ITPUB
ITPUB
May 30, 2022 · Fundamentals

What Ukraine’s War‑Time Apps Reveal About Digital Transformation and Its Future in China

The article explores the concept of digitalization, its benefits, real‑world wartime applications in Ukraine such as Air Alert and Diya, and parallels these innovations with China’s pandemic‑era tools and government mini‑programs, ultimately urging programmers to drive the next wave of digital transformation.

ChinaSoftware EngineeringUkraine
0 likes · 14 min read
What Ukraine’s War‑Time Apps Reveal About Digital Transformation and Its Future in China
21CTO
21CTO
Mar 7, 2022 · Information Security

How ICANN’s Neutral Stance Shapes the Russia‑Ukraine Cyber Conflict

Amid sanctions, Russia shifted all domestic sites to the .ru domain while Ukraine appealed to ICANN to sever Russia’s internet ties, prompting a neutral refusal, a surge of Anonymous‑led cyber attacks, DDoS assaults on the .ru TLD, and broader internet restrictions.

CybersecurityDDoSDomain Names
0 likes · 5 min read
How ICANN’s Neutral Stance Shapes the Russia‑Ukraine Cyber Conflict
Programmer DD
Programmer DD
Mar 6, 2022 · Fundamentals

What Do Russian and Ukrainian Developers Earn? 2023 Salary Insights

This article examines recent salary surveys for Russian and Ukrainian software developers, revealing average earnings, gender differences, experience and age impacts, as well as detailed compensation breakdowns by programming language and seniority across both countries.

IT marketRussiaUkraine
0 likes · 9 min read
What Do Russian and Ukrainian Developers Earn? 2023 Salary Insights
21CTO
21CTO
Sep 29, 2018 · Information Security

How Weak Default Passwords Exposed Ukraine’s Military Network

A Ukrainian journalist revealed that the armed forces' Dnipro system used default passwords like "admin" and "123456", allowing anyone to access critical network devices and potentially map and infiltrate the entire military network, highlighting severe information‑security risks.

Information SecurityNetwork VulnerabilityUkraine
0 likes · 4 min read
How Weak Default Passwords Exposed Ukraine’s Military Network