Information security specialist
Come up with one, trying to use the other. And have to protect the fruits of their own intelligence. So there was one of the most valuable professions - a…

Continue reading →

How Alexander Sysoev tamed Goliath (part 2)
The creation of the team Real business requires a stop-loss involvement. Only if you immerse yourself in your business with all your strength and all your time — the project…

Continue reading →

Samsung has registered a new brand of Rize smartphones
According to the documents, Samsung plans to release three new models of Rize10, Rize20 and Rize30 smartphones Samsung has applied for registration of three new smartphone models, T3 writes. The…

Continue reading →

official

Information security specialist

Come up with one, trying to use the other. And have to protect the fruits of their own intelligence. So there was one of the most valuable professions – a specialist in information protection. Today, of course, is inextricably linked to computers.

Protect what?
Initially, the information security system was developed for the needs of the military. The strategic data on defence capability were so important that their leakage could lead to huge human losses. Accordingly, computer security turned to the experience of cryptography, that is, encryption. Cryptographic scripts and special programs appeared, allowing to automate the process of encryption and decryption. Continue reading

Examples of "new" IT companies
In the course of digital transformation, companies that previously ordered IT solutions themselves become centers of competence in the field of information technology. It's inevitable. And understandable. IT companies should…

...

DEVELOPMENT OF A MODEL OF CONTROL AND ANALYSIS OF ROAD TRAFFIC USING THE ALGORITHM OF NEURAL NETWORKS
Accidents on road transport cause huge material and moral damage to society as a whole and to individual citizens. From year to year in the Russian Federation as a result…

...

New hardware platforms for the study of a free object in a quantum system
Transfer of information has long been studied by scientists and every year there are new developments in the field of information theory. The most relevant in modern conditions are the…

...

"Code is the law": how to avoid substitution of the principle of decentralization (part 2)
"Decentralization" and "autonomy" mean joint management of society and its organization. And registries can provide excellent technical support, including in the construction of many new scenarios of interaction between participants…

...