Spanish research experiment: is the dialect so elementary

 Before moving to Spain, I had a meager experiment in the study of foreign languages. Comparative success I have achieved exclusively in the study of the British business style at the university. And even he was safely thrown into the evaporation movement for years as unnecessary. At the age of 29, fate threw me to Spain, where I had reason to learn a completely new invented language for me.


Everything that I read on the global Internet on the live forums found in Spain after six months before moving:

Guishpan is an infinitely lightweight language.
In three months it is possible to learn to speak nimbly without having to learn the syllable on purpose.
The Spaniards will gladly help you, sometimes they will see you, but no, you are trying to hollow out their tongue.
Ingenious grammar and the like.


As it turns out, some of the endorsements ultimately do not fit the realistic arrangement of things. More details about this all - about the cut.

How I Prepared for the Pesky Research

We were preparing for the reason for the move in advance, I decided to acclimatize the basics of Spanish, which helped me with a video for YouTube via Polyglot. I quickly looked through them: I remembered no more than 10 promises and the views of the declension of ingenuous verbs in the present tense. The strangeness did not bother me, but I was waiting in Spain for language courses for the same, in my turn.

Sometimes you initiate to train the Gishpan language, it seems that everything else is too bad, even for those who have problems with the humanities. Only two weeks after the start of teaching, I could at least explain myself with the teacher after home and training questions. But after two months it became clear that I was happy early.

The general problem: tenses in the Spanish syllable

In the Spanish syllable, 14 to 18 tenses are accentuated, seven of which are complex compound ones. This wealth is always conjugated in 4 moods: imperative, subjunctive, relative and indicative.

Indicative:

Presente de Indicativo;
Pretérito Indefinido;
Pretérito Imperfecto de Indicativo;
Pretérito Perfecto de Indicativo;
Pretérito Pluscuamperfecto de Indicativo;
Pretérito Anterior de Indicativo;
Futuro Simple de Indicativo;
Futuro Perfecto de Indicativo.


Imperative:

Imperativo Afirmativo;
Imperativo Negativo.


Relative inclination:

Condicional Simple;
Condicional Perfecto.


Subjunctive mood:

Presente de Subjuntivo;
Pretérito Imperfecto de Subjuntivo;
Pretérito Perfecto de Subjuntivo;
Pretérito Pluscuamperfecto de Subjuntivo;
Futuro Simple de Subjuntivo;
Futuro Perfecto de Subjuntivo.

If you compare it with the Russian language, because in the great and powerful, experimenters emphasize from 10 to 16 times. But more often only three basic forms are used: the future, the past and the present. In the Spanish syllable, the tenses are always used with temperament after throwing out two, which can only be noticed in official documents - Futuro Simple de Subjuntivo and Futuro Perfecto de Subjuntivo.

For those who study Spanish, the extremum of 12 times is pulled out to study, most of which I did not even know existed. Is it possible not to torture yourself and talk using three simple tenses? In addition, you are more likely to be understood. But whether you understand what they will answer you is another question. Undoubtedly, it is not enough to dispose of exclusively ingenuous times in colloquial spanish. If a person wants to join Spanish society, to find a service, that is to say, he plans to study.

In my project on the eve of the move, two main points stuck out: to study the syllable for six months and immediately after the courses to start studying at the university, at the same time pulling up Spanish. Only two months later, after moving, I realized that my order had crumbled to dust. Without tremendous inclinations to fasten foreign words in passing and memorize them from the main time, there is no chance of learning to satisfactorily assert in Spanish in six months. Therefore, having buried my hopes, I signed up for an additional multi-month character and at the same time hired a tutor for 2-3 hours a week.

In the first six months for study I retired every day after 5 to 7 times with homework. After all this, as I signed up for the newly invented character and began to accurately exercise with the teacher, I went to the Spanish origin up to 10 times every day. It was this perfect deepening and crazy learning tact. Against all my efforts, I spent six months in order to start talking to people for the street.

Subjunctive omission and other singularities

And at this point, our team moved on to the study of the subjunctive mood. From the very first lesson, the veil was lifted that we should accordingly abandon everything that we had trained before, and start training first, taking into account the subjuntivo. In the Russian syllable yes there is a subjunctive mood, but in a very unassuming figure - for example, "I would have been born with you in a movie, but I will be busy." It is this "would" that forms some modality of the verb, in other words, it orientates the speaker for emotion and desire.

The Spaniards are an infinitely sensitive people, they have a subjunctive omission in all gossip and in almost all times. It is rather difficult for a Russian person to comprehend the principle and logic of his consumption. For example, my friend from Italy did not have to learn decently, causality in the Italian syllable is the same approach. And I'm still racking my brains before saying something in the subjunctive mood.

And in order to slam the topic with Spanish verbs, I will only say, they are inclined by faces and numbers, as in the Russian language. For example, the unassuming verb "comer" (from Spanish for "is") will be conjugated in the following manner in all tenses:


It looks intimidating, but this is an unassuming verb, with which there are naturally no problems. Conjugation rules sometimes activate difficulties, if only the skill of needing few abnormal verbs. But there are few of them, and every minute they are modified after the set principles, which are free to remember.

Speaking of Spanish syntax and phonetics, here I, I would say, rested. He was a little boss, and they are mastered in the course of the educational process by themselves. In many cases, words are read smoothly in the same spirit, written in their turn, after throwing out the evaporation of the rules. For example, the h chord is not pronounced - this letter in the word must be simply let out (why is it needed then? “LL” is constantly read not as a double “l”, but as “d.” It seems that such throw-outs are easy to remember.

The order of promises in Spanish sentences is simple, and there will be no problems with it either. In some figurative books, exclusively by Spanish creators of the half of the previous century, endlessly long sentences with a gigantic number of adjectives and adverbs are encountered every minute. It happens that by the end of the sentence you already forget what was there at the beginning.


The Gishpan dialect froze to me not as quickly and malleable as it might like for the first glance. I admit that someone would overcome the language barrier earlier, but I had no opportunity to force myself to speak, knowing that I was doing it wrong.

Guishpan dialect in Andalusia

Even in spite of the fact that some Spaniards frankly helped me in teaching, it often intensified additional difficulties. And all the causality, it is useful to train Castilian Gishpan at the same time as the dialect, some emitted in the province where you live.

I am in Andalusia where Spanish enrolled in a specialized form. I idolize her as "village". Strange as it may seem, a remote Russian village, where people say "einy" and choose to explain the well-wisher with a friend infinitely loudly, increasing the tone at the end of each phrase: "Lyudk, and Lyudk, did you give the pigs? ... Hence, they speak impeccably here too. Thanks to this singularity and the manner of pronouncing promises by the inhabitants of Andalusia, endlessly, I could not tie up a run for spanish

It is extreme to hand over that despondency, sometimes after language courses you go out into the fresh air you cannot analyze everything between the mash of sounds and words. And it's not a matter of specific slang, some to consume in Andalusia and what is not in dictionaries, but in the pattern of pronunciation of words, swallowing endings, reductions and a very noble speed with which sentences are swung out directly from others. For example, the popular fiction “buenos días”, or “good morning,” is pronounced in Andalusia with an infinitely agile and truncated version. In general, it comes out for some reason "wen! And communication with elderly people still activates some suffering in me. A similar situation is with young people in 10 to 25 years, who have their own way of communicating and an immense supply of bike words.

In the course of adaptation, it turned out that the manner of communication and the Andalusian dialect differs from metropolis to metropolis and from village to village. Indeed, even in a border suburb, some are located a kilometer from the place where I live, the inhabitants speak somewhat differently. This seriously complicates the task, and even immediately, I sometimes understand what I am being told if the surrounding dialect has gone.

This is what can be said about the writing style of most Spaniards. As if on purpose, I am a member of several maternal chat rooms, causation my kids are being trained in aboriginal school. Impeccably half of the guardians scribble correctly, using the solemn Gishpan dialect during correspondence and sometimes placing commas for better understanding. And some information every minute compels you to put up the cup, the reason is to quietly and intensively analyze abbreviations, illiterate scribbled words, and internally put dots where they do not interfere. Every minute, only after a responsible analysis of the information, it becomes clear that it does not carry any useful information for anyone, turning off the sender himself.

Loudly, the difficulties that were tied and are being tied for me for this path, the Spaniards do not at all refuse to confirm the phrase or begin to assert a little more slowly for the sake of the success of communication. Valid constantly, this is accompanied by a warning smile. But, in my opinion, the "hospitality" of the Spaniards is considerably exaggerated due to the multiple responses of tourists. But I will scribble about this at other times.

General trends in the development of telecommunications in times of all the bored pandemic

 On October 28, the country went into a regime of self-isolation, Germany decided in a similar manner, however, with more flexible conditions. Probably, other powers will also set the quarantine schedule in motion for the evaporation of weeks - for example, Spain, which has now slammed some regions.


It is clear that all this will have infinitely knowledgeable consequences for the sake of diverse areas of business, starting with IT. Against the crisis, manufacturers' profits through the cloud infrastructure deployment trade are growing. Telecom tendencies at this intricate moment are described in the article.

Cloud service hardware spending is on the rise

According to reliable information from Idc experts, the profits of manufacturers of network equipment, starting with servers, storage systems, switches, are growing little by little. The explanation is elementary - business and national creatures must quickly improve telecommunications in order to transfer the increasing load on the network. Accordingly, spending grows for some companies and profits for others.

Thus, the deepening of revenue through the cloud infrastructure equipment retailer after comparison with the previous year collected 34.4%. And a similar ratio for equipment that is not integrated with IT infrastructure decreased by 8.7% in comparison with the previous year.

As for the available cloudy services, because here expenses during the year stretched for 47.8%, reaching a mark of $ 14.1 billion. Experts say that this year, this type of expenses for the first time exceeded the costs of traditional IT infrastructure. And since panzootic is developing, the progress of the "clouds" will continue. According to experts, by the end of the ages, business expenses for this site will amount to an impeccable 54%.

General drivers of growth

The trends that we are talking about were already quite visible in the spring - the push too often responds to change in all spheres of service and life. Distance education has become famous, telemedicine is being deployed, and the abundance of entertainment services is increasing. This could not but influence the deepening of purchases of network equipment and everything that has any connection with the clouds. According to analysts, by the end of this age, the costs of business and national systems on platforms for cloud infrastructure will increase by 50.9%, reaching $ 37.7 billion. The push for collective storage systems and Ethernet switches is only growing more constructively.

These trends have shown themselves not in some one region, but are valid in all countries, starting in Europe, China and the USA. In the last two areals, the annual growth rate has collected 60.5% and 36.9%. At the same time, public clouds unwind much faster than private ones. Finally this year, profits through them will increase by 15% to $ 52.4 billion.

If we argue as they say, then by 2024 the costs for the cloudy IT infrastructure will increase to the mark of $ 109.3 billion. This is about 63.6% through the corporate size of expenses for IT infrastructure. Expenses for own cloudy infrastructure will increase by a rough 9.3%.

The question was multiplied by joint decisions. The skill is that most companies, whether small or large, have different-sized IT infrastructures. That is why, for the sake of optimization, mash prefer multicomponent environments and utilize designated infrastructures in commercial data centers.

Most of the companies that are frozen to recycle cloudy infrastructure, have set the benefits that it gives. So, someone has clearly increased the scale of the use of internal IT-services, so that it was required to immediately distribute the capacity. And for some, on the contrary, the business is not as active as in the very beginning of the year, so that such fraternity is used less by the clouds. Accordingly, resilient infrastructure delivers the ability to nimbly reduce load and save money.



And what about Russia?

Not surprisingly, the market for cloudy services in Russia is also growing - it has multiplied by 24.8% this year, exceeding analysts' expectations. It is clear that most of the monitors were collected in the previous year, and they are somewhat behind in terms of realistic indicators. In the Russian Federation, in its turn all over the world, the push of public clouds prevails - its share is 85% in the market of cloudy solutions. Most of this bazaar is owned by Microsoft.

In 2019, the profit of the 10 largest Russian suppliers SAAS (Software-as-a-Service) increased by 48% after comparing with 2018. In absolute terms, the size of the bazaar has multiplied to 48 billion rubles. As for the IaaS bazaar in the Russian Federation, its volume was two times less. The profit of the top 10 companies from the Russian Federation was around 24 billion in growth. If you collect the top 100 companies, then the total amount of their revenue in the Russian Federation according to the results of the previous age increased by 22%.

Exclusively demanded, cloudy schemes have frozen in such areas as financial services, telecommunications, manufacturing, pharmaceuticals, and the automotive industry.

By the way, after the provided Mail. ru, immediately in business and usual

Strong association - is she doing well?

Not to mention the details, yes. Business and the kingdom understand that when fast internet is needed, strong communication lanes come to the rescue.

“Telecom is not an elementary socially obligatory business - apart from us, self-isolation is unbearable in principle. We help to experience stress, organize communication with loved ones, guarantee equipment with food and medicine, improve coordination - this is always possible exclusively due to the Internet. In addition, only that we have a solemn level of penetration of broadband access in our country, it turned out to be important, ”declared an agent of one of the largest IT organizations in the country.

But, unfortunately, many providers and operators get revenue. So, due to the fact that some services were provided free of charge, the fall collected 5-10%. True, in the agreements of the second quarantine ripple, the emergence of violent growth is likely, some will close the fall of the proceeds.

On the other hand, it is impossible to forget about the initiative of the Russian government in the project of providing free access to socially necessary resources. Operators, however, without specialized enthusiasm, froze to look for solutions that would help to implement this initiative.

What's next?

The distribution of the microbe so either friendly will stop. Regrettably, the sample of businesses will be able to experience the second swell of the coronavirus - quickly extremely difficult economic conditions for them. Big risk - for a small service business. However, most mugs will always go back to work.

But do not expect that the use of cloudy services, including sent education, etc., will decrease. No, users endlessly liked remote plowing - and some simply do not want to repeat themselves to offices.

Remote plowing was enough for many employers - however, in this case, no one is late for work, it is possible to connect with a man at any time. Probably, in the near future, freshly baked companies, which did not manage to develop this at the beginning of the current year, will run to the remote location. And then the overload for the bond will increase even more.

There is only one exit - to buy new equipment, establish bonds and stretch cables. Management measures alone will not help here.

In terms of pandemic and remoteness, take a closer look at the centralized management of the Zyxel Nebula line. It is an ecosystem of hardware and software components that will help not only promote the line REMOTE, but also manage and scale. Any “Uncle Vasya” can attach an access point for the limit in a branch and drive RJ-45 into it, and the administrator connects to the point remotely, configures it and regulates the volume of its work. This is exactly what it is with switches and firewalls.

17 Chrome and Firefox extensions for your privacy and security

 Without getting into the details, the set of useful extensions can be overwhelmed for five categories:

Blockade of advertising
Suppression and falsification of information (IP, geolocation, user agent)
Clearing provided in the browser
Privacy options
Defense through malware and mining scripts

A number of browsers are established for the Chromium engine, its extensions are compatible with Brave, Opera and Vivaldi.

Ad blockers

The most important extension that you need to define yourself, and yes to all known and relatives - advertising worker. This is an absolute must have for everyone. Here are the most popular ones:

AdBlock Plus (Chrome, Edge, Firefox, Opera, Safari, Android, iOS)
AdBlock (Chrome, Firefox, Safari, Edge)
uBlock Origin (Chrome, Firefox)
Ghostery (Chrome, Firefox, Opera, Edge)


Extremely recommend a positive blocker, they all do a pretty good job. Someone loves the fastest Ghostery, someone has adapted to the elderly AdBlock Plus.


The results of benchmarks at the beginning of February 2019, how much time it takes to finish the page with various ad blockers. Against investing, all of them, as a result, activate the loading of pages

Last but not least - vote after the perfect blocker.

Suppression of information


Silence of certain information: referrer, user agent, IP-address and geolocation. Protects through online trackers and allows you to correct your IP address in the output for the server.


User Agent Switcher


A simple and powerful continuation for switching between multiple user agent lines.

WebRTC Protect

WebRTC is an open source real-time communication framework. It is usually used for video calls and conferences via an Internet browser, that is, mobile devices.

The sequel to WebRTC Protect protects the user through IP revenues via WebRTC. The sequel is tiny and easy to use.


Unseen - privacy in chats
Defense by detecting Seen status in chat rooms. It functions with web messengers WhatsApp, Facebook Messenger, Web Telegram, etc., and on facebook sites. com and messenger.

Blocks the "Viewed" status, the final enterprise pointer and the "User is typing."

Location guard
Silence is the fake of its geographic location.

Clearing provided in the browser

Click & Clean (Chrome, Firefox, Edge)

Famous sequel to cleanup fleeting provided in the browser. Of course, the consistency options are consumed in the browser itself, but this extension produces a lot of customizable settings and increased cleaning options.


Privacy options

Privacy Settings

A minimalistic yet highly feature-rich sequel for the sake of managing privacy options. Differs in an artless interface.

Privacy Manager
More relocated air traffic controller privacy options in Chrome. There are a lot of options and settings for the sake of managing safety options and cookies. Permits yes to send viewing materials, for the sake of this to consume an impressive set of options.

Privacy Manager can generate mesh monitoring, cheat cookies, and fill in IP addresses over WebRTC.

Privacy Badger (Chrome, Firefox, Opera, Android)

The sequel to Privacy Badger through the Electric Stages Foundation (EFF) unconsciously shows and blocks trackers and harmful scripts based on their behavior. Consume permissions for discrete items, including video players and dialog widgets.

The creators explain that they like Disconnect, Adblock Plus, Ghostery and other similar extensions and ad blockers, but "they don't provide what they need." The test showed that all of these solutions for an effective service require some amount of uncomplaining configuration in order to block the original trackers. Some are scrapping an unacceptable business model by removing buyers from the block list after money. That's why EFF let go of a personal follow-up to block tracking.

Relocated open source cookie manager. Allows you to edit, add, manage, organize and search after cookies. Yes allows you to cheat the expiration date of cookies and import / export them.

Defense and harmlessness

Miner blocker

The continuation against cryptominers not only curbs the service of miner scripts, but also serves as an indicator for which sites such malware is delivered. Owners of sites believe this to be a legitimate modification of micropayments, sometimes readers pay with their resources for the service of access to information, however, in this case, it is moral to warn users about charging fees.

Fox Web Security

Maternal control: blocking sites with adult content. However, it is possible to bypass it, however, as if any blocking.

HTTPS Everywhere (Chrome, Firefox, Opera, Firefox for Android), continued connected in Brave, Tor and Onion (iOS) by default

General development of the Tor Project and the Electric Frontier Foundation. Many sites do not implement full, but partial or incorrect HTTPS help. For example, after the default, the unprotected HTTP version is loaded, or separate hyperlinks are set for it on HTTPS pages. The sequel to HTTPS Everywhere fixes some of these bugs by changing requests for the fly.

Any sequel records its contribution to web page parsing and memory consumption, so it is desirable to define an imperative extremum and nothing more. For example, the "antivirus" extensions at an impressive level are in vain and use only CPU and memory repertoires extremely ineffectively, and at times they even plant worthless advertisements into the Internet browser, as if it were an antivirus continuation of Avast.

If you are used by other useful extensions for high protection of your own provided and security, add in the comments.

Responsible imperfection in GeForce Experience

 NVIDIA developers have patched two major vulnerabilities in the GeForce Experience utility. This program is installed together with the drivers for video cards, responds after the automatic software resumption and other functions. In versions of GeForce Experience up to 3.70, a difficult task was found that theoretically allows you to inherit one hundred percent inspection over the system.


When installing the warranty After on the user's computer, the web server for the NodeJS warehouse is blown up, corresponding after the association with the manufacturer's infrastructure. It loads emergency libraries automatically. In some case, the device of this ingredient is located near the control of a potential attacker, and he can change it to malicious code. Failure CVE-2020-5977 earned 8.2 points on the CvSS scale and can cite as if to denial of service, similar to a random elevated verse.

The second vulnerability, CVE-2020-5990, corrects an error in NVIDIA ShadowPlay for the sake of capturing and streaming game video, however, it is possible to cite a local prerogative increase and random code execution. Renewal for the sake of GeForce Experience can be downloaded on the company's website, or you can wait for the freshly baked version to automatically download.

A similar theme has been slammed in GeForce Experience for a year. Then the prospector found a procedure for replacing one of the entire files to which the utility revolves.

Similar After the timephased is utilized for mass or targeted attacks. Vulnerabilities in the programs themselves can be exploited, but in unusual cases the whole chain of software delivery to the user is in a dangerous position. The most well-known incident of this attack is the activity of ShadowHammer, during which a modified program for the sake of ASUS computers was distributed for some time from compromised servers.

What the hell happened:
Nokia specialists shared a report on the detection of malicious software in computer networks that use the company's defense assets. Professionals noticed a decent progress in the number of infected IoT devices: their share between all compromised devices was 32.72% (16.17% a year before). Primarily harmful after being caught for systems near Windows. In second place IoT devices - phones and gadgets based on Android have moved them to the cake.

In the Linux 5. 10 kernel release, we pulled out the setfs () function, which made it possible to refuel writing to the operational memory. According to reliable information from some sources, it was present in the OS kernel since version 0. 10 1991 ages - then it was introduced for the sake of helping outdated systems for the 80386 processor warehouse at that time. In 2010, it turned out that the function could be utilized for rewriting data to which the reader, in the usual modification, cannot have access. A similar glitch in LG smartphones for the Android warehouse was shown in 2016.

Yandex. The browser, and yes in Opera and Safari, had a bug that allowed to falsify the content of the address bar. So far, a bug has been found in Google Chrome, thanks to which user materials are not deleted for the sake of Google personal services (for example, YouTube), even if there is no exception for them. Transcendental, this allows the user to be identified, some refuses to give themselves away, eliminating all previously secure information. Google approved the error and promised to fix it.

A Check Point study argues that phishing emails primarily exploit Microsoft's services. In 19% of cases, phishing attack operators fake messages to make them look like the correspondence of the given company. In second and third places is phishing through the names of DHL and Google, 9% each.

How does fame regulation work on the global Internet?

 If we say in ingenuous language, then the main installation within the framework of fame management is to hide all the negative away, and promote the positive so that, therefore, it is to the user, some is fond of this or some company, or a product, that is, a person.

In order to immediately separate the feasible aeronegative and the hate after touching on this article, there will be no question of customized responses. Here I will outline in general terms the principle of action of any of the instruments. Some of them are used on a scale of other directions, any exclusively at the disposal of fame on the Internet.
On the eve of reading, please note that this source appears to be purely a story about how fame regulation affects corporate lines. If you indulge in specifics, then the material threatens to become extremely impressive.

What is reputation regulation made of?

So, if we say about the most general devices in the framework of reputation management, it would be preferable to structure them in two directions, such as the subscriber support service and the formation of a controlled zone.
There are two main areas of payment for customer support:
- Forecast of mentions on the Internet.
- Reacting to mentions.
Here, from the names of the devices, it is possible to freely determine after what they answer. The forecast is carried out, in most cases, by means of YouScan and Brand Analytics. The general directive is to detect mentions of a company that ask for conclusion or attention. Such a negative may exist, which is worth responding to from an official representative, a discrepancy with a product or service / order, information about which should be presented to the subscription support industry. In addition, there may be an ordinary note or advice on the work of the brew and the improvement of the service, which should also be taken into account.
With responsiveness, the conjuncture is impeccably the same simple. You take an unloading from the forecasting arrangement and see for which devil you need to answer. Possible match from both faces of the official representative, that way, and from the faces of the client, but this is a few nigger work, which may also be that way prodelyvat within reputation management.

Establishing an info field

In this case, the size of the services and the abundance of devices are larger than those of the customer support service. If in the main case plowing is directed, as a rule, to work with existing ones, then when generating an information field, the setting is quite different. The subject of the action will be an eventual client, some of whom are familiar with your company / product now, as if they are with competitors, and today he wants to choose whom to actually contact.
It should be taken into account that in addition to ordinary advertising and PR, consuming apparently-invisibly special methods, one of which we are talking about.

SERM (Search Engine Reputation Management)

Many who are devoted to this topic insofar as it is in detail, call "Serm" one hundred percent complex of reputation management, but this is not so. SERM responds only after the establishment of the issue, and more specifically for the promotion of positive resources in the visible area, thereby displacing negative ones. Plowing occurs according to brand demand and reputation (brand / product + reviews). This is done, first of all, due to the increase in behavioral and social moments on these very resources. In addition, I will again consume a number of details for promotion, but I will not go into them.
In general, within the SERM, it is necessary to understand that the speech agrees on the actual reputation queries, which can be found in "company + reviews", "company", "product + review", "person's name", etc. It sounds simple enough, but quite often, sometimes they want to write out regulation by reputation, they orientate the required question, I suppose, "mounting scale reviews".

SMRM (Social Media Reputation Management)

In its turn, it will be authoritative to provide from the name, this toolkit responds to the management of fame in public media.
This includes classic SMM, some of which function in conjunction with ORM and the client's preconceptions are worked out. However, this is not all. At the disposal of fame to consume infinitely frequent activities of creating controlled resources, which can be relegated to SERM, similar to SMRM. In between these resources, consume the following:
- Feedback sites (satellite sites), which are used to post responses about any positive multi-brand, that is, a group of goods. Immediately, they are already far differently relevant, as if a few years ago, since the buyer's confidence could hardly be baked into by means of a resource known exclusively to one company. It is possible to tinker with deeper reviews, however, for the sake of agreeing only the content for him and the technical specification itself and the composition of the site, it will take a significant amount of time, effort, and funds.
- Articles. They are used for more popular product reviews, that is, the company's service. In most cases, these are the same semi-advertising articles that the companies themselves scribble about themselves, it will be exclusively published through the faces of a client who has long had an experiment of service with a company or using a product. In most cases, 2-3 notes are located in the base of the reputation services, after which they are already moving into the tested zone.
- Blogs. In fact, this is exactly the same thing as articles, only a blog is captured by one and articles are placed on it with a set frequency. It is not clear how, it is also promoted into the visible area.
- Categories of responses and judgments in social networks. Here VK only grasps denser, where a similar group is signed, in which fraternity it is possible to inherit a return association with respect to their work, and, of course, easily moderate it.
I myself will note that groups and satellite sites are losing their relevance, but until now some are inflamed by their creation and maintenance.



In fact, the fundamental and most significant tool if the brethren are thoroughly functioning over their reputation. It is not so important whether the contractor or the company itself, which follows the reputation, is selling it, but the unloading, as if as a rule, is collected once a day, after which it is now possible to notice and decide, there is nothing to do with all the references.
The most important thing is to set up a well-adjusted monitoring system so that not a single mention, the more negative, could slip out except for attention. It is necessary to work out all the semantics in great detail, only this is essential for the sake of brands and products with famous names.
Yes, it happens endlessly every minute, sometimes in the response that is, the comments do not contain the name of the company. In such a case, it is possible to treat by hand a small resource cartel. It would be best to arrest the TOP 10, or exclusively the company's social network, although, in this case, this intersects with the SMM department.

React to be mentioned

One of the most general tools, some responds after a still fresh aeronegative, that is, the rest of the mentions that ask attention.
It is necessary to understand, and if we are talking about the negative, then it should be split into constructive and far-fetched. It’s one thing, sometimes a visitor bought your product, he met an alliance or consumed some painful space, and the consumer scribbled about it in a social bond, that is to say otzovik and put everything on the shelves. Here it is more than logical to respond to the message, if you find it through the streamlined monitoring.
Differ, if such an ordinary rude provocative hate review, where there are no arguments and indications of shortcomings, and the text is filled with obscenities and far-fetched facts. In this case, it is preferable either not to react, or to do it in a big way on behalf of the brand evangelist, some will intercede and be able to force the discussion (if, of course, this can be called a discussion).

How to have a conversation with the creator of fruitful negativity?

First of all, it is essential to understand, and if you decide to write out the regulation of reputation, because at first the distributor will chase you like a small child with clarifications in what manner it is worthwhile to correspond to this or that negative. By the way, during the main month, a diagram of reactions will be collected, where all the nuances of communication with a client, types of responses, and a feasible counter negative should exist.
Sometimes the enumeration has already been found, you should immediately find out the details of what exactly is the root cause of such dissatisfaction, unless, of course, this is not clear from the message itself.
After that, the extremum in the two notifications will switch the conversation to personal information, that is, to the mail, so that the entire investigation of the events does not take place in front of everyone. If you managed to do this, everything is fine, the plowing is done. Further now it depends on the support service.
It is possible to ask the question: “Why is it all without exception, if it is possible to simply hand over a greeting to the support service? The protest is quite elementary - in this case, it is important that users, including those who have thrown out indignation for a prominent place, create a vital communication, which will make it clear that the sampled companies are the same for their client. Support work, in most cases, responds in an extremely dispassionate and scripted manner, which is why it does not have the same effect.

Direction of adverse responses

Having recited this title, you probably thought that the speech agrees to delete everything, but it was not there. At worst, it makes no sense to tinker for two reasons:
In the wrong scenario, aeronegative is possible to inherit tremendous publicity.
You will not be able to send everything.
It is worth trying to send aeronegative exclusively for trust sites, the moderation of which is possible and will be directed to the dialogue, which is important, first of all, your personal reputation. It is precisely to consume these same trust resources, which are seized within the framework of placement, if you write out regulation by reputation. They are rather complicated in terms of placement, even if the analysis keeps an obvious client. There is nothing to do about pulling out reviews, because the presence of responsible and impartial arguments, which is why this or another analysis seems to be ordered and not from your client, the source is quite possible to thoroughly analyze the lamentation and remove the analysis, that is, an unfavorable comment.
Already such, at first glance, sound and service complaints may lead to a new swell of negativity, if a toast agrees on resources that seem thin and aimed at negativity. The market for incriminating evidence in Russia itself has been formed wow (If all of them say this word in time). It is this that seems to be the main factor, because similar portals and sites will unleash the situation about the fact that someone scrawled them with a request to send it any other aeronegative, that is, compromising evidence.
It is preferable not to touch such repertoires, but to release them below, where a small abundance of users will experience it.

How to build a reputation at the start?

Let's examine the entrance to the formation of the outfit for the sake of the company, which exclusively goes to the market.
It is not clear how, mainly, this direction is significant for brands, which are preferable to operate on the Internet, that is, their implementation depends on discussion on social networks and word of mouth.
So, let's say that there are brothers "X", which exclusively streamlined and tuned business processes and begins their activities. It is important for her that the client, sometimes picking up between her and more popular competitors, chose her proper. Otherwise, it is important, they decided to write out the regulation of fame, that is to say, to develop it ourselves, depends solely on the possibilities, both organizational and financial. Yes, tell about yourself in terms of reputation?
First of all, you need to know that if the brethren are engaged, say, in the creation of refrigerators, then forming the issue after business inquiries, I suppose “to buy a refrigerator” is generally impossible. Our attitude is brand and reputation queries, in other words "brand name" and "brand name + reviews".

We regulate the info field

It is here to this day easier, after the last measure, if the conjuncture is not neglected. In this case, the most magnificent and most important thing is monitoring. It will help not so much on the scale of reputation management, but also to understand the entrepreneurial spirit of the users of the mash on the Internet, where they say a lot about you, which channels of attracting an audience seem to be more successful, and where to consume drawdowns.
Sometimes you know that somewhere you have scribbled something that disgraces the corporate picture, and even more so, if this is a client's problem, some wants to insist on its solution - pay him and resolve it. It is essential to tinker it not like outdated machines with ingenuous scripts, but to conduct a good communication with a person in order to conclude a problem, gradually, as if he wrote above, lead the conversation for the mail, into his own information, except further.
In addition, it is infinitely not advised to always reshoot the time to the support service. Not long ago I saw that on one of the popular marketplaces a store selling covers for phones and laptops responded to all responses with a message, I suppose "Thank you after the review, your opinion is infinitely important to us." Everything would not be so sad if there were no such conclusions on the negative and reviews in a certain star. Looked at it, you know, insofar as it is good.



With the right scenario and the appropriate basis for the trouble about your outfit on the global Internet, you can get by with “little blood” to the limit and create such an information field, which will be just as much attacks of competitors, not remembering the realistic basic negative. In such a rework, there will be no desire to write out regulation by reputation, after the last frontier, in the form in which such a trend is transmitted by the majority.
Immediately, such a trend evolves, moreover, this is combined not only with the emergence of freshly baked devices within the framework of work, but also with the awareness of the business that it is much better from the very foundation to approach reputation and image as capital, and in contrast to an empty sound.

Why didn't altcoins soar? Chronicle of extraordinary cryptocurrencies

 Bitcoin started with an idea formulated in 2008 in the Manifesto of Satoshi Nakamoto: an economic structure for the Internet economy, allowing the implementation of payments on the web directly, content with the mediation of classical economic institutions. As it turns out, many were expecting something similar. During 2013-2017, freshly baked cryptocurrencies and tokens appeared in huge numbers, including the most unusual ones. Some - prepared after the joke, jokes because of the experience for; the rest - with a specific mission: public projects, political coins, various business ideas.


It was at this post that we compiled samples of the most diverse, distant well-wishers from a friend and unobvious in concept tokens and altcoins: from Dogecoin to LGBT coin, from coin to bypass political censorship to porno tokens to pay for something unconditionally.

Perhaps many of them will work for some as a source of freshly baked ideas. But, most importantly, we want to describe their situation and analyze three questions:

What was it?
Why didn't they succeed?
What is it, therefore, for the upcoming blockchain and cryptocurrencies?


Little educational program: coins are called cryptocurrencies for their blockchain (from Bitcoin to Dogecoin). Tokens are derivatives of another crypto. Most of them are tokens on the Ethereum blockchain.

The token combined with the Doge meme was created in 2013 for fun, or simply as an experiment property. If there was intent here, that is to say, a filigree foresight, the developers of the pesotoken do not remember it: “One evening I drank beer after work. I had a well-rounded independent time and I arrested and bought a Dogecoin rank. com, ”recalls Jackson Palmer, product manager at Adobe. Subsequently, IBM programmer Billy Markus helped develop a realistic Dogecoin cryptocurrency. Together they wanted the freshly baked cryptocurrency to be interesting and get a huge audience than Bitcoin, however, without touching on the details, it looked faster than dreams than a plan to conquer the world; Cryptocurrency developers hardly expected that it would become 34th after the value of capitalization in the world rank (according to those provided for Lipets in 2020).

On December 17, 2013, Doge's value was $ 0.000255. After a month, at the beginning of January 2014, the course gained marks of $ 0.002306, in other words, stretched out approximately 10 times. After which he just as sharply moved away and was positioned for the macrocosms in motion for three years. However, Dogecoin immediately appears to be the largest altcoin on the market, it began trading for the legendary trading platform Robinhood, and in June, after the trading volume, it was twice ahead of Bitcoin Cash. Elon Musk and Tik-Tok contributed to his growth.

On April 1, 2019, in the Dogecoin official Twitter account, users were jokingly recommended to take a liking to the newly baked CEO of the project. Elon Musk found himself between the applicants, after which the majority of votes were cast.

At the beginning of July 2020, a TikTok reader released a short video in which he clicked to acquire Dogecoin in order to earn on the growth of its value. The shaft amounted to more than 58 thousand likes and 4 thousand.

Major exchanges have taken advantage of Doge's peak of fame and have presented their buyers with great interactivity with altcoin. For example, on July 10, the Binance Futures platform tossed DOGE / USDT lifetime contracts with up to 50x leverage.

Tron plan chief Justin Sun, following the rise of Dogecoin, announced that from now on, his project will focus on building an audience on TikTok. And he promised to organize, so that the videos of the blockchain startup would freeze viral.

“People adore cats and money, so why not combine? "- someone thought unconditionally and, it seems, it worked out. Cryptocurrencies associated with seals are Monacoin, Catcoin and Nyancoin. Of these, independent enthusiasm is driven by Monacoin, immediately ranking 113th in the rankings.

Monacoin is the conditional greenery of the Japanese project, formed for a swell of sympathy for cats and the popular figurative ASCII character, Monet. The token was planned for December 2013 and was created in 2014 as the ultimate fork of Litecoin. Monacoin froze over as the first opposite cryptocurrency explored in Japan and is still popular today.

The value of MonaCoin (MONA) for now is $ 1.26, and the commercial circuit in 24 hours is $ 1,136,740. Over the past 24 hours, the cost has increased by 2.1%. Immediately in circulation: 72.75 million, total coin supply: 105.1 million. On the day of the article's release, Monacoin is showing solid momentum.



Perhaps it would have been possible to explain the popularity of Monacoin with a cat painted for it, however, other cat cryptocurrencies turned out to be less successful.

the extremum was registered in 2017 ($ 1.25), but is not immediately used now.

extremum in 2019: $ 0.04241324, not immediately used now either.

LGBT Token

The developers of the LGBT token claim that they developed it not so much because of earnings, but also because of a public mission. The LGBT Token cryptocurrency has been leaked by the LGBT Foundation, a non-trade organization that helps the global gay community to dispose of its national economic reserve for the benefit of equality. These are some really impressive sums: the joint purchasing power of the pink economy is estimated at 4.6 trillion US dollars.

The LGBT Foundation promotes the LGBT token as a payment order in everyday transactions for the sake of businesses, whether digital or physical. To force this, Hornet Networks, the LGBT Foundation philanthropist, is creating a token circuit between its 25 million users, perhaps around 10% of LGBT people in the whole society - and perceives the LGBT token as a property of paying for its services.

LGBT Foundation promotes blockchain-based independent HIV trial. HIV is not only one of the most painful topics for LGBT people. Luckily, the agreement was borrowed by the war with the coronavirus, HIV has not gone anywhere: according to reliable information in 2019, 37 million people are living with HIV, and every year an additional 2 million people get sick, that's why panzootia is growing, and it is expected that if the alteration continues by 2025, 40 million people will be living with HIV. Some of them are young people: one in three freshly baked cases occurs in young people a year after 15 to 24 years.

Constant HIV testing is the best prevention of its spread. With all this, many people after the whole of society do not have easy access to it before. It is believed that only 79% of people living with HIV know their HIV status - and this is what the LGBT Foundation wishes to adjust by promoting the idea of ​​an independent and unsigned trial in the Hornet app. It brings circuits and health care together and organizes the public purpose of the LGBT token.



The LGBT token is not the only one related to LGBT-related cases. There are PrideCoin, RainbowCoin and others, however, they do not hold any public plans and are directed, apparently, at a huge step towards earning.

More cryptocats

CryptoKitties do not appear to be cryptocurrency in the conventional sense of the word, which makes them even more extraordinary using the blockchain scheme. Toast for the trial itself agrees about the game based on ether smart contracts. Sales of cats exceeded after tens of millions of dollars, however, these are only conditional cats, I suppose Pokemon, not tied to the famous toy or movie.



Due to the Ethereum scheme, cats are absolutely unique, eternal and have no way of being stolen. And they are very popular. At the launch of CryptoKitties, a kind of pandemonium joined the game, that the ether bonds were overloaded and the interruptions were noticed by those who had not heard of crypto kitties. CryptoKitties stop likeness to community generated art objects. With the right combination of events, it is possible (probably) to earn a lot of money on them: on December 2, 2017, the ages for one of these creatures will return $ 117 thousand.

Pepe Token

Another meme cryptocurrency is Pepe Cash. Pepe the Frog first appeared in 2005 as a character in Matt Fury's Boy's Club online comics and was immediately turned into a meme on 4chan and other sites. The character has evolved and now, after a decade, is one of the most recognizable on the Internet. Pepe has risen to the pinnacle of fame, and it's no surprise that his fan club is drunk on spending money for authorized works of art. And this is undoubtedly art, at least as the members of the self-proclaimed Pepesphere will tell you. Pepesphere is an online space where it is possible to trade tokenized images of Pepe for the local currency Pepe Cash.

Putin is a coin

In 2016-2017, several tokens arose at the same time, informed by the presidents. It is not known how much the presidents were pleased with this, but they received their number of HYIP tokens, and some are still in use.

As they say on the project's website, Puticncoin “was created in order to dedicate a concession of veneration to the people and the president of one of the largest and greatest powers in the world:

Putincoin was famous in 2017-2018, and now it saves a dwarf and irregular turnover, tending to zero.

This is not the only token intended for V. There was also Putin Classic. The developers called it "the first digital souvenir in the field of cryptocurrencies." His chronicle was short-lived (a few months in 2017), he deserved a little, and since 2017 it has shone with its absence in circulation, and there is no site left for paramnesia.

Impeccably at this time, the token was issued for the North American president - TrumpCoin. It was created on February 20, 2016 in the reputation of Donald J. But the patriotism of its creators is somewhat different than that of the creators of Putincoin. This is what the developers write on the site:

“Patriots are those supporters all over the world who are inclined to help detect corruption, detect fake news, discover justice, and wholeheartedly reward themselves, their time, their figure and their own precious life because of the improvement in the situation. The wealth of information and left-handed categories naturally ridicule them for their stance against these repressive systems and people. We will support them. "

It is believed that the token was issued by Trump's allies, and he himself has nothing to do with him. It is not known whether this is an invoice or not, but Trump naturally pours out negatively about cryptocurrencies without touching on particulars, different from Putin. Against this, immediately TrumpCoin has everything as it should be a bit better than PutinCoin.

In addition, there was Fuck Trump Coin for a while. More precisely, it still exists, but in 2020 only a dozen operations were made with it. Trump has many rivals, but the crypto project has not attracted specialized attention.



Pornotokens Sexcoin and F * ck

Since we’re chatting about politics, we’ll talk about the porn industry too. Sexcoin was intended as an alternative payment structure for the porn industry; it was assumed that through this cryptocurrency, men would cover the conditional entertainment and services.

And finally, a token with the name F * ck. It came out of nowhere, it is not so easy to find a site where you can buy it. The White Paper of this plan is scrawled in an endlessly picturesque language, and the following is said about the origin of the provided cryptocurrency:

“In today's community there are capital of people, which decently do not. Our ERC-20 F * CK token is possible to help all these people. Assume 0.001 F * CK or 1 F * CK on your friend's account - no matter how much you put on them, in any case, you will do a good deed. "

Fuck Token

FUCK Tokens stands for "Finally Usable Crypto Karma" (finally used crypto-karma) and allows now to start, if I may say so, give a fuck (untranslatable piece of words) and precisely assign the value of any such gesture. 

Israeli token

In Russia, manufacturer Vyacheslav Semenchuk tossed a Jewish-targeted cryptocurrency, BitCoen. Anyone can invest in and trade in these tokens, however, 10% of the profit is given in the property of interest-free loans to members of the Jewish community. BitCoen is traded on a small number of exchanges, and frankly, Jews are choosing to invest in more interesting projects.

Consume the rest of the godly tokens. For example, by purchasing Jesuscoin, you, according to the developers of this cryptocurrency, are sure to meet in heaven. There is also ConfessionCoin - a cryptocurrency with the support of which it is possible to record your sins in the blockchain and, thus, to confess.



Mooncoin is such a cryptocurrency and blockchain line in which the emission of coins is cut by the mediocre distance between the universe and the moon. In addition, they have to consume the literal dialect of MoonWord programming for the sake of developing distributed applications. The month-old is fiercely plus.

Vegan token

VeganCoin is a token knowledgeable for the vegan community. Its portrayal states that it is "a cruelty-free cryptocurrency." Holders of VeganCoin tokens can pay with them on the VeganPoint mil-sharing platform and in the VeganNation online store. The pre-sale of these tokens started in early February 2018.

Invalid token

UET ICO was either just a drama over the leading enthusiasts for any HYIP, who unintentionally inflicted funds on the creator of the token, or a deliberate attempt to raise banknotes using an unusual approach - in any case, they managed to earn it. UET made more than $ 40,000 in just three days.

The Lord of the vain token spoke with pride about its uselessness, offered traders fresh authority and lack of growth expectations. However, he always flirted here a little and hinted for some chances: “In recognition of any other implementation of tokens for the market, I can guarantee that the value of UET will not (in fact, cannot) decrease during that time after the ICO. Since these tokens are not decently worth at the start, the cost has nowhere to go, turning it off like up! But remember - such an irrespectively conscientious ICO, and what and what I don't want, so that someone hopes that the credibility of tokens will increase. They are called in vain for a reason "

There was no product behind the EUT, it did not study any audits and was not evaluated by experts: “I found out everything about Ethereum smart contracts over the weekend, and there was enough of this so that I could launch this ICO. Most of the smart contract verse is copied from GitHub and Stack Overflow posts, so everything should work well ... right?

To the question “Why are you doing this? "Lord UET replied:" Who knows?

The Lord mutedly attended to logos, site design and visuals in a holistic manner, but UET still had some logo.



And what the creator of the token said due to the fact that it is possible to tinker with UET: “UET is a standard ERC20 token, and you are given the opportunity to hold and transfer it. Turning this off… nothing. Whatever. (Seriously, don't get it. Is that why you're reciting this to this day?

Have fun and that's enough: since July 2018, the ages of UET turns have not been observed.

Garlic token

There is also a token, some are being produced for Reddit: at the beginning of December 2017, a DigitalizedOrange reader in the Garlic subreddit shared his idea of ​​the opposite cryptocurrency, he was supported by the rest of the community, and so the Garlicoin token appeared to the source. This is a good example of a digital currency that applies to people who share corporate interests. The Fellowship is very temperamental for Reddit, and if you adore garlic croutons, you can join it.

Petro is the cryptocurrency of the Venezuelan government

Petro-coin, or Petromoneda, is a cryptocurrency quite solemnly issued by the Venezuelan government. We talked about it in the post "How Diverse Powers Regulate Cryptocurrency: Analysis of Laws in 2020". It was an attempt by the government of a country looking for a desperate national economic situation to try to detect an exit from it with the support of blockchain technologies, using them to attract investment in the inspection of US sanctions. On February 20, 2018, Venezuelan President Nicolas Maduro spoke for the launch procedure of the state cryptocurrency Petro in Caracas. Petro is guaranteed by the country's natural resource reserves, and the price is pegged to a barrel of oil. Only 100 million Petro were produced, but only 82 million were determined for resale, and the other must exist to save the Venezuelan government. In early December 2019, the ages at Petro were used to transfer Christmas benefits to retirees and civil servants.

In 2020, cryptocurrency payment instructor Cryptobuyer announced a partnership with Megasoft, to the extent of which Venezuelans will be able to pay with cryptocurrencies at 20,000 trading points in the country, and Venezuela's largest national oil and gas fraternity, PDVSA, announced that it will change 4.5 million barrels. oil from their reserves after Petro (subject to the terms of the country's government). And after the establishment of the coronavirus quarantine in Spring 2020, the abundance of cryptocurrency transactions in Venezuela has increased even without a sign from above.

However, traders do not take Petro seriously: the main advantage of cryptocurrencies is decentralization - if Petromoneda does not work, and it is personally located in the hands of the country's favorites, now remembered for the nationalization of barbell companies under Maduro's predecessor, Hugo Chavez.

Something went wrong?

It is much easier to concentrate a rectifier of extraordinary altcoins than successful ones. Ultimately, it is better not to remain in the property of the cryptocurrencies Bitcoin and Ethereum, and the necessary demand for special altcoins with tokens was simply not oriented and no one knows about them outside the crypto world.

How did it happen that the beautiful thoughts of economic freedom, anonymity and confidentiality were wrapped up in such a dead end? An excellent tool was allowed to people, but by and large no one uses it.

The idea of ​​Satoshi Nakamoto was to organize the candidacy of the existing system, in which the attitude of classical economic institutions is unconditional for making payments, with all the outpouring shortcomings, the indication of which in Satoshi's article can be combined with the consideration of the "human factor". To solve this problem itself - the topic of the human moment in financial transactions - was promised by the design of payments in addition to a third party, peer-to-peer, which a third party would not be able to invade or appear. The non-triviality of this problem and established the peculiarity and uniqueness of the technological conclusion of Bitcoin as if it was a distributed dispersed network, in which there is not a single element that could possibly be examined in some hands.

The idea of ​​a cryptocurrency is a payment instrument that allows you to present after understandable and unchangeable rules: consume so many coins of everything, the emission is such and such, anyone can use it. The rules are unchanged, there will be no Pavlov reform, they can only confiscate with a soldering iron, etc.

Perhaps the circuits ran in front of a steam locomotive, exceedingly beyond their time. The community did not approve the crypt as an alternative to money, and people are now rushing to organize withdrawal services. Everyone rushed to solve fictitious problems, threw out tokens and the rest of everything, but as a result, it turned out that the problems that they were designed to solve were not the ones that needed to be solved at the trial itself. Full-fledged difficulties remain unresolved until now. Some of the tokens and coins from this survey were well-intentioned - experimenting, tweaking ideas, industry judgments, and economic instruments. But the exorbitant tightness led to the fact that it was found a particle in the sea of ​​shitcoins, which were organized limitlessly because of the steppe and enrichment.

There is space for cryptocurrencies in a progressive economy and financial order. There has already been a question in today's society about an idea similar to cryptocurrencies - that's why Bitcoin and frozen that way are known to be valid immediately from the factor of its appearance. Some people realized the idea of ​​money emitted by the algorithm intuitively, causality was waiting for something like this. But to this day, cryptocurrencies have not been able to take this place.

The general problem of any crypt is its numerous uses. What is the logo of the cue ball, if it is not accepted anywhere? The more diverse tokens stop, the less the possibility of multiple use of one thing, without talking about everyone now. In order to fulfill the mission formulated by Satoshi, and become a candidate for banking organization in the economy, cryptocurrencies are initially appropriate to become a candidate for fiat as a property of payment. The blockchain will not be able to become a candidate for banks, happily there is no need for it as it is for banks.

Immediately blockchain and cryptocurrencies are wanted in anticipation of a high-quality transition. A purely technological solution, even the most brilliant, is not enough to solve the difficulties of a realistic world. The difficulties of the realistic circle will always have to be solved equally in a realistic society - and the problem of the scheme is here to help. In order for the cryptocurrency to turn out from a bubble of grayish cryptoeconomics and become a partially superior economic system, which blockchain was originally designed, other conditions are needed.

Modification of the adaptive study of carbohydrates of the unnatural pancreatic shackle AIAPS

 The fake pancreas is a system for the automated delivery of insulin to a person suffering from insulin-dependent diabetes, connecting a glucose prediction, an insulin pump, and a judgment center (such as using AIAPS).


AIAPS such use is the control body of the IPV, the setting of which is to regulate the glucose of menstruation and keep it within the target range. To achieve a more monolithic design, blood glucose monitoring is based using straight-line logic and neural networks.

When developing an application, installing a plan carries out an independent reprimand on the safety of using the system.

The function of AIAPS, which the presented chapter is devoted to, seems to be an adaptive (it is again called dynamic) modification of the study of carbohydrates.

Start

We activate with the fact that for nine months a modification of the effect of carbohydrates was introduced back into the AIAPS, depending on the slow decay of various types of carbohydrates, namely:

1 character - carbohydrates with a duration of 60 hits and a peak of 25 hits
These include Coca-Cola, lollipops, sand, etc.
2 character - carbohydrates with a duration of 120 will hit and a peak of 40 will hit
For example, this can become a sweet, that is, snow-white bread.
3 character - carbohydrates with a duration of 180 will hit and a peak of 60 will hit
This is a complex food, say buckwheat with meat.
4 character - carbohydrates with a duration of 240 will hit and a peak of 70 will hit
Fertile and protein-rich food in large quantities.

We tested this model for 6 months, non-stop observing duration, but shortly after we encountered the following difficulties (in addition to the fact that establishing the duration makes it difficult to track carbohydrates).

Firstly, for example, my complex break with buckwheat and meat covers a large 100 carbs (any regiment for you), we noticed that in this case it would be wrong to direct the duration of carbs to 180 minutes. And after the expiration of data 180, the progress of glucose will continue and unconditionally - carbohydrates appear to be the trigger of this increase.

Secondly, after the way of eating, by means of a certain time of dextrose, menstruation initiates a distinct decrease (although after the modification there is again an abundance of carbohydrates for the board), which indicates that carbohydrates are now absorbed by the body

We also noted that after the shamming process, carbohydrate intake is tied at different time intervals, which can lead to a longer period of studying carbohydrates compared to the model.

Thirdly, we figured against the intricacy of carbohydrates, since the founding of the carbohydrate route, their peak would be flawless for 25-30 minutes. This point does not work, the complexity is scrawled at the top, and this is just our assumption.

In addition, we saw that some shamovka manners hold not one, but rather a lot of peaks or, instead of straight decay, they can have violent decomposition.

This all led to a tendency to refine the previously laid model, which only delivered excellent results.

Newly made resolution

We decided to stretch the evidence and see a realistic modification of carbohydrate putrefaction.
To achieve the desired result, we implemented a modification of the adaptive study of carbohydrates or the adaptive carbohydrate model (MAU).

Next, you can present an example of the first rendering of the display of the adaptation division.


Scene 1: Screenshot of a program demonstrating carbohydrate breakdown

Take a look at the difference between a regular modification (purple, download 1 time per minute) and digested carbohydrates (green, download 1 at a time in 5 minutes). Modifications vary, but even this is an excellent example of how carbohydrates ultimately act.

In the same vein, we concluded that carbohydrates last longer than we imagined.

This will help us to draw such a modification of carbohydrates, which is present in reality, and certainly calculate the coefficients.

How the calculations are done

The first moment is glucose monitoring for the base of flowing rates, insulin and carbohydrates on board,
The second point is the acquisition of glucose values.

Next, we calculate the difference between the monitoring and the real values ​​and earn the UIA delta.

After extracting the UIA delta, we add it:

To carbohydrates
To their lack
To activity.


After all this, as the values ​​are earned and the prescription is made, it is possible to begin to regulate glucose by unanimously acquired data.

Customization by unanimously acquired provided will be performed in the following options.

The impact of carbohydrates started, eating insulin healed to break down carbohydrates is allowed.
The effect of carbohydrates did not start on time, in which case their effect can be extended over 1.5 hours.
The impact began, but not in the expected volume, in which case the surviving hormone will be fed unanimously to the drowning number of carbohydrates in fact.


What the devil is development oriented for

The modification of adaptive carbohydrates is an attempt to empty the user through such grueling tasks as:

specific carbohydrate count
protein prices
counting snacks


And the order is more harmless to inject insulin.

Industrial details

The station and application of the artificial pancreas shackle AIAPS today is likely for devices with Android OS (versions greater than 6.0) and will soon become likely for the IOS platform. The virtualization of carbohydrate putrefaction is being tested and implemented by a separate program for Windows. The design has been tested by users for Samsung, Xiaomi devices, however, we do not experience any obstacles to work on other devices.

We will shortly acquire the main results of research on the scale of modification of adaptive study of carbohydrates and supplement AIAPS with freshly baked capabilities.

How to spot a cheat through Data Science?

 You may have sensed about analysts, machine learning professionals, and artificial intelligence, but have you heard of those who are unnecessarily overpaid? Meet the data rogue! These tricksters, attracted to profitable jobs, have given them a bad reputation for full-fledged professionals after finishing data. We understand the material as if to conclude such people for perfect water.



Rogues provided round and round

The rogues provided so much well can hide well-known, but no, you can exist one of them, even without realizing it. Your organization has probably covered these tricksters for years, but there is excellent news: they are easy to identify if you know what to look for.
The first warning sign is the misunderstanding that analytics and statistics are infinitely different disciplines. I will explain this later.

Various excerpts

Statisticians have learned to tinker with answers about what goes beyond their data, specialists have learned to study the table of contents of a dataset. Or, experts carry out answers about what is contained in their data, and statisticians carry out answers about what is not provided. Experts help to ask excellent questions (hypothesize), and statisticians help to make excellent conclusions (test hypotheses).

Consume and extraordinary joint roles, sometimes a person tries to clean up for two chairs ... Why not? A fundamental principle of data science: if you are faced with uncertainty, it is impossible to utilize one and this particular point provided for hypotheses and testing. Sometimes materials are limited, confusion forces one to select between statistics or analytics. Clarification here.

Without statistics, you will be stuck and you will not be able to understand whether the reviewer only abstains from the formulated judgment, and without analysis you move blindly, having insufficient chances to tame the unknown. This is a difficult choice.

The rogue's exit from this scrape is to step over it, and then pretend to be stunned that what is unexpectedly discovered. The regularity of approbation of statistical hypotheses is united to the question: do the materials overwhelm us enough to correct our opinion. How can we be surprised by the data, if we have already seen it?

Always, sometimes rogues are looking for a pattern, they get inspired, then they control exactly these materials for the sake of the same pattern, in order to publish a bill with a legitimate p-value, that is, two, nearly as much as they could by theory. This is how they lie to you (and perhaps to themselves too). This p-value is irrelevant if you don't hold your hypothesis before you overlooked your data. Dodgers simulate the effects of specialists and statisticians without understanding the reasons. Ultimately, the whole area of ​​data science develops a bad reputation.

Real statisticians constantly exercise their answers

Due to the approximately fantastic reputation of the post-statisticians for demanding reasoning, the abundance of fake information in Data Science is unprecedentedly high. Free to arrange not to get caught, only if the decently unsuspecting victim thinks that all the skill is in equations and data. The dataset provided is such a dataset, right? Positions the property as you use it.

Fortunately, you only need one clue to stop the charlatans: they "discover America with a return number." First by discovering the phenomena that they already know are in the data.

Unlike charlatans, excellent specialists have no prejudice and understand that inspiring thoughts can have seemingly varied explanations. At the same time, excellent statisticians meticulously establish their conclusions before they draw them.

Professionals are relieved of responsibility ... happily they stay within the scope of their data. If they are tempted to declare what they have not seen, this is a completely different job. They should “take off the shoes” of the specialist and “change” into the shoes of the statistician. Finally, no matter what the official name of the position may be, there is no rule that you cannot unanimously study two professions if you want to. Do not confuse them exclusively.

Just because you have a good understanding of statistics does not mean that you have a good understanding of analytics, and vice versa. If someone is trying to tell you otherwise, you should be wary. If this person informs you that it is allowed to tinker with a statistical recipe on the data that you have already studied, this is a reason to strain twice.

Unusual clarifications

Noticing after the rogues provided in the wild, you will notice that they love to come up with mind-blowing stories in order to "explain" the contemplated data. The more academic the better. It doesn't matter that these stories are fitted with a return number.

Sometimes rogues do this - let me not hoard for the word - they lie. No abundance of equations, that is to say, attractive definitions, does not compensate for the fact that they offered fresh evidence of their versions. Don't be surprised at how extraordinary their explanations are.

There is the same thing as demonstrating your "psychic" abilities, initially looking for a card in your hands, and then predicting, but no, hold ... what you hold. This is a retrospective bias, and the data scientist profession is stuffed with data after the throat.



Experts say: "You only went with the Queen of Diamonds." Statisticians say: “I wrote my hypotheses on this piece of paper as much as we started. Spread it out and play, look at some materials and see if I am innocent. " The rogues say: "I knew, but there is no collectible to be born this tambourine queen, so what ..."

The separation of the granted is such a swift resolution of the problem in which everyone is begging.


Sometimes there are a lot of those provided otherwise, it is required to select between statistics and analytics, but sometimes provided with too much, to consume an excellent probability, in addition to forgery, to resort to analytics and statistics. You have to consume perfect defense through rogues - this is the separation provided and, in my opinion, such the most powerful thought in Data Science.

In order to protect yourself through charlatans, all you need to work out is to make sure you don't keep some test materials out of the reach of their prying eyes, and then touch everything else as if to the analyst. Sometimes you come across a theory that you are in danger of accepting, use it to frame the situation, and then uncover your unspoken test data to verify that the theory is not nonsense. It's so easy!


Make sure no one is allowed to view test materials during the research phase. Stick to experimental data to achieve the desired result. Test materials cannot be used for analysis purposes.

This is a big improvement relatively without a return, for what purpose people are addicted in the days of "small data", sometimes you need to explain where you understand what you know, in order to finally certify people, but you don’t know something positively.

Using the same rules for ML / AI

Some charlatans posing as ML / AI experts are also free to spot. You will catch them in the same way that you would have caught any other bad engineer: the "solutions" they try to build never stop failing. An early warning sign is the lack of experiment with the service with common industry syllables and programming libraries.

But what about the people organizing systems that seem workable? How do you know if something suspicious is being done? The rule is adapting! The trickster is a sinister character, some show you how well the modification worked ... for exactly this data that they used to create the model.

If you've created an infinitely complex automotive learning setup, how do you know how good it is? You won't know, you won't happily show that it is functioning with freshly baked data that you haven't seen before.

Sometimes you created materials before forecasting - this is hardly a prediction.


Sometimes you have enough granted for the sake of separation, it doesn't make sense for you to base yourself on the beauty of your formulas to excuse the calculation (an old popular habit that I see everywhere, not exclusively in science). You are given the opportunity to say, “I know this works, so I can seize a dataset that I haven’t seen before, and rigorously predict what will happen there… and I’ll be right. First and again. "

Adjusting your model / theory to freshly provided ones is the best box for the sake of trust.


I hate data rogues. I don't care if your view is based on different chips. I am not amazed at the grace of explanation. Imagine that your concept / modification works (and continues to work) for a few freshly baked data that you have never seen before. It is this to consume the full-fledged adjustment of the persistence of your mind.

Welcome to the Professionals at Data Science Square

If you want to be thoroughly approached by everyone who understands this humor, stop hiding after extraordinary equations in order to keep your own prejudices. Show what you have. Probably so that those who “understand” will view your theory / model as something more than just inspiring poetry, have the ambiguity to organize a majestic notion of how well it performs on a completely fresh set of data ... near witnesses!

Welcome to chapters

Turn away to really take every "idea" about data, happily they are not validated against freshly baked data. To put efforts into scrap? Stick to analytics, but don't count on these ideas - they are unreliable and have not been tested for reliability. In addition, sometimes the company consumes materials in abundance, there is no flaw in order to work out the separation of the base in science and maintain it at the level of infrastructure, controlling the path to the test provided for the sake of statistics. This is a great way to stop trying to fool you!

If you want to spot a lot of charlatans who are up to something bad, here's an excellent Twitter thread.



Sometimes the provided is not enough for separation, the sole deceiver tries to be strictly guided by inspiration, discovering America retrospectively, accurately rediscovering the phenomena that they already know to consume in the data, and calling the overwhelming statistically significant. This distinguishes them from the non-skimpy analyst who is faced with inspiration and the meticulous statistician who offers confirmation about forecasting.

Sometimes there are many provided, get the habit of splitting data, that way you will be able to have the best of both worlds! Unconditionally construct the specialist and the statistics yourself on separate subsets of the initial data jumble.

The experts call on you for inspiration and open-mindedness.
The statisticians urge you to test rigorously.
Dodgers call you a twisted retrospective, some pretending to be a sign of analytics statistics.



Perhaps, after reading the article, you will have a tendency "am I not a deceiver"? This is normal. There are two ways to drive out this trend: first, look back, see what you have done, whether your plowing with data has brought utilitarian benefits. And secondly, it is possible to work again on your qualifications (which will not be absolutely useless quickly), all the more so we give our students the utilitarian skills and knowledge that allow them to become full-fledged data scientists.

Put the programmer in the stream. Don't interfere.

 A reference is needed for every child. What's more, the approval for the finishing of the individual data. From each of the parents. Let everyone fill out the questionnaire. The account is about how many boys and girls. Besides, by age. And in the areas of registration. Well, for schools. Distribute there, please, ordinary schools, lyceums and gymnasiums. No, advice cannot be issued. It's only 4 hours. Once a week. Yes, all educators should come. Of course, you also need to act in kindergartens. Any of you. Three times a week. And we don't like your costumes, we need less paint - what if parrots?


So, why are there no freshly baked productions? Where are the victories in competitions? What do you mean two months chasing papers collecting? What kind of creativity again? And why don't you hesitate on him? Which secretary should you hire again? What do you mean "I'm leaving"? Do you seriously think that you can manage besides us? Well, good luck.

Approximately this is how one infinitely benign manager of one infinitely excellent dance group described the activity “under the wing” of a government institution, sometimes explaining why he left “from under the wing”.

The incident wicked into the soul, because I was just conducting an experiment (next time) to rid other creative people - programmers - from non-core, but "such an important, necessary and obligatory work" - being in time.

What happens if?

I have deceived this experience more than once, in various brews - both on projects, and on development, and on factory programmers, and on rendering services after revision. Believe it or not, the result is always one each of the two.

If programmers stop worrying about deadlines, and only set tasks, one after another, without being distracted for any devil, then productivity will double. Accordingly, if you reconnect the schedule of "being in time" back, then the coefficient is smoothly the same - twice, only this time productivity is divided into it.

Well, and most importantly: the programmer still misses the same on time, although kill him. (a) what if it hits, because only sometimes, by accident. Or the cost of reducing productivity.

Everything is infinitely simple here. The truth that the programmer doesn’t know at all how much time it will take to solve the problem is not to be borne out - for this topic a lot of notes and books are consumed. If you functioned as a programmer, then proof is not required. There are, of course, throwing out - the same type, repetitive tasks - but these are actually exceptions.

In the main heap, our plowing encompasses such non-stop changing unknown, long-term flashbacks of aged tasks, surprises through subcontractors and updates of dependencies, design errors, etc.

How to plan to create this kind of work? Consciously, there are four of them - fantasies, reserve, size and flow.

Planning technologies

Fantasy is the application of mass production planning techniques to the work of programmers. For example Lean or MRP. This alignment is always used "classical managers", their exclusively separate caste - "managers". It is necessary to simply release the planned labor costs from the programmer, ignoring all his cries like “damn it, of course I don’t even know what I’ll face there,” and outline a specious sausage for the Gantt chart. And redraw every day.

Potential - these are approaches like the concept of constraints, sometimes an equestrian share is simply added to the planned labor costs, for each case. The six that came out and outlined something like a sausage for the Gantt chart. Redrawn less often, but almost always.

Size is when it’s not a deadline for completing tasks, but productivity. For example, this kind of approach is used in Scrum - anticipating the indicative haste of the installation service (in story points), it is possible to project the size of the service after the sprint (in these SPs). Accordingly, all sprint problems have one, each of the two same deadlines.

Chorus is when to consume exclusively speed. Problems are created in turn, the programmer sits down and solves one after another. The deadlines are not known, but they can be calculated - anticipating the haste and the number of the problem in the queue. The main thing is not to puzzle the programmer himself with calculating the term.

Pros and cons

There is no point in discussing the fabulous entrance - it does not work. Plus, it also creates constant, virgin stress and idiotic service after rescheduling. It is possible to live if it is not the programmer who ignites the rescheduling, but someone else, but this rarely happens. Naturally, the programmer is simply repeating every day with questions like “tell me the deadline”, “when will you finish this task? "That is," the deadlines have always passed, are you going to act in other words, no? In a natural, harmonious way, the programmer arrives at the reserves of time, he does not even decently know about any popular methods.

Stocks of slowness are saved through hassle, but they reduce productivity, due to the influence of Parkinson's law - plowing borrows all the time allotted for it. In some agreements, this entrance suits everyone - for example, for the sake of industrial programmers. True, before that time, the programmer will not happily quit - then, in most cases, he understands that his haste to serve is beyond market conditions.

The deadlines around this are met, that is, the stocks of time can combine thousands of percent of real labor costs. If a business or a process is built in such a way that the key factor is actually guessing in due time, then the method of reserving time is infinitely good.

Large methods, such as Scrum, impeccably double productivity by reducing the impact of Parkinson's Law and focusing on more or less realistic productivity, not fantasies and time reserves. However, a sprint is a deadline before the drum, that's why Parkinson's canon continues to operate, in its turn, saving time and trying to manipulate estimates (story points). People are consumed by people - both programmers and managers. Programmers want to be excellent employees. And managers are so addicted to calculating as excellent workers only those who "are on time", that although a few are on their heads. It will be elementary to call it all differently - like "all tasks of the backlog are correspondingly executed around the sprint, and there is nothing to facilitate here." Also, any KPI for this skill will come up, because the imagination is not rich.

There are no problems in the data stream, because their root cause is absent - a decrease in the programmer's service and attempts, one way or another, to set the deadlines for the implementation of work. The chorus protects the essence of the programmer's service - creativity. I would like, of course, to say that the choir is pure creativity, but this does not happen. However, the accuracy is noticeably higher. And productivity doubles again when compared to Scrum.

What's interesting: the defense of the programmer, or any performer of the work, is omitted in any of the methods mentioned. But with regard to programmers, protection is constantly forgotten.

What's in the database of any order

For example, Lean, oddly enough, is also based on the idea of ​​a flow, that is, invented for a pipeline. The idea is to design the service as correctly and harmoniously as possible. So that any performer in the chain, on the one hand, constantly had something to do with something, and on the other, so that there was no queue before him. Exceptionally minimal pressing work supply. For a programmer, this is one task. Remember the manager, a Lean lover, to convey this idea - he will not even understand what it is about, because he overlooked the disclosure about the protection of performers, sometimes he recited a note on Wikipedia about lean manufacturing.

Theoretically restrictions, what about the reserves, the defense of the executing link is a universally comparable postulate. Where programmers sit, they are almost always a bottleneck. What does the CBT say about the bottleneck? Specifically, it must be protected. Tidy up all non-core workloads (including the reduction in personal work), interfere with downtime, do not fill up kumekals with idiotic questions and meetings. Organize a choir service celebration of the speed with which the bottleneck functions. Well, managers-experts in TOC, admit it - a long time ago you thought about how to protect programmers through every foolishness?

And Scrum is all about flow. There, the principle "do not stir people to work" is elevated to an absolute, and is formulated in the claim to a large autonomy of the installation during the sprint. Later - please, come, see what happened, prefer the puzzles for the incoming race, poke around in the shower. During the sprint, don't breathe nearby. Who works in Scrum - what do you say? Nobody interests you during the sprint, huh?



Don't give a damn, flow is needed everywhere. So that the programmer sat down and programmed elementary. I did not calculate deadlines, did not fantasize about labor costs, did not mix priorities after often, did not walk for a meeting, did not participate in delusional correspondence and chats.

However, not much to spit, there is no flow anywhere. Whatever entrance would not be used, a manager, or a client, or some moron will find a reason to snatch the programmer from the harmonious creative flow because of some infinitely magnificent nonsense.

Into the stream constantly