Pull to refresh
214.58

Research and forecasts in IT *

Research, trends and forecasts in the IT field

Show first
Rating limit
Level of difficulty

Russian speaking IT presales and passing interviews to the West

Reading time 6 min
Views 1.1K

Russian speaking IT presales and passing interviews to the West

I'm Paul Karol an American and I've been living in Russia and working internationally with businesses for the last 10 years. My first client was a Gazprom high level director and we worked on international communication and connections with the West and China.

I am the keynote speaker in many events and also give companywide training for companies that interact with other countries. I have been working deeply with The IT community of Russia for 6 years. My job is to make them pass their project interviews. Also I work with the presales and make sure that the company gets the projects that they want.

I'm the expert on Russia, Chinese and the  Western cultural relations.

First: if your company is just beginning to approach the Western market including America you want to have success in the beginning. If you're successful at passing the first few presale meetings or project interviews your reputation will be established. If you fail a few interviews or presales then you start to develop a reputation.

@paulkarolgibrelstions4767
Total votes 4: ↑3 and ↓1 +2
Comments 4

Listicles — a simple technique for benchmarking your value proposition against alternatives

Level of difficulty Medium
Reading time 5 min
Views 625

I believe listicles have a huge potential for testing demand hypotheses. Have you tried using listicles for your demand validation? If so - let us know in the comments how this worked for you.

Do you know these "Top N something something" kind of articles? Like:
- 5 best GPS vehicle trackers
- The 14 hair growth products that actually work
- Top 10 Best CRM Software Tools in 2023
They are often referred to as "listicles" - articles presented in the form of a list.

I love them - they make picking a new phone, a movie to watch, an app to install much easier. I also use them at work all the time while looking for solutions to everyday challenges.

So what if we use one of them to benchmark our product against the best available alternatives?

Read more
Total votes 4: ↑4 and ↓0 +4
Comments 1

Utilitarian blockchain. 1. Assets

Reading time 8 min
Views 1.3K
image

In the modern world, the term " **blockchain** " is steadily associated with cryptocurrencies, NFTs, mining, trading and financial pyramids. However, even among programmers and IT people there is not always a clear understanding of what it is and what it is for.

This article attempts to look at this still relatively new element of the information and human space in practical and slightly philosophical aspects.

> **Disclaimer**: The article will use simple language to explain non-trivial concepts, so non-critical distortion of technical details is possible.
Read more →
Rating 0
Comments 0

How to detect a cyberattack and prevent money theft

Reading time 13 min
Views 1.8K

Money theft is one of the most important risks for any organization, regardless of its scope of activity. According to our data, 42% of cyberattacks on companies are committed to obtain direct financial benefits.  You can detect an attack at various stages—from network penetration to the moment when attackers start withdrawing money.  In this article, we will show how to detect an attack at each of its stages and minimize the risk, as well as analyze two common scenarios of such attacks: money theft manually using remote control programs and using special malware—a banking trojan.

Read more
Rating 0
Comments 0

Q1 2021 DDoS attacks and BGP incidents

Reading time 6 min
Views 1.6K

The year 2021 started on such a high note for Qrator Labs: on January 19, our company celebrated its 10th anniversary. Shortly after, in February, our network mitigated quite an impressive 750 Gbps DDoS attack based on old and well known DNS amplification. Furthermore, there is a constant flow of BGP incidents; some are becoming global routing anomalies. We started reporting in our newly made Twitter account for Qrator.Radar.

Nevertheless, with the first quarter of the year being over, we can take a closer look at DDoS attacks statistics and BGP incidents for January - March 2021.

Read more
Total votes 15: ↑15 and ↓0 +15
Comments 0

Top 7 Technology Trends to Look out for in 2021

Reading time 4 min
Views 3.4K

Technology is as adaptable and compatible as mankind; it finds its way through problems and situations. 2020 was one such package of uncertain events that forced businesses to adapt to digital transformation, even to an extent where many companies started to consider the remote work culture to be a beneficiary long-term model. Technological advancements like Hyper automation, AI Security, and Distributed cloud showed how any people-centric idea could rule the digital era. The past year clearly showed the boundless possibilities through which technology can survive or reinvent itself. With all those learnings let's deep-dive and focus on some of the top technology trends to watch out for in 2021.

Read more
Rating 0
Comments 3

Getting Better at Reading Academic Papers: a Brief Guide for Beginners (Part 2)

Reading time 3 min
Views 1.9K
«Nothing makes you feel stupid quite like reading a scientific journal article» — writes the TV presenter and molecular biologist Adam Ruben. In a way, he's right — many of us get lost in the often confusing language of peer-reviewed papers. But the situation does not have to be hopeless. A bit of effort on the readers' part can go a long way. We looked at the techniques actual scientists use to navigate academic content. And compiled them into this two-part guide (Part 1: Getting Better at Understanding Academic Papers).

Read more →
Total votes 7: ↑7 and ↓0 +7
Comments 0

Getting Better at Understanding Academic Papers: a Brief Guide for Beginners (Part 1)

Reading time 4 min
Views 6.2K
«Nothing makes you feel stupid quite like reading a scientific journal article» — writes the TV presenter and molecular biologist Adam Ruben. In a way, he's right — many of us get lost in the often confusing language of peer-reviewed papers. But the situation does not have to be hopeless. A bit of effort on the readers' part can go a long way. We looked at the techniques actual scientists use to navigate academic content.

And compiled them into this two-part guide (part 2).


Read more →
Total votes 5: ↑5 and ↓0 +5
Comments 0

Mind traps: how scientists fool themselves

Reading time 5 min
Views 2K
Even the most honest of scientists are regularly misled by their cognitive biases. They often go to great lengths to find proof for whatever seems logical, while dismissing evidence to the contrary.

Yet this issue is rarely discussed — because it remains an embarrassing subject.

Read more →
Total votes 5: ↑4 and ↓1 +3
Comments 2

Future economics for physicists

Reading time 7 min
Views 1.6K

Annotation. This article gives an analogy between the forces of nature and various types of money. A justification for the "money conservation laws" is made. Explanation of the IT-money phenomenon by analogy to physics laws is given, as well as gold and currency money. The transition from the gold and currency to the gold-currency-computing economy is considered. A reasonable assumption is made that the fourth type of money after gold, securities and IT money will be so-called "citation indices" or "ratings", which are similar in their properties to stock indices.


What is money?


This article is an attempt to understand what money is from the physics and econophysics points of view. Econophysics (economics and physics) is an interdisciplinary research field, applying theories and methods originally developed by physicists to solve problems in economics, usually those including uncertainty or stochastic processes, nonlinear dynamics and evolutionary games.

Read more →
Total votes 1: ↑0 and ↓1 -1
Comments 0

Estimation of VaR and ConVaR for the stock price of the Kazakhstani company

Reading time 8 min
Views 1.5K

The last decades the world economy regularly falls into this vortex of financial crises that have affected each country. It almost led to the collapse of the existing financial system, due to this fact, experts in mathematical and economic modelling have become to use methods for controlling the losses of the asset and portfolio in the financial world (Lechner, L. A., and Ovaert, T. C. (2010). There is an increasing trend towards mathematical modelling of an economic process to predict the market behaviour and an assessment of its sustainability (ibid). Having without necessary attention to control and assess properly threats, everybody understands that it is able to trigger tremendous cost in the development of the organisation or even go bankrupt.


Value at Risk (VaR) has eventually been a regular approach to catch the risk among institutions in the finance sector and its regulator (Engle, R., and Manganelli S., 2004). The model is originally applied to estimate the loss value in the investment portfolio within a given period of time as well as at a given probability of occurrence. Besides the fact of using VaR in the financial sector, there are a lot of examples of estimation of value at risk in different area such as anticipating the medical staff to develop the healthcare resource management Zinouri, N. (2016). Despite its applied primitiveness in a real experiment, the model consists of drawbacks in evaluation, (ibid).


The goal of the report is a description of the existing VaR model including one of its upgrade versions, namely, Conditional Value at Risk (CVaR). In the next section and section 3, the evaluation algorithm and testing of the model are explained. For a vivid illustration, the expected loss is estimated on the asset of one of the Kazakhstani company trading in the financial stock exchange market in a long time period. The final sections 4 and 5 discuss and demonstrate the findings of the research work.

Read more →
Total votes 13: ↑13 and ↓0 +13
Comments 0

Physical unclonable functions: protection for electronics against illegal copying

Reading time 7 min
Views 4.9K
Translation

Source: The online counterfeit economy: consumer electronics, a report made by CSC in 2017

Over the past 10 years, the number of fake goods in the world has doubled. This data has been published in the latest Year-End Intellectual Property Rights Review by the US Department of Homeland Security in 2016 (the most current year tracked). A lot of the counterfeiting comes from China (56%), Hong Kong (36%) and Singapore (2%). The manufacturers of original goods suffer serious losses, some of which occur on the electronics market.

Many modern products contain electronic components: clothes, shoes, watches, jewellery, cars.
Last year, direct losses from the illegal copying of consumer electronics and electronic components in the composition of other goods were about $0.5 trillion.

How to solve this problem?
Read more →
Total votes 14: ↑14 and ↓0 +14
Comments 0

Authors' contribution