human resource management
Apple is ready to transfer users ‘ personal data on servers in the Russian Federation, reports “Kommersant”. Consent of the company immediately confirmed two sources familiar with the situation. “Neighbor” Apple’s data center was the hotel booking service Booking.com.
Partner of American corporations has become a data center IXcellerate. Earlier it became known that with the same firm agreed Internet company Booking.com. In this case, Apple to store information about Russian users enough seven percent of all facilities: the company has taken a 50 racks of 700. As IXcellerate and Apple declined to comment on the information. Continue reading
In April 2004, the Ukrainian it company — “Miratech”, “SoftLine”, “Mirasoft”, “ProFIX”, “Ukrsoft”, “SoftServe” adopted decision on creation of the Association “Information technologies of Ukraine”. The company-the founders of the Association are the leading Ukrainian software developers who have accumulated successful experience in the sale and licensing of services in the developed markets of North America and Europe.
The aim of the Association is to consolidate the efforts on promotion in foreign markets competitive products of Ukrainian companies, the merger of scientific and industrial potential of Ukraine to create software that meets international standards, as well as conditions for further development of the region. Continue reading
Leading cyberdelia first world have agreed to limit their actions in the information space, writes “Kommersant” with reference to the available publications report of the group of governmental experts of the UN on international information security.
This group, consisting of representatives of 20 countries, including Russia, USA, China, Britain, France, Brazil, Japan, South Korea and Israel, gathered for the third time, and only now she was able to come to an agreement, said the newspaper.
According to “Kommersant”, States undertake “to promote the use of ICT for peaceful purposes and to prevent conflicts arising from their utilization”. In particular, they agreed to eliminate cyber attacks on the critical infrastructure of each other, among them nuclear power plants, banks, transport management or supply. Continue reading
“Immaterial” bot attacks visitors news resources
MiniDuke – a new piece of malware for cyber espionage in government structures around the world
“Kaspersky Lab” published a research report
the number of incidents which occurred last week and connected with another
an example of cyber espionage against government agencies and scientific
organizations around the world. During the attack, the attackers used
the combination of sophisticated malicious code “old school” Continue reading
Main IT technologies in Chinese language
Master class “IT technologies in the study of Chinese language” holds t Rener Monich Ivan Pavlovich . candidate of economic Sciences, associate Professor, Department of Economics and accounting Transbaikal state University. A graduate of Beijing University media communication (Communication University of China).
In this master class You will get the opportunity to acquire the skills for using information technologies that will help in learning the Chinese language.
online and offline dictionaries; Continue reading
CIOs of large Russian companies will sooner or later meet with representatives of integrators business. What hopes CIO lay on a meeting with integrators? Alexander Abramov, the CIO group of agroenterprises “Resource”: “In our groups. read more >>>
Modeling business processes allows us to analyze not only how the enterprise as a whole, how it interacts with external organizations, customers and suppliers, but also as an organized activity on each individual workplace. Continue reading
1) rental applications . placed at the site of IT companies, for example, office applications or systems like ERP, CRM. This service today is in demand mainly for medium-sized companies with a high level of demand for information resources and technology, for example, trading firms with a developed branch network;
2) leasing of infrastructure with a high degree of protection, with powerful communication channels that ensure the smooth operation of the system. Today it is one of the most popular types of outsourcing that are in demand by companies with large Internet projects, which is a business tool (for example, payment systems, online shops); Continue reading
Exhibition company ’s Krasnoyarsk fair” in conjunction with the Office of Informatization and communications of the administration of Krasnoyarsk, with the support of the Government of Krasnoyarsk region invites you to participate in the exhibition-forum “itCOM-2015”.
Currently there is growing interest in the city and the region, it is planned intensive construction, the development of the economy, increase jobs and growth in the number of residents. In these conditions dramatically increases the demand for advanced telecommunication services, telecommunication and information technology. All these factors determine the relevance and popularity of the exhibition “itCOM-Information technology. Continue reading
With the introduction of electronic data interchange (EDI) the company is radically changing the system of management of business processes. The transition to electronic document management is required in the presence of a large volume of incoming, outgoing and internal documents and reporting forms.
In order to facilitate a decision by the heads of enterprises on the implementation of a system of EDO, we asked questions to Alexander Bader, the Director of the Department ’s corporate information Management” of the Russian office of the company “TerraLink” (Canada). Continue reading
1. Samsung Galaxy S6 Edge: the first smartphone with dual screen
Dual screen in the Samsung Galaxy S6 Edge was a continuation of the concept that we saw in Galaxy Note Edge. The device looks futuristic and has excellent characteristics. It is unclear why the company needed to announce two smartphones at once, when it was possible to confine S6 Edge and disrupt the jackpot?
Feature S6 Edge in the fact that the creation of the bend used very advanced technology. In the display panel there is a plastic substrate, which easily bends. For additional protection panel coated with a protective glass Gorilla Glass 4. The side faces can be used to get quick access to contacts and notifications and other features.
2. The Iris scan: quick and very accurate
The Iris scan was another really sci-Fi technology, which came in a real device at MWC 2015. The guys from PhoneArena has reviewed the iris scanner on smartphone Fujitsu, and were impressed by his speed and accuracy even in not ideal conditions. Unlock your smartphone by scanning the iris was a really easy process.
The device that was shown at the exhibition, can not boast of a stylish design. However, the developers promise to create a more visually pleasing solution.
3. Qualcomm Sense ID: new fingerprint scanner that uses an ultrasonic signal
Qualcomm Sense ID is a new technology of fingerprint recognition. It uses ultrasonic waves to obtain detailed “map” of the fingerprint is much more detailed than the picture, which can be obtained using traditionally used capacitive fingerprint sensor.
The scanner can recognize the owner of the smartphone, even if that would be dirty or wet fingers. The technology also works on glass and sapphire. This means that it can be integrated in different places on your smartphone.
4. MicroSD cards from SanDisk 200 GB will turn your smartphone into a portable hard drive
Sandisk introduced a new product at the exhibition MWC 2015 — MicroSD card with a capacity of as much as 200 GB. Prior to this the maximum amount of memory was 128 GB. Now this tiny box effectively turns your smartphone into a portable hard drive that you can use to store very large files.
5. Blackphone 2: secure the phone with work and personal sections
Blackphone 2 — this is the second joint creation of the Spanish company Geeksphone and company Silent Circle, which has long been working in the field of privacy and protection of information space. And it appeared to an important innovation: the ability to separate personal and work data.
If necessary, the system administrator can remotely lock or delete the application that violates the security policy of the company. It can even completely clear corporate profile, leaving untouched the private. The basic concept Blackphone 2 — the maximum safety without noticeably sacrificing convenience and performance.