Hacker Newsnew | past | comments | ask | show | jobs | submit | gudok's commentslogin

Huawei | Algorithm researcher, Huawei Cloud | Full Time | ONSITE (Moscow, Russia)

Here in Huawei Moscow Research Center we work on optimization problems that arise in all projects of our company. Our particular team is responsible for core Huawei Cloud (https://www.huaweicloud.com/intl/en-us/product/ecs.html) algorithms, such as optimal placement and migration of virtual machines over physical hosts, batch job scheduling, network flow/congestion control, load forecasting and so on. We have never-ending stream of NP-hard problems and use a variety of methods to deal with them: network/graph algorithms, LP solvers, evolutionary algorithms, and, of course, a lot of heuristics. We are researchers: we do not have bugtacker, scrum or devops.

Perfect candidate would be a veteran software engineer who feels overqualified to be a part of modern coding pipeline and instead would like to shift to more demanding disciplines, namely algorithms and applied math.

Minimal requirements are the following:

  * good knowledge of classical Cormen-style computer science
  * ability to solve math test in relaxed pace (it is not very hard, but still of university level)
  * diploma of one of the top local universities
  * motivation to work as a researcher (this is important!)
We also expect candidates to have one of the following:

  * proficiency in C++
  * experience with math. optimization methods
  * experience in building distributed systems
  * PhD diploma and/or publications
If you are interested, please contact me at gudkov.andrei@huawei.com. First step of hiring process is informal talk over the phone with me and other team members.

We can provide relocation from other areas of Russia and from majority of CIS countries.


How exactly encrypted DNS will reduce spying? ISPs will still be able to observe IP addresses users connect to and even particular host names in SSL handshakes.


Due to shared hosting you can't map every IP to a hostname, and encrypted SNI is a thing.


But the ISP can likely map most of the IPs to hostnames, as one would expect shared hosting to only be used for smaller sites.


I reviewed 1600 edits at StackOverflow. And I can say that some of the automatically generated questions are more intelligible than the average SO question. For example, this one looks fine to me: https://stackroboflow.com/#!/question/11235


It's so close to being intelligible, but I still can't quite parse it, like so many actual SO posts.


Likewise, I'm not sure I'd think anything was strange if I came across https://stackroboflow.com/#!/question/12110.


Maybe it is because major email services already do good enough job of filtering spam/phishing emails?

And yes, we already have DKIM.


(I am the author of this article, looks like someone posted it here before I got the chance)

If they were, phishing would be a thing of the past; but it's not. In addition it's a lot harder to filter out targeted spear phishing with spam filters.

Spam filtering is certainly useful – as are other measures such as the malicious website list that most browsers have – but it seems to me that adding extra guarantees such as signing would be a good thing?

DKIM is useful, but also limited. It just detects forgeries of From address and such. Ideally email signing should be like https: if it's not https then you shouldn't trust it. DKIM can perhaps fill this role; but the current implementations don't; they just add some score to the spam-check.


You are begging the question by assuming that a signature on an email message proves anything useful to the recipient when the facts on the ground show this not to be the case.

It is not harder to conduct phishing with email signatures, and the fact that such phishing campaigns have no problem putting TLS certs on their phishing sites is a simple existence proof of this fact.

Email signatures does not impact spam in any significant manner beyond existing measures to prevent domain name forgery in the header. Spam email signed by joe@cheap-ray-bans.com does not stop being spam because it is signed and the signature provides no useful signal to spam filtering tools.

The difference between an email signature and a TLS cert on a web site is that in the latter case the user is making an effort to connect to a specific site and the certificate ensures that they are in fact connecting to paypaaaaal.com even if other means were used to misdirect them to this site. With email there are two problems to be addressed, transport privacy/security (a sender problem) and unsolicited email (a recipient problem) and signatures are only useful in ensuring integrity of the former and do nothing for the latter.


Interaction between humans and AI is far from perfect. It seems that it would be easier for the people to adapt to AI rather than the opposite. I feel that someday every traffic participant (including pedestrians) will be required to carry tracking device. These devices will communicate together and prohibit or allow actions, e.g. making a turn or crossing a road. Eventually they will make traffic rules as we know today, obsolete. No traffic lights, no road signs and no crossings anymore. Every action will controlled by the device. And, of course, they will automatically report and fine law-breakers.

Is this the bright future of the humankind? Or is this a setting for a new dystopian book?


How much time would it take to synthesize 500K-lut design on a high-end workstation?


wait, we have an FPGA-based hardware module to accelerate synthetization!

(or even more ironic: an ASIC module)


Around 5 hours.


Does Elastic have a tradition of replying to applications by any chance?


Location: Moscow, Russia

Remote: yes

Willing to relocate: after at least 6 months of working together

Technologies: full-text search engines, DBMS internals, bigdata (C/C++/Linux, Java/Hadoop)

CV: https://gudok.xyz/cv/

Email: gudokk@gmail.com

---

I have 10+ years of experience and a lot of completed projects. Interested in hardcore in-house development and research (no "how to combine 32 third-party libraries together", please).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: