Posts

How does Dark Web works? Security and Hacking concepts for Product Manager

Image
1. How can criminals hold your computer for Ransomware? Ransomware is a type of malware that can damage your computer; it is a piece of software code that locks or encrypts your important files until you pay the amount demanded by hackers. This type of malware comes via email or as an attachment to download. It exploits a flaw in the operating system and runs malicious code on your computer. Once this runs on your computer, it locks all your files and gets decrypted only when you pay the amount. They take money in  b itcoins through a specialized wallet that doesn’t store any kind of information. This ensures that their information is hidden from the government. How can you prevent ransomware? One of the most effective ways to protect from this kind of malware is to have high-security encryption in the operating system. Large organizations like hospitals, governments etc., are at high risk, so they should spend a great amount of money on their IT infrastructure. Another solution is to

Smart Business Strategies for Product Managers

Image
1. Why a retail store like Nordstom offer free Wi-Fi?  We know that Starbucks offer free Wi-Fi so that people can have meeting their, can work there and sip coffee. In 2012 a retailer started offering free Wi-Fi in stores, and this smart strategy increases their profit. When we turn on your Wi-Fi, our phone sends out a radio signal to find out the nearby router or Wi-Fi spot. These radio signals from the phone contain a unique code that is embedded in the phone called MAC address. So whoever owns the hotspot can use the MAC address to identify your phone, whenever it connects to a hotspot. Credits:  https://medium.com/@amdadulbari In 201 2  Nordstrom realized that they can use their Wi-Fi router to get the location of their customers inside the store. But the question now arise is how could Nordstrom get the exact location of the customer inside the store?  The technique is called triangularization , the store has multiple hotspot, so when you are connected with the WIFI, with the stre

System Design Concepts for Product Managers — Part 2

Image
This is a system design series for Product Managers who should have a high-level understanding of System Design.  We will first cover the basic concepts of System Design. This is part 2 of System Design. Stay tuned for future updates. You can find  part_1  here. Database Sharding What is database Sharding? Credits:  https://www.geeksforgeeks.org/ Let’s start with an example, assume that you are a software engineer who is building a product for user management. You have to store the data of millions of users in your database. You have already realized that your user base is increasing rapidly; what you will do? First, you will try to increase the capacity of the Database; increasing the capacity of the database make the search query to be slow. Then you realize that you need to do a partition of the data and query the database according to the request. Databas e  Sharding is the process of breaking up the large data into smaller chunks called shards; a shard is a horizontal data partiti

System Design Concepts for Product Managers — Part 1

Image
This is a system design series for Product Managers who should have a high-level understanding of System Design. We will first cover the basic concepts of System Design. This is part 1, and stay tuned for future updates. 1. Load Balancer What is a Load Balancer? Load Balancer:  Load Balancer is a common term used widely when you are working on an application tha t  serves enormous traffic. Let’s understand with an example: Assume that Netflix has deployed several servers to handle the number of client requests. When we hit “Netflix.com”, how does Netflix know which server it has routed my request to? This is where the load balancer comes into the picture; load Balancers distribute the incoming traffic from the client efficiently across different servers and make sure that no server is getting overheated or overloaded. Reliability and availability are maintained by redirecting the incoming request to the available servers. Credits:  https://codeburst.io/ Load Balancing Algorithms The lo