Apple is ready to transfer users ‘ personal data on servers in the Russian Federation, reports “Kommersant”. Consent of the company immediately confirmed two sources familiar with the situation. “Neighbor” Apple’s data center was the hotel booking service Booking.com.
Partner of American corporations has become a data center IXcellerate. Earlier it became known that with the same firm agreed Internet company Booking.com. In this case, Apple to store information about Russian users enough seven percent of all facilities: the company has taken a 50 racks of 700. As IXcellerate and Apple declined to comment on the information. Continue reading
Leading cyberdelia first world have agreed to limit their actions in the information space, writes “Kommersant” with reference to the available publications report of the group of governmental experts of the UN on international information security.
This group, consisting of representatives of 20 countries, including Russia, USA, China, Britain, France, Brazil, Japan, South Korea and Israel, gathered for the third time, and only now she was able to come to an agreement, said the newspaper.
According to “Kommersant”, States undertake “to promote the use of ICT for peaceful purposes and to prevent conflicts arising from their utilization”. In particular, they agreed to eliminate cyber attacks on the critical infrastructure of each other, among them nuclear power plants, banks, transport management or supply. Continue reading
International automatic identification system EAN * UCC system is used to identify units of accounting unique global identification number of the item GTIN (G lobal T rade Item Numbe r) . Number GTIN is displayed on the packaging of goods in the form of a barcode of an international coding system EAN/UCC–13. The main components of the EAN * UCC system along with are code GTIN SSCC-18 and global identification number EAN/UCC GLN. Code SSCC-18 is used in logistics operations and is a unique identifier in all phases of control of movement of the consignment. It’s used by all parties involved in transportation, as unique links to detailed information about the cargo stored in the shipping document (computer file). Global identification number EAN/UCC GLN (G lobal Location Numbe r) is a 13-bit digital code (number) assigned to identify the businesses and functional units, physical locations. It does not carry meaningful information, and is a reference to data stored in a computer database. Number EAN/UCC GLN in the database if necessary, you can quickly find more detailed information about the company (organization) or OU, for example, legal and postal address, billing information, names of Directors and governors, characteristics of storage facilities and etc. Continue reading
1) rental applications . placed at the site of IT companies, for example, office applications or systems like ERP, CRM. This service today is in demand mainly for medium-sized companies with a high level of demand for information resources and technology, for example, trading firms with a developed branch network;
2) leasing of infrastructure with a high degree of protection, with powerful communication channels that ensure the smooth operation of the system. Today it is one of the most popular types of outsourcing that are in demand by companies with large Internet projects, which is a business tool (for example, payment systems, online shops); Continue reading
1. Samsung Galaxy S6 Edge: the first smartphone with dual screen
Dual screen in the Samsung Galaxy S6 Edge was a continuation of the concept that we saw in Galaxy Note Edge. The device looks futuristic and has excellent characteristics. It is unclear why the company needed to announce two smartphones at once, when it was possible to confine S6 Edge and disrupt the jackpot?
Feature S6 Edge in the fact that the creation of the bend used very advanced technology. In the display panel there is a plastic substrate, which easily bends. For additional protection panel coated with a protective glass Gorilla Glass 4. The side faces can be used to get quick access to contacts and notifications and other features.
2. The Iris scan: quick and very accurate
The Iris scan was another really sci-Fi technology, which came in a real device at MWC 2015. The guys from PhoneArena has reviewed the iris scanner on smartphone Fujitsu, and were impressed by his speed and accuracy even in not ideal conditions. Unlock your smartphone by scanning the iris was a really easy process.
The device that was shown at the exhibition, can not boast of a stylish design. However, the developers promise to create a more visually pleasing solution.
3. Qualcomm Sense ID: new fingerprint scanner that uses an ultrasonic signal
Qualcomm Sense ID is a new technology of fingerprint recognition. It uses ultrasonic waves to obtain detailed “map” of the fingerprint is much more detailed than the picture, which can be obtained using traditionally used capacitive fingerprint sensor.
The scanner can recognize the owner of the smartphone, even if that would be dirty or wet fingers. The technology also works on glass and sapphire. This means that it can be integrated in different places on your smartphone.
4. MicroSD cards from SanDisk 200 GB will turn your smartphone into a portable hard drive
Sandisk introduced a new product at the exhibition MWC 2015 — MicroSD card with a capacity of as much as 200 GB. Prior to this the maximum amount of memory was 128 GB. Now this tiny box effectively turns your smartphone into a portable hard drive that you can use to store very large files.
5. Blackphone 2: secure the phone with work and personal sections
Blackphone 2 — this is the second joint creation of the Spanish company Geeksphone and company Silent Circle, which has long been working in the field of privacy and protection of information space. And it appeared to an important innovation: the ability to separate personal and work data.
If necessary, the system administrator can remotely lock or delete the application that violates the security policy of the company. It can even completely clear corporate profile, leaving untouched the private. The basic concept Blackphone 2 — the maximum safety without noticeably sacrificing convenience and performance.