Pull to refresh
75.05

IT Standards *

Standards in Information Technology

Show first
Period
Level of difficulty

Eliminating opportunities for traffic hijacking

Reading time8 min
Views4.1K

Beautiful scheme for BGP connection to Qrator filtering network

A little historical overview


  • BGP hijacks — when an ISP originates an advertisement of address space that does not belong to it;
  • BGP route leaks — when an ISP advertises prefixes received from one provider or peer to another provider or peer.

This week it has been 11 years since the memorable YouTube BGP incident, provoked by the global propagation of a more specific prefix announce, originated by the Pakistan Telecom, leading to an almost 2 hour in duration traffic disruption in the form of redirecting traffic from legitimate path to the bogus one. We could guess if that event was intentional, and even a correct answer wouldn’t help us completely prevent such incidents from happening today. While you read this, a route leak or a hijack is spreading over the networks. Why? Because BGP is not easy, and configuring a correct and secure setup is even harder (yet).

In these eleven years, BGP hijacking became quite damaging attack vector due to the BGP emplacement in the architecture of modern internet. Thanks to BGP, routers not only acquire peer information, and therefore all the Internet routes — they are able of calculating the best path for traffic to its destination through many intermediate (transit) networks, each representing an individual AS. A single AS is just a group of IPv4 and/or IPv6 networks operating under a single external routing policy.
Read more →
Total votes 18: ↑18 and ↓0+18
Comments0

Physical unclonable functions: protection for electronics against illegal copying

Reading time7 min
Views5K

Source: The online counterfeit economy: consumer electronics, a report made by CSC in 2017

Over the past 10 years, the number of fake goods in the world has doubled. This data has been published in the latest Year-End Intellectual Property Rights Review by the US Department of Homeland Security in 2016 (the most current year tracked). A lot of the counterfeiting comes from China (56%), Hong Kong (36%) and Singapore (2%). The manufacturers of original goods suffer serious losses, some of which occur on the electronics market.

Many modern products contain electronic components: clothes, shoes, watches, jewellery, cars.
Last year, direct losses from the illegal copying of consumer electronics and electronic components in the composition of other goods were about $0.5 trillion.

How to solve this problem?
Read more →
Total votes 14: ↑14 and ↓0+14
Comments0

Flightradar24 — how does it work? Part 2, ADS-B protocol

Reading time9 min
Views7.3K
I’m going to have a guess and say that everyone whose friends or family have ever flown on a plane, have used Flightradar24 — a free and convenient service for tracking flights in real time.

image

In the first part the basic ideas of operation were described. Now let's go further and figure out, what data is exactly transmitting and receiving between the aircraft and a ground station. We'll also decode this data using Python.
Read more →
Total votes 12: ↑12 and ↓0+12
Comments0

Quintet instead of Byte — data storage and retrieval approach

Reading time13 min
Views1.6K
Quintet is a way to present atomic pieces of data indicating their role in the business area. Quintets can describe any item, while each of them contains complete information about itself and its relations to other quintets. Such description does not depend on the platform used. Its objective is to simplify the storage of data and to improve the visibility of their presentation.



We will discuss an approach to storing and processing information and share some thoughts on creating a development platform in this new paradigm. What for? To develop faster and in shorter iterations: sketch your project, make sure it is what you thought of, refine it, and then keep refining the result.

The quintet has properties: type, value, parent, and order among the peers. Thus, there are 5 components including the identifier. This is the simplest universal form to record information, a new standard that could potentially fit any programming demands. Quintets are stored in the file system of the unified structure, in a continuous homogeneous indexed bulk of data. The quintet data model — a data model that describes any data structure as a single interconnected list of basic types and terms based on them (metadata), as well as instances of objects stored according to this metadata (data).
Read more →
Total votes 8: ↑8 and ↓0+8
Comments2

Telegram bot provides time-based currency

Reading time2 min
Views7.7K

Many of us spend time in specialized telegram groups. The power over communication here belongs to random people with their own shortcomings. Conflict and abuse occurs regularly. Is there another way to keep order so that scam spam doesn't flourish and no one has total control over group members?

In my case, these thoughts led to the development and testing of a system that can be connected to your Telegram today.

How it works?
Total votes 6: ↑5 and ↓1+4
Comments5

Why I need RSS 3.0

Level of difficultyEasy
Reading time6 min
Views904

In the past 5 years, I moved across 3 countries and 2 continents. It was not a short tourist travel or vacation, but a full immigrant experience with 1+ year experience minimum. I had to adapt to new cultures, new languages, new people, new food, new weather, new everything. One of the pains was to adopt new online services and information sources.

The problems I have faced were not obvious and interesting at the same time. I tried to analyze what was missing and required to make life easier.

Read more
Total votes 2: ↑2 and ↓0+2
Comments1

Dealing with sanctions and the other difficult question

Reading time3 min
Views930

In our last article we covered the anatomy of a presale meeting gone wrong. In that article we posed some questions for everyone to think about. What exactly does an American company wanting to hire a Russian custom software development company, feel about this Russian company? What are they afraid of? What are their concerns?

In the end we came up with five concerns.

1. Is the company a fly by night company, is the company a one-day company?

2. Will they be professional in supporting or developing the software that they've sold to us?

3. Will they have proper data security?

And now the two new ones that are because of the mess the world is in now...

4. Will they be able to complete the project on time? This includes proper internet access an infrastructure to support IT.

5. Where is your team located? Are you still located in Russia?

Now we're going to look at the last 2, number four and five.
However let's look at number 5 first.

Many IT companies today if they want to work with the United States or even Europe they must not have their developers located inside of Russia. Matter of fact it goes so far that if a developer is located in Russia and they're using a VPN and somehow the VPN is breached the credentials are canceled for that developer to work on the project.

It's for this reason that Russian IT companies are opening offices around the world. Let's look at Armenia as an example.

Wait a minute I have to go back for a second...... We must discuss how countries look to America Canada and Western Europe. I basically give them a score based on questions that are brought up in the mind of the American company or European company.

Read more
Total votes 6: ↑4 and ↓2+2
Comments2

RSS with types

Level of difficultyMedium
Reading time5 min
Views423

RSS 2.0 specification was published in 2009 and hasn't moved from that point. The popularity and website adoption of this standard are dropping. People stop using it as it can't compete with social networks owned by big companies, and publishers stop using it is not rewarding. Let's review, analyze, and suggest a possible alternative to RSS. We will go from a concept to a working prototype.

Read more
Total votes 1: ↑1 and ↓0+1
Comments0

Million Dollar IT Sale…..Lost

Reading time2 min
Views934

Lose Your Sale) How to lose an IT project sale. 

My name is Paul Karol and I work as a director in a Russian IT company that mostly sells their products into the American Market. What we will discuss today was so costly for that company that I want to share this knowledge so that it doesn't happen to other Russian IT companies. 

Case Study

Today I want to tell you about a sale that almost was. I was Consulting for this one company and they were involved in selling software to the United States. This one particular client was in contact with the sales manager for 2 months.

Now this sales manager was very good at their job and they had a lot of charisma on the phone and in the text messages. However they specifically did not know something that cost them a large contract. 

1. In Russia it's respectful not to talk about your personal life because you feel that you're wasting someone's time if you do not know them well. 

2. In the United States once you have been talking with somebody for a couple of months you would start to consider them sort of a friend. 

The Russian IT sales manager had not been in contact with this client for about a week and this was unusual. 

They were worried. 

Then the text message came that said this. 

"I'm sorry Marina that I have not been in contact with you for some time. I took my family and kids to the Lakeside and we enjoyed some time by the beach." 

The Russian IT sales manager did not know how to think about this and they asked this question. 

" So, do you want to buy our product?" 

Read more
Total votes 3: ↑2 and ↓1+1
Comments2

Your Name: Why it’s Important in American Sales and Marketing

Reading time2 min
Views819

This is one of the most important articles I’ve written. 

In this article, I’m going to dive deep into one of the largest differences between Russia and America pertaining to sales and marketing. 

1. You must use your name. 

2. You must have a personal approach. 

3. You must show that you are involved. 

4. You must show that you care about the needs and desires of the client. 

Recently, I was faced with an interesting problem. I was asked to call clients without making it personal. 

So let’s go back to when I was in America, living and working as a sales person. The company I work for, was very large, and had multiple branches around the Washington DC area. They had offices in three states. 

They put me through a sales training course. 

The biggest “take away” from the course….. 

You’re not selling the product/ 

you’re selling yourself. 

It's important to use your charisma and your genuine caring for the customer to win them over. Once they understand that you're actually trying to help them, then they will seriously consider the item you are telling them about. 

I also want to say, very clearly, that it's not a prideful approach. It should be a professional approach. You're responsible to tell the customer/ the client all the benefits of the item and how this item will help their business.

Everything above pertains to sales in America. So if you are approaching America as a sales manager this is how you should craft your approach. 

Now I've spoken to my colleague,

Kristina Pashnina and we have agreed upon some stark differences to the Russian sales climate. Here she will begin to tell you how the Russians see sales. 

Read more
Total votes 1: ↑1 and ↓0+1
Comments4

Building an IT website, aimed at America and the West

Reading time3 min
Views869

My last article stirred up some definite comments and even questions about different things in business. I’m going to keep giving you as much information as I can so that you can continue to do business as IT professionals outside of Russia with other countries. 

How do you design a website that will be viewed in the west and appreciated by the people there?

What are the most important elements

for, America and other western markets?

Read more
Total votes 1: ↑1 and ↓0+1
Comments8

It's alive

Reading time2 min
Views1.2K

I wonder why IT developer interviews are so strange most of the time. It feels as if the people are looking for computer science teachers, not engineers. All those theoretical questions that have no relation to the working reality. It is strange to be looking for eloquent teachers, who can perfectly explain any term or pattern, and then ask them to do the actual work. Maybe it is the imprint from the years spent in university when the teachers looked like all-knowing gods and seemed to solve any issue in your life. May be, may not. Anyway, these teachers stay in unis and don't do the work.

You know, what would be my universal answer to all interview questions? “I have no idea how and why it works, but I can use it, and I can use it for good”. This is the reality. Actually, no one knows exactly these hows and whys. What is a computer? What is electricity? What is an electron? No one knows for sure. But it works and we use it.

Imagine a famous author, like Stephen King, asked a question about the difference between deus ex machina and Mary Sue. Would his answer change the quality of his books? He may or he may not know all those scientific literature terms, but he can use the language and use it for good.

Every time I turn on my computer it is a wonder. I have no idea what is going on, but it awakes, it becomes alive, and I can communicate with it in its own sublime and subtle language.

Have you ever realised that all these electronic devices are monsters, Frankenstein's monsters? Some pieces of dead matter were put together, and then, with some electricity involved, it suddenly awoke. “It's alive!”. Had Frankenstein any idea why it turned alive? Of course not, or why he was so surprised? Every developer experiences this feeling almost every day. “It's working!”

Read more
Total votes 7: ↑4 and ↓3+1
Comments1
Change theme settings

Authors' contribution