How Alexander Sysoev tamed Goliath (part 1)
This month Vladislav Moiseev's book "Business from nothing, or How to build an Internet company and not go crazy"is published. Forbes publishes a fragment from the book dedicated to Alexander…

Continue reading →

Examples of "new" IT companies
In the course of digital transformation, companies that previously ordered IT solutions themselves become centers of competence in the field of information technology. It's inevitable. And understandable. IT companies should…

Continue reading →

Revaluation of values: the results of the crypto world in 2018
After the dizzying rise of cryptocurrencies in December 2017 in 2018, it's time for the harsh truth: the authorities took up the regulation of the market, and investors stopped believing…

Continue reading →

communication

INFLUENCE OF GADGETS ON HUMAN LIFE

In the XXI century it is impossible to imagine modern society without gadgets, smartphones, tablets or smart watches. Undoubtedly, these devices make our lives easier and bring diversity to our lives, but we still do not have a clear, reliable idea of the interaction of these devices for human life. If you search the Internet “What is a gadget?” then we will have the information “Gadget is a small device designed to facilitate and improve human life.”

According to statistics from the world health organization, more than 59% of the world’s population use smartphones, and the average user of the gadget checks his smartphone at least 150 times a day. In other words, the gadget has become an external human body. Continue reading

Information security specialist

Come up with one, trying to use the other. And have to protect the fruits of their own intelligence. So there was one of the most valuable professions – a specialist in information protection. Today, of course, is inextricably linked to computers.

Protect what?
Initially, the information security system was developed for the needs of the military. The strategic data on defence capability were so important that their leakage could lead to huge human losses. Accordingly, computer security turned to the experience of cryptography, that is, encryption. Cryptographic scripts and special programs appeared, allowing to automate the process of encryption and decryption. Continue reading

Labor market for IT specialists
The specialists of the IT-service - an essential component of any office. A leading programmer or IT Director in Ukraine can receive up to$ 3,500 per month for his work.…

...

Moscow city hall has launched an SMS service to spy on debtors
The Department of information technology of Moscow has launched an SMS-service to track possible arrears in fines, fees and other payments, the press service of the Department reports. Now, to…

...

Samsung has registered a new brand of Rize smartphones
According to the documents, Samsung plans to release three new models of Rize10, Rize20 and Rize30 smartphones Samsung has applied for registration of three new smartphone models, T3 writes. The…

...

Methods of assessing the economic efficiency of the use of information technology in the financial activities of enterprises
The urgency of the problem. A common approach to determining the economic efficiency of it implementation is the ratio of profit and total costs of the enterprise. However, the effectiveness…

...