computer technology
Information technology – a set of methods, productive and software and technological tools, combined in a process chain for the collection, storage, processing, output and distribution of information to reduce the complexity of the processes of use of information resources, improve the reliability and efficiency of working with them.
Research logistics processes conducted at research centers in developed countries, indicate that the main directions of development of logistics systems in the coming years will be closely linked with computer technology. Consider the basic directions of development of information technologies. Continue reading
For anybody not a secret the fact that our lives are constantly changing, new technologies, telecommunications solutions designed to make our familiar way of life, even more comfortable. In addition to this, our life accelerates its pace, information, as a means for doing business, rapidly becoming obsolete, its volume increases from year to year. According to some analysts, the largest telecommunications companies, we are moving towards a global network of everything. Sounds like science fiction, however, we would not ignore such statements. Continue reading
Ecological marked signs (eco-labeling) is a complex of signs intended for the information of consumers about the environmental friendliness of consumer goods or environmentally sound methods of their use, operation, or disposal.
Handling symbols form a complex of symbols, intended for information on methods of treatment (storage, warehousing, transportation, loading-unloading, etc.) with weights (tare) and goods. Manipulation signs (warning labels) that indicate ways of handling the cargo, is applied to each piece of cargo in the upper left corner of two adjacent walls of the container. Continue reading
In April 2004, the Ukrainian it company — “Miratech”, “SoftLine”, “Mirasoft”, “ProFIX”, “Ukrsoft”, “SoftServe” adopted decision on creation of the Association “Information technologies of Ukraine”. The company-the founders of the Association are the leading Ukrainian software developers who have accumulated successful experience in the sale and licensing of services in the developed markets of North America and Europe.
The aim of the Association is to consolidate the efforts on promotion in foreign markets competitive products of Ukrainian companies, the merger of scientific and industrial potential of Ukraine to create software that meets international standards, as well as conditions for further development of the region. Continue reading
“Immaterial” bot attacks visitors news resources
MiniDuke – a new piece of malware for cyber espionage in government structures around the world
“Kaspersky Lab” published a research report
the number of incidents which occurred last week and connected with another
an example of cyber espionage against government agencies and scientific
organizations around the world. During the attack, the attackers used
the combination of sophisticated malicious code “old school” Continue reading
International automatic identification system EAN * UCC system is used to identify units of accounting unique global identification number of the item GTIN (G lobal T rade Item Numbe r) . Number GTIN is displayed on the packaging of goods in the form of a barcode of an international coding system EAN/UCC–13. The main components of the EAN * UCC system along with are code GTIN SSCC-18 and global identification number EAN/UCC GLN. Code SSCC-18 is used in logistics operations and is a unique identifier in all phases of control of movement of the consignment. It’s used by all parties involved in transportation, as unique links to detailed information about the cargo stored in the shipping document (computer file). Global identification number EAN/UCC GLN (G lobal Location Numbe r) is a 13-bit digital code (number) assigned to identify the businesses and functional units, physical locations. It does not carry meaningful information, and is a reference to data stored in a computer database. Number EAN/UCC GLN in the database if necessary, you can quickly find more detailed information about the company (organization) or OU, for example, legal and postal address, billing information, names of Directors and governors, characteristics of storage facilities and etc. Continue reading
1) rental applications . placed at the site of IT companies, for example, office applications or systems like ERP, CRM. This service today is in demand mainly for medium-sized companies with a high level of demand for information resources and technology, for example, trading firms with a developed branch network;
2) leasing of infrastructure with a high degree of protection, with powerful communication channels that ensure the smooth operation of the system. Today it is one of the most popular types of outsourcing that are in demand by companies with large Internet projects, which is a business tool (for example, payment systems, online shops); Continue reading
Exhibition company ’s Krasnoyarsk fair” in conjunction with the Office of Informatization and communications of the administration of Krasnoyarsk, with the support of the Government of Krasnoyarsk region invites you to participate in the exhibition-forum “itCOM-2015”.
Currently there is growing interest in the city and the region, it is planned intensive construction, the development of the economy, increase jobs and growth in the number of residents. In these conditions dramatically increases the demand for advanced telecommunication services, telecommunication and information technology. All these factors determine the relevance and popularity of the exhibition “itCOM-Information technology. Continue reading
1. Samsung Galaxy S6 Edge: the first smartphone with dual screen
Dual screen in the Samsung Galaxy S6 Edge was a continuation of the concept that we saw in Galaxy Note Edge. The device looks futuristic and has excellent characteristics. It is unclear why the company needed to announce two smartphones at once, when it was possible to confine S6 Edge and disrupt the jackpot?
Feature S6 Edge in the fact that the creation of the bend used very advanced technology. In the display panel there is a plastic substrate, which easily bends. For additional protection panel coated with a protective glass Gorilla Glass 4. The side faces can be used to get quick access to contacts and notifications and other features.
2. The Iris scan: quick and very accurate
The Iris scan was another really sci-Fi technology, which came in a real device at MWC 2015. The guys from PhoneArena has reviewed the iris scanner on smartphone Fujitsu, and were impressed by his speed and accuracy even in not ideal conditions. Unlock your smartphone by scanning the iris was a really easy process.
The device that was shown at the exhibition, can not boast of a stylish design. However, the developers promise to create a more visually pleasing solution.
3. Qualcomm Sense ID: new fingerprint scanner that uses an ultrasonic signal
Qualcomm Sense ID is a new technology of fingerprint recognition. It uses ultrasonic waves to obtain detailed “map” of the fingerprint is much more detailed than the picture, which can be obtained using traditionally used capacitive fingerprint sensor.
The scanner can recognize the owner of the smartphone, even if that would be dirty or wet fingers. The technology also works on glass and sapphire. This means that it can be integrated in different places on your smartphone.
4. MicroSD cards from SanDisk 200 GB will turn your smartphone into a portable hard drive
Sandisk introduced a new product at the exhibition MWC 2015 — MicroSD card with a capacity of as much as 200 GB. Prior to this the maximum amount of memory was 128 GB. Now this tiny box effectively turns your smartphone into a portable hard drive that you can use to store very large files.
5. Blackphone 2: secure the phone with work and personal sections
Blackphone 2 — this is the second joint creation of the Spanish company Geeksphone and company Silent Circle, which has long been working in the field of privacy and protection of information space. And it appeared to an important innovation: the ability to separate personal and work data.
If necessary, the system administrator can remotely lock or delete the application that violates the security policy of the company. It can even completely clear corporate profile, leaving untouched the private. The basic concept Blackphone 2 — the maximum safety without noticeably sacrificing convenience and performance.