"Code is the law": how to avoid substitution of the principle of decentralization (part 2)
"Decentralization" and "autonomy" mean joint management of society and its organization. And registries can provide excellent technical support, including in the construction of many new scenarios of interaction between participants…

Continue reading →

How a computer cheats the patent system of "Big Pharma»
The algorithm allowing to find ways of synthesis of pharmacological preparations bypassing patent restrictions is developed. The same program will help to formulate patent applications so as to make them…

Continue reading →

Free simulator for the formation of practical programming skills
Learning programming develops new ways of thinking, gives you the prospect of finding a good job, gives you a sense of superiority and generally makes you cool. There is a…

Continue reading →

communication

INFLUENCE OF GADGETS ON HUMAN LIFE

In the XXI century it is impossible to imagine modern society without gadgets, smartphones, tablets or smart watches. Undoubtedly, these devices make our lives easier and bring diversity to our lives, but we still do not have a clear, reliable idea of the interaction of these devices for human life. If you search the Internet “What is a gadget?” then we will have the information “Gadget is a small device designed to facilitate and improve human life.”

According to statistics from the world health organization, more than 59% of the world’s population use smartphones, and the average user of the gadget checks his smartphone at least 150 times a day. In other words, the gadget has become an external human body. Continue reading

Information security specialist

Come up with one, trying to use the other. And have to protect the fruits of their own intelligence. So there was one of the most valuable professions – a specialist in information protection. Today, of course, is inextricably linked to computers.

Protect what?
Initially, the information security system was developed for the needs of the military. The strategic data on defence capability were so important that their leakage could lead to huge human losses. Accordingly, computer security turned to the experience of cryptography, that is, encryption. Cryptographic scripts and special programs appeared, allowing to automate the process of encryption and decryption. Continue reading

How Alexander Sysoev tamed Goliath (part 2)
The creation of the team Real business requires a stop-loss involvement. Only if you immerse yourself in your business with all your strength and all your time — the project…

...

Website editor: head to the Internet
The Internet has everything that can interest and easily find answers to almost all questions. And to ensure that the information on the web-pages was relevant, interesting and readable, follows…

...

New hardware platforms for the study of a free object in a quantum system
Transfer of information has long been studied by scientists and every year there are new developments in the field of information theory. The most relevant in modern conditions are the…

...

Programmer: genius unwillingly
Programmer is one of the most popular and highly paid professions. Even not the most advanced specialist can find a job in accordance with their level of knowledge, and then…

...