaptcha bypass, hcaptcha solver If you are into automation and keep up with trends, you’ve probably noticed that, at some point, difficulties in hCaptcha bypass began to emerge. What kind of difficulties? Several major captcha recognition services, such as 2captcha, have removed any mention of how to bypass hCaptcha from their documentation, and the presence of thematic tweets on Twitter (along with official responses from the service) confirms my suspicion that something has happened… Let’s figure out what happened, why 2captcha no longer bypass hCaptcha, and what role solvecaptcha plays in creating new hCaptcha solver. Read more

Subscribe to our newsletter

Subscribe to our newsletter and never miss new stories and promotions.