General trends in the development of telecommunications in times of all the bored pandemic

 On October 28, the country went into a regime of self-isolation, Germany decided in a similar manner, however, with more flexible conditions. Probably, other powers will also set the quarantine schedule in motion for the evaporation of weeks - for example, Spain, which has now slammed some regions.


It is clear that all this will have infinitely knowledgeable consequences for the sake of diverse areas of business, starting with IT. Against the crisis, manufacturers' profits through the cloud infrastructure deployment trade are growing. Telecom tendencies at this intricate moment are described in the article.

Cloud service hardware spending is on the rise

According to reliable information from Idc experts, the profits of manufacturers of network equipment, starting with servers, storage systems, switches, are growing little by little. The explanation is elementary - business and national creatures must quickly improve telecommunications in order to transfer the increasing load on the network. Accordingly, spending grows for some companies and profits for others.

Thus, the deepening of revenue through the cloud infrastructure equipment retailer after comparison with the previous year collected 34.4%. And a similar ratio for equipment that is not integrated with IT infrastructure decreased by 8.7% in comparison with the previous year.

As for the available cloudy services, because here expenses during the year stretched for 47.8%, reaching a mark of $ 14.1 billion. Experts say that this year, this type of expenses for the first time exceeded the costs of traditional IT infrastructure. And since panzootic is developing, the progress of the "clouds" will continue. According to experts, by the end of the ages, business expenses for this site will amount to an impeccable 54%.

General drivers of growth

The trends that we are talking about were already quite visible in the spring - the push too often responds to change in all spheres of service and life. Distance education has become famous, telemedicine is being deployed, and the abundance of entertainment services is increasing. This could not but influence the deepening of purchases of network equipment and everything that has any connection with the clouds. According to analysts, by the end of this age, the costs of business and national systems on platforms for cloud infrastructure will increase by 50.9%, reaching $ 37.7 billion. The push for collective storage systems and Ethernet switches is only growing more constructively.

These trends have shown themselves not in some one region, but are valid in all countries, starting in Europe, China and the USA. In the last two areals, the annual growth rate has collected 60.5% and 36.9%. At the same time, public clouds unwind much faster than private ones. Finally this year, profits through them will increase by 15% to $ 52.4 billion.

If we argue as they say, then by 2024 the costs for the cloudy IT infrastructure will increase to the mark of $ 109.3 billion. This is about 63.6% through the corporate size of expenses for IT infrastructure. Expenses for own cloudy infrastructure will increase by a rough 9.3%.

The question was multiplied by joint decisions. The skill is that most companies, whether small or large, have different-sized IT infrastructures. That is why, for the sake of optimization, mash prefer multicomponent environments and utilize designated infrastructures in commercial data centers.

Most of the companies that are frozen to recycle cloudy infrastructure, have set the benefits that it gives. So, someone has clearly increased the scale of the use of internal IT-services, so that it was required to immediately distribute the capacity. And for some, on the contrary, the business is not as active as in the very beginning of the year, so that such fraternity is used less by the clouds. Accordingly, resilient infrastructure delivers the ability to nimbly reduce load and save money.



And what about Russia?

Not surprisingly, the market for cloudy services in Russia is also growing - it has multiplied by 24.8% this year, exceeding analysts' expectations. It is clear that most of the monitors were collected in the previous year, and they are somewhat behind in terms of realistic indicators. In the Russian Federation, in its turn all over the world, the push of public clouds prevails - its share is 85% in the market of cloudy solutions. Most of this bazaar is owned by Microsoft.

In 2019, the profit of the 10 largest Russian suppliers SAAS (Software-as-a-Service) increased by 48% after comparing with 2018. In absolute terms, the size of the bazaar has multiplied to 48 billion rubles. As for the IaaS bazaar in the Russian Federation, its volume was two times less. The profit of the top 10 companies from the Russian Federation was around 24 billion in growth. If you collect the top 100 companies, then the total amount of their revenue in the Russian Federation according to the results of the previous age increased by 22%.

Exclusively demanded, cloudy schemes have frozen in such areas as financial services, telecommunications, manufacturing, pharmaceuticals, and the automotive industry.

By the way, after the provided Mail. ru, immediately in business and usual

Strong association - is she doing well?

Not to mention the details, yes. Business and the kingdom understand that when fast internet is needed, strong communication lanes come to the rescue.

“Telecom is not an elementary socially obligatory business - apart from us, self-isolation is unbearable in principle. We help to experience stress, organize communication with loved ones, guarantee equipment with food and medicine, improve coordination - this is always possible exclusively due to the Internet. In addition, only that we have a solemn level of penetration of broadband access in our country, it turned out to be important, ”declared an agent of one of the largest IT organizations in the country.

But, unfortunately, many providers and operators get revenue. So, due to the fact that some services were provided free of charge, the fall collected 5-10%. True, in the agreements of the second quarantine ripple, the emergence of violent growth is likely, some will close the fall of the proceeds.

On the other hand, it is impossible to forget about the initiative of the Russian government in the project of providing free access to socially necessary resources. Operators, however, without specialized enthusiasm, froze to look for solutions that would help to implement this initiative.

What's next?

The distribution of the microbe so either friendly will stop. Regrettably, the sample of businesses will be able to experience the second swell of the coronavirus - quickly extremely difficult economic conditions for them. Big risk - for a small service business. However, most mugs will always go back to work.

But do not expect that the use of cloudy services, including sent education, etc., will decrease. No, users endlessly liked remote plowing - and some simply do not want to repeat themselves to offices.

Remote plowing was enough for many employers - however, in this case, no one is late for work, it is possible to connect with a man at any time. Probably, in the near future, freshly baked companies, which did not manage to develop this at the beginning of the current year, will run to the remote location. And then the overload for the bond will increase even more.

There is only one exit - to buy new equipment, establish bonds and stretch cables. Management measures alone will not help here.

In terms of pandemic and remoteness, take a closer look at the centralized management of the Zyxel Nebula line. It is an ecosystem of hardware and software components that will help not only promote the line REMOTE, but also manage and scale. Any “Uncle Vasya” can attach an access point for the limit in a branch and drive RJ-45 into it, and the administrator connects to the point remotely, configures it and regulates the volume of its work. This is exactly what it is with switches and firewalls.

17 Chrome and Firefox extensions for your privacy and security

 Without getting into the details, the set of useful extensions can be overwhelmed for five categories:

Blockade of advertising
Suppression and falsification of information (IP, geolocation, user agent)
Clearing provided in the browser
Privacy options
Defense through malware and mining scripts

A number of browsers are established for the Chromium engine, its extensions are compatible with Brave, Opera and Vivaldi.

Ad blockers

The most important extension that you need to define yourself, and yes to all known and relatives - advertising worker. This is an absolute must have for everyone. Here are the most popular ones:

AdBlock Plus (Chrome, Edge, Firefox, Opera, Safari, Android, iOS)
AdBlock (Chrome, Firefox, Safari, Edge)
uBlock Origin (Chrome, Firefox)
Ghostery (Chrome, Firefox, Opera, Edge)


Extremely recommend a positive blocker, they all do a pretty good job. Someone loves the fastest Ghostery, someone has adapted to the elderly AdBlock Plus.


The results of benchmarks at the beginning of February 2019, how much time it takes to finish the page with various ad blockers. Against investing, all of them, as a result, activate the loading of pages

Last but not least - vote after the perfect blocker.

Suppression of information


Silence of certain information: referrer, user agent, IP-address and geolocation. Protects through online trackers and allows you to correct your IP address in the output for the server.


User Agent Switcher


A simple and powerful continuation for switching between multiple user agent lines.

WebRTC Protect

WebRTC is an open source real-time communication framework. It is usually used for video calls and conferences via an Internet browser, that is, mobile devices.

The sequel to WebRTC Protect protects the user through IP revenues via WebRTC. The sequel is tiny and easy to use.


Unseen - privacy in chats
Defense by detecting Seen status in chat rooms. It functions with web messengers WhatsApp, Facebook Messenger, Web Telegram, etc., and on facebook sites. com and messenger.

Blocks the "Viewed" status, the final enterprise pointer and the "User is typing."

Location guard
Silence is the fake of its geographic location.

Clearing provided in the browser

Click & Clean (Chrome, Firefox, Edge)

Famous sequel to cleanup fleeting provided in the browser. Of course, the consistency options are consumed in the browser itself, but this extension produces a lot of customizable settings and increased cleaning options.


Privacy options

Privacy Settings

A minimalistic yet highly feature-rich sequel for the sake of managing privacy options. Differs in an artless interface.

Privacy Manager
More relocated air traffic controller privacy options in Chrome. There are a lot of options and settings for the sake of managing safety options and cookies. Permits yes to send viewing materials, for the sake of this to consume an impressive set of options.

Privacy Manager can generate mesh monitoring, cheat cookies, and fill in IP addresses over WebRTC.

Privacy Badger (Chrome, Firefox, Opera, Android)

The sequel to Privacy Badger through the Electric Stages Foundation (EFF) unconsciously shows and blocks trackers and harmful scripts based on their behavior. Consume permissions for discrete items, including video players and dialog widgets.

The creators explain that they like Disconnect, Adblock Plus, Ghostery and other similar extensions and ad blockers, but "they don't provide what they need." The test showed that all of these solutions for an effective service require some amount of uncomplaining configuration in order to block the original trackers. Some are scrapping an unacceptable business model by removing buyers from the block list after money. That's why EFF let go of a personal follow-up to block tracking.

Relocated open source cookie manager. Allows you to edit, add, manage, organize and search after cookies. Yes allows you to cheat the expiration date of cookies and import / export them.

Defense and harmlessness

Miner blocker

The continuation against cryptominers not only curbs the service of miner scripts, but also serves as an indicator for which sites such malware is delivered. Owners of sites believe this to be a legitimate modification of micropayments, sometimes readers pay with their resources for the service of access to information, however, in this case, it is moral to warn users about charging fees.

Fox Web Security

Maternal control: blocking sites with adult content. However, it is possible to bypass it, however, as if any blocking.

HTTPS Everywhere (Chrome, Firefox, Opera, Firefox for Android), continued connected in Brave, Tor and Onion (iOS) by default

General development of the Tor Project and the Electric Frontier Foundation. Many sites do not implement full, but partial or incorrect HTTPS help. For example, after the default, the unprotected HTTP version is loaded, or separate hyperlinks are set for it on HTTPS pages. The sequel to HTTPS Everywhere fixes some of these bugs by changing requests for the fly.

Any sequel records its contribution to web page parsing and memory consumption, so it is desirable to define an imperative extremum and nothing more. For example, the "antivirus" extensions at an impressive level are in vain and use only CPU and memory repertoires extremely ineffectively, and at times they even plant worthless advertisements into the Internet browser, as if it were an antivirus continuation of Avast.

If you are used by other useful extensions for high protection of your own provided and security, add in the comments.

Responsible imperfection in GeForce Experience

 NVIDIA developers have patched two major vulnerabilities in the GeForce Experience utility. This program is installed together with the drivers for video cards, responds after the automatic software resumption and other functions. In versions of GeForce Experience up to 3.70, a difficult task was found that theoretically allows you to inherit one hundred percent inspection over the system.


When installing the warranty After on the user's computer, the web server for the NodeJS warehouse is blown up, corresponding after the association with the manufacturer's infrastructure. It loads emergency libraries automatically. In some case, the device of this ingredient is located near the control of a potential attacker, and he can change it to malicious code. Failure CVE-2020-5977 earned 8.2 points on the CvSS scale and can cite as if to denial of service, similar to a random elevated verse.

The second vulnerability, CVE-2020-5990, corrects an error in NVIDIA ShadowPlay for the sake of capturing and streaming game video, however, it is possible to cite a local prerogative increase and random code execution. Renewal for the sake of GeForce Experience can be downloaded on the company's website, or you can wait for the freshly baked version to automatically download.

A similar theme has been slammed in GeForce Experience for a year. Then the prospector found a procedure for replacing one of the entire files to which the utility revolves.

Similar After the timephased is utilized for mass or targeted attacks. Vulnerabilities in the programs themselves can be exploited, but in unusual cases the whole chain of software delivery to the user is in a dangerous position. The most well-known incident of this attack is the activity of ShadowHammer, during which a modified program for the sake of ASUS computers was distributed for some time from compromised servers.

What the hell happened:
Nokia specialists shared a report on the detection of malicious software in computer networks that use the company's defense assets. Professionals noticed a decent progress in the number of infected IoT devices: their share between all compromised devices was 32.72% (16.17% a year before). Primarily harmful after being caught for systems near Windows. In second place IoT devices - phones and gadgets based on Android have moved them to the cake.

In the Linux 5. 10 kernel release, we pulled out the setfs () function, which made it possible to refuel writing to the operational memory. According to reliable information from some sources, it was present in the OS kernel since version 0. 10 1991 ages - then it was introduced for the sake of helping outdated systems for the 80386 processor warehouse at that time. In 2010, it turned out that the function could be utilized for rewriting data to which the reader, in the usual modification, cannot have access. A similar glitch in LG smartphones for the Android warehouse was shown in 2016.

Yandex. The browser, and yes in Opera and Safari, had a bug that allowed to falsify the content of the address bar. So far, a bug has been found in Google Chrome, thanks to which user materials are not deleted for the sake of Google personal services (for example, YouTube), even if there is no exception for them. Transcendental, this allows the user to be identified, some refuses to give themselves away, eliminating all previously secure information. Google approved the error and promised to fix it.

A Check Point study argues that phishing emails primarily exploit Microsoft's services. In 19% of cases, phishing attack operators fake messages to make them look like the correspondence of the given company. In second and third places is phishing through the names of DHL and Google, 9% each.

How does fame regulation work on the global Internet?

 If we say in ingenuous language, then the main installation within the framework of fame management is to hide all the negative away, and promote the positive so that, therefore, it is to the user, some is fond of this or some company, or a product, that is, a person.

In order to immediately separate the feasible aeronegative and the hate after touching on this article, there will be no question of customized responses. Here I will outline in general terms the principle of action of any of the instruments. Some of them are used on a scale of other directions, any exclusively at the disposal of fame on the Internet.
On the eve of reading, please note that this source appears to be purely a story about how fame regulation affects corporate lines. If you indulge in specifics, then the material threatens to become extremely impressive.

What is reputation regulation made of?

So, if we say about the most general devices in the framework of reputation management, it would be preferable to structure them in two directions, such as the subscriber support service and the formation of a controlled zone.
There are two main areas of payment for customer support:
- Forecast of mentions on the Internet.
- Reacting to mentions.
Here, from the names of the devices, it is possible to freely determine after what they answer. The forecast is carried out, in most cases, by means of YouScan and Brand Analytics. The general directive is to detect mentions of a company that ask for conclusion or attention. Such a negative may exist, which is worth responding to from an official representative, a discrepancy with a product or service / order, information about which should be presented to the subscription support industry. In addition, there may be an ordinary note or advice on the work of the brew and the improvement of the service, which should also be taken into account.
With responsiveness, the conjuncture is impeccably the same simple. You take an unloading from the forecasting arrangement and see for which devil you need to answer. Possible match from both faces of the official representative, that way, and from the faces of the client, but this is a few nigger work, which may also be that way prodelyvat within reputation management.

Establishing an info field

In this case, the size of the services and the abundance of devices are larger than those of the customer support service. If in the main case plowing is directed, as a rule, to work with existing ones, then when generating an information field, the setting is quite different. The subject of the action will be an eventual client, some of whom are familiar with your company / product now, as if they are with competitors, and today he wants to choose whom to actually contact.
It should be taken into account that in addition to ordinary advertising and PR, consuming apparently-invisibly special methods, one of which we are talking about.

SERM (Search Engine Reputation Management)

Many who are devoted to this topic insofar as it is in detail, call "Serm" one hundred percent complex of reputation management, but this is not so. SERM responds only after the establishment of the issue, and more specifically for the promotion of positive resources in the visible area, thereby displacing negative ones. Plowing occurs according to brand demand and reputation (brand / product + reviews). This is done, first of all, due to the increase in behavioral and social moments on these very resources. In addition, I will again consume a number of details for promotion, but I will not go into them.
In general, within the SERM, it is necessary to understand that the speech agrees on the actual reputation queries, which can be found in "company + reviews", "company", "product + review", "person's name", etc. It sounds simple enough, but quite often, sometimes they want to write out regulation by reputation, they orientate the required question, I suppose, "mounting scale reviews".

SMRM (Social Media Reputation Management)

In its turn, it will be authoritative to provide from the name, this toolkit responds to the management of fame in public media.
This includes classic SMM, some of which function in conjunction with ORM and the client's preconceptions are worked out. However, this is not all. At the disposal of fame to consume infinitely frequent activities of creating controlled resources, which can be relegated to SERM, similar to SMRM. In between these resources, consume the following:
- Feedback sites (satellite sites), which are used to post responses about any positive multi-brand, that is, a group of goods. Immediately, they are already far differently relevant, as if a few years ago, since the buyer's confidence could hardly be baked into by means of a resource known exclusively to one company. It is possible to tinker with deeper reviews, however, for the sake of agreeing only the content for him and the technical specification itself and the composition of the site, it will take a significant amount of time, effort, and funds.
- Articles. They are used for more popular product reviews, that is, the company's service. In most cases, these are the same semi-advertising articles that the companies themselves scribble about themselves, it will be exclusively published through the faces of a client who has long had an experiment of service with a company or using a product. In most cases, 2-3 notes are located in the base of the reputation services, after which they are already moving into the tested zone.
- Blogs. In fact, this is exactly the same thing as articles, only a blog is captured by one and articles are placed on it with a set frequency. It is not clear how, it is also promoted into the visible area.
- Categories of responses and judgments in social networks. Here VK only grasps denser, where a similar group is signed, in which fraternity it is possible to inherit a return association with respect to their work, and, of course, easily moderate it.
I myself will note that groups and satellite sites are losing their relevance, but until now some are inflamed by their creation and maintenance.



In fact, the fundamental and most significant tool if the brethren are thoroughly functioning over their reputation. It is not so important whether the contractor or the company itself, which follows the reputation, is selling it, but the unloading, as if as a rule, is collected once a day, after which it is now possible to notice and decide, there is nothing to do with all the references.
The most important thing is to set up a well-adjusted monitoring system so that not a single mention, the more negative, could slip out except for attention. It is necessary to work out all the semantics in great detail, only this is essential for the sake of brands and products with famous names.
Yes, it happens endlessly every minute, sometimes in the response that is, the comments do not contain the name of the company. In such a case, it is possible to treat by hand a small resource cartel. It would be best to arrest the TOP 10, or exclusively the company's social network, although, in this case, this intersects with the SMM department.

React to be mentioned

One of the most general tools, some responds after a still fresh aeronegative, that is, the rest of the mentions that ask attention.
It is necessary to understand, and if we are talking about the negative, then it should be split into constructive and far-fetched. It’s one thing, sometimes a visitor bought your product, he met an alliance or consumed some painful space, and the consumer scribbled about it in a social bond, that is to say otzovik and put everything on the shelves. Here it is more than logical to respond to the message, if you find it through the streamlined monitoring.
Differ, if such an ordinary rude provocative hate review, where there are no arguments and indications of shortcomings, and the text is filled with obscenities and far-fetched facts. In this case, it is preferable either not to react, or to do it in a big way on behalf of the brand evangelist, some will intercede and be able to force the discussion (if, of course, this can be called a discussion).

How to have a conversation with the creator of fruitful negativity?

First of all, it is essential to understand, and if you decide to write out the regulation of reputation, because at first the distributor will chase you like a small child with clarifications in what manner it is worthwhile to correspond to this or that negative. By the way, during the main month, a diagram of reactions will be collected, where all the nuances of communication with a client, types of responses, and a feasible counter negative should exist.
Sometimes the enumeration has already been found, you should immediately find out the details of what exactly is the root cause of such dissatisfaction, unless, of course, this is not clear from the message itself.
After that, the extremum in the two notifications will switch the conversation to personal information, that is, to the mail, so that the entire investigation of the events does not take place in front of everyone. If you managed to do this, everything is fine, the plowing is done. Further now it depends on the support service.
It is possible to ask the question: “Why is it all without exception, if it is possible to simply hand over a greeting to the support service? The protest is quite elementary - in this case, it is important that users, including those who have thrown out indignation for a prominent place, create a vital communication, which will make it clear that the sampled companies are the same for their client. Support work, in most cases, responds in an extremely dispassionate and scripted manner, which is why it does not have the same effect.

Direction of adverse responses

Having recited this title, you probably thought that the speech agrees to delete everything, but it was not there. At worst, it makes no sense to tinker for two reasons:
In the wrong scenario, aeronegative is possible to inherit tremendous publicity.
You will not be able to send everything.
It is worth trying to send aeronegative exclusively for trust sites, the moderation of which is possible and will be directed to the dialogue, which is important, first of all, your personal reputation. It is precisely to consume these same trust resources, which are seized within the framework of placement, if you write out regulation by reputation. They are rather complicated in terms of placement, even if the analysis keeps an obvious client. There is nothing to do about pulling out reviews, because the presence of responsible and impartial arguments, which is why this or another analysis seems to be ordered and not from your client, the source is quite possible to thoroughly analyze the lamentation and remove the analysis, that is, an unfavorable comment.
Already such, at first glance, sound and service complaints may lead to a new swell of negativity, if a toast agrees on resources that seem thin and aimed at negativity. The market for incriminating evidence in Russia itself has been formed wow (If all of them say this word in time). It is this that seems to be the main factor, because similar portals and sites will unleash the situation about the fact that someone scrawled them with a request to send it any other aeronegative, that is, compromising evidence.
It is preferable not to touch such repertoires, but to release them below, where a small abundance of users will experience it.

How to build a reputation at the start?

Let's examine the entrance to the formation of the outfit for the sake of the company, which exclusively goes to the market.
It is not clear how, mainly, this direction is significant for brands, which are preferable to operate on the Internet, that is, their implementation depends on discussion on social networks and word of mouth.
So, let's say that there are brothers "X", which exclusively streamlined and tuned business processes and begins their activities. It is important for her that the client, sometimes picking up between her and more popular competitors, chose her proper. Otherwise, it is important, they decided to write out the regulation of fame, that is to say, to develop it ourselves, depends solely on the possibilities, both organizational and financial. Yes, tell about yourself in terms of reputation?
First of all, you need to know that if the brethren are engaged, say, in the creation of refrigerators, then forming the issue after business inquiries, I suppose “to buy a refrigerator” is generally impossible. Our attitude is brand and reputation queries, in other words "brand name" and "brand name + reviews".

We regulate the info field

It is here to this day easier, after the last measure, if the conjuncture is not neglected. In this case, the most magnificent and most important thing is monitoring. It will help not so much on the scale of reputation management, but also to understand the entrepreneurial spirit of the users of the mash on the Internet, where they say a lot about you, which channels of attracting an audience seem to be more successful, and where to consume drawdowns.
Sometimes you know that somewhere you have scribbled something that disgraces the corporate picture, and even more so, if this is a client's problem, some wants to insist on its solution - pay him and resolve it. It is essential to tinker it not like outdated machines with ingenuous scripts, but to conduct a good communication with a person in order to conclude a problem, gradually, as if he wrote above, lead the conversation for the mail, into his own information, except further.
In addition, it is infinitely not advised to always reshoot the time to the support service. Not long ago I saw that on one of the popular marketplaces a store selling covers for phones and laptops responded to all responses with a message, I suppose "Thank you after the review, your opinion is infinitely important to us." Everything would not be so sad if there were no such conclusions on the negative and reviews in a certain star. Looked at it, you know, insofar as it is good.



With the right scenario and the appropriate basis for the trouble about your outfit on the global Internet, you can get by with “little blood” to the limit and create such an information field, which will be just as much attacks of competitors, not remembering the realistic basic negative. In such a rework, there will be no desire to write out regulation by reputation, after the last frontier, in the form in which such a trend is transmitted by the majority.
Immediately, such a trend evolves, moreover, this is combined not only with the emergence of freshly baked devices within the framework of work, but also with the awareness of the business that it is much better from the very foundation to approach reputation and image as capital, and in contrast to an empty sound.

Why didn't altcoins soar? Chronicle of extraordinary cryptocurrencies

 Bitcoin started with an idea formulated in 2008 in the Manifesto of Satoshi Nakamoto: an economic structure for the Internet economy, allowing the implementation of payments on the web directly, content with the mediation of classical economic institutions. As it turns out, many were expecting something similar. During 2013-2017, freshly baked cryptocurrencies and tokens appeared in huge numbers, including the most unusual ones. Some - prepared after the joke, jokes because of the experience for; the rest - with a specific mission: public projects, political coins, various business ideas.


It was at this post that we compiled samples of the most diverse, distant well-wishers from a friend and unobvious in concept tokens and altcoins: from Dogecoin to LGBT coin, from coin to bypass political censorship to porno tokens to pay for something unconditionally.

Perhaps many of them will work for some as a source of freshly baked ideas. But, most importantly, we want to describe their situation and analyze three questions:

What was it?
Why didn't they succeed?
What is it, therefore, for the upcoming blockchain and cryptocurrencies?


Little educational program: coins are called cryptocurrencies for their blockchain (from Bitcoin to Dogecoin). Tokens are derivatives of another crypto. Most of them are tokens on the Ethereum blockchain.

The token combined with the Doge meme was created in 2013 for fun, or simply as an experiment property. If there was intent here, that is to say, a filigree foresight, the developers of the pesotoken do not remember it: “One evening I drank beer after work. I had a well-rounded independent time and I arrested and bought a Dogecoin rank. com, ”recalls Jackson Palmer, product manager at Adobe. Subsequently, IBM programmer Billy Markus helped develop a realistic Dogecoin cryptocurrency. Together they wanted the freshly baked cryptocurrency to be interesting and get a huge audience than Bitcoin, however, without touching on the details, it looked faster than dreams than a plan to conquer the world; Cryptocurrency developers hardly expected that it would become 34th after the value of capitalization in the world rank (according to those provided for Lipets in 2020).

On December 17, 2013, Doge's value was $ 0.000255. After a month, at the beginning of January 2014, the course gained marks of $ 0.002306, in other words, stretched out approximately 10 times. After which he just as sharply moved away and was positioned for the macrocosms in motion for three years. However, Dogecoin immediately appears to be the largest altcoin on the market, it began trading for the legendary trading platform Robinhood, and in June, after the trading volume, it was twice ahead of Bitcoin Cash. Elon Musk and Tik-Tok contributed to his growth.

On April 1, 2019, in the Dogecoin official Twitter account, users were jokingly recommended to take a liking to the newly baked CEO of the project. Elon Musk found himself between the applicants, after which the majority of votes were cast.

At the beginning of July 2020, a TikTok reader released a short video in which he clicked to acquire Dogecoin in order to earn on the growth of its value. The shaft amounted to more than 58 thousand likes and 4 thousand.

Major exchanges have taken advantage of Doge's peak of fame and have presented their buyers with great interactivity with altcoin. For example, on July 10, the Binance Futures platform tossed DOGE / USDT lifetime contracts with up to 50x leverage.

Tron plan chief Justin Sun, following the rise of Dogecoin, announced that from now on, his project will focus on building an audience on TikTok. And he promised to organize, so that the videos of the blockchain startup would freeze viral.

“People adore cats and money, so why not combine? "- someone thought unconditionally and, it seems, it worked out. Cryptocurrencies associated with seals are Monacoin, Catcoin and Nyancoin. Of these, independent enthusiasm is driven by Monacoin, immediately ranking 113th in the rankings.

Monacoin is the conditional greenery of the Japanese project, formed for a swell of sympathy for cats and the popular figurative ASCII character, Monet. The token was planned for December 2013 and was created in 2014 as the ultimate fork of Litecoin. Monacoin froze over as the first opposite cryptocurrency explored in Japan and is still popular today.

The value of MonaCoin (MONA) for now is $ 1.26, and the commercial circuit in 24 hours is $ 1,136,740. Over the past 24 hours, the cost has increased by 2.1%. Immediately in circulation: 72.75 million, total coin supply: 105.1 million. On the day of the article's release, Monacoin is showing solid momentum.



Perhaps it would have been possible to explain the popularity of Monacoin with a cat painted for it, however, other cat cryptocurrencies turned out to be less successful.

the extremum was registered in 2017 ($ 1.25), but is not immediately used now.

extremum in 2019: $ 0.04241324, not immediately used now either.

LGBT Token

The developers of the LGBT token claim that they developed it not so much because of earnings, but also because of a public mission. The LGBT Token cryptocurrency has been leaked by the LGBT Foundation, a non-trade organization that helps the global gay community to dispose of its national economic reserve for the benefit of equality. These are some really impressive sums: the joint purchasing power of the pink economy is estimated at 4.6 trillion US dollars.

The LGBT Foundation promotes the LGBT token as a payment order in everyday transactions for the sake of businesses, whether digital or physical. To force this, Hornet Networks, the LGBT Foundation philanthropist, is creating a token circuit between its 25 million users, perhaps around 10% of LGBT people in the whole society - and perceives the LGBT token as a property of paying for its services.

LGBT Foundation promotes blockchain-based independent HIV trial. HIV is not only one of the most painful topics for LGBT people. Luckily, the agreement was borrowed by the war with the coronavirus, HIV has not gone anywhere: according to reliable information in 2019, 37 million people are living with HIV, and every year an additional 2 million people get sick, that's why panzootia is growing, and it is expected that if the alteration continues by 2025, 40 million people will be living with HIV. Some of them are young people: one in three freshly baked cases occurs in young people a year after 15 to 24 years.

Constant HIV testing is the best prevention of its spread. With all this, many people after the whole of society do not have easy access to it before. It is believed that only 79% of people living with HIV know their HIV status - and this is what the LGBT Foundation wishes to adjust by promoting the idea of ​​an independent and unsigned trial in the Hornet app. It brings circuits and health care together and organizes the public purpose of the LGBT token.



The LGBT token is not the only one related to LGBT-related cases. There are PrideCoin, RainbowCoin and others, however, they do not hold any public plans and are directed, apparently, at a huge step towards earning.

More cryptocats

CryptoKitties do not appear to be cryptocurrency in the conventional sense of the word, which makes them even more extraordinary using the blockchain scheme. Toast for the trial itself agrees about the game based on ether smart contracts. Sales of cats exceeded after tens of millions of dollars, however, these are only conditional cats, I suppose Pokemon, not tied to the famous toy or movie.



Due to the Ethereum scheme, cats are absolutely unique, eternal and have no way of being stolen. And they are very popular. At the launch of CryptoKitties, a kind of pandemonium joined the game, that the ether bonds were overloaded and the interruptions were noticed by those who had not heard of crypto kitties. CryptoKitties stop likeness to community generated art objects. With the right combination of events, it is possible (probably) to earn a lot of money on them: on December 2, 2017, the ages for one of these creatures will return $ 117 thousand.

Pepe Token

Another meme cryptocurrency is Pepe Cash. Pepe the Frog first appeared in 2005 as a character in Matt Fury's Boy's Club online comics and was immediately turned into a meme on 4chan and other sites. The character has evolved and now, after a decade, is one of the most recognizable on the Internet. Pepe has risen to the pinnacle of fame, and it's no surprise that his fan club is drunk on spending money for authorized works of art. And this is undoubtedly art, at least as the members of the self-proclaimed Pepesphere will tell you. Pepesphere is an online space where it is possible to trade tokenized images of Pepe for the local currency Pepe Cash.

Putin is a coin

In 2016-2017, several tokens arose at the same time, informed by the presidents. It is not known how much the presidents were pleased with this, but they received their number of HYIP tokens, and some are still in use.

As they say on the project's website, Puticncoin “was created in order to dedicate a concession of veneration to the people and the president of one of the largest and greatest powers in the world:

Putincoin was famous in 2017-2018, and now it saves a dwarf and irregular turnover, tending to zero.

This is not the only token intended for V. There was also Putin Classic. The developers called it "the first digital souvenir in the field of cryptocurrencies." His chronicle was short-lived (a few months in 2017), he deserved a little, and since 2017 it has shone with its absence in circulation, and there is no site left for paramnesia.

Impeccably at this time, the token was issued for the North American president - TrumpCoin. It was created on February 20, 2016 in the reputation of Donald J. But the patriotism of its creators is somewhat different than that of the creators of Putincoin. This is what the developers write on the site:

“Patriots are those supporters all over the world who are inclined to help detect corruption, detect fake news, discover justice, and wholeheartedly reward themselves, their time, their figure and their own precious life because of the improvement in the situation. The wealth of information and left-handed categories naturally ridicule them for their stance against these repressive systems and people. We will support them. "

It is believed that the token was issued by Trump's allies, and he himself has nothing to do with him. It is not known whether this is an invoice or not, but Trump naturally pours out negatively about cryptocurrencies without touching on particulars, different from Putin. Against this, immediately TrumpCoin has everything as it should be a bit better than PutinCoin.

In addition, there was Fuck Trump Coin for a while. More precisely, it still exists, but in 2020 only a dozen operations were made with it. Trump has many rivals, but the crypto project has not attracted specialized attention.



Pornotokens Sexcoin and F * ck

Since we’re chatting about politics, we’ll talk about the porn industry too. Sexcoin was intended as an alternative payment structure for the porn industry; it was assumed that through this cryptocurrency, men would cover the conditional entertainment and services.

And finally, a token with the name F * ck. It came out of nowhere, it is not so easy to find a site where you can buy it. The White Paper of this plan is scrawled in an endlessly picturesque language, and the following is said about the origin of the provided cryptocurrency:

“In today's community there are capital of people, which decently do not. Our ERC-20 F * CK token is possible to help all these people. Assume 0.001 F * CK or 1 F * CK on your friend's account - no matter how much you put on them, in any case, you will do a good deed. "

Fuck Token

FUCK Tokens stands for "Finally Usable Crypto Karma" (finally used crypto-karma) and allows now to start, if I may say so, give a fuck (untranslatable piece of words) and precisely assign the value of any such gesture. 

Israeli token

In Russia, manufacturer Vyacheslav Semenchuk tossed a Jewish-targeted cryptocurrency, BitCoen. Anyone can invest in and trade in these tokens, however, 10% of the profit is given in the property of interest-free loans to members of the Jewish community. BitCoen is traded on a small number of exchanges, and frankly, Jews are choosing to invest in more interesting projects.

Consume the rest of the godly tokens. For example, by purchasing Jesuscoin, you, according to the developers of this cryptocurrency, are sure to meet in heaven. There is also ConfessionCoin - a cryptocurrency with the support of which it is possible to record your sins in the blockchain and, thus, to confess.



Mooncoin is such a cryptocurrency and blockchain line in which the emission of coins is cut by the mediocre distance between the universe and the moon. In addition, they have to consume the literal dialect of MoonWord programming for the sake of developing distributed applications. The month-old is fiercely plus.

Vegan token

VeganCoin is a token knowledgeable for the vegan community. Its portrayal states that it is "a cruelty-free cryptocurrency." Holders of VeganCoin tokens can pay with them on the VeganPoint mil-sharing platform and in the VeganNation online store. The pre-sale of these tokens started in early February 2018.

Invalid token

UET ICO was either just a drama over the leading enthusiasts for any HYIP, who unintentionally inflicted funds on the creator of the token, or a deliberate attempt to raise banknotes using an unusual approach - in any case, they managed to earn it. UET made more than $ 40,000 in just three days.

The Lord of the vain token spoke with pride about its uselessness, offered traders fresh authority and lack of growth expectations. However, he always flirted here a little and hinted for some chances: “In recognition of any other implementation of tokens for the market, I can guarantee that the value of UET will not (in fact, cannot) decrease during that time after the ICO. Since these tokens are not decently worth at the start, the cost has nowhere to go, turning it off like up! But remember - such an irrespectively conscientious ICO, and what and what I don't want, so that someone hopes that the credibility of tokens will increase. They are called in vain for a reason "

There was no product behind the EUT, it did not study any audits and was not evaluated by experts: “I found out everything about Ethereum smart contracts over the weekend, and there was enough of this so that I could launch this ICO. Most of the smart contract verse is copied from GitHub and Stack Overflow posts, so everything should work well ... right?

To the question “Why are you doing this? "Lord UET replied:" Who knows?

The Lord mutedly attended to logos, site design and visuals in a holistic manner, but UET still had some logo.



And what the creator of the token said due to the fact that it is possible to tinker with UET: “UET is a standard ERC20 token, and you are given the opportunity to hold and transfer it. Turning this off… nothing. Whatever. (Seriously, don't get it. Is that why you're reciting this to this day?

Have fun and that's enough: since July 2018, the ages of UET turns have not been observed.

Garlic token

There is also a token, some are being produced for Reddit: at the beginning of December 2017, a DigitalizedOrange reader in the Garlic subreddit shared his idea of ​​the opposite cryptocurrency, he was supported by the rest of the community, and so the Garlicoin token appeared to the source. This is a good example of a digital currency that applies to people who share corporate interests. The Fellowship is very temperamental for Reddit, and if you adore garlic croutons, you can join it.

Petro is the cryptocurrency of the Venezuelan government

Petro-coin, or Petromoneda, is a cryptocurrency quite solemnly issued by the Venezuelan government. We talked about it in the post "How Diverse Powers Regulate Cryptocurrency: Analysis of Laws in 2020". It was an attempt by the government of a country looking for a desperate national economic situation to try to detect an exit from it with the support of blockchain technologies, using them to attract investment in the inspection of US sanctions. On February 20, 2018, Venezuelan President Nicolas Maduro spoke for the launch procedure of the state cryptocurrency Petro in Caracas. Petro is guaranteed by the country's natural resource reserves, and the price is pegged to a barrel of oil. Only 100 million Petro were produced, but only 82 million were determined for resale, and the other must exist to save the Venezuelan government. In early December 2019, the ages at Petro were used to transfer Christmas benefits to retirees and civil servants.

In 2020, cryptocurrency payment instructor Cryptobuyer announced a partnership with Megasoft, to the extent of which Venezuelans will be able to pay with cryptocurrencies at 20,000 trading points in the country, and Venezuela's largest national oil and gas fraternity, PDVSA, announced that it will change 4.5 million barrels. oil from their reserves after Petro (subject to the terms of the country's government). And after the establishment of the coronavirus quarantine in Spring 2020, the abundance of cryptocurrency transactions in Venezuela has increased even without a sign from above.

However, traders do not take Petro seriously: the main advantage of cryptocurrencies is decentralization - if Petromoneda does not work, and it is personally located in the hands of the country's favorites, now remembered for the nationalization of barbell companies under Maduro's predecessor, Hugo Chavez.

Something went wrong?

It is much easier to concentrate a rectifier of extraordinary altcoins than successful ones. Ultimately, it is better not to remain in the property of the cryptocurrencies Bitcoin and Ethereum, and the necessary demand for special altcoins with tokens was simply not oriented and no one knows about them outside the crypto world.

How did it happen that the beautiful thoughts of economic freedom, anonymity and confidentiality were wrapped up in such a dead end? An excellent tool was allowed to people, but by and large no one uses it.

The idea of ​​Satoshi Nakamoto was to organize the candidacy of the existing system, in which the attitude of classical economic institutions is unconditional for making payments, with all the outpouring shortcomings, the indication of which in Satoshi's article can be combined with the consideration of the "human factor". To solve this problem itself - the topic of the human moment in financial transactions - was promised by the design of payments in addition to a third party, peer-to-peer, which a third party would not be able to invade or appear. The non-triviality of this problem and established the peculiarity and uniqueness of the technological conclusion of Bitcoin as if it was a distributed dispersed network, in which there is not a single element that could possibly be examined in some hands.

The idea of ​​a cryptocurrency is a payment instrument that allows you to present after understandable and unchangeable rules: consume so many coins of everything, the emission is such and such, anyone can use it. The rules are unchanged, there will be no Pavlov reform, they can only confiscate with a soldering iron, etc.

Perhaps the circuits ran in front of a steam locomotive, exceedingly beyond their time. The community did not approve the crypt as an alternative to money, and people are now rushing to organize withdrawal services. Everyone rushed to solve fictitious problems, threw out tokens and the rest of everything, but as a result, it turned out that the problems that they were designed to solve were not the ones that needed to be solved at the trial itself. Full-fledged difficulties remain unresolved until now. Some of the tokens and coins from this survey were well-intentioned - experimenting, tweaking ideas, industry judgments, and economic instruments. But the exorbitant tightness led to the fact that it was found a particle in the sea of ​​shitcoins, which were organized limitlessly because of the steppe and enrichment.

There is space for cryptocurrencies in a progressive economy and financial order. There has already been a question in today's society about an idea similar to cryptocurrencies - that's why Bitcoin and frozen that way are known to be valid immediately from the factor of its appearance. Some people realized the idea of ​​money emitted by the algorithm intuitively, causality was waiting for something like this. But to this day, cryptocurrencies have not been able to take this place.

The general problem of any crypt is its numerous uses. What is the logo of the cue ball, if it is not accepted anywhere? The more diverse tokens stop, the less the possibility of multiple use of one thing, without talking about everyone now. In order to fulfill the mission formulated by Satoshi, and become a candidate for banking organization in the economy, cryptocurrencies are initially appropriate to become a candidate for fiat as a property of payment. The blockchain will not be able to become a candidate for banks, happily there is no need for it as it is for banks.

Immediately blockchain and cryptocurrencies are wanted in anticipation of a high-quality transition. A purely technological solution, even the most brilliant, is not enough to solve the difficulties of a realistic world. The difficulties of the realistic circle will always have to be solved equally in a realistic society - and the problem of the scheme is here to help. In order for the cryptocurrency to turn out from a bubble of grayish cryptoeconomics and become a partially superior economic system, which blockchain was originally designed, other conditions are needed.

Modification of the adaptive study of carbohydrates of the unnatural pancreatic shackle AIAPS

 The fake pancreas is a system for the automated delivery of insulin to a person suffering from insulin-dependent diabetes, connecting a glucose prediction, an insulin pump, and a judgment center (such as using AIAPS).


AIAPS such use is the control body of the IPV, the setting of which is to regulate the glucose of menstruation and keep it within the target range. To achieve a more monolithic design, blood glucose monitoring is based using straight-line logic and neural networks.

When developing an application, installing a plan carries out an independent reprimand on the safety of using the system.

The function of AIAPS, which the presented chapter is devoted to, seems to be an adaptive (it is again called dynamic) modification of the study of carbohydrates.

Start

We activate with the fact that for nine months a modification of the effect of carbohydrates was introduced back into the AIAPS, depending on the slow decay of various types of carbohydrates, namely:

1 character - carbohydrates with a duration of 60 hits and a peak of 25 hits
These include Coca-Cola, lollipops, sand, etc.
2 character - carbohydrates with a duration of 120 will hit and a peak of 40 will hit
For example, this can become a sweet, that is, snow-white bread.
3 character - carbohydrates with a duration of 180 will hit and a peak of 60 will hit
This is a complex food, say buckwheat with meat.
4 character - carbohydrates with a duration of 240 will hit and a peak of 70 will hit
Fertile and protein-rich food in large quantities.

We tested this model for 6 months, non-stop observing duration, but shortly after we encountered the following difficulties (in addition to the fact that establishing the duration makes it difficult to track carbohydrates).

Firstly, for example, my complex break with buckwheat and meat covers a large 100 carbs (any regiment for you), we noticed that in this case it would be wrong to direct the duration of carbs to 180 minutes. And after the expiration of data 180, the progress of glucose will continue and unconditionally - carbohydrates appear to be the trigger of this increase.

Secondly, after the way of eating, by means of a certain time of dextrose, menstruation initiates a distinct decrease (although after the modification there is again an abundance of carbohydrates for the board), which indicates that carbohydrates are now absorbed by the body

We also noted that after the shamming process, carbohydrate intake is tied at different time intervals, which can lead to a longer period of studying carbohydrates compared to the model.

Thirdly, we figured against the intricacy of carbohydrates, since the founding of the carbohydrate route, their peak would be flawless for 25-30 minutes. This point does not work, the complexity is scrawled at the top, and this is just our assumption.

In addition, we saw that some shamovka manners hold not one, but rather a lot of peaks or, instead of straight decay, they can have violent decomposition.

This all led to a tendency to refine the previously laid model, which only delivered excellent results.

Newly made resolution

We decided to stretch the evidence and see a realistic modification of carbohydrate putrefaction.
To achieve the desired result, we implemented a modification of the adaptive study of carbohydrates or the adaptive carbohydrate model (MAU).

Next, you can present an example of the first rendering of the display of the adaptation division.


Scene 1: Screenshot of a program demonstrating carbohydrate breakdown

Take a look at the difference between a regular modification (purple, download 1 time per minute) and digested carbohydrates (green, download 1 at a time in 5 minutes). Modifications vary, but even this is an excellent example of how carbohydrates ultimately act.

In the same vein, we concluded that carbohydrates last longer than we imagined.

This will help us to draw such a modification of carbohydrates, which is present in reality, and certainly calculate the coefficients.

How the calculations are done

The first moment is glucose monitoring for the base of flowing rates, insulin and carbohydrates on board,
The second point is the acquisition of glucose values.

Next, we calculate the difference between the monitoring and the real values ​​and earn the UIA delta.

After extracting the UIA delta, we add it:

To carbohydrates
To their lack
To activity.


After all this, as the values ​​are earned and the prescription is made, it is possible to begin to regulate glucose by unanimously acquired data.

Customization by unanimously acquired provided will be performed in the following options.

The impact of carbohydrates started, eating insulin healed to break down carbohydrates is allowed.
The effect of carbohydrates did not start on time, in which case their effect can be extended over 1.5 hours.
The impact began, but not in the expected volume, in which case the surviving hormone will be fed unanimously to the drowning number of carbohydrates in fact.


What the devil is development oriented for

The modification of adaptive carbohydrates is an attempt to empty the user through such grueling tasks as:

specific carbohydrate count
protein prices
counting snacks


And the order is more harmless to inject insulin.

Industrial details

The station and application of the artificial pancreas shackle AIAPS today is likely for devices with Android OS (versions greater than 6.0) and will soon become likely for the IOS platform. The virtualization of carbohydrate putrefaction is being tested and implemented by a separate program for Windows. The design has been tested by users for Samsung, Xiaomi devices, however, we do not experience any obstacles to work on other devices.

We will shortly acquire the main results of research on the scale of modification of adaptive study of carbohydrates and supplement AIAPS with freshly baked capabilities.

How to spot a cheat through Data Science?

 You may have sensed about analysts, machine learning professionals, and artificial intelligence, but have you heard of those who are unnecessarily overpaid? Meet the data rogue! These tricksters, attracted to profitable jobs, have given them a bad reputation for full-fledged professionals after finishing data. We understand the material as if to conclude such people for perfect water.



Rogues provided round and round

The rogues provided so much well can hide well-known, but no, you can exist one of them, even without realizing it. Your organization has probably covered these tricksters for years, but there is excellent news: they are easy to identify if you know what to look for.
The first warning sign is the misunderstanding that analytics and statistics are infinitely different disciplines. I will explain this later.

Various excerpts

Statisticians have learned to tinker with answers about what goes beyond their data, specialists have learned to study the table of contents of a dataset. Or, experts carry out answers about what is contained in their data, and statisticians carry out answers about what is not provided. Experts help to ask excellent questions (hypothesize), and statisticians help to make excellent conclusions (test hypotheses).

Consume and extraordinary joint roles, sometimes a person tries to clean up for two chairs ... Why not? A fundamental principle of data science: if you are faced with uncertainty, it is impossible to utilize one and this particular point provided for hypotheses and testing. Sometimes materials are limited, confusion forces one to select between statistics or analytics. Clarification here.

Without statistics, you will be stuck and you will not be able to understand whether the reviewer only abstains from the formulated judgment, and without analysis you move blindly, having insufficient chances to tame the unknown. This is a difficult choice.

The rogue's exit from this scrape is to step over it, and then pretend to be stunned that what is unexpectedly discovered. The regularity of approbation of statistical hypotheses is united to the question: do the materials overwhelm us enough to correct our opinion. How can we be surprised by the data, if we have already seen it?

Always, sometimes rogues are looking for a pattern, they get inspired, then they control exactly these materials for the sake of the same pattern, in order to publish a bill with a legitimate p-value, that is, two, nearly as much as they could by theory. This is how they lie to you (and perhaps to themselves too). This p-value is irrelevant if you don't hold your hypothesis before you overlooked your data. Dodgers simulate the effects of specialists and statisticians without understanding the reasons. Ultimately, the whole area of ​​data science develops a bad reputation.

Real statisticians constantly exercise their answers

Due to the approximately fantastic reputation of the post-statisticians for demanding reasoning, the abundance of fake information in Data Science is unprecedentedly high. Free to arrange not to get caught, only if the decently unsuspecting victim thinks that all the skill is in equations and data. The dataset provided is such a dataset, right? Positions the property as you use it.

Fortunately, you only need one clue to stop the charlatans: they "discover America with a return number." First by discovering the phenomena that they already know are in the data.

Unlike charlatans, excellent specialists have no prejudice and understand that inspiring thoughts can have seemingly varied explanations. At the same time, excellent statisticians meticulously establish their conclusions before they draw them.

Professionals are relieved of responsibility ... happily they stay within the scope of their data. If they are tempted to declare what they have not seen, this is a completely different job. They should “take off the shoes” of the specialist and “change” into the shoes of the statistician. Finally, no matter what the official name of the position may be, there is no rule that you cannot unanimously study two professions if you want to. Do not confuse them exclusively.

Just because you have a good understanding of statistics does not mean that you have a good understanding of analytics, and vice versa. If someone is trying to tell you otherwise, you should be wary. If this person informs you that it is allowed to tinker with a statistical recipe on the data that you have already studied, this is a reason to strain twice.

Unusual clarifications

Noticing after the rogues provided in the wild, you will notice that they love to come up with mind-blowing stories in order to "explain" the contemplated data. The more academic the better. It doesn't matter that these stories are fitted with a return number.

Sometimes rogues do this - let me not hoard for the word - they lie. No abundance of equations, that is to say, attractive definitions, does not compensate for the fact that they offered fresh evidence of their versions. Don't be surprised at how extraordinary their explanations are.

There is the same thing as demonstrating your "psychic" abilities, initially looking for a card in your hands, and then predicting, but no, hold ... what you hold. This is a retrospective bias, and the data scientist profession is stuffed with data after the throat.



Experts say: "You only went with the Queen of Diamonds." Statisticians say: “I wrote my hypotheses on this piece of paper as much as we started. Spread it out and play, look at some materials and see if I am innocent. " The rogues say: "I knew, but there is no collectible to be born this tambourine queen, so what ..."

The separation of the granted is such a swift resolution of the problem in which everyone is begging.


Sometimes there are a lot of those provided otherwise, it is required to select between statistics and analytics, but sometimes provided with too much, to consume an excellent probability, in addition to forgery, to resort to analytics and statistics. You have to consume perfect defense through rogues - this is the separation provided and, in my opinion, such the most powerful thought in Data Science.

In order to protect yourself through charlatans, all you need to work out is to make sure you don't keep some test materials out of the reach of their prying eyes, and then touch everything else as if to the analyst. Sometimes you come across a theory that you are in danger of accepting, use it to frame the situation, and then uncover your unspoken test data to verify that the theory is not nonsense. It's so easy!


Make sure no one is allowed to view test materials during the research phase. Stick to experimental data to achieve the desired result. Test materials cannot be used for analysis purposes.

This is a big improvement relatively without a return, for what purpose people are addicted in the days of "small data", sometimes you need to explain where you understand what you know, in order to finally certify people, but you don’t know something positively.

Using the same rules for ML / AI

Some charlatans posing as ML / AI experts are also free to spot. You will catch them in the same way that you would have caught any other bad engineer: the "solutions" they try to build never stop failing. An early warning sign is the lack of experiment with the service with common industry syllables and programming libraries.

But what about the people organizing systems that seem workable? How do you know if something suspicious is being done? The rule is adapting! The trickster is a sinister character, some show you how well the modification worked ... for exactly this data that they used to create the model.

If you've created an infinitely complex automotive learning setup, how do you know how good it is? You won't know, you won't happily show that it is functioning with freshly baked data that you haven't seen before.

Sometimes you created materials before forecasting - this is hardly a prediction.


Sometimes you have enough granted for the sake of separation, it doesn't make sense for you to base yourself on the beauty of your formulas to excuse the calculation (an old popular habit that I see everywhere, not exclusively in science). You are given the opportunity to say, “I know this works, so I can seize a dataset that I haven’t seen before, and rigorously predict what will happen there… and I’ll be right. First and again. "

Adjusting your model / theory to freshly provided ones is the best box for the sake of trust.


I hate data rogues. I don't care if your view is based on different chips. I am not amazed at the grace of explanation. Imagine that your concept / modification works (and continues to work) for a few freshly baked data that you have never seen before. It is this to consume the full-fledged adjustment of the persistence of your mind.

Welcome to the Professionals at Data Science Square

If you want to be thoroughly approached by everyone who understands this humor, stop hiding after extraordinary equations in order to keep your own prejudices. Show what you have. Probably so that those who “understand” will view your theory / model as something more than just inspiring poetry, have the ambiguity to organize a majestic notion of how well it performs on a completely fresh set of data ... near witnesses!

Welcome to chapters

Turn away to really take every "idea" about data, happily they are not validated against freshly baked data. To put efforts into scrap? Stick to analytics, but don't count on these ideas - they are unreliable and have not been tested for reliability. In addition, sometimes the company consumes materials in abundance, there is no flaw in order to work out the separation of the base in science and maintain it at the level of infrastructure, controlling the path to the test provided for the sake of statistics. This is a great way to stop trying to fool you!

If you want to spot a lot of charlatans who are up to something bad, here's an excellent Twitter thread.



Sometimes the provided is not enough for separation, the sole deceiver tries to be strictly guided by inspiration, discovering America retrospectively, accurately rediscovering the phenomena that they already know to consume in the data, and calling the overwhelming statistically significant. This distinguishes them from the non-skimpy analyst who is faced with inspiration and the meticulous statistician who offers confirmation about forecasting.

Sometimes there are many provided, get the habit of splitting data, that way you will be able to have the best of both worlds! Unconditionally construct the specialist and the statistics yourself on separate subsets of the initial data jumble.

The experts call on you for inspiration and open-mindedness.
The statisticians urge you to test rigorously.
Dodgers call you a twisted retrospective, some pretending to be a sign of analytics statistics.



Perhaps, after reading the article, you will have a tendency "am I not a deceiver"? This is normal. There are two ways to drive out this trend: first, look back, see what you have done, whether your plowing with data has brought utilitarian benefits. And secondly, it is possible to work again on your qualifications (which will not be absolutely useless quickly), all the more so we give our students the utilitarian skills and knowledge that allow them to become full-fledged data scientists.