7 best free programs for conducting webinars in 2018

 3r3-3559. 3r3-31. 3r33544. 7 best free programs for conducting webinars in 2018
3r33542.  3r3-3559. 3r33544. At the most basic level, the webinar software includes video conferencing and audio conferencing. Some also offer features such as screen sharing, video recording, file sharing, and integration with other software, such as Microsoft PowerPoint. 3r33547. 3r33542.  3r3-3559. 3r33544. Most of the webinar software is paid and many users come to traditional video conferencing software. Video conferencing software and webinar software are often very similar, but differ in the number of participants and functionality. However, many find the functionality ...
+ 0 -

Medical Data | Do not give out your medical card

 
3r3-31. Least of all your electronic medical data you need (s). There is also good news - today, users can already receive medical electronic data in several services, if very necessary. Today we understand how and why to start embedding your medical information system into the medical data ecosystem and whether the patient needs its data.
 
 
Medical Data | Do not give out your medical card  
EGISZ 3-3399. .
 
3r3122. through regional IIAs - in St. Petersburg,
IIAC 3r3-399. in Moscow - 3r3331. EMIAS 3r399. .
 
 
Information for the patient is available in services in the form of PDF forms approved by the Order of the Ministry of Health of the Russian ..
.
+ 0 -

10 reasons why customers unsubscribe from the product

 3r3304. 3r3-31. This article is written with Ekaterina Korneeva (Wrike, Customer Success Manager). Ekaterina is a professional with 4 years of experience in sales and customer service.
 3r3304.
 3r3304. In today's high-tech world, sales of products are often built on a subscription-based model (SaaS). On the one hand, the Internet has erased the boundaries between countries and leveled the playing field - tiny startups can compete in international markets with recognized corporations. On the other hand, it has created a lot of headaches for directors and business owners who are used to working ...
+ 0 -

Technical Mitap in St. Petersburg September 13 - How to make big changes on the backend

Technical Mitap in St. Petersburg September 13 - How to make big changes on the backend
 
 
Often applications are developed through many small improvements, but there comes a time when a lot of particulars are built into a whole picture, the implementation of which requires qualitative and scale changes. And here only one good idea is not enough. Equally important are the organizational and technical components of the issue. How to prepare and implement architectural changes in the operating system? We are want to talk about global refactoring, improving system performance, code optimization, database approaches, and many other things.
 
...
+ 0 -

How I launched my first SaaS project working for hire the whole day

Hello, Habr! I present to your attention the translation of article How I Shipped My First SaaS Side Project While Working Full Time Tigran Hakobyan, who works in the well-known service of postponed posting Buffer I was able to launch my project and even monetize it.
 
 
How I launched my first SaaS project working for hire the whole day
 
Booknshelf , which helps many people organize their books on the Web. Although a full-time job has a big impact on my growth as an engineer, I was able to acquire some of the developer's skills while working on my personal projects.
 
 
Only last year I began to think about creating another source of income besides my ...
+ 0 -

Research of IT-sales process

We have been selling consulting and automation for quite some time now. And in recent years, associated with the sale of SAAS.
 
 
We communicate with different companies and compare how the sales process is organized in the food and service companies. We often get into arguments about the motivation of sellers, their workload, the necessary experience and education, the channels of lodogeneration, regulations and sales processes.
 
 
After several such disputes at the conferences, we decided to initiate a study of the IT sales process to do some sort of a cut with the ability to compare how IT ...
+ 0 -

Crossover invites you to Gravity Co-working Space for the last Hiring Tournament of the season

Crossover invites you to Gravity Co-working Space for the last Hiring Tournament of the season  
 
Over the past few months, we've spent as many as three large Hiring Tournament in Moscow, in which we looked for specialists at such high-paying positions as Software Engineering Manager or Chief Software Architect. We collected reviews, talked about the internal kitchen and even conducted streams. But the first month of summer is coming to an end and the need to reset the pace, gain strength to the laboring autumn breakthrough and just rest, it's stronger. Really active at this time, probably only tourist agents who need to sell to us, northerners, burning and not very tours to the region with a more ...
+ 0 -

Building flexible business analytics for SaaS without involving the development resource

Building flexible business analytics for SaaS without involving the development resourceAnalytics is one of the most important components of any online business. It is impossible to make decisions and test hypotheses, based on intuition and their assumptions, and not on figures. Rather, it is possible, but not for long.
 
I regularly and for a long time are engaged in construction of analytics at myself in a product. Of course, not everything turned out right away, much was done by trial and error. But as a result, I still derived a certain algorithm, as well as a set of principles and rules that allow you to build flexible analytics without the help of developers. About them and ...
+ 0 -

SOC for intermediate. We are sorting out what we are protecting, or how to make an inventory of the

SOC for intermediate. We are sorting out what we are protecting, or how to make an inventory of theinfrastructure.And again, hello. The cycle "SOC for " continues its movement and development. We have already covered the first layer of the internal kitchen of the monitoring and incident response centers in previous articles, so let's try to go a little deeper into technical details and more subtle problems.  We have already several times indirectly touched on the topic of asset management: and in article about the security control , and in issues of automation and artificial intelligence in SOC . Obviously, without monitoring the infrastructure of the customer, the monitoring center will not ...
+ 0 -

The miners replaced the cryptographers

We at Solar JSOC permanently collect impersonal data on events and incidents of information security in customer infrastructures. On the basis of this information, we do an analysis every six months, which demonstrates how attacks on Russian organizations are changing. Today we have collected for you the most interesting trends of the second half of 2017
 
 
The miners replaced the cryptographers  
they told , how to properly build the process of using external sources of threat information. Here are the types of Threat Intelligence we use:
 
 
 
Opensource - open databases of malware indicators, management servers and phishing links. As ...
+ 0 -