Information technology
Information technology – a set of methods, productive and software and technological tools, combined in a process chain for the collection, storage, processing, output and distribution of information to reduce the complexity of the processes of use of information resources, improve the reliability and efficiency of working with them.
Research logistics processes conducted at research centers in developed countries, indicate that the main directions of development of logistics systems in the coming years will be closely linked with computer technology. Consider the basic directions of development of information technologies. Continue reading
Apple is ready to transfer users ‘ personal data on servers in the Russian Federation, reports “Kommersant”. Consent of the company immediately confirmed two sources familiar with the situation. “Neighbor” Apple’s data center was the hotel booking service Booking.com.
Partner of American corporations has become a data center IXcellerate. Earlier it became known that with the same firm agreed Internet company Booking.com. In this case, Apple to store information about Russian users enough seven percent of all facilities: the company has taken a 50 racks of 700. As IXcellerate and Apple declined to comment on the information. Continue reading
Leading cyberdelia first world have agreed to limit their actions in the information space, writes “Kommersant” with reference to the available publications report of the group of governmental experts of the UN on international information security.
This group, consisting of representatives of 20 countries, including Russia, USA, China, Britain, France, Brazil, Japan, South Korea and Israel, gathered for the third time, and only now she was able to come to an agreement, said the newspaper.
According to “Kommersant”, States undertake “to promote the use of ICT for peaceful purposes and to prevent conflicts arising from their utilization”. In particular, they agreed to eliminate cyber attacks on the critical infrastructure of each other, among them nuclear power plants, banks, transport management or supply. Continue reading
“Immaterial” bot attacks visitors news resources
MiniDuke – a new piece of malware for cyber espionage in government structures around the world
“Kaspersky Lab” published a research report
the number of incidents which occurred last week and connected with another
an example of cyber espionage against government agencies and scientific
organizations around the world. During the attack, the attackers used
the combination of sophisticated malicious code “old school” Continue reading
International automatic identification system EAN * UCC system is used to identify units of accounting unique global identification number of the item GTIN (G lobal T rade Item Numbe r) . Number GTIN is displayed on the packaging of goods in the form of a barcode of an international coding system EAN/UCC–13. The main components of the EAN * UCC system along with are code GTIN SSCC-18 and global identification number EAN/UCC GLN. Code SSCC-18 is used in logistics operations and is a unique identifier in all phases of control of movement of the consignment. It’s used by all parties involved in transportation, as unique links to detailed information about the cargo stored in the shipping document (computer file). Global identification number EAN/UCC GLN (G lobal Location Numbe r) is a 13-bit digital code (number) assigned to identify the businesses and functional units, physical locations. It does not carry meaningful information, and is a reference to data stored in a computer database. Number EAN/UCC GLN in the database if necessary, you can quickly find more detailed information about the company (organization) or OU, for example, legal and postal address, billing information, names of Directors and governors, characteristics of storage facilities and etc. Continue reading
C 27 to 29 November 2013 in Chelyabinsk, in the CC “Metropolis” (Sverdlovsk Avenue, 51A) will be held international specialized exhibition ’s safety and security. Fire protection. IT technologies. Connection. Telecommunications”
The exhibition is held under the patronage of the Government of the Chelyabinsk region, the Ministry of information technologies and communications of the Chelyabinsk region, GU on interaction with law-enforcement and military bodies of the Chelyabinsk region, Ministry of internal Affairs of Russia on the Chelyabinsk region, EMERCOM of Russia in the Chelyabinsk region.
Co-organizer of the exhibition is the national Association of Bodyguards of Russia in the person of President Dmitry Fonarev Nikolaevich. Continue reading
1) rental applications . placed at the site of IT companies, for example, office applications or systems like ERP, CRM. This service today is in demand mainly for medium-sized companies with a high level of demand for information resources and technology, for example, trading firms with a developed branch network;
2) leasing of infrastructure with a high degree of protection, with powerful communication channels that ensure the smooth operation of the system. Today it is one of the most popular types of outsourcing that are in demand by companies with large Internet projects, which is a business tool (for example, payment systems, online shops); Continue reading
With the introduction of electronic data interchange (EDI) the company is radically changing the system of management of business processes. The transition to electronic document management is required in the presence of a large volume of incoming, outgoing and internal documents and reporting forms.
In order to facilitate a decision by the heads of enterprises on the implementation of a system of EDO, we asked questions to Alexander Bader, the Director of the Department ’s corporate information Management” of the Russian office of the company “TerraLink” (Canada). Continue reading
1. Samsung Galaxy S6 Edge: the first smartphone with dual screen
Dual screen in the Samsung Galaxy S6 Edge was a continuation of the concept that we saw in Galaxy Note Edge. The device looks futuristic and has excellent characteristics. It is unclear why the company needed to announce two smartphones at once, when it was possible to confine S6 Edge and disrupt the jackpot?
Feature S6 Edge in the fact that the creation of the bend used very advanced technology. In the display panel there is a plastic substrate, which easily bends. For additional protection panel coated with a protective glass Gorilla Glass 4. The side faces can be used to get quick access to contacts and notifications and other features.
2. The Iris scan: quick and very accurate
The Iris scan was another really sci-Fi technology, which came in a real device at MWC 2015. The guys from PhoneArena has reviewed the iris scanner on smartphone Fujitsu, and were impressed by his speed and accuracy even in not ideal conditions. Unlock your smartphone by scanning the iris was a really easy process.
The device that was shown at the exhibition, can not boast of a stylish design. However, the developers promise to create a more visually pleasing solution.
3. Qualcomm Sense ID: new fingerprint scanner that uses an ultrasonic signal
Qualcomm Sense ID is a new technology of fingerprint recognition. It uses ultrasonic waves to obtain detailed “map” of the fingerprint is much more detailed than the picture, which can be obtained using traditionally used capacitive fingerprint sensor.
The scanner can recognize the owner of the smartphone, even if that would be dirty or wet fingers. The technology also works on glass and sapphire. This means that it can be integrated in different places on your smartphone.
4. MicroSD cards from SanDisk 200 GB will turn your smartphone into a portable hard drive
Sandisk introduced a new product at the exhibition MWC 2015 — MicroSD card with a capacity of as much as 200 GB. Prior to this the maximum amount of memory was 128 GB. Now this tiny box effectively turns your smartphone into a portable hard drive that you can use to store very large files.
5. Blackphone 2: secure the phone with work and personal sections
Blackphone 2 — this is the second joint creation of the Spanish company Geeksphone and company Silent Circle, which has long been working in the field of privacy and protection of information space. And it appeared to an important innovation: the ability to separate personal and work data.
If necessary, the system administrator can remotely lock or delete the application that violates the security policy of the company. It can even completely clear corporate profile, leaving untouched the private. The basic concept Blackphone 2 — the maximum safety without noticeably sacrificing convenience and performance.