<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: mattiethomass</title>
    <description>The latest articles on DEV Community by mattiethomass (@mattiethomass).</description>
    <link>https://dev.to/mattiethomass</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F646646%2Fa96a267c-e9af-4778-abcb-9253a2d7c5a3.png</url>
      <title>DEV Community: mattiethomass</title>
      <link>https://dev.to/mattiethomass</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mattiethomass"/>
    <language>en</language>
    <item>
      <title>What Is an SDLC? - 12 Key Principles</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Fri, 06 Jan 2023 10:05:59 +0000</pubDate>
      <link>https://dev.to/mattiethomass/what-is-an-sdlc-12-key-principles-e6b</link>
      <guid>https://dev.to/mattiethomass/what-is-an-sdlc-12-key-principles-e6b</guid>
      <description>&lt;p&gt;The software development life cycle (SDLC) is a process that software developers use to create and maintain software. The main purpose of the SDLC is to provide a structure for developing software in a way that ensures quality and minimizes risks.&lt;/p&gt;

&lt;p&gt;There are many different models for the SDLC, but the most popular ones are the Waterfall model, the Cleanroom model, and the Agile model. Each of these models has its own benefits and drawbacks, so it's important to choose the one that's right for your project.&lt;/p&gt;

&lt;p&gt;The Waterfall model is probably the best-known SDLC model. It's a linear approach that takes each phase of the project from start to finish before moving on to the next phase. This can be a very efficient way to work, but it can also be inflexible if changes need to be made during the development process.&lt;/p&gt;

&lt;p&gt;The Cleanroom model is similar to the Waterfall model in that it also follows a linear approach. However, instead of starting with requirements gathering and ending with testing, this model starts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The 12 Key Principles of Agile Methodology &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1. Individuals and interactions over processes and tools &lt;/p&gt;

&lt;p&gt;2. Working software over comprehensive documentation &lt;/p&gt;

&lt;p&gt;3. Customer collaboration over contract negotiation &lt;/p&gt;

&lt;p&gt;4. Responding to change over following a plan &lt;/p&gt;

&lt;p&gt;That is, while there is value in the items on the right, we value the items on the left more. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Twelve Agile Manifesto Principles&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The 12 Agile principles are presented below and aim to create an environment that puts the customer first, provides the structure for business goals, and is capable of responding quickly to changes in market forces and user needs. Additionally, this system allows developers to adjust each stage of the development process and make it suitable for their team rather than being constrained by external factors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Customer satisfaction through early and continuous software delivery&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The highest priority for all 12 principles is the contentment of customers. Early and constant delivery aids in the accomplishment of customer needs and increases return on investment (ROI). Regularly obtaining functioning software additionally makes clients much more pleased, since they commonly detest waiting for updates. By implementing this principle, software developers will be capable of reacting to difficulties quickly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Accommodate changing requirements throughout the development process&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Deadlines should not be delayed when a new requirement emerges or a new feature has to be included; customer requests for changes, even at the end of the project, should not induce dread but rather be welcomed with enthusiasm as they are usually profitable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Frequent delivery of working software&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;By dividing the entire development process into smaller stages, regular delivery of debugged software can be made possible. This principle also promotes a more effective assessment of implemented ideas and approaches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Collaboration between the business stakeholders and developers throughout the project&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The principal aim of this is to generate a synergistic effect between those who use the software and those who develop it. Working together regularly between business and developer teams greatly upgrades the quality of choices taken as well as makes communication amongst stakeholders much simpler.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Support, trust, and motivate people involved&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When developers are provided with a conducive workspace and have their basic needs taken into account, they tend to perform better and produce better outcomes. When people are given encouragement and trust, tasks are typically completed satisfactorily and in a timely manner.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Enable face-to-face interactions&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Face-to-face collaboration between team members is beneficial for making communication more efficient. However, due to the Covid-19 pandemic, many software developers had to switch to a virtual work environment, which caused numerous projects to be delayed or postponed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. Working software is the primary measure of progress&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The team's performance is largely judged based on their delivery of high-functioning software to the customer. Regardless of the amount of effort put in - including but not limited to coding, debugging, and lack of sleep - if the software doesn't do what it was intended to do, the job isn't done.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;8. Agile processes support a consistent development pace&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Team members should talk and set up a steady speed that they can keep up with and provide working software on an ongoing basis. The purpose of this is to avoid overworking and the need for extreme efforts. Streamlining regular processes is the solution.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;9. Attention to technical detail and design enhances agility&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The difference between a true professional and an ordinary team member lies in the operational excellence they maintain. By having a carefully selected set of skills and design solutions, the developer team is able to uphold the speed of the project, repeatedly refine their code, face difficulties with confidence, and respond to them productively. These facets of development make it more agile.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;10. Simplicity&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The software development process can be hindered by complex decisions, so it is important to ensure that the amount of effort put in is sufficient for the task at hand. If something can be accomplished in a simple manner with minimal effort and no reduction in quality, this should be prioritized. An essential factor to bear in mind is that customers are paying for results and not hard work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;11. Self-organizing teams encourage great architectures, requirements, and designs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Teams that have experience and motivation, who communicate regularly and share ideas, are able to create top-notch solutions while sustaining their development process. Those groups that must be prompted by their leader frequently ought to reconsider the entirety of their methodology.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;12. Regular reflections on how to become more effective&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The final principle emphasizes that ongoing development, advancement of skill, and optimizing processes are the essential components for effective work and overall success. This can be attained by continually repeating the four steps: plan, complete, examine and take action. If any issues occur, the team can easily review it and move forward.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final Thoughts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Agile's aim is to bring together software development and business requirements. Many web development businesses deploy Agile in constructing products. Projects created according to the values and principles of Agile put emphasis on customers, inviting them to be directly involved in the process. The adoption of the Agile Manifesto across all facets of software manufacturing has demonstrated its efficacy and benefits for many processes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Strengths and Weaknesses of Agile&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are many different types of software development methodologies, each with its own set of strengths and weaknesses. One popular methodology is known as agile development. Agile development is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and customer feedback.&lt;/p&gt;

&lt;p&gt;One strength of agile development is that it helps to ensure that software meets the needs of the customer or client. This is because agile developers work closely with customers throughout the software development process in order to get feedback and ensure that the final product meets their needs.&lt;/p&gt;

&lt;p&gt;Another strength of agile development is its flexibility. Agile developers are able to quickly adapt to changes in requirements or feedback from customers. This can be a big advantage over other methodologies, which may be more rigid and less able to accommodate changes.&lt;/p&gt;

&lt;p&gt;However, there are also some potential weaknesses associated with agile development. One weakness is that it can sometimes be difficult to estimate how long it will take to complete a project using this methodology. This is because agile developers often have to make changes or additions based on customer feedback.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;When to Choose Agile&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There is no one-size-fits-all answer to the question of when to choose agile over a waterfall. It depends on the specific project and organization. However, there are some general guidelines that can help you decide which approach is best for your situation. &lt;/p&gt;

&lt;p&gt;If you are working on a project with a lot of uncertainty, agile may be a good choice. This is because agile methods are designed to deal with change and uncertainty. Waterfall, on the other hand, is better suited for projects where everything is known in advance and is not likely to change. &lt;/p&gt;

&lt;p&gt;Agile methods are also generally more suitable for shorter projects. This is because they allow you to get started quickly and make changes along the way as needed. Waterfall, on the other hand, takes longer to set up and is more suited for longer projects with well-defined requirements. &lt;/p&gt;

&lt;p&gt;Finally, it is important to consider the organizational culture when deciding between agile and waterfall. Agile methods require a lot of collaboration and communication between team members.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Agile Methodologies&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Organizations may have varying approaches to applying Agile SDLC, including Kanban, Scrum, Extreme Programming, Feature-Driven Development, Crystal, Lean and Dynamic Systems Development Methods. In some cases, there may be a hybrid approach such as combining Scrum and Kanban (Scrumban).&lt;/p&gt;

&lt;p&gt;We'll focus exclusively on Scrum and Kanban, the two most widely used non-hybrid Agile approaches, today.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scrum vs. Kanban&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are a lot of different ways to manage software development projects, and two of the most popular are Scrum and Kanban. Both Scrum and Kanban have their own strengths and weaknesses, so it's important to choose the right one for your project.&lt;/p&gt;

&lt;p&gt;Scrum is a framework that helps teams work together to complete a project. It's based on the idea of "sprints," or short periods of time when team members work together to complete a specific goal. Scrum is great for projects that need to be completed in a short amount of time because it helps keep everyone focused on the task at hand. However, it can be difficult to keep track of all the moving parts in a Scrum project, and some team members may feel like they're being micromanaged.&lt;/p&gt;

&lt;p&gt;Kanban is a system that helps teams manage their work by visualizing it. This makes it easy to see what needs to be done and who is working on what. Kanban is great for projects that have a lot of moving. &lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Article prepared by Stanislav Bakhariev, CEO &lt;a href="https://it-rating.com/"&gt;IT-Rating.com Inc&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

</description>
    </item>
    <item>
      <title>4 Vital Concepts To Be Implemented In The SRM Strategy</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Tue, 06 Dec 2022 18:52:14 +0000</pubDate>
      <link>https://dev.to/mattiethomass/4-vital-concepts-to-be-implemented-in-the-srm-strategy-59j2</link>
      <guid>https://dev.to/mattiethomass/4-vital-concepts-to-be-implemented-in-the-srm-strategy-59j2</guid>
      <description>&lt;p&gt;&lt;a&gt;&lt;span&gt;Developing long-term mutually beneficial relationships with the key strategic suppliers is a critical point in improving performance in the supply chain: from gaining cost efficiency to attaining constant growth and development.&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a&gt;&lt;span&gt;To minimize supply chain risks, companies should treat their suppliers as partners. &lt;/span&gt;&lt;/a&gt;&lt;span&gt;This means establishing clear and transparent relationships which will allow the suppliers to fully trust the customer. Let’s review the key points of establishing strong and mutually beneficial relationships with suppliers.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span&gt;1. &lt;a&gt;&lt;span&gt;The suppliers &lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;are much more than just goods or service providers&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;First of all, they are partners. This partnership should be based not only on financial transactions but also on mutual trust and loyalty. Let the suppliers feel like they are an important part of your business. Enlighten them about processes in your company, such as new product launches or promotions. &lt;a&gt;Listen to their advice and concerns. &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;It would be great if you provide the supplier with a convenient tool to work with you.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span&gt;2. Paying the suppliers on time is critical&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;If you don't want to lose sustainable suppliers make sure you pay them on time. You will prove that you are a reliable client. &lt;a&gt;Inform your suppliers, if for any reason you are not able to perform payment on the scheduled date. &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Let the supplier know as soon as possible when payment can be performed. Suppliers like timely payments just as much as purchasers like on-time delivery. It is highly recommended to implement the solution that automatically sends you reminders on key important events within the contract, including the scheduled payments to the suppliers.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span&gt;3. Establish a strong relationship with your suppliers&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fus3b5hgp3617g1cl754a.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fus3b5hgp3617g1cl754a.jpeg" alt="Image description" width="600" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Make sure you maintain constant and clear communication with each of your suppliers. Inform them regularly of your strategies and your plans, so they will know how they can help you to execute your strategy and what they may suggest. Let the suppliers see what benefits they will receive by cooperating with you. If you appreciate their work, show them that. If something doesn't work, also let them know. Strong relationships with clear and constant communication make the suppliers more loyal.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span&gt;4. &lt;a&gt;Not all suppliers are the same. &lt;/a&gt;&lt;a&gt;&lt;span&gt;There is great supplier diversity&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&lt;span&gt;: take into account culture, business processes, and document flow requirements&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Since the world is becoming more and more interconnected, we encounter various suppliers located across the country or even around the world. Each city, state, or country has its own rules, laws, and terminology. For example, the word "vendor" is more commonly used in the US, while the word "supplier" is more commonly used in the UK. Or, for example, in Brazil and many other countries in South America, the documents must be physically stamped upon receipt.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;If some of your suppliers are located in another country, you and your procurement team should be aware of cultural differences while communicating with these suppliers. Attitudes towards work always vary from one country to another. So, take this fact into account and make sure it's okay for you. You should also take into account the difference in currency, tax rates, and other financial issues. Finally, take into account the time zone difference, and always keep in mind the time when the supplier is available for communication.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpi9gyyxtbtiuvbo0khab.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpi9gyyxtbtiuvbo0khab.jpeg" alt="Image description" width="600" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Establishing long-term relationships with suppliers is critical, but you should not choose suppliers just because you like them. Select the most efficient and effective suppliers to work with and it would be clear that efficiency and effectiveness are real value for your business, not just a cost. &lt;a href="https://acquirell.com/supplier-relationship-mgmt/?utm_source=pr&amp;amp;utm_medium=article&amp;amp;utm_campaign=devto&amp;amp;utm_content=rewra_vitalsrm" rel="noopener noreferrer"&gt;Therefore, it is critical to have in place a convenient solution that would enable the procurement team to constantly keep tracking the interaction with suppliers and identify efficient and reliable suppliers as well as inefficient and unsustainable suppliers.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;

</description>
      <category>watercooler</category>
    </item>
    <item>
      <title>The importance of eLearning in 2022</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Sun, 06 Nov 2022 17:39:56 +0000</pubDate>
      <link>https://dev.to/mattiethomass/the-importance-of-elearning-in-2022-3c95</link>
      <guid>https://dev.to/mattiethomass/the-importance-of-elearning-in-2022-3c95</guid>
      <description>&lt;p&gt;&lt;span&gt;Online has already become the same full-fledged format as offline. With different possibilities of virtual learning, the requirements for the quality of distance education have also grown.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qO26udkT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zbah3t6mynkfuwl76wwb.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qO26udkT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zbah3t6mynkfuwl76wwb.jpg" alt="Image description" width="750" height="422"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Let's figure out what needs to be changed now in order to improve the quality of education.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;&lt;span&gt;Challenges of distance learning&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;At the height of COVID-19, quarantines were introduced in 192 countries around the world.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;More than 1.5 billion different students (&lt;/span&gt;&lt;a href="https://ieeexplore.ieee.org/document/9453887"&gt;&lt;span&gt;91.4%&lt;/span&gt;&lt;/a&gt;&lt;span&gt;) have switched to distance learning. Although even in developed countries, only &lt;/span&gt;&lt;a href="https://www.frontiersin.org/articles/10.3389/feduc.2021.638470/full"&gt;&lt;span&gt;60% of educators had online learning experience&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Delivering information via video communication, when it is still the same boring lecture format, is ineffective for modern students, so it was urgently necessary to come up with something new.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;Online, the concentration of attention is lower than in reality, and the lack of live interaction makes it difficult to perceive content. When hundreds of different educational platforms are open to us on the Internet with interesting information on any topic from all over the world and exciting speeches in the TEDx format, each speaker still needs to compete for the attention of the student.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;Therefore, in  eLearning, the role of not only a mentor, who turns from an ordinary teacher into a video blogger, podcaster or other kind of content maker, and thereby attracts and retains an audience, is especially important, but also the platform on which learning takes place. It should have all the necessary tools for modern learning, be convenient and accessible for both the student and the coach.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;&lt;span&gt;4 steps to improve the quality of distance learning&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rAiYmoxV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6k417eelfs2yob7xirv0.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rAiYmoxV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6k417eelfs2yob7xirv0.jpg" alt="Image description" width="750" height="422"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;First, the quality of the current content in the educational environment should be assessed. There are several criteria here:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;span&gt;The format of training - how understandable it is and how it affects the efficiency of assimilation of information;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Content - the relevance of the information and whether the theory can be worked out in practice in the current conditions, what of it can really be applied in the case;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;External design of the educational program (presentation and positioning of the brand in the network) - visual perception forms a general impression about the service, teachers and the effectiveness of the training itself;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The style and tone of the presentation of the material is the key to strong audience interest.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;span&gt;Choose the best learning pace&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt;The universal class schedule does not correspond to the realities of modern students - active, purposeful, sometimes working in several places and traveling frequently. They are not interested in sitting in classrooms for hours trying not to fall asleep during lectures. The new generation seeks to spend the time allotted for training with benefit.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;What is important: students immediately learn all the intricacies of real work in their chosen specialty. We study the roles of each team member, learn to apply our skills in combination with the skills of other colleagues, and together we move towards the goal.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;&lt;span&gt;Use convenient online tools&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt;With &lt;/span&gt;&lt;a href="https://raccoongang.com/solutions/custom-lms-development-services/"&gt;&lt;span&gt;custom lms development&lt;/span&gt;&lt;/a&gt;&lt;span&gt; an online platform can be equally convenient for both teacher and students.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Online, the standard approach - reading material - is not good. High-quality distance learning is supported with the help of special tools provided by the platform on which the training is conducted.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Ideally, the group and the teacher should have a single LMS-system (Learning Management System). This is an online platform where students and teachers communicate, exchange useful materials, complete and check homework assignments, and learn to work in a team.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;For organizing a distance learning process, an LMS system is a real salvation. Through one platform, you can control class attendance, conduct control and certification, and form your own library of useful sources.&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span&gt;Apply gamification&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt;In distance learning, game technologies increase students' attentiveness and motivation. As the results of a survey of users of the &lt;/span&gt;&lt;a href="https://raccoongang.com/blog/is-open-edx-the-next-big-thing-in-custom-lms-world/"&gt;&lt;span&gt;open edX&lt;/span&gt;&lt;/a&gt;&lt;span&gt; platform showed, 89% of respondents said that they are most likely to finish the task to the end if it is presented in a game form.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Self-control and the desire to learn are especially strengthened when a competitive moment appears in the mechanics of learning - the struggle for conditional points, achievements.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;For example, in training for the professions of a traffic expert and investor, which are popular today, real freelance clients and the first significant earnings are much cooler than ordinary estimates, this is a real benefit from the acquired knowledge and its direct application in practice.&lt;/span&gt;&lt;/p&gt;

</description>
      <category>leaning</category>
      <category>managment</category>
    </item>
    <item>
      <title>Pseudorandom number generation</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Mon, 27 Jun 2022 09:08:36 +0000</pubDate>
      <link>https://dev.to/mattiethomass/pseudorandom-number-generation-1h7a</link>
      <guid>https://dev.to/mattiethomass/pseudorandom-number-generation-1h7a</guid>
      <description>&lt;p&gt;&lt;span&gt;Quite often programmers in their work meet with the need of working with random numbers. Most often random numbers are required in modeling, numerical analysis, and testing tasks, but there are many other very specific tasks like:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Random selection of the responder. In this case, one wheel is enough. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Form mini-groups to work in class or to work on a long-term project.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Choice of tasks for students, both textual and using images.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Formation of sentences. You can represent wheels with sentence members. Students must form sentences with correct word order, cases, etc.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Winged phrases. You can break such phrases, and aphorisms into parts. Start wheels. The students have to indicate the correct or incorrect order of these phrases.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Randomly choose questions from the didactic game.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;And much more..&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;They are all easily solved at &lt;/span&gt;&lt;a href="https://spinnerwheel.com"&gt;&lt;span&gt;SpinnerWheel&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a relatively new site that provides an easy way to create custom wheel generators to randomly select names, numbers, words, and even images. A feature of SpinnerWheel is the ability to further customize the names, words, numbers, and images that appear in the wheel. You can also customize the sound and visual effects of the spinners you create.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;Of course, all modern programming languages have a random function or their analogs. These functions most often give really good pseudorandom numbers, but I've always wondered how these functions work.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;In this topic, I will try to explain how the linear congruential method (which is most often used in the random function) works, and the method of getting random numbers using a polynomial counter (which is often used for hardware testing).&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h4&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h4&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;It is worth saying right away that it makes sense to generate random numbers only with uniform distribution since all other distributions can be obtained from the uniform one using transformations known from probability theory.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;For those who have forgotten or have not yet studied probability theory, let me remind you that in a uniformly distributed sequence of zeros and ones, zeros will occur on average (!) in 50% of cases. &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;However, it does not mean that there will be exactly 500 zeros in a sequence of 1000 digits. Moreover, a sequence of 1000 digits can have 999 zeros, and the probability that the thousandth element will be equal to zero remains equal to 0.5. This seems paradoxical at first sight, but it is important to understand that all sequences are equally probable. If we consider a sufficiently large set of such sequences, then on average(!) each of them will contain 500 zeros.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Having remembered the theory a little bit, we move on to history. In pre-computer times, random numbers were obtained by pulling colorful balls out of bags, drawing cards, and rolling dice. You couldn't do serious research that way, so in 1927 Tippett published the first table of random numbers. A little later, people tried to automate the process somehow. Machines generating random numbers began to appear. Now such devices are also used and are called sources (generators) of entropy. It should be noted that only such devices can give truly random numbers. But, unfortunately, entropy generators are quite expensive, and it is not possible to install them on every PC. This is why the need for algorithms to produce random numbers arose.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h4&gt;&lt;strong&gt;The first attempt to obtain an NSP&lt;/strong&gt;&lt;/h4&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Some people think that getting random numbers is easy. In their opinion, it is enough to perform random complex mathematical operations on the original number. If we open the second volume of the famous Knuth, we find that in 1959 Knuth also tried to build a generator based on such an idea. His algorithm looked like this:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;span&gt;[Select the number of iterations.] Assign Y to the largest significant digit of X. (We will perform steps K2-K13 exactly Y+1 times, i.e., apply randomized transformations a random number of times.)&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Select random step] Assign the next highest significant digit X. Move to step K(3 + Z), i.e. to a randomly chosen step in the program.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Provide &amp;gt; 5 x 109] If X &amp;lt; 5000000000, assign X the value X + 5000000000.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Middle of the square.] Replace X with the middle of the square X&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Multiply.] Replace X with the number (1001001001 X) mod 1010.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Pseudo-complete.] If X &amp;lt; 100000000, assign X the value X + 9814055677; otherwise assign X the value 1010- X.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Rearrange the halves.] Swap the five lowest characters with the highest.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Multiply.] Perform step K5.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;span&gt;[Decrease digits.] Decrease each non-zero digit of the decimal representation of the number X by one.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;К10. [Modified by 99999.] If A' &amp;lt; 105, assign X the value - X 2 +99999; otherwise assign X the value X - 99999.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Normalize.] (At this step A' cannot be zero.) If X &amp;lt;109, multiply X by 10.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Modification of the method of mean squares.] Replace X with the mean 10 digits of the number X(X - 1).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;[Repeat?] If Y &amp;gt; 0, decrease Y by 1 and return to step K2. If Y = 0, the algorithm is complete. The value of number X from the previous step will be the desired "random" value.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Despite its apparent complexity, this algorithm quickly converged to the number 6065038420, which after a small number of steps converted to itself. The moral of the story is that you can't use a random algorithm to get random numbers.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h4&gt;&lt;strong&gt;Linear congruential method&lt;/strong&gt;&lt;/h4&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;In most programming languages, this is the method used in the standard random number function. This method was first proposed by Lehmer in 1949. Four numbers are selected:&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;span&gt;Module m (m&amp;gt;0);&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Multiplier a (0&amp;lt;=a&amp;lt;m);&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Increment c (0&amp;lt;=c&amp;lt;m);&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;span&gt;Initial value X&lt;/span&gt;&lt;span&gt;0&lt;/span&gt;&lt;span&gt; (0&amp;lt;= X&lt;/span&gt;&lt;span&gt;0&lt;/span&gt;&lt;span&gt; &amp;lt; m)&lt;/span&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;The sequence is obtained using the following recurrence formula: X&lt;/span&gt;&lt;span&gt;n+1&lt;/span&gt;&lt;span&gt; =(a* X&lt;/span&gt;&lt;span&gt;n&lt;/span&gt;&lt;span&gt; +c) mod m.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;This method gives really good pseudorandom numbers, but if we take the numbers m,a,c arbitrarily, we are likely to be disappointed. With m=7, X&lt;/span&gt;&lt;span&gt;0&lt;/span&gt;&lt;span&gt; =1, a=2, c=4 we get the following sequence: 1,6,2,1,6,2,1,...&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;This sequence does not exactly fit the definition of a random sequence. Nevertheless, this failure allowed us to draw two important conclusions:&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;span&gt;The numbers m,a,c, X&lt;/span&gt;&lt;span&gt;0&lt;/span&gt;&lt;span&gt; must not be random;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The linear congruential method gives us repetitive sequences.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Any function mapping a finite set X to X will give cyclically repeated values. So, our goal is to lengthen as much as possible the unique part of the sequence (by the way, the length of the unique part cannot be more than m).&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Without going into details of the proofs, let us say that the period of the sequence will be equal to m only if the following three conditions are met:&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;span&gt;The numbers c and m are mutually prime;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;a-1 is a multiple of p for every prime p that is a divisor of m;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If m is a multiple of 4, then a-1 must also be a multiple of 4.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;span&gt;At the end of the story about the linear congruential method, we should say that the sequences obtained with its help, although they are sufficiently random, are not cryptographically stable. Because knowing 4 consecutive numbers, the cryptanalyst can make a system of equations, from which we can find a,c,m.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h4&gt;&lt;strong&gt;Obtaining pseudorandom numbers based on the polynomial counter (shift register)&lt;/strong&gt;&lt;/h4&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;The algorithm we are going to consider is based on the exclusive OR (sum modulo two) operation. Just in case, let me remind you what the truth table for this function looks like:
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iLfchPWF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.ibb.co/rc2n2NZ/unnamed-29.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iLfchPWF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.ibb.co/rc2n2NZ/unnamed-29.png" alt="unnamed-29" width="171" height="118"&gt;&lt;/a&gt;
&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;The circuits shown in the figure below are the simplest polynomial counters. The zero bit in such circuits is calculated based on the exclusive OR function, and all other bits are obtained by a simple shift. The bits from which the signal goes to the exclusive OR are called taps.
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--54IExjTv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://lh3.googleusercontent.com/keep-bbsk/AGk0z-PABWsBhxJIwhrjTZO7D8NwAwe6GGxNcwA5v7cxssVSvIUHWJnkrwPYeagwiQg0MgEL64NnHaVwK7HhuFI_AYDyLMLrmWtR7bWpOZlx_MVNElw%3Ds653" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--54IExjTv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://lh3.googleusercontent.com/keep-bbsk/AGk0z-PABWsBhxJIwhrjTZO7D8NwAwe6GGxNcwA5v7cxssVSvIUHWJnkrwPYeagwiQg0MgEL64NnHaVwK7HhuFI_AYDyLMLrmWtR7bWpOZlx_MVNElw%3Ds653" width="653" height="134"&gt;&lt;/a&gt;
&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Let's look at how the values in these registers will change when the initial value is 001:
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--C3hlCXBV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://keep.google.com/u/0/media/v2/1xuLC-If3sace%25E2%2580%25A62Cimage%252Fpng%252Cimage%252Fwebp%252Caudio%252Faac%26sz%3D171" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--C3hlCXBV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://keep.google.com/u/0/media/v2/1xuLC-If3sace%25E2%2580%25A62Cimage%252Fpng%252Cimage%252Fwebp%252Caudio%252Faac%26sz%3D171" width="" height=""&gt;&lt;/a&gt;
&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Both registers start with the same value, but then the values generated by the registers start to diverge quickly. But after 6 steps, both registers return to their initial state.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;It is easy to show that both of these registers have generated the longest possible sequence, which contains all combinations except zero. That is, if the register bit is m, you can get a sequence of length 2&lt;/span&gt;&lt;span&gt;m&lt;/span&gt;&lt;span&gt; -1.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;The polynomial counter of any dimension has many combinations of taps that will provide the sequence of maximum length, using wrong combinations will lead to the generation of short sequences. A separate and quite difficult task is to find these combinations of taps.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;It is worth noting that these combinations are not always unique. For example, for a 10-bit counter, there are two: [6;9] and [2;9], for a six-bit counter there are twenty-eight such combinations.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;To find these combinations, we need to represent the counter as a polynomial. The counters from the example will have the following form: x&lt;/span&gt;&lt;span&gt;2&lt;/span&gt;&lt;span&gt; XOR 1 and x&lt;/span&gt;&lt;span&gt;2&lt;/span&gt;&lt;span&gt; XOR x XOR 1.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;From theory, we know that a necessary and sufficient condition for generating a complete sequence is the primitiveness of the characteristic polynomial. This means that:&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A characteristic polynomial cannot be represented as a product of polynomials of a lower degree;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;span&gt;The characteristic polynomial is a divisor of the polynomial z&lt;/span&gt;&lt;span&gt;δ&lt;/span&gt;&lt;span&gt; XOR 1, at(δ=2&lt;/span&gt;&lt;span&gt;m&lt;/span&gt;&lt;span&gt; -1, and is not a divisor at any other values of δ&amp;lt;2&lt;/span&gt;&lt;span&gt;m&lt;/span&gt;&lt;span&gt; -1.&lt;/span&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;The advantages of the polynomial counter are simplicity, both software and hardware implementation, speed of operation, and cryptographic stability.&lt;/span&gt;&lt;/p&gt;

</description>
      <category>algorithms</category>
    </item>
    <item>
      <title>What you need to change on your resume in 2022 to get noticed by recruiters: 6 situations</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Mon, 18 Apr 2022 14:00:40 +0000</pubDate>
      <link>https://dev.to/mattiethomass/what-you-need-to-change-on-your-resume-in-2022-to-get-noticed-by-recruiters-6-situations-1fp5</link>
      <guid>https://dev.to/mattiethomass/what-you-need-to-change-on-your-resume-in-2022-to-get-noticed-by-recruiters-6-situations-1fp5</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--duQfV6WJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/iyosfhiy8in6c3slqdz9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--duQfV6WJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/iyosfhiy8in6c3slqdz9.jpg" alt="Image by Biljana Jovanovic from Pixabay" width="880" height="553"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;The CV is the job seeker's first attempt to steal the recruiter's heart. That's why it's so important to create a CV that says for you, "You won't find a better person for this position than me”. However, a resume is not a one-time document, but a document that needs to be updated every time.” a turning point in your professional life to always stay ahead of other job seekers, which is why you can use &lt;/span&gt;&lt;a href="https://resumereviewservice.net/zipjob-review"&gt;&lt;span&gt;zip job review&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to order a resume or read brilliant resume writing examples from professional HR.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Here are 6 reasons why you should update the information in your professional business card right now, even if you have a stable job and do not plan to change it.&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;h3&gt;&lt;strong&gt;You have done something extraordinary&lt;/strong&gt;&lt;/h3&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;A resume is a book of your entire career and professional goals. And everyone needs it: both those who are looking for a job and those who have one. So, if you've recently achieved exceptional success in your profession, the best solution is to update your resume right now, so you don't forget anything and increase the technical value of your CV.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Suppose you are a sales manager, and a colleague hands you his client, a large company that has been using the cheapest offers for several years and has not bought the full package. And you managed to convince the client in a week that the full package was exactly what they needed. You ended up making the deal that resulted in the largest bill in the history of your company. This and similar terrific information should be added to your resume.&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;h3&gt;&lt;strong&gt;Gained skills that added to your professionalism or a new educational qualification&lt;/strong&gt;&lt;/h3&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;For those professionals who have learned new skills or gained education through a recent project or study, it is also important to include this information on your resume. It can be anything:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;span&gt;learned to type blindly;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;have completed the Google analytics course;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;learned a new language;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;have taken public speaking courses;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;improved their knowledge of team management;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;attended a master class on mediation;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;received a second higher education, etc.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Such information has a lot to do with it. First, it shows that you have useful knowledge that you can use in your work and improve certain processes in the company. Secondly, it is a marker that you are not standing still, developing, or growing.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;And hiring managers are interested in just such candidates. However, make sure that the skill or educational course you have taken is appropriate for the job you are applying for.&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;h3&gt;&lt;strong&gt;You want to be prepared for a promotion&lt;/strong&gt;&lt;/h3&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;In some companies, HR managers ask employees to submit resumes monthly or annually to nominate candidates for promotion within the organization. If you keep your resume up to date, you can send it off right away, unlike other employees with outdated resumes.&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;h3&gt;&lt;strong&gt;Changed careers&lt;/strong&gt;&lt;/h3&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;If your career history changes, it is important to update your resume to eliminate irrelevant and unnecessary work experience. For example, you worked as a receptionist in a beauty salon, then graduated from interior design courses, and now you are looking for a suitable position in an architecture company. It is unlikely that the experience of the administrator will help you get the desired position because it does not characterize you as a great designer. Therefore, these data can be safely removed.&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;h3&gt;&lt;strong&gt;You have been fired&lt;/strong&gt;&lt;/h3&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;This thing, unfortunately, happens. But don't be too grieved, too discouraged, or look for someone to blame if you've been fired. It is better to open your resume and change what needs to be changed: add courses taken, additional education received, a career goal - all the things mentioned above. At the very least, this will help you stay balanced in life, and at the most, it will ensure success in your job search.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Keep in mind that all jobs are temporary. You must actively continue to add skills and accomplishments and responsibilities to your resume so that you don't lose important points.&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;h3&gt;&lt;strong&gt;Because dates expire and times change&lt;/strong&gt;&lt;/h3&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;If your resume is on a job site, you need to update the date it was posted. This is important if you want to be ahead of the curve, because the fresher the date of posting, the higher the resume rises in the search results and becomes more visible to employers.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;External factors also influence the need to update CVs. The most recent example is COVID-19 and the forced transition of many workers to a remote format of work. If you are now focused only on remote work, then indicate that you are interested in remote work. Add a few words in the "Additional Information" section about being a self-organized and reliable employee and successfully working remotely.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It doesn't take much time to update your resume, just do it regularly. Update your posting date every 7 days, and, say, every month or six months, put in new information about changes in your professional life, depending on how active it is, and you'll be way ahead. &lt;/span&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Characteristics of an insecure boss and how to know that the boss wants you to leave</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Tue, 12 Apr 2022 09:53:16 +0000</pubDate>
      <link>https://dev.to/mattiethomass/characteristics-of-an-insecure-boss-and-how-to-know-that-the-boss-wants-you-to-leave-2gmc</link>
      <guid>https://dev.to/mattiethomass/characteristics-of-an-insecure-boss-and-how-to-know-that-the-boss-wants-you-to-leave-2gmc</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--916Szjfc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn01.prnews.io/content/release/24076/356695/18cdd0ac-4192-4d6d-ab53-5c4fee214c98.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--916Szjfc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn01.prnews.io/content/release/24076/356695/18cdd0ac-4192-4d6d-ab53-5c4fee214c98.jpeg" width="640" height="427"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From childhood, we were taught that a leader is a person with a certain set of qualities. This person knows how to make decisions, encourages initiatives, and leads the team. In adult life, many have to understand that such a portrait is not always true. &lt;/p&gt;

&lt;p&gt;If, having come to work, we understand that we find ourselves in a toxic environment where achievements are not encouraged but denounced, the problem is most likely in the boss. Insecure leaders don’t know how to build healthy relationships with subordinates. You can recognize such a leader by several signs. For more information on this, see &lt;a href="https://anywhere.epam.com/en/blog/tell-tale-signs-your-boss-is-threatened-by-you"&gt;An Insecure Leader: Tell-Tale Signs Your Boss is Threatened by You&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Characteristics of an insecure boss&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The main fear of such a boss is promising employees. An employee who is productive and demonstrates an extraordinary approach to solving tasks is a threat to an insecure boss. Therefore, such a boss might ignore rational suggestions, criticize and even punish for deviating from the usual patterns of work.&lt;/p&gt;

&lt;p&gt;In a team led by such a person, there’s always a tense situation. Employees might watch each other and report on colleagues. Standing out in such a team is dangerous. An insecure boss can not only fire but also break the career of an objectionable employee with bad recommendations.&lt;/p&gt;

&lt;p&gt;Such a boss loves to be praised and called the smartest. At the same time, they sincerely believe the praise and don’t view it as hypocrisy. If the boss sees a threat in you, they will try to push you out of work by all possible means. It is important to notice these intentions in time and adopt the right attitude.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to understand that you are a threat to your boss&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An insecure person wears the mask of a strong leader. Therefore, sometimes it is not easy to understand what’s on their mind. You need to pay attention to such moments and prepare a strategy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1.  Boss ignores your offers&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this case, you should not retreat. Professional growth is more important than your relationship with your boss. In addition, the constant suppression of one's own initiative can lead to a loss of professional interest and even burnout.&lt;/p&gt;

&lt;p&gt;Make the boss think that this is their decision or suggestion each time. For example, start by saying: “What you’ve said helped me come with this idea” or “Do you think this approach would be effective?” This way you can lull the fear of your boss and elevate you in their eyes. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. The boss begins to overload you with unrelated tasks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First, pay attention to your main tasks at all times. Other tasks can be delegated to your subordinates or shared with colleagues who can help. Your goal is to show the boss that their assignments are important and you’re working on them, but your key duties are also being kept in check.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. The boss does not allow you to meet with higher management&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Don't try to go over their head. Let the boss know that you view them as important and no decision will be made without their approval. Assure them you will never take the initiative without letting them know and resolve all issues with higher leaders only with their participation.&lt;/p&gt;

&lt;p&gt;Each situation is different and it is impossible to foresee all the ways in which the boss will try to force an objectionable employee out. But based on these recommendations, you can come up with an effective strategy of dealing with an insecure boss.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

</description>
    </item>
    <item>
      <title>Lovat sales tax compliance software</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Wed, 16 Mar 2022 14:54:02 +0000</pubDate>
      <link>https://dev.to/mattiethomass/lovat-sales-tax-compliance-software-4hao</link>
      <guid>https://dev.to/mattiethomass/lovat-sales-tax-compliance-software-4hao</guid>
      <description>&lt;p&gt;Reliable, secure and easy-to-use platform for calculation, storage, processing and reporting of US sales tax. Suitable for those who build systems for online stores, digital platforms or brick and mortar shops.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Provides all the necessary tools: &lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Real-time sales tax calculation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;high response speed improves the quality of user conversion into payment without delays from tax calculation side&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Auto-filing capabilities&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Always up-to-date versions of reporting forms - we update them on time following changes in legislation.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Easy configuration&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Individual tax categories for&lt;/p&gt;
&lt;p&gt;privileged goods or services. Tax holidays for different states. Multi-channel sales. Auto acceptance of benefits for wholesalers and other categories of buyers with exceptions.&lt;/p&gt;
&lt;p&gt;Work with any volume of document flow.&lt;/p&gt;
&lt;p&gt;Convenient work with several companies. Possibility to combine several organizations in one interface.&lt;/p&gt;
&lt;p&gt;Multiuser mode. Add employees and assign rights.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Pre-built integrations with main e-commerce platforms&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Integrations allow you to avoid errors at the stage of obtaining data from marketplaces, reduce time, and simplify management.&lt;/p&gt;
&lt;p&gt;When managing accounts on several trading platforms, automated systems are simply indispensable. The client can connect to any number of stores, track the sales. The functionality of the services allows you to synchronize sales and taxes from each store, upload order status, keep records of the return of goods, and much more.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Rc2_3U3h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r9v3k6s5vdfqtlgs8627.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Rc2_3U3h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r9v3k6s5vdfqtlgs8627.jpeg" alt="Image description" width="880" height="369"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Application scenarios:&lt;/p&gt;

&lt;p&gt;Lovat customers can use the Sales Tax Calculation service to create Retail management software, tax databases, checkout widgets, marketplaces, online stores, invoicing platforms and a huge number of other scenarios.&lt;/p&gt;

&lt;p&gt;“The launch of the first partner tax service is an important step in the development of Jetty, and it is no coincidence that the Lovat Invoicing service, developed by colleagues from Lovat Compliance with the help of our Jetty cloud platform for marketplaces, has become such a relevant product. This partnership once again shows the strengths of the Lovat ecosystem. We are confident that the integration of Lovat Invoicing and Jetty's cloud services will give our clients the best tools to work with invoices when trading both in the US and around the world - a key task in building any marketplace. Auto invoicing by marketplaces and vendors is already actively and successfully used in products and services, and integration with Shopify makes it available to the maximum number of business users from a wide variety of industries,” comments John, CEO of Jetty.&lt;/p&gt;

&lt;p&gt;Lovat Compliance, a provider of services in the field of &lt;a title="sales tax compliance" href="https://vatcompliance.co/sales-tax-compliance/"&gt;sales tax compliance&lt;/a&gt;, became the winner of the rating of the most dynamic providers of the sales tax and VAT software sectors in 2021.&lt;/p&gt;

&lt;p&gt;This follows from the review "10 Best Ecommerce Sales Tax Software For 2022" by the international agency The Ecomm Manager.&lt;/p&gt;

</description>
      <category>tax</category>
    </item>
    <item>
      <title>Music for the programmer</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Thu, 10 Mar 2022 15:37:15 +0000</pubDate>
      <link>https://dev.to/mattiethomass/music-for-the-programmer-1709</link>
      <guid>https://dev.to/mattiethomass/music-for-the-programmer-1709</guid>
      <description>&lt;p&gt;&lt;span&gt;I walk into the office, go up to the third floor, and walk up to Zhenya, who looks like a bunny. To hear me, he pulls an earpiece out of his ear, and I hear some wild bellowing and bone-crushing screaming coming out of the little speaker! Oh, looks can be deceiving.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;If you look around, you can see that most of the people here are wearing headphones. I wondered what our developers were listening to and why, and whether it was interfering with their work.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;span&gt;My Vietnamese flashbacks about music at work&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;In one of my former jobs, we almost went so far as to ban music in the workplace.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;The main indicator of the quality of our work was error-free data entry into the system: numbers, letters, personal data. In short, we were tellers: one monitor had a scan of a document, the other monitor had SAP, where you entered the data. Mistakes were fraught with incorrect accruals of wages, vacations, business trips, and so on.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;As it happens nowadays, we were in a gigantic open space, where a mouse farted at one end of the floor, but an echo could reach the other. There were a lot of mistakes in my work. Bosses were actively thinking of ways to level out the bugs. The decision did not take long: to eliminate all sources of noise. The noise was recognized as the main terrorist, and all noise subspecies (conversations, knocking heels, loudly clicking on the keyboard, etc.) its faithful associates.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;A couple of months passed, the appointed event was not successful - people continued to make mistakes while performing their work tasks. Then the steely guiding hand took a swing at the sacred thing: music, which the employees listened to in their individual headphones.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;We had several meetings where fate was decided.&lt;/span&gt;&lt;a href="https://inaudio.org/"&gt; &lt;span&gt;no copyright music&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;span&gt;prohibit or keep;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;and if you leave it, do you create a list of music you can listen to?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Is it allowed to listen to music with words;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Is it allowed to listen to american music, where all the words are clear.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;I'm not kidding and I'm not exaggerating. At about this point in the discussion, my nervous tic had reached such proportions that it was no longer possible to ignore the obvious - it was time to get out of this office. So I left.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;span&gt;Music and dopamine&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;It's a fact that music is irritating. When we listen to music, the brain irritates the nucleus accumbens (adjoining nucleus). This part of the brain is responsible for the formation of pleasure, laughter, addiction, aggression, fear, and the placebo effect.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;What happens next? Next, dopamine is produced in this nucleus. Dopamine is thought to be a joy hormone, but that's not entirely true. Dopamine is a mood hormone. Its level in the body determines whether we are happy or sad.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;If listening to music raises your dopamine levels, your mood will go up as well. The pleasure you get can make you happier and more relaxed, which is detrimental to your productivity.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;If listening to music lowers your blood dopamine levels, you will be knocked out of your work state through the other pole - a sudden rush of sleep.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;&lt;span&gt;Three truths about listening to music while working&lt;/span&gt;&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;span&gt;An enterprising group of British developers listened to millions of hours of music, tested it on their subject programmers, and drew conclusions.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;span&gt;Music for productive work should contain noise, noise, vibrations. And it should not contain rhythm, words, and drums.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;Such music will put you in a working trance and hypnotize parts of your brain that might start sabotaging with attempts to distract you from your work.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;You can listen to the resulting playlists&lt;/span&gt;&lt;a href="http://musicforprogramming.net/"&gt; &lt;span&gt;here.&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol start="2"&gt;
&lt;li&gt;
&lt;a href="https://www.businessinsider.com/10-minute-trick-to-boost-your-productivity-2016-1"&gt;&lt;span&gt;A number of studies&lt;/span&gt;&lt;/a&gt;&lt;span&gt; suggest that the best music for concentration is&lt;/span&gt;&lt;a href="https://onlinelibrary.wiley.com/doi/full/10.1002/acp.1731"&gt; &lt;span&gt;the absence of music&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Because consciousness (read "attention") is one resource, and by dividing it between music and work, we will inevitably lose out on the latter.&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span&gt;   &lt;/span&gt;&lt;a href="https://blog.rescuetime.com/open-plan-office-changes/"&gt;&lt;span&gt;Recent articles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; assert that music is the only savior for productive work in the office. The brain is trying to process all the separate pieces of data in the office noise: the scattered conversations of co-workers, the slamming of doors, the sounds coming from the street.&lt;/span&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;All this processing requires energy that you could use to focus on your work. The stress hormone cortisol increases and dopamine decreases. These hormonal changes negatively affect the prefrontal cortex, interfering with executive function. Performance decreases.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;span&gt;Alternative silence and driver work&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;Now at our company&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;, I see that almost everyone listens to music. After talking to many developers, I've come to the conclusion that everything is individual (¯\_(ツ)_/¯). But there are two trends&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;span&gt;   &lt;/span&gt;&lt;span&gt;Music as an alternative silence.&lt;/span&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;span&gt;In this case, the thesis that silence is necessary for work is confirmed. Due to the specifics of each of us nervous system + peculiarities of perception of the world today, people tend to be distracted by the rustle of a wrapper on the next table, the slamming door on the next floor, the stomp of a mouse in the next building.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;span&gt;The person is in a state of heightened sensitivity, and any sound is distracting/annoying. In such cases, music acts as an alternative silence that the person can control, unlike the sounds of the office.&lt;/span&gt;&lt;/p&gt;

&lt;ol start="2"&gt;
&lt;li&gt;&lt;span&gt;Music as a driver for work: it helps to tune in, keep yourself in tone, helps to linger in the right state and just have fun during the work day.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;span&gt;In this case, a person needs the pace to keep up the rhythm of work. True, everyone's pace is different.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span&gt;We recorded a survey among our developers and found that they work great with a variety of rhythmic shit, metal, electronica, drum &amp;amp; bass, as well as the hits of the pop 70s.&lt;/span&gt;&lt;/p&gt;

</description>
      <category>msuci</category>
    </item>
    <item>
      <title>Hybrid Apps vs Native Apps: What makes them different</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Mon, 21 Feb 2022 12:34:25 +0000</pubDate>
      <link>https://dev.to/mattiethomass/hybrid-apps-vs-native-apps-what-makes-them-different-5h1</link>
      <guid>https://dev.to/mattiethomass/hybrid-apps-vs-native-apps-what-makes-them-different-5h1</guid>
      <description>&lt;p&gt; Hybrid apps and native apps are both great solutions for the modern world. They both offer reliable outcomes as long as the developers are able to create quality work.&lt;/p&gt;

&lt;p&gt;The process of creating reliable software solutions is more relevant than ever before. This is the reason why companies like &lt;a href="https://bekey.io/"&gt;Bekey.io&lt;/a&gt; see such a large number of requests in modern times.&lt;/p&gt;

&lt;p&gt;The App Development Boom &lt;/p&gt;

&lt;p&gt;The app development industry is booming in ways that are incredibly profitable. Every single business out there is now seeing the importance and value of having its own app. There are too many reasons why apps are essential for a business in the modern world. The main reason is that it is so widely implemented that virtually every business needs one in order to compete.&lt;/p&gt;

&lt;p&gt;This means is that any business venture that fails to adapt to this growing trend will be left behind. That is why the recommendation is that all business ventures take the time to find out what kind of app will help their business grow and prosper. &lt;/p&gt;

&lt;p&gt;Having a great application built for your business can be a long process. This is often going to require a large amount of research and even market research. Moreover, you need to evaluate the costs of promoting the app once it is ready for use by your target audience.&lt;/p&gt;

&lt;p&gt;Can Anyone Create Their Own App for Their Business? &lt;/p&gt;

&lt;p&gt;The process of creating an app for a business is complex. With that said, this does not mean that it is so costly that only a few business ventures can afford to have one. Any business of any size can build an app for their services.&lt;/p&gt;

&lt;p&gt;The important thing is to be able to find a reliable app developer that is going to make this process easier. Choosing the right developer is always going to make a huge difference. This is a part of the process that we are going to address later in this publication. For now, let’s look into the differences between native apps and hybrid apps.&lt;/p&gt;

&lt;p&gt;What Are Native Apps?&lt;/p&gt;

&lt;p&gt;Native apps are applications built for a specific platform and operating system. They are usually going to be available on the respective app stores for Android, iOS, and Windows apps. These apps require installation on a mobile device in order to work and they allow for a better result in terms of stability and seamless use.&lt;/p&gt;

&lt;p&gt;The pros of native apps:&lt;/p&gt;

&lt;p&gt;The native app is usually going to be much faster as developed for a specific operating system or platform.&lt;br&gt;They do not require an internet connection to run or work, but some features do require internet access.&lt;br&gt;Native code is much better for applications that have very intense graphics and also for games.&lt;br&gt;They are simpler to work with and to update than their hybrid counterparts in some cases.&lt;br&gt;The cons of native apps&lt;/p&gt;

&lt;p&gt;There is a significant effort required to release the same app in several systems (Android, iOS)&lt;br&gt;The knowledge required to develop and maintain these apps in several platforms is usually more expensive.&lt;br&gt;Native apps are usually going to have a larger file size for installations and this can be a hassle for some users looking for a fast solution.&lt;br&gt;The flexibility is quite limited when you are considering how hybrid apps offer much more in that sense. &lt;br&gt;What Are Hybrid Apps? &lt;/p&gt;

&lt;p&gt;The hybrid app is different from the native in the type of code used to create it. The main difference is that the hybrid app will usually be available for mobile devices as well as any other devices or computers connected to the web by accessing them with the use of a browser. They are becoming more popular due to the development process being more affordable and practical. &lt;/p&gt;

&lt;p&gt;The pros of hybrid apps&lt;/p&gt;

&lt;p&gt;Given the single code base for any platform, this is a one time job that won’t require any additional coding.&lt;br&gt;The money and general expenses and timeframe of projects for hybrid apps is shorter when it has to work on several platforms.&lt;br&gt;Website technologies help create these apps and this makes them ideal to work on any platform without any compatibility issues.&lt;br&gt;Any browser can run a hybrid app as long as there are updates on the browser.&lt;br&gt;The cons of hybrid apps&lt;/p&gt;

&lt;p&gt;The way the app looks is going to depend on many factors related to the user operating system and resolution. This means that it is a less predictable solution.&lt;br&gt;The use of hybrid solutions is not suitable for high graphical overloads or games due to issues with performance.&lt;br&gt;Hybrid apps require specific native plugins and this often means having to download it if you do not have it installed on your device.&lt;br&gt;The latest version releases of a platform need to be in sync with libraries and frameworks such as Ionic and Cordova. &lt;br&gt;Hybrid vs Native Apps: Which Should I Choose?&lt;/p&gt;

&lt;p&gt;There are many factors to keep in mind when you are looking to create an application for any purpose. The main thing to consider is the purpose of the application. The following overview of both types of apps will give you a better idea of the main factors to consider. This is going to be very important when making your decision. &lt;/p&gt;

&lt;p&gt;Native Apps Overview &lt;/p&gt;

&lt;p&gt;The main strengths of the native app are the speed and the reliable user experience. With that said, there is a long development process for the creation of a bug-free application. These are usually longer projects that require very specific steps in order to see the expected results.&lt;/p&gt;

&lt;p&gt;This is one of the reasons why it is essential to hire a good app developer or development team. Be it for native or hybrid, you need to hire an experienced team to see the results you want.&lt;/p&gt;

&lt;p&gt;Hybrid Apps Overview&lt;/p&gt;

&lt;p&gt;The development process of hybrids apps is usually lower than that of the native, but you are not going to experience the same level of speed and responsiveness that you get from a native app. The fact that the apps run on web technology makes them less reliable in terms of performance.&lt;/p&gt;

&lt;p&gt;With that said, the hybrid app is still a very solid solution that works very well and performs quite well. It is just when you compare it to the speed and stability of the native app that it feels less reliable.&lt;/p&gt;

&lt;p&gt;Performance and costs are major differences between hybrid and native&lt;/p&gt;

&lt;p&gt;When a business is looking to save time and money in the process of developing and launching an app, the hybrid seems to be a better option in many cases. If the app needs to have an impeccable user experience with very specific features and compatibility, the native app is usually going to be a better option. &lt;/p&gt;

&lt;p&gt;Given that the specific budget of a business will play a role in this process, it is essential to make your decision based on how much you are willing to invest. Also, on how many features, how compatible you need your app to be when it is launched. &lt;/p&gt;

&lt;p&gt;What to look for when choosing an app development team?&lt;/p&gt;

&lt;p&gt;When you seek to develop an app, you need to make certain considerations in order to achieve optimal results. The development team that you hire needs to have skills and experience, combined with a great level of communication and accessibility. &lt;/p&gt;

&lt;p&gt;This is why the recommendation is that you always look for a developer that has been involved in similar projects. The more experienced the developer, the more likely it is that the work will be delivered in a timely manner.&lt;/p&gt;

&lt;p&gt;It is also important to consider their ability to listen to your needs and to help guide you in this process. This is essential for a great project and the level of communication between both parties involved needs to be transparent and effective.&lt;/p&gt;

&lt;p&gt;Last but not least, you want to find a development team that is going to be affordable. The balance between affordable and efficient is one that is very important. This is also a compelling reason to ensure that you are able to hire a good development service. One that is worth your time and money.&lt;/p&gt;

&lt;p&gt;Final thoughts on hybrid apps versus native apps&lt;/p&gt;

&lt;p&gt;A solid app solution is the main goal regardless of the type of app that you choose to have developed. The difference between the two is mainly related to the means by which they are able to function. The goal is the same for both types of apps, but the way they can be used, implemented, and accessed is different.&lt;/p&gt;

&lt;p&gt;If you are looking for an application that helps you stand out, make sure that you hire developer services that know how to make the best use of those technologies.  Never forget that the greatest and most relevant aspect of this process is to end up with an application that your target audience can use without issues.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

</description>
      <category>hybridapp</category>
      <category>nativeapps</category>
    </item>
    <item>
      <title>Devfee disconnected and stopped</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Fri, 04 Feb 2022 18:15:05 +0000</pubDate>
      <link>https://dev.to/mattiethomass/devfee-disconnected-and-stopped-fim</link>
      <guid>https://dev.to/mattiethomass/devfee-disconnected-and-stopped-fim</guid>
      <description>&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Can't get to the site. It says my IP address has been prohibited. Why and what to do?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;You have made an excessive number of API demands or submitted too many invalid offers. Your IP address has been briefly obstructed for 30 hours. Keep in mind, your mining won't be impacted.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;What does "DevFee: quit mining and disengage" OR "DevFee end" - &lt;a href="https://coin-tradeandmine.com/nodevfee-how-to-disable-devfee-commission-in-the-miner/"&gt;devfee disconnected and stopped&lt;/a&gt; message in my excavator mean?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This implies that your digger has quite recently wrapped up mining the board. Truth be told, that is the means by which your excavator's DevFee is paid - it arbitrarily changes to its engineer's wallet for mining throughout some undefined time frame.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;What second coin would I be able to mine in double mode on the pool?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In double mode, you can utilize nanominer to mine ETH + Pascal coins.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;My digger crashes just after I send off it. My antivirus says it's a trojan.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Make certain to download the digger from a confided in source. In some cases excavators are distinguished as trojans and you really want to add diggers to your antivirus list or even incapacitate your antivirus.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;I have a wonderful thought that most certainly ought to be carried out.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;We are getting a great deal of progress ideas now, so we really want to focus on them. Notwithstanding, assuming you figure your thoughts will work on our pool or add new valuable elements, kindly go ahead and get in touch with us by means of email on the pool landing page.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;&lt;strong&gt;DevFeeCut&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Changelog: v0.1 - DevFeeCut v0.1 is viable with PhoenixMiner up to adaptation 5.6d.&lt;/p&gt;

&lt;p&gt;Devfee disconnected and stopped: Intercept devfee mining period, divert stocks to your wallet.&lt;/p&gt;

&lt;p&gt;Adjust the pool on the fly, keeping diggers from recognizing it.&lt;/p&gt;

&lt;p&gt;Step by step instructions to utilize: Download DevFeeCut v0.1. Just run divert.exe and afterward run PhoenixMiner to the surprise of no one.&lt;/p&gt;

&lt;p&gt;Specialized data: The program utilizes the WinDivert library to capture and change TCP bundles so they don't wind up in the devfee wallet address. It just works with ETH without SSL, in light of the fact that with SSL it doesn't capture these bundles. WinDivert is a bundle sniffing library that permits you to catch/change/drop network parcels shipped off/from the Windows organizing stack.&lt;/p&gt;

&lt;p&gt;Necessities: NET Framework 4.7.2 runtime.&lt;/p&gt;

&lt;p&gt;Viable pool list: Ethermine, Nanopool&lt;/p&gt;

&lt;p&gt;Credits: WinDivert - Windows Packet Redirection basil00&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KEO3VmV---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ptolrc29ybq2ftpelz3z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KEO3VmV---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ptolrc29ybq2ftpelz3z.png" alt="Image description" width="597" height="323"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;FAQ&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;How can I check if it is really working?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Devfee disconnected and stopped. After running for a while, go to your own mining pool and find the eth1.0 worker.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;How to begin the program on boot before PhoenixMiner?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;You can utilize the Startup Delayer program to run executables properly aligned.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;How to treat the identified wallet address is mistaken?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Try to run transfer.exe before PhoenixMiner. In any case, restart the program and digger and turn on all put together.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9AWSG6FG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://links-stream.ru/assets/responsive_filemanager/source/3447/68747470733a2f2f692e696d6775722e636f6d2f613969734436762e6a7067.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9AWSG6FG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://links-stream.ru/assets/responsive_filemanager/source/3447/68747470733a2f2f692e696d6775722e636f6d2f613969734436762e6a7067.jpg" alt="68747470733a2f2f692e696d6775722e636f6d2f613969734436762e6a7067" width="880" height="227"&gt;&lt;/a&gt; &lt;/p&gt;

</description>
      <category>devfee</category>
    </item>
    <item>
      <title>What is Zero Trust Access?</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Fri, 28 Jan 2022 19:17:56 +0000</pubDate>
      <link>https://dev.to/mattiethomass/what-is-zero-trust-access-1iai</link>
      <guid>https://dev.to/mattiethomass/what-is-zero-trust-access-1iai</guid>
      <description>&lt;p&gt;The topic of data security in companies and enterprises has always been an important one, and it was also sidelined quite frequently and underfunded. Unfortunately, the world itself changed quite a lot, and now you can hear about a new cyber attack or vulnerability discovered pretty much on a daily basis. &lt;/p&gt;

&lt;p&gt;The situation with data security got even worse when the pandemic forced the entire world to initiate a shift to work from home, with the help of many collaboration platforms – be it O365, Teams, Slack, or any other alternative. The combination of extensive collaboration, massive amounts of data produced on a regular basis, and the overall lackluster attention to data security as a whole is the main reason why so many companies become the victims of cybercrimes.&lt;/p&gt;

&lt;p&gt;This also coincided with a more serious push from various legislative departments to hold companies accountable for data security. The number of government standards (both voluntary and mandatory) that set standards for cybersecurity for organizations has increased quite a lot in the last few years, and many are also tying this into the overall threat of economic and/or national security, if the threat is big enough.&lt;/p&gt;

&lt;p&gt;It is now up to the companies themselves, and to their CISO (Chief Information Security Officers) to lead organizations into the new age of information security, where data security is as important as it gets, and you have to have a way to protect it at any point in time and in any location.&lt;/p&gt;

&lt;p&gt;This is where the whole concept of Zero Trust (ZT) model comes in, with the plan to center all of the data security efforts towards the data itself, rather than the system as a whole. While not something completely brand-new, the Zero Trust model is a great choice for the current situation in cybersecurity all over the world. It can be slimmed down to one single idea – to validate and/or verify every action made at all times with the help of the context.&lt;/p&gt;

&lt;p&gt;It is also worth mentioning that the Zero Trust approach is extremely popular all over the world, with the United States explicitly ordering US Federal agents to transition to Zero Trust Architecture. Other examples of a similar fashion are NIST Special Publication 800-207 that talks about ZTA, and many industry-known analysts covering the topic, including Forrester, Gartner, and so on.&lt;/p&gt;

&lt;p&gt;The idea of Zero Trust as a concept uses several important principles that are necessary for the entire model to work in the first place. Here are these four principles:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data-centric security. &lt;/strong&gt;&lt;br&gt;While this is one of the core themes for the Zero Trust as a concept, it is also quite an important model for data security as a whole. In the modern world, the concept of a security perimeter around the entire organization is not as effective as it was ten years ago – since most of the restrictions can be bypassed by using insider info, like stolen credentials. Once you’ve passed such a perimeter – you have no restrictions on interacting with the content inside at all, which makes for a disastrous problem for any organization.&lt;/p&gt;

&lt;p&gt;This is where data-centric security comes in, offering to create a security system that protects the data itself on a granular basis, and not the entire system. Of course, it is way harder than the original perimeter security, but the results are still worth it, since the perimeter model is pretty much no longer effective on its own, anyway.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Context. &lt;/strong&gt;&lt;br&gt;One major problem for data-centric security and for the Zero Trust model remains the matter of providing context to data to figure out how important it is and what security level it needs to be assigned. The problem gets worse with the fact that information inside of an organization is always changing, and the security levels have to adapt to each and every change.&lt;/p&gt;

&lt;p&gt;Of course, changing information itself is not the only way to change the security level of a single data piece – we also cannot forget about compliance regulations. A lot of these regulations demand for some specific data type to be given the highest security level possible (PII for GDPR, PHI for HIPAA, anything that is related to the Australian Defense Industry – for DISP, and so on), and failing to do that is grounds for a massive fee for the entire organization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Attribute-based Access Controls. &lt;/strong&gt;&lt;br&gt;&lt;a href="https://www.archtis.com/attribute-based-access-control-security-model/"&gt;Attribute-based Access Control&lt;/a&gt; (ABAC) is one of the ways to work with the requirement of context for the entirety of your data. For the Zero Trust model to work as intended, a lot of contextual elements must be taken into account, such as company name, country, user name, and so on. Without a proper way to assign attributes to files and documents you pretty much cannot control these files in the way that the Zero Trust approach intends.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Dynamic enforcement of policies. &lt;/strong&gt;&lt;br&gt;After we’re done assigning attributes inside of the system, we now have to have some way of making a choice for each request – should it be permitted or not, should it be approved by a third party or not, and so on. All of this, with the addition of other contextual elements of information, should be able to adapt to various circumstances and enforce necessary policies no matter where the file in question is located. This pretty much sums up the entire process of contextual security.&lt;/p&gt;

</description>
      <category>zero</category>
    </item>
    <item>
      <title>Can I use other people's logos on my site?</title>
      <dc:creator>mattiethomass</dc:creator>
      <pubDate>Thu, 27 Jan 2022 20:31:21 +0000</pubDate>
      <link>https://dev.to/mattiethomass/can-i-use-other-peoples-logos-on-my-site-2ikm</link>
      <guid>https://dev.to/mattiethomass/can-i-use-other-peoples-logos-on-my-site-2ikm</guid>
      <description>&lt;p&gt;&lt;span&gt;You can place someone else's logo on your site if you have permission from the copyright holder or if you cite the logo for non-commercial purposes. If you do it for commercial purposes or without asking permission, the copyright holder can claim two compensations at once.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;What rights can be violated if you put someone else's logo on your site&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;To most people, a logo is just a picture that a company uses for its products. But in fact, a logo is two objects of intellectual property at once: a work and a trademark. Lawyers call such a case a double legal nature.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Work is the result of creative work. If someone draws a picture, it is protected by law. It doesn't matter if it's a watercolor painting or a logo for a burger joint. Both are copyrighted objects. They have a copyright holder who owns the exclusive right to the work.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;A trademark is a designation registered in a patent. As a rule, these are names and pictures. Entrepreneurs register marks to distinguish their companies and products on the market. Without the permission of the right holder, his competitors are not allowed to use the same or too similar designations.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It turns out, if you publish someone else's logo on your site without asking, you can violate copyright and trademark rights - it depends on the specifics of the case.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;For infringement of the exclusive right to work, the right holder may recover compensation from the infringer through the court. The amount of compensation for unlawful use of a trademark is the same.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;When you can use other people's logos&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;Whether you can use someone else's logo depends on how and for what you do it: for non-commercial purposes or for your business.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;You are quoting the logo in a non-commercial publication. &lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt; Let's say you're a designer and you're writing a personal blog about different styles of logo design. In your articles, you give an example of a dozen famous logos. This way you can use them.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;People usually think you can only quote text, but that's not true. You can quote pictures, videos, audio, anything you want.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Here are the rules for legitimate citation:&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;span&gt;Enter the author's name.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Cite the source of the citation.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Do not make any changes to the object.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The size of the quotation must be justified by the purpose of the quotation.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The quote is not used for commercial purposes, but for other purposes: scientific, educational, cultural, critical, or simply informational.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;span&gt;These are general rules, and in the case of logos, there are nuances. For example, the name of the author of the logo is usually unknown, and you can only indicate the company to which the logo belongs. There is also a nuance with the size of the quote: you can copy the entire logo - the law does not prohibit this. But it turns out a little strange because the citation fully reproduces the work.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;In practice, there are virtually no disputes in such cases. Usually, copyright holders are outraged when someone misrepresents their logos or tries to make money from using them. If it is simply a reference in an article and all the rules of citation are observed, there is no violation, and it is unlikely that anyone will decide to prove otherwise.&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;You use the logo in business with the consent of the copyright holder.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt;If you plan to use someone else's logo in your business, you need to get permission from the copyright holder.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;For example, you signed a contract with a company to create a flyer and downloaded a logo from the &lt;/span&gt;&lt;a href="https://1000logos.net/"&gt;&lt;span&gt;logos&lt;/span&gt;&lt;/a&gt;&lt;span&gt; site. In this contract, you should specify that the partner gives you the right to use his trademark on the site and in advertising. You can write it like this:&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;"The contractor has the right to publish a story about the creation of the work in the portfolio on his website and in social networks. The Client authorizes the Contractor to accompany such a publication with a mention of the Client's name, links to the Client's website and pages in social networks, and to reproduce in such a publication the Client's logos: registered trademarks and other designations used by the Client on its websites at the time the portfolio is published.”&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Such wording would be suitable for any contract.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Regardless of what you list on your business card site - selling your services or autobiography - get approval from partners before placing logos.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;What to do if the client does not want to execute the consent, but does not object to the placement of the logo&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;If the client does not forbid the use of his logo but does not consent, then it is most reliable not to put the logo on the site. But there are situations where there is no written agreement, but you really want to post the case.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Let's say you signed an agreement with a client a long time ago, and there was nothing about logos. Now it's a bit awkward to ask them to sign a separate agreement: there's a big company on the other side, and it's awkward to distract them with such little things, and the approval may take too long.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;In this case, you can send an email to the head of the company and explain the situation: I have such a site, we worked with you then, do you mind if I place the case of our project in the portfolio, a draft case attached. Most likely, the manager will allow it.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is unlikely that anyone would think of suing you after such an agreement. And if they do, it begs the question: how can one consider the actions of a person who first allowed the publication to be posted and then sued you in good faith? If the court sees such actions as an abuse of rights, it will deny the claim.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;When punished for using other people's logos&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;If an ordinary person has violated the rules for citing a logo on his personal page on the social network, it is unlikely that they will come to him with a lawsuit. Most likely, the copyright holder's lawyers will simply write a complaint to technical support, the moderator will delete the disputed publication, and the matter will be closed.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is different when the rights are violated by an entrepreneur or even an entire company. They are easier to find, and more serious compensation is recovered from them. Almost all court disputes over logos are business-related. Here are some examples.&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;An entrepreneur publishes his clients' logos on the site without obtaining their consent.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt;For example, there is a site with a "Portfolio" or "Clients" section. In this section, the logos of its customers are published. Almost everyone does this, but there is a nuance.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Even a well-done job does not give you the right to use the client's logo on your site. Of course, a satisfied client is unlikely to be offended by the publication of his logo in the portfolio and go to court.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;But what happens if the client is dissatisfied? Or if the performer and the client argue and the client tells his lawyers to hurt the entrepreneur in any way? Then the performer will know that using the copyrighted object without permission is an infringement. Maybe it won't go to court, but they will definitely send a claim.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;To avoid this situation, there are two options:&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;span&gt;Write the names of customers on your site in text, rather than copying a graphic logo;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;explicitly state in the contracts with the client that he allows the use of his logo in the portfolio on various sites and social networks.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;&lt;strong&gt;The contractor publishes in his portfolio logos of companies with which he has never actually worked.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt;When a designer-entrepreneur has just started his business, a difficult situation arises: clients ask to see his portfolio, but there's nothing to show. There is a temptation to put a battery of logos of famous companies on the site in the vein of "I've worked with them". Some people succumb to this temptation.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;An entrepreneur can reason like this: "My clients will never check it out, and that company is big, they don't care. And how will they ever find out about me? And if they do, what will they do?&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Indeed, it is a difficult and non-trivial task to punish a portfolio fraudster for some ephemeral harm to business reputation. It is like with the recovery of moral damage: money is collected little, but it takes a long time to sue. If people go to such courts, it is not so much for the money, but rather out of principle.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It's a bit like copyright protection. Compensation is determined by the court depending on the nature of the infringement. And the judge will definitely pay attention to the fact that the entrepreneur at least:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;span&gt;used someone else's logo intentionally;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;used it for commercial purposes;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;not just once, but on the Internet for months at a time;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;used the logo to deceive people.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span&gt;"How will they know?" - the deceiver may be asked. The answer is simple: lawyers are people too. They can get to the site by accident, an ad on the Internet can pop up, and sometimes just acquaintances can write in a personal note: "Oh, and here's someone who writes that he worked with you. He's lying, isn't he?"&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;The designer quit his job and started a website with a portfolio.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt; It could be that a designer worked for a company, had a fight with management, and quit. In order to find clients, the designer creates a website, where he publishes the work created at his former workplace. In this case, the former employee is the offender.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;The fact is that he drew these logos on work assignments. He had an employment contract, and it was his responsibility to create these works. That's what the designer was paid for.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;In such cases, the works are considered service works. According to the law, the exclusive right to the work belongs to the employer. It is not allowed to use the work without the permission of the copyright holder. In this case, it does not matter that the real author is a dismissed employee. There is a person who owns the right, and there is a person who does not have that right.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;If an employee has not received written permission from his employer to use the work, he may not use it. Compensation is charged to offending authors under the same article as to ordinary offenders.&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;The entrepreneur uses other people's logos on his products.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span&gt;Without the permission of the right holder, it is impossible to use his mark on goods and in advertising. Not only the sale of goods but also the fact of offering goods for sale using someone else's trademark is considered an infringement.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;In such a case, a claim can be made for infringement of the work and the trademark. There is one product, but there are two infringements, and two claims for compensation can be made, as I mentioned above.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;This is best seen in the courts for cartoon characters. For example, the Spider-Man character from "The Avengers" is registered as a trademark. When an infringer sells some backpack with Spider-Man on it, he may face two claims at once: one on copyright and one on trademarks.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It does not matter whether the entrepreneur knew that the logo was registered as a trademark or not. Courts believe that entrepreneurs must exercise due care and diligence and check what designations they use in business and whether they violate the rights of others.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;What's the bottom line&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;Logos can be quoted in non-commercial publications - it is not a violation.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;If you're going to use someone else's logo on your worksite, get written consent from the copyright holder.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Illegal use of someone else's logo can simultaneously violate both copyright and trademark rights.&lt;/span&gt;&lt;/p&gt;

</description>
      <category>copyrights</category>
    </item>
  </channel>
</rss>
