Pull to refresh

Management

Show first
  • New
  • Top
Rating limit
  • All
  • ≥0
  • ≥10
  • ≥25
  • ≥50
  • ≥100

Top 5 Best VOD Streaming Platforms in 2021

Business ModelsSoftware
Tutorial

These days, video streaming mobile apps have been witnessed with an increased spike of subscribers & now much video content is being much cherished without any interruptions via a streaming app. 

This is duly because catering to the prerequisite needs of end-users have popularized several VOD streaming services that has bought keen interest as compared to to the big black box which is slowly diminishing its presence. 

According to recent forecasted data, there is a positive anticipation of the entire VOD streaming  platform development’s  market to expand its size & peak its value by $842.93 billion by the year 2027! Source: Softermii 

Read more
Rating 0
Views754
Comments 2

News

Show more

Application performance monitoring and health metrics without APM

IT systems testingSystem administrationIT InfrastructureWeb services testingService Desk
Translation

I have already written about AIOps and machine learning methods in working with IT incidents, about hybrid umbrella monitoring and various approaches to service management. Now I would like to share a very specific algorithm, how one can quickly get information about functioning conditions of business applications using synthetic monitoring and how to build, on this basis, the health metric of business services at no special cost. The story is based on a real case of implementing the algorithm into the IT system of one of the airlines.

Currently there are many APM systems, such as Appdynamics, Dynatrace, and others, having a UX control module inside that uses synthetic checks. And if the task is to learn about failures quicker than customers, I will tell you why all these APM systems are not needed. Also, nowadays health metrics are a fashionable feature of APM and I will show how you can build them without APM. 

Читать далее
Rating 0
Views458
Comments 0

How to choose the appropriate level of statistical significance for an AB-test

Web services testingProduct ManagementStatistics in IT

Nowadays a lot of product managers have to confirm most of their decisions with AB-tests. Yet, it is far not always clear how to choose the parameters for the test. A particularly difficult parameter to tune is often the level of statistical significance. If we choose too high level - tests will fail even though improvements do exist. If we choose too low level - we'll be getting lots of "confirmations" of false improvements.

When we make decisions based on AB-tests, once in a while we'll be making mistakes. We can limit the losses caused by such mistakes by choosing the appropriate level of statistical significance.

Read more
Rating 0
Views231
Comments 0

Telegram bot provides time-based currency

ProgrammingIT StandardsKotlinCommunity managementSocial networks and communities

Many of us spend time in specialized telegram groups. The power over communication here belongs to random people with their own shortcomings. Conflict and abuse occurs regularly. Is there another way to keep order so that scam spam doesn't flourish and no one has total control over group members?

In my case, these thoughts led to the development and testing of a system that can be connected to your Telegram today.

How it works?
Total votes 6: ↑5 and ↓1 +4
Views6.4K
Comments 5

Customer feedback: The ultimate guide

SaaS / S+SService DeskGrowth Hacking
Tutorial

Introduction

It was 1989 when 2 editors of Inc. magazine, George Gendron and Bo Burlingham made the nervous drive to Palo Alto, California. Not long beforehand they’d decided on who to name as Inc.’s Entrepreneur of the Decade, and finally, they would get a chance to interview him.

As they entered the offices of NeXT, their interviewee approached them. In his trademark jeans and turtleneck sweater, Steve Jobs led them up the stairs to his office and the interview commenced.

Securing an interview with Steve Jobs was rare, even in 1989. And, wanting to make the most of their time, the editors got straight to the point with their very first question:

“Where do great products come from?”

After a slight pause, and a shuffle in his chair, Jobs replied:

“I think really great products come from melding two points of view; the technology point of view and the customer point of view. You need both. You can't just ask customers what they want and then try to give that to them. By the time you get it built, they'll want something new.”

Silence overshadowed the room. Three decades later, and this powerful answer Jobs gave is something that still isn’t often internalized in companies. 

Collecting user feedback is incredibly important. As you’ll see examples of later in this article, launching surveys, asking onboarding questions, and conducting customer interviews are all vital tools for improving your product. 

But the true lesson that Steve Jobs gave all this time ago was that user feedback isn’t as simple as asking what users want, or what they think about your product, and making those changes. You have to dive much deeper.

Read article
Total votes 4: ↑4 and ↓0 +4
Views783
Comments 2

Q1 2021 DDoS attacks and BGP incidents

Qrator Labs corporate blogInformation SecurityIT InfrastructureNetwork technologiesResearch and forecasts in IT

The year 2021 started on such a high note for Qrator Labs: on January 19, our company celebrated its 10th anniversary. Shortly after, in February, our network mitigated quite an impressive 750 Gbps DDoS attack based on old and well known DNS amplification. Furthermore, there is a constant flow of BGP incidents; some are becoming global routing anomalies. We started reporting in our newly made Twitter account for Qrator.Radar.

Nevertheless, with the first quarter of the year being over, we can take a closer look at DDoS attacks statistics and BGP incidents for January - March 2021.

Read more
Total votes 15: ↑15 and ↓0 +15
Views669
Comments 0

Roslyn API: Why PVS-Studio Was Analyzing the Project So Long

PVS-Studio corporate blogAPIDevelopment Management

How many of you have used third-party libraries when writing code? It's a catchy question. Without third-party libraries the development of some products would be delayed for a very, very long time. One would have to reinvent the wheel to solve each problem. When you use third-party libraries you still stumble upon some pitfalls in addition to obvious advantages. Recently PVS-Studio for C# has also faced one of the deficiencies. The analyzer could not finish analyzing a large project for a long time. It was due to the use of the SymbolFinder.FindReferencesAsync method from the Roslyn API in the V3083 diagnostic.

Read more
Total votes 2: ↑1 and ↓1 0
Views255
Comments 0

Qrator Labs' Value Partnership Programs

Qrator Labs corporate blogInformation SecuritySales managementBusiness Models

Why is it valuable to get into the Qrator Labs partnership program?

In Qrator Labs, we firmly believe that working together brings a better result. Which is the reason why, for years, we were trying to find meaningful partnerships with all kinds of companies. They either seek to provide their existing customers with the top-notch DDoS mitigation technology developed at Qrator Labs with many additional ecosystem solutions or want to succeed the other way around. By getting their product available for Qrator Labs' customers by integrating into the Qrator anycast filtering network.

Read more
Total votes 20: ↑20 and ↓0 +20
Views378
Comments 0

PVS-Studio Team's Kanban Board. Part 1: Agile

PVS-Studio corporate blogAgile

This article could have been born about a year ago – that's when the PVS-Studio team decided to try agile. However, we wanted to experience it hands-on before we told the world about it. Aside from introducing agile, we decided to switch from Bitbucket to a new task tracker. We also wanted to upgrade many of our internal development processes. No time for an article!

Read more
Total votes 2: ↑1 and ↓1 0
Views476
Comments 0

Content marketing stamina — the easy way for startup founders to get ahead of their competition

ITMO University corporate blogProject managementDisplay advertisingContent-marketingStart-up development

Content marketing is an endless endurance race. You can’t put a cap on business growth, even if you’re a tech industry giant. A single success is not enough — every time you reach the finish line, it moves further away. Retaining your existing customers is no walk in the park either. When you go silent, you are actively ignoring your audience. There’s no way around it — you need to pump out content.

However, doing that day in and day out requires a lot of stamina. So let’s look at why we get tired in the first place, and figure out how to avoid it. [Previous article: The true cost of free labour].

Continue Reading
Total votes 4: ↑3 and ↓1 +2
Views529
Comments 1

Multiple violations of policies in RMS open letter

Open sourceGitHubLegislation in ITSocial networks and communitiesBiography of geeks

Author: Chris Punches (@cmpunches, Silo group). License: "Please feel free to share unmodified".

The following text is an unmodified copy of now removed issue #2250 on rms-open-letter.github.io repository. The text claims multiple violations of different policies, codes of conduct and other documents in creation, content and support of the "Open letter to remove Richard M. Stallman from all leadership positions". The issue has not been addressed.

Read more
Total votes 24: ↑20 and ↓4 +16
Views3K
Comments 3

The true cost of free labour — and how startup founders can find their way around it

ITMO University corporate blogInternet marketingContent-marketingStart-up developmentProduct Management

Starting a startup can be tricky. To make money, you need clients. To attract clients, you need a portfolio. To have an attractive portfolio, you need to… Well, you see where I’m going with this. A lot of founders offer their services for free to escape this cycle. However, there are plenty of issues with this approach. It’s certainly not the silver bullet it might seem. Here we are discussing this topic in detail.

Continue Reading
Total votes 4: ↑3 and ↓1 +2
Views530
Comments 0

Architecting Architecture: Makers and Takers

System Analysis and DesignProduct ManagementSystems engineering
Translation

The step has been made. Not sure where to, but for sure from the point of no return. Keep calm and keep walking. It is about a time to look around and understand the smelly and slippery route before you. And what are those noisy creatures swarming around our fishy “innovative” design we called Mandelbrot blueprint. You don't get a buzzing-noise like that, just buzzing and buzzing, without its meaning something.

Read more
Total votes 4: ↑4 and ↓0 +4
Views849
Comments 1

Architecting Architecture

System Analysis and DesignProject managementSystems engineering
Translation

Architect. This word sounds so mysterious. So mysterious that to understand it you almost forced to add something. Like “System Architect” or “Program Architect”. Such addition does not make clearer, but for sure adds weight to the title. Now you know – that’s some serious guy! I prefer to make undoubtful and around 10 year ago added to my email signature “Enterprise Architect of Information Systems”. It’s a powerful perk. Like “Chosen One”. With architects it is always a matter of naming, you know. Maybe that is why the only way to become and architect is to be named as one by others. Like with vampires. One of them has to byte you! That is probably the easiest way to earn the title as there is no degree or school to grant you one. And if there’s a troubling title, somebody’s making a trouble, and the only reason for making a trouble that I know of is because you’re an Enterprise. Huge old and complex multinational corporation. Like a one-legged pirate. Strong and scary, but not a good runner. You own your ship, you had good days, you have some gold, you need new ways.

To get to new treasures and avoid losing second leg to piranha regulators and local business shark swarming waters near every enterprise ship – every pirate has a map. Map is a list of major features and requirements in desired order and priority.

Read more
Total votes 2: ↑2 and ↓0 +2
Views1.1K
Comments 1

Have we ever been working by the Waterfall?

Development ManagementAgile

We work using Agile: Scrum, or Kanban, or any other extended project management way. Agile appeared in 2001 as a result of a long discussion between really smart guys. They just formed best practices of management into the shape of short documents - the Agile Manifesto. But what did they want to replace by the Agile way? Most of you may say that they wanted the Waterfall to go to the past. But what would you think if I tell you that the “classical” Waterfall had been a really rare thing even for those days?

Read more
Total votes 1: ↑1 and ↓0 +1
Views858
Comments 2

Startups going global: a guide to Startup Digest

ITMO University corporate blogDisplay advertisingContent-marketingStart-up developmentLifehacks for geeks

Techstars Startup Digest was designed as a discovery tool for entrepreneurs looking for tech events in their area. It was founded in 2009 by Chris McCann who just moved to the Valley. He created an old-school newsletter, featuring promising events in the Bay Area. There was no website, all the events were hand-picked by Chris himself, and the newsletter had 22 subscribers. People liked the idea and that number quickly grew. In 2012 it was acquired by Startup Weekend. Three years later, Startup Weekend’s parent company UP Global was acquired by Techstars — and that’s how the project got its name.

Startup Digest can be a useful tool for startups and event coordinators. If you can successfully leverage it, your event, blog post and/or tech product can reach thousands of people at no cost.

Continue Reading
Total votes 3: ↑3 and ↓0 +3
Views752
Comments 1

Top 7 Technology Trends to Look out for in 2021

Information SecurityNetwork technologiesResearch and forecasts in ITArtificial IntelligenceIOT
Sandbox

Technology is as adaptable and compatible as mankind; it finds its way through problems and situations. 2020 was one such package of uncertain events that forced businesses to adapt to digital transformation, even to an extent where many companies started to consider the remote work culture to be a beneficiary long-term model. Technological advancements like Hyper automation, AI Security, and Distributed cloud showed how any people-centric idea could rule the digital era. The past year clearly showed the boundless possibilities through which technology can survive or reinvent itself. With all those learnings let's deep-dive and focus on some of the top technology trends to watch out for in 2021.

Read more
Rating 0
Views2.7K
Comments 1

Koyaanisqatsi: The WYSIWYG-style byte-code CPU

Creative CommonsFPGADIY
Draft diagram of core

SVG-File (actual draft)

Lyrics


Ancient times are known to everyone not with immortal works from Homer's only, but also with the Pythagorean multiplication table, Euclidean geometry and the Archimedes screw and the Pi, which we learned to use only relatively recently. In antiquity the art was not only to be able to write poetry and prose, but to design catapults or battering tools also, now there are rigid frameworks, when the discovering the new another beautiful formula is a formal words play only.
Mathematics rules the modern world completely, cynically intertwining with the world of art, intruding with calculations in all spheres of our recreation and everyday life, when the colors of masterpieces turning into poisonous colours.
Read more →
Total votes 2: ↑2 and ↓0 +2
Views695
Comments 0

Top 5 Best Secure Video Streaming Platforms of 2021

Business ModelsMicroservices

In this modern era of technological advancements, it is important to connect with people who matter the most to your business i.e. customers. Are you searching for a secure online video platform for your business?

Do you know what is secure streaming!

Well, various online video platforms can help you in providing seamless videos to your customers. But what we need is a secure online video platform that can also protect our digital content from various e-hazards. Read on to know more about some of the most secure online video platforms in the market.

Read more
Rating 0
Views1.2K
Comments 0

Damned if you do, damned if you don’t: how tech companies can cut through passive-aggressive media

ITMO University corporate blogDisplay advertisingContent-marketingStart-up developmentMedia management

Entrepreneurs make for easy targets. Whatever your business is doing, it’s guaranteed to ruffle some feathers. But don’t be quick to blame the public. Most times, being sceptical of change is only logical.

Even those who buy into your product will probably expect it to fail. 20% of businesses shut their doors during their first year, and less then half survive for more than five. We may not know these numbers, but we know it from experience — most of them overpromise, underdeliver and ultimately disappoint.

As such, it’s no surprise that the internet is full of passive-aggressive tech coverage. No matter what you do, your business is going to be attacked and demeaned. No one is immune.

Look no further than the original iPhone’s early reviews. It generated a lot of negative coverage for the sake of negative coverage. CNET’s main complaints revolved over a lack of physical buttons, completely missing the entire point of having a touchscreen. A Techcrunch columnist went even further and outright damned it to failure. Sounds funny now, but 14 years ago these people were dead serious.

Of course, these days everyone is an expert and the comment sections matter more than the articles they follow. Unlike traditionally restrained media professionals, the overconfident amateurs on popular UGC platforms openly take pleasure in attacking whatever they come across. It might be their way of letting off steam from being bullied at work or having financial difficulties, but no matter the reason, you still have to deal with a bunch of people trying to paint you in a negative light. And that’s not easy.

Continue Reading
Total votes 3: ↑3 and ↓0 +3
Views533
Comments 0