
Feature # 2 - Podcast on Entrepreneurs and Current Trends in the IT Ecosystem

In this issue of the “Characteristic” show - a show about entrepreneurs and current trends in the development of the local and global IT ecosystem - [from the creators of the Metrika show and the Traffic show ] you will have a discussion of the problems of “remote” work with Stanislav Protasov (pictured left ), co-founder and senior vice president of software design and development, Acronis .
In addition to the transcript, we also provided links to an audio version of the conversation with Stanislav.
Podcast Audio:
Listen to the issue and subscribe to the Show Feature in the iTunes Store
Subscribe to RSS
Download the audio file of the issue
[All our podcasts in one Audio tape in the iTunes Store]
Podcast transcript:
Dmitry Kabanov: In the process of preparing for this issue, I could not help but notice the fact that your interviews, everything that you say, is mainly aimed at answering questions that you are periodically asked about technologies, startups, investments, and today I decided to try to discuss a slightly new topic that focuses on remote work and the technologies that support it. It seems to me that this is a very interesting [topic] both for employers and for the employees themselves, who are now looking for new job opportunities both domestically and abroad. First of all, I would like to start all the same with the place, tasks and goals of Acronis today as a company. It seems to me that this would be correct and most interesting.
Stanislav Protasov:Acronis is now continuing to develop those technologies that have always been the basis of its value - backup technologies. We are improving, in a sense, polishing what we have. In addition, Acronis has a rather interesting, promising new direction, which we call Acronis Access - is mobile access to data, which is becoming more and more relevant today. [Why?] Because, well, [for example], last year, as I recall, for the first time in history, the supply of personal computers and laptops fell compared to 2012. The number of deliveries of tablets has already, in fact, exceeded the supply of laptops, and it is less clear that the number of mobile devices will only increase and [they will become] the main devices for accessing information in the world. Therefore the question is how to access information from these devices that may be confidential, secret, very, let's say, sensitive to employers' companies, has risen very sharply in the last couple of years. Acronis Access is one such solution that addresses this issue. Acronis is now moving in two directions: we combine our traditional technologies with what we call Any Data Technology, i.e. technology for accessing any data from any devices, and we add products that allow secure remote access from mobile devices. who deal with this problem. Acronis is now moving in two directions: we combine our traditional technologies with what we call Any Data Technology, i.e. technology for accessing any data from any devices, and we add products that allow secure remote access from mobile devices. who deal with this problem. Acronis is now moving in two directions: we combine our traditional technologies with what we call Any Data Technology, i.e. technology for accessing any data from any devices, and we add products that allow secure remote access from mobile devices.
Dmitry: It seems to me [that] this is a very interesting direction, of course. But it turns out that in order to invest the main efforts in this direction, it is necessary to feel yourself, maybe a more lightweight company, to revive the team again and invest energy in a new direction.
Stanislav:Well, I don’t really understand how you can revive a team without resorting to any special means. But generally speaking, yes. [Recently] Sergey Belousov, one of the founders, returned to the company, returned as executive director. The company had certain problems caused by, let's say, not the optimal course of the previous top management; accordingly, Sergey is currently restructuring the company's strategy, restructuring the company's marketing, product line and even the organization of the company, i.e. now we are generally building a company around four business units: consumer products - products designed for end users who want to protect their data, corporate products for companies, what is called small & medium business, and the cloud direction,

Stanislav: Absolutely. Firstly, I want to say that the initiative in question is an initiative to connect to the Internet the farthest corners of our country, which, according to various estimates, will bring broadband Internet to an additional thirty million of our fellow citizens. In general, in terms of scale and effect, it can probably be compared with the laying of motorways or railways throughout the country, we can say that this is, in [some] terms, the BAM of our time.
Dmitry: Well, such an engine of the economy.
Stanislav:This is really the engine of the economy, because it allows people who sit somewhere deep in Russia to do business or work for some companies that otherwise could not be noticed or hired in any way, and [in this sense], this, of course, is a very good initiative. Naturally, there are risks, and risks, both technological and related to the level of education of these people and the ability of people to work remotely. In general, this is a very difficult question - the remote work of employees. Firstly, employees who work in the same office are forced to communicate in one way or another: as a last resort in a smoking room, not to mention some meetings, conversations over a cup of coffee, etc. etc. When a person is deprived of this, he is deprived of a sufficiently large amount of information. This is the first problem, i.e. the remote employee is less involved in the work of the company, he has less information, and the information allows us to make the most correct decisions. The second problem is that remote work, moreover, requires a certain level of human development, if you want. What do I mean: when I need to do something, and I sit at home at the computer, where I have distractions, [for example], children and the TV, it can be much harder to force myself than in an office where there is nothing to work interferes. I'm not talking about such things that for [effective work] a person needs some kind of space that many people in our country are not able to provide for themselves. We all know that we do not have a very high number of square meters of housing per person. That is, there are a huge number of problems, a purely organizational-human field. But other than that, there are technical aspects, because if, say, a person works in a medium-sized company’s office, I don’t even take any big company, then data security issues, anti-virus scan issues, issues of non-working equipment are usually solved by the IT department where they work , especially in our country, professional system administrators who are able to diagnose and fix problems that arise. When a person sits at home for several hundred or thousands of kilometers [from the office] and something doesn’t work with the computer or the message “enter your phone number and send SMS there pops up, otherwise we won’t open this screen for you”, then as a rule, he is not able to cope with such a problem on his own. then data security issues, anti-virus scan issues, issues of non-working equipment are usually solved by the IT department, where professional system administrators are able to diagnose and fix problems that arise, especially in our country. When a person sits at home for several hundred or thousands of kilometers [from the office] and something doesn’t work with the computer or the message “enter your phone number and send SMS there pops up, otherwise we won’t open this screen for you”, then as a rule, he is not able to cope with such a problem on his own. then data security issues, anti-virus scan issues, issues of non-working equipment are usually solved by the IT department, where professional system administrators are able to diagnose and fix problems that arise, especially in our country. When a person sits at home for several hundred or thousands of kilometers [from the office] and something doesn’t work with the computer or the message “enter your phone number and send SMS there pops up, otherwise we won’t open this screen for you”, then as a rule, he is not able to cope with such a problem on his own.

Dmitry: It turns out that this creates a number of new challenges for the company.
Stanislav: Absolutely. Even worse, usually any company and any IT department provides perimeter security, i.e. [fights] anti-virus threats, hacker threats, etc. etc. With computers of remote users, everything is much worse, because there may be some rootkits, viruses that simply transmit data to an unknown server in an unknown country.
Dmitry: Well, of course, physically, it’s much easier to put everything, roughly speaking, in one building, to fence it, to put security, etc.
Stanislav:Of course, absolutely. In general, the safest computer is locked in a room without any Internet connections, and an automaton sits at the entrance. This has been known since the beginning of the development of the industry, and, accordingly, the issue of access and maintaining the confidentiality of information plays a huge role. Well, it’s clear that if I, say, a lawyer who works remotely for a company from Moscow, but [I am], relatively speaking, in Khabarovsk, and I’m working out an agreement between my company and some other large organization, then those conditions which are [prescribed] in this contract, for my employer can be very, very confidential, i.e. if they get on the Internet, then the deal will simply not take place.
Dmitry: The whole business can be compromised.
Stanislav:Fortunately, such things do not happen very often, but yes, [they do happen]
Dmitry: It’s just that the very fact of compromise can jeopardize [the company's] trust.
Stanislav:Of course, of course, I can [tell you about a case that I] read about 15 years ago, even when faxes were in fashion. There was such a story that Oracle employees sent a quota to the wrong client, simply made a mistake, dialed the wrong number by fax, and the fax with the offer went to another company, and there was some fantastic discount far beyond 50 percent. This information got into the public domain, and Oracle had rather serious, let's say, at least reputational costs, because they now had to explain to all the custom owners “why should I pay the full price list when you give a quota at a discount of 70 percent. "
Dmitriy:Yes, even if we look from the perspective of an ordinary employee, who is trying to solve some task, working freelance or remote employee, you can recall the case with Dropbox in the beginning of this year, when there was aa lot of rumors that supposedly security was compromised by a certain group of anonymous hackers. Subsequently, the company denied this information, [stating] that it was just [carried out] technical work during this period of time, and [therefore] it became possible to make such an information reset. Everyone who found out about this, one way or another, thought about what [they] store on Dropbox or iCloud analogues, cloud storages, how they approach these issues, because even any typical employee, layman and person, in principle, it already stores quite substantial and significant information for itself in cloud storage - these can be documents, passport scans, personal photos, etc., i.e. quite sensitive information, both reputational and literally economic. Maybe from your point of view [worth] to repeat, what is the risk of a household person, a layman, working with cloud storage. I think that we do not have any task to scare everyone with some kind of horror stories, but still there are some risks associated with this.
Stanislav:No, well [of course], it’s important to understand that Dropbox is just a cloud-based file hosting service, it’s not, in general, a storage, i.e. I don’t remember that Dropbox promised somewhere that the information you put there will always be there. No, this is really a convenient external storage, but it does not guarantee the inviolability of your information. This is one of the most convenient ways to share information with some of your counterparties, friends, or someone else, but Dropbox's security team, since by its nature it was not conceived as a cloud storage for corporations, in general, is designed for end users . For example, [consider] such a simple fact that you can put some kind of file on Dropbox that anyone in the world can access for some time. But imagine that this is a draft order of the president of a country, [in this case] it’s not a very reasonable way to store information. And I think, from this point of view, in terms of cloud storage and in terms of cloud backups, of course, Dropbox will slowly [supplant] such solutions as, let’s say, our cloud version of Acronis backup, because it First, allows you to have multiple backups, i.e. You can take not only a specific document, but also any revision of it. Secondly, depending on the provider, this data can be encrypted, and thirdly, access is rather tightly controlled. our cloud version of Acronis backup, because, firstly, it allows you to have multiple backups, i.e. You can take not only a specific document, but also any revision of it. Secondly, depending on the provider, this data can be encrypted, and thirdly, access is rather tightly controlled. our cloud version of Acronis backup, because, firstly, it allows you to have multiple backups, i.e. You can take not only a specific document, but also any revision of it. Secondly, depending on the provider, this data can be encrypted, and thirdly, access is rather tightly controlled.
Dmitry: That is, guarantees are already appearing.
Stanislav:Of course, the same with Acronis Access. Why does he present a very attractive solution for many companies? Because, both on your servers inside the company, and on the client device, the information is encrypted, and you control with what programs, with what applications and which users can see this information. From this point of view, I think it is [inappropriate] to call Dropbox a network storage, this is a file sharing service. About 10 or 15 years ago, when network technologies began to appear, probably [nevertheless] about 20 years ago, practically any organization had a novell netware server, which was an organization’s file hosting service - different people from different departments put their documents [there] and could edit them, watch, fix, etc. etc., Dropbox in some ways - the new cloud novell newtware.
Dmitry: It turns out that even an ordinary person encounters devices, smartphones, cameras, video cameras, a bunch of tasks when he needs to ensure the preservation of especially important information, [such as], for example, a family photo album or some kind of video then a special trip. I always don’t really want to lose such valuable things, and usually it all ends with people running with their hard drive to various artisanal services, where they are offered to carry out some kind of repair work worth 30-40-50 thousand rubles. It would seem that if you use simple mechanisms, simple tools that already [exist], you can get just these guarantees and preserve the valuable that you have and that you don’t want to lose.
Stanislav:Here I would slightly share confidential information and information that I want to keep, because experience shows that just for most people a set of their own photos is, in some respects, a matter of some kind of fetish, rather than confidential information.
Dmitry: Now it’s already.
Stanislav:People are happy to [share] them. Even if these are some slightly compromising photos. But this does not mean that the user does not need them, and this does not mean that for people the preservation of this information does not play any role. Of course, the development of digital technologies and the development of the Internet have dramatically increased the number of photos that an ordinary user has. I’ve seen such a good demotivator, [where] the American astronaut and the girl filming herself in the bathroom were [pictured] and the caption: "The American astronaut flew to the moon - took 3 photos, went into the bathroom in the morning - took 84 photos." Indeed, the number of photos, videos and other materials has increased dramatically, and for people they are of great value, and people are willing to pay money for the restoration of this information, therefore such services how reliable storage of this information somewhere in the cloud will be in demand, and they are now appearing. Indeed, quite a lot of people are offering them now, technologies are gradually improving. I now think that Acronis for these purposes today probably ...

Stanislav: Not even that there is a solution, probably there is the best solution in the world, because, in essence, we started 15 years ago with this topic of creating user data backups and improved it all 15 years. Cloud [technology] is a fairly new thing. Where you make a backup is [something] remote, it does not belong to you and is provided to you as a service, but the principle of saving data has not really changed much.
Dmitry: But it seems to me that [there is] a very important advantage - the ability to clearly understand the devices that are used for this copying, because so many people like to just backup manually to some external small repositories of the same family, children's albums photographs.
Stanislav: I am sure that this is simply due to the lack of convenient applications. Firstly, observing the average user, it is easy to notice that he doesn’t want to copy anything anywhere, he wants his data to be protected, and if he manually copies any specific files or folders, it’s just because he doesn’t know how else can they be saved. This is inconvenient, for example, if you have 5000 photographs, [then] copying them manually [labor-intensive process].
Dmitry: Every time, stay tuned ...
Stanislav:Firstly, every time you follow, understand in which folder you have new photos. Secondly, here you started to copy, 3 thousand were copied, and then everything stopped copying - what should I do? To start all over again? Calculate where you left off? Or how? Therefore, the decisions that will take up this part of the work, i.e. will determine the difference between the data that you already saved and the new data, copy [to] some external, not even cloud [storage], maybe just some kind of additional hard drive or flash drive Drive only what has changed will certainly be in demand. Because it's just a lot more convenient.
Dmitriy:Well, yes, we could just solve these problems manually about 7 years ago, when we had an average of 100 photos a month, but no more. Now this figure [for an ordinary person] can already exceed tens of times [indicators of that period], taking into account all that ...
Stanislav: Yes, it can not, but exceeds! Not even in the tens, but in the hundreds. I am not a photographer, my wife is not a photographer either, but she, when I last did synchronization, had 7 thousand photos. I do not know [whether they accumulated] in a year, in three, but nonetheless.
Dmitry: I think you can throw a couple more horror stories. I looked at the reportUnitrends, and they write that there are several reasons for data loss: in 40% of cases hardware failure is to blame, in 29% - human error and 13% - software failure, theft, viruses and other things account for about 18%. Thus, it turns out that [about] 25% of personal computer users suffer from data loss. In the course of our discussion, we have already touched on [some] parts of the aspects related to this, but there are still technological myths. So, very often people think about the types of hard drives that they use - drives with HDD, SSD, etc. Are there any, maybe sober decisions and considerations that will allow you to quickly understand these myths: is it worth paying attention to the type of your hard drive or all this, roughly speaking, do not give a damn and just use a reliable service provider to save your data?
Stanislav:There is a common belief that SSDs, since they do not have rotating parts, are more reliable. Indeed, if you look at the statistics of the disks returned to [the manufacturer] due to the fact that there were some drawbacks, the percentage of returned [disks] in SSDs is lower, but it should be understood that this does not really matter. Suppose SSDs are a hundred times more reliable than regular hard drives. But how can it comfort me if the SSD dies in my case? No way. Any carrier dies, and [it is clear that] an SSD is not a panacea. I don’t remember the numbers right now, how many rewrites can be maintained by one SSD cell, 5 thousand or 100 million, this is not very important. It is important that at some point, after overwriting, they stop storing information. In addition, it is still flash memory, and it is subject to cosmic rays, some kind of radiation, etc. etc., therefore, absolutely reliable media does not exist. SSDs also die, and accordingly, if the data is really so important that there is no way to lose it, it is better to have a backup, it is better to have a backup, it is better to save this data somewhere else.
Dmitry: Yes, but it can make equipment more expensive. Take, for example, an average computer with an SSD drive, which probably costs a little more than [the rest]. Some hope that by paying the extra 100 dollars, they will protect themselves.
Stanislav: Well, for me, as for a relatively technical person, the main value of SSDs is not even reliability, but speed, responsiveness, etc. etc., therefore, I, of course, am an adherent of SSD disks and I will recommend them to everyone, but unfortunately they do not solve the issues of reliability of information storage.
Dmitry: Well, this is just such a myth [is].
Stanislav:It’s clear where it grows, [from the fact] that there are no rotating parts, but most people now have laptops. If you drop the laptop, unfortunately, the fact that there is an SSD disk, with a high degree of probability will not help to save information, very often then it will not be restored, or it’s very difficult to restore it.
Dmitry: But [what], if you try to return to the point of view of the employer, to the point of view of companies that provide remote access for their employees? I studied this topic and stumbled upon the blog of Gaidar Magdanurov, again referring to Unitrends, which say that about 93% of companies experiencing failures in ensuring the safety of such works put their reputation at risk and actually go bankrupt for a year. There were even examples: in 2009, the platformJournalSpace , which provided a platform for creating and maintaining blogs, just crashed due to malicious actions by an employee who did not provide a proper backup of the server on which the entire platform was based.
Stanislav:Well, I think it’s not malicious actions, but rather ordinary human negligence. Right now, for example, the bitcoin exchange went bankrupt in Japan, and people found that they did not have a normal development environment - they wrote their system directly to working systems, i.e. from the point of view of development processes, their level of development [is about the same] as a startup of three programmers. This, too, in general, is simply negligence - what is called "until the roasted rooster pecks." Therefore, I do not think that there was a deliberate wrecking, most likely, a person simply did, but did not check, or did not think, or something like that. Well, this is such a standard problem, if the data is lost, then the company can risk its entire business, especially if its business is associated with servicing a large number of customers. [For instance], the company has lost customer credentials, lost credit cards and can’t beat them now, or these credit cards, even worse, have been stolen, and half of the hacker Internet trades them, etc. Of course, the safety and security of data for the company now represent a very important aspect of the survival of their business.
Dmitry: Well, I think it’s very important to understand such a moment that the higher the employee’s position, the more rights he has, the higher the level of access to confidential company data, just to such records that can store credit card numbers, according to essentially all customer records. We know a lot of cases when companies with a good reputation lost such data: hotels.com lost data about 240 thousand [of their] customers, and there were such cases with Ernst & Young , and Starbucks repeatedly lost data. They lost data about their employees, not just about customers.
Stanislav: Yes, a couple of years ago, Linked in lost almost a quarter of its client’s password databases, i.e. [all] passwords and logins. Yes, sometimes.
Dmitriy:It turns out that companies, it would seem, should take care of employees even more than about customers, but negligent or malicious actions put the company's reputation and, accordingly, the entire business at risk. Maybe there is an example on the Russian market? Because we heard about such high-profile stories with LinkedIn, with Starbucks, with (...)
Stanislav:Surely there is, it just doesn’t come to my mind, and, of course, the companies themselves try not to advertise such things, maximize [implement] what is called damage control, [compose] some kind of PR story, as is the case with Dropbox, I don’t know [for sure] whether Dropbox was opened, or really, [carried out] some work, but for general reasons, the option of opening is possible. Of course, this also happens in Russia, and it happens very often. It is clear that in order for this story to become public, several components are needed: firstly, it should be noticed, secondly, the company's business must be large and visible, and it is clear that any company, especially a successful company, is simply paranoid confidential information regarding their customers and their employees. Say there is such an American company Amazon, a few years ago I talked with their engineers and to the simple question “what are you most afraid of?” they replied: “Most of all we are afraid of being hacked, opened, because this is a [spoiled] reputation, this is a problem, this is the loss of confidential information.” Why can losing or leaking company employee information be very painful? Well, if, say, information has leaked that allows an employee to access company data, for some time, under the guise of this employee, some people with malicious intent may come to you. I still believe in people, and in most companies and corporations, the security policy is based on the fact that employees can be trusted. because it’s a [spoiled] reputation, it’s a problem, it’s a loss of confidential information. ” Why can losing or leaking company employee information be very painful? Well, if, say, information has leaked that allows an employee to access company data, for some time, under the guise of this employee, some people with malicious intent may come to you. I still believe in people, and in most companies and corporations, the security policy is based on the fact that employees can be trusted. because it’s a [spoiled] reputation, it’s a problem, it’s a loss of confidential information. ” Why can losing or leaking company employee information be very painful? Well, if, say, information has leaked that allows an employee to access company data, for some time, under the guise of this employee, some people with malicious intent may come to you. I still believe in people, and in most companies and corporations, the security policy is based on the fact that employees can be trusted. For a long time, under the guise of this employee, some evil-minded people may come to you. I still believe in people, and in most companies and corporations, the security policy is based on the fact that employees can be trusted. For a long time, under the guise of this employee, some evil-minded people may come to you. I still believe in people, and in most companies and corporations, the security policy is based on the fact that employees can be trusted.
Dmitry: So there is a certain culture?
Stanislav: Of course. I think that most people, settling down somewhere, are arranged not to steal from their employer, but to do something useful. Accordingly, even if there is some fantastically well-developed security policy in the company and any actions of employees are logged, [and] an internal audit is carried out on the movement and movement of information, all the same, even in these conditions, if the outside person received some kind of confidential information about an employee of the company, especially a senior one, he can do quite a lot of harm, just downloading this information, pretending to be another person.
Dmitry: This is very difficult to track.
Stanislav:This can be traced, because there is such a thing as suspicious activity, i.e. if we talk about any financial industry, then the request for credit card numbers of all customers can serve as suspicious activity. Even if I am the president or vice president of this company, it’s abnormal activity for me. Something like this [suspicious activity] is tracked by good IT departments when something obscure begins to happen on the network. This is how they begin to understand that under the name of an employee a hacker logged in. But there are, of course, other ways, it is clear that if I am a Gazprom company, and a user from Indonesia logs in to me under the name of Vice President, this is suspicious in itself.
Dmitriy:Well, yes, maybe you have some basic tips so that companies and employees who work remotely can still take a critical look and maintain their culture of working with data and a culture of data storage?
Stanislav:My [main tip]: do not underestimate the need for backups. Because information is lost. [So you say 25% ...], I don’t know how true or not, but, generally speaking, I haven’t met a single person who at least once in his life did not lose important information for him. Whether it’s mail or some documents, it doesn’t matter [for what reason they were lost] - computer crash, computer theft or someone dropped it, almost all of us faced this. Fortunately, in most cases, we all turned out to be, let’s say, limited by this, [this] is not a complete disaster, but there ...
Dmitry: But still it hits very hard, if any reports, documents are lost, redo it all, [start] all over again ...
Stanislav:Imagine that I am a remote employee, a freelancer who does the work for some corporate customer, [I] have been working for several months and op! - All my data is lost, and I, in general, am losing several months of my life. I’m not even talking about reputation, because this market, for all that, is rather narrow, everyone knows the best specialists in it. And if a person does not fulfill his obligations, this returns to him with unpleasant surprises and unwillingness of other customers to work with him. Therefore, backing up your data should be a good habit. And, of course, it is better to find a solution that allows you to do this without too much activity on your part. Man is so arranged that he always forgets something. [Take, for example, me], a very neat person, [who] used to backup. If for some time, [let] a little - a few days in a row, I can’t make them, for various reasons, [let’s say], a friend came to the army, and I drink with him for all the years I missed, it starts to become a habit: once I didn’t, twice I didn’t, I didn’t do it three times, but in a year it shot me. Therefore, the solution should be one that does not require any effort from you and always works. Whether this makes some software installed on your external drive, or if you back up to the cloud, this is, of course, a matter of your personal preferences, although [copying] to the cloud is certainly more convenient and, most likely, more reliable. I didn’t do it three times, but a year later it struck me. Therefore, the solution should be one that does not require any effort from you and always works. Whether this makes some software installed on your external drive, or if you back up to the cloud, this is, of course, a matter of your personal preferences, although [copying] to the cloud is certainly more convenient and, most likely, more reliable. I didn’t do it three times, but a year later it struck me. Therefore, the solution should be one that does not require any effort from you and always works. Whether this makes some software installed on your external drive, or if you back up to the cloud, this is, of course, a matter of your personal preferences, although [copying] to the cloud is certainly more convenient and, most likely, more reliable.
Dmitry: Thank you, it seems to me that we had a very interesting conversation, interview, I think that somehow we will meet again and talk about what next challenges will await us in the future, when we take photos of tens of thousands of photos daily using ...
Stanislav:I think [this will happen] soon enough, [taking into account] all these technologies of augmented reality, we all will just have a constant stream of data. Even if you just look at these glasses, well, relatively stupid today - Google Glass, which allows you to record on cameras, immediately throw out useful information on objects. I don’t know how they will change over time, but it’s clear that the potential of this type of technology is huge, which means that some kind of data stream will accompany us all our life, and this data stream will be of some value to us, and it’s clear that the amount of data ... well, this, we see even now, the amount of data that the average person generates exponentially every few years.
Dmitriy:Yes, starting with smart glasses, ending with bracelets that collect information about health, human condition, etc.
Stanislav: Of course!
Dmitry: Well, thank you very much.
Stanislav: Thank you!
[Note] We will be glad to hear your wishes on the podcast format and try to answer questions of interest, friends :)