THE STUDY OF TECHNOLOGY CREATE A PARALLAX EFFECT WITH THE HELP OF A WEB BROWSER
Initially, the world wide web was developed to store and retrieve data in the form of documents, but with the development of technologies such as HTML markup language and CSS…

Continue reading →

"Code is the law": how to avoid substitution of the principle of decentralization (part 1)
The history of the Ethereum platform — will the blockchain really open an era of managed self-regulation? The end of winter was marked by the merger of several dozen companies,…

Continue reading →

If you have a worse MacBook Pro, there is good news: two main drawbacks that can be found in these models have been solved
Apple users drew attention to the incorrect work in MacBook Pro laptops of the older model, which was released on July 12. The company agreed with the comment and corrected…

Continue reading →

patent application

How a computer cheats the patent system of “Big Pharma»

The algorithm allowing to find ways of synthesis of pharmacological preparations bypassing patent restrictions is developed. The same program will help to formulate patent applications so as to make them invulnerable
In modern pharmacology, intellectual property is the most important asset, and its protection is a separate industry where a lot of know-how is accumulated. Starting work on the Chematika project, researchers from Poland, led by Bartosz Grzybowski, who is now working in South Korea, did not expect that they developed a computer algorithm will be able to revolutionize this area of knowledge. Nevertheless, they seem to have succeeded: the program easily finds strategies for the synthesis of complex chemical compounds that bypass the restrictions imposed by the relevant patents. Continue reading

Why you need a certified it specialist
A few years ago, the term "certified specialist" was puzzling. Now the situation has changed. To be competitive in the it market, you need extensive knowledge, experience, and certification –…

...

Examples of "new" IT companies
In the course of digital transformation, companies that previously ordered IT solutions themselves become centers of competence in the field of information technology. It's inevitable. And understandable. IT companies should…

...

Your e-mail address is your business card
Everyone knows the old saying "Meet on clothes, escorted to the mind." In the world of information technology, where we live, we are increasingly first met by electronic means of…

...

Information security specialist
Come up with one, trying to use the other. And have to protect the fruits of their own intelligence. So there was one of the most valuable professions - a…

...