Wednesday, September 30, 2020

System administrator of cloud services

Vacancy description

We invite the Cloud Services System Administrator to our team .

About Us:


DE NOVO is the creator and leader of the Ukrainian cloud market, the operator of the country's first commercial TIER III reliability level data processing center.

DE NOVO cloud services are designed for enterprise clients - it is the top league of cloud solutions in terms of the range of tasks and profitability.

What will you do:


Operation of cloud platforms (planning and managing resources, maintaining normal operation, diagnosing and eliminating the causes of deviations from the standard).

Support the users of our services (technical specialists clients).

Complete the tasks of Cloud technological development.

Participate in projects to introduce new cloud services.

As we see our future "combat unit":


Sociable (work requires communication with colleagues and clients), attentive / organized (work requires exceptional concentration) and motivated to develop.


Deeply versed in the subject at the level of understanding the principles of operation, planning, implementation, operation and diagnostics.


Subject:


Knowledge of virtualization systems based on VMware technologies; networks and storage systems; data transmission networks (L2 / L3 topology, NAT, FW, VPN); infrastructure services (AD, DNS, SMTP, etc).

Acquaintance with the basics of project activities and ITIL.

Proficiency in English at the level of reading technical documentation and basic communication with vendor support.

What do we offer:


Regular "technology quests" and lack of opportunity to get bored in the workplace.

Registration according to the Labor Code of Ukraine.

Vacation 24 days, sick leave.

Fully official salary, consisting of a salary and a bonus part based on performance.

Mobile communication.

Medical insurance.

A sincere working atmosphere.

Tuesday, September 29, 2020

The direction of training includes 3 specialties, depending on the applied objects of activity

Computer systems and networks" - highly productive computer systems, multiprocessors, cluster, parallel, distributed systems; global and local computer networks computer engineering jobs.

System programming" - operating systems, incl. real time systems; software agents; software systems (drivers, compilers, etc.); information security software.

Specialized computer systems" - computer systems with optimized parameters, onboard and navigation, embedded, diagnostic cryptocomputer systems, signal and image processing systems.


Roma, FPM:

“70% of disciplines for all three areas of FPM are the same. In our  software engineering, they teach specifically software development (a lot of practice compared to the rest). The emphasis is on writing code, competently drawing up data structures, and building algorithms.

The study is interesting and stress-free. Good teaching staff. For 4 years I would not call any subject superfluous or unnecessary, apart from philosophies, psychology and other heresies. They teach only what you can really make money with. From  2-3 courses you can go to work in your specialty. "


Bogdan, FPM:

Computer engineering studies programming with a bias towards hardware development (computer circuitry, computer electronics, applied theory of digital automata).

Software engineering focuses on applied development. There are courses on software testing, software engineering, etc.

There is less programming in applied mathematics. They focus on theoretical and practical training in mathematics. 

Monday, September 28, 2020

What studies to become a computer engineer in Morocco?

Computer engineering has become one of the most requested specialties, both for the job market and for students. Computer engineering professions are considered today as the professions of the future. Studies show that among the 10 most popular job titles currently, four are directly related to computer engineering. The latter constitute 50% of the total vacancies in these top 10 trades.

It is evident that this field of study has a lot of potential and value. This is why, through this article, we have chosen to deal with the different methods of access to computer engineering, the specialization courses, as well as the criteria that will allow you to differentiate yourself if you wish to become an IT engineer. in Morocco.

Join a post-baccalaureate engineering school 


Computer science vs engineering

To become a computer engineer in Morocco, you must first start by choosing to join a private or public post-baccalaureate engineering school.

 Private engineering schools accessible after the baccalaureate generally offer 5-year training courses including two years of integrated preparatory classes and 3 years of specialization. However, few are the public engineering schools accessible directly after the bac and which offer training with integrated preparatory classes.

In addition, private engineering schools offer more flexibility to students, particularly in terms of the choice of the course, or the proximity of the students, by offering classes on a human scale, adapted to the number of students and the courses. requested by students, unlike public engineering schools where the number of places is fixed in advance. Students are thus admitted to the course of their choice in order of meritocracy, which maximizes the risk of not being able to access the desired training if the student is not well classified, and he will thus be forced to reorient his career. to another domain.

Join a post-preparatory engineering school

The second option you have is to join a post-preparatory engineering school. This consists of going through two years of preparatory classes before being able to take the common national competitive examination (CNC), the outcome of which can be critical for your choice of school and area of ​​specialization.

The preparatory cycle consists of training concentrated in mathematics, physics, languages ​​and many other subjects, and in no way guarantees a choice of specialty or even the integration of an engineering school. Indeed, in order to integrate the school of his choice and pursue the desired training in computer engineering, the student must have a very good average in the common national competition. It is its ranking in the competition, in addition to the capacity of the different establishments, which will determine the choice definitively.

The different fields of computer engineering

Being itself a branch of engineering, computer engineering has several sectors and fields of specialization, all of which lead to specialized professions and highly coveted by the job market.

There are some more traditional sectors such as network engineering or industrial IT and very recent ones, which have just appeared with the rise of new technologies, such as Big Data engineering, web development or mobile, Engineering in Cloud Computing or engineering in artificial intelligence.

These specialties have great growth potential and provide access to several career opportunities. They lead to professions such as Big Data engineer, Business intelligence project manager, advanced developer engineer, cloud and virtualization engineer, artificial intelligence engineer, cloud computing architect… and many other professional perspectives.

Stand out as an IT engineer

To become a computer engineer in Morocco who stands out in the job market, you have to take several aspects into consideration. The school where you will continue your training, the quality of the programs taught at this school, its network of partners, its recognition by the business world, its experience ... all are criteria that play a crucial role in differentiation between the winning engineers.

In order to be able to make the right choice of your school, you must focus on all the aspects mentioned above. A better computer engineering school offers quality training balanced between teaching technical skills relating to the profession / field, and essential human and managerial skills to forge a future winner with a strong personality, assertive, good communicator and capable, later on, to the exercise of his function of manager within the company.

In conclusion, there are different types of engineering schools and different ways to integrate them. However, if you want to specialize in computer engineering, a field that is becoming very coveted today, it would be better to opt from the start for a post-baccalaureate school specializing in computer engineering, which will allow you to benefit from all his expertise and possible opportunities to become a distinguished computer engineer who really stands out in the market.

Friday, September 25, 2020

The meaning of the phrase "industrial engineering"

The meaning of the word "industrial"

INDUSTRIAL , - oh , - oh . 1. App. to industry (in 1 digit); industrial. Industrial enterprise. Industrial centre. (Small Academic Dictionary, IAS)

All meanings of INDUSTRIAL

The meaning of the word "engineering"

ENGINEERING , -and, well . 1. Outdated. Engineering art, engineering. For a consistent attack of an atomic nucleus, enormous energies are needed. --- And he understood: only high engineering could eventually give them to atomic physics. Danin, Rutherford. (Small Academic Dictionary, IAS)

All meanings of ENGINEERING

Making the Word Map better together

Hello! My name is Lampobot, I am a computer program that helps to make a Map of Words. I can count very well, but so far I do not understand well how your world works. Help me figure it out!

Question: to stipulate - is it something neutral, positive or negative?

Associations for the word "industrial"

fishing industry cities fishing

All associations for INDUSTRIAL

Associations for the word "engineering"

engineer blueprints technology

All associations for ENGINEERING

Synonyms for industrial engineering

computer engineering construction engineering software engineering Industrial Design civil Engineering computerquestions

All synonyms for INDUSTRIAL ENGINEERING

Industrial Engineering Sentences

The idea of industrial human factor engineering is being actively developed .

G. Kh. Boronova, Labor psychology: lecture notes

The development of industrial engineering involved in the management and organization of production required the use of more and more complex mathematical models and led to the development of numerous statistical and optimization planning algorithms, the practical application of which required the processing of large amounts of information and the performance of rather complex calculations.

Evgeny Leonidovich Shuremov, Computer-oriented control technologies. Briefly about the main

They are interested in the economic structure, the system of political power, the ruling religions and ideologies of the world, the main breakthrough technologies in the field of medicine, space, and industrial engineering .

Kazantsev Valery, Step into the future in a dream

(all offers)

Combination of the word "industrial"

industrial enterprises

industrial production

industrial revolution

industrial development of the country

industrial potential of the country

for the protection of industrial property

has become a major industrial center is

about industrial espionage

(complete compatibility table)

Combination of the word "engineering"

social engineering

genetic engineering

software engineering

in engineering

social engineering methods

Concepts with the phrase "industrial engineering"

Industrial Engineering (also Industrial Engineering) is an engineering discipline concerned with the design, improvement and research of integrated systems consisting of people, money, knowledge, information, equipment, energy, materials and processes. Manufacturing management is based on the principles and methods of engineering analysis. Applications of mathematics, physics and social sciences are used together with methods of engineering analysis and design

Thursday, September 24, 2020

Computer engineer

Computer engineer is more than a profession. Depending on the size of the company in which he works, the computer engineer can move from a versatile and general engineer to a specialist in a particular technical field.

In an SME or a small structure, the IT engineer acts as a jack-of-all-trades: construction and maintenance of the IT network, management of equipment parks, even IT development and software development. 

If they work in an IT services company or in the IT department of a large company, IT engineers have their specialties. Several trades then emerge: Computer hardware engineers jobs

The information system engineer 

The management IT specialist 

The network and telecoms engineer

The industrial computer engineer

The internet and multimedia engineer

The software development engineer

Depending on his role, the IT engineer may therefore be required to work on different technical aspects. In all cases, this professional must demonstrate serious computer skills, rigor, a strong sense of analysis, but also versatility. He must also know how to be able to work in a team. Listening to business issues, understanding which will allow him to effectively adapt his activities, he also has good interpersonal skills and knows how to explain his work to business staff.

Wednesday, September 23, 2020

KU Leuven engineer fights against the blind spot

Blind spot accidents involving trucks cause approximately 1,300 victims in Europe every year. Existing blind spot mirrors and cameras cannot always prevent accidents. “Blind spot mirrors are not always that effective,” says Kristof Van Beeck in  Campuskrant . “They never show the complete blind spot, and if a truck hits an overhanging branch, the positioning of the mirror can already get out of control. A blind spot camera, which shows the blind spot zone on a screen via a wide-angle lens, works more accurately, but just as with the mirrors, you count on the drivers' attention. And it cannot be avoided that the attention sometimes falls. ” 

Alarm

That is why the engineer developed a safety system that automatically warns truck drivers when someone is in the blind spot. “The system uses complex algorithms that analyze the images from blind spot cameras. The system uses image recognition to quickly and accurately detect cyclists or pedestrians. When someone shows up, an alarm goes off in the driver's cabin computer hardware skills.” 

The new system has also been tested in practice with traffic simulations. These simulations show that the system works 95 percent accurately. The researchers are currently in talks with industrial partners to develop a commercial system for trucks. However, further research is needed for this, among other things to see whether the system can handle long journeys and is able to withstand rain and fog. 

Van Beeck is a PhD student at EAVISE, the De Nayer Technology Campus of the KU Leuven in Sint-Katelijne-Waver. 

Tuesday, September 22, 2020

How to become an electrician?

Electrician

An electrical technician is a person who works to maintain electrical systems in buildings and understands a wide variety of electrical equipment. A person who wants to become an electrician usually needs a good understanding of how electrical equipment works. The way in which a person can acquire this knowledge may vary depending on the jurisdiction in which the person plans to work. However, in many places, it takes one to two years of training for a person who wants to become an electrician. This training can be obtained in college or vocational school, or even through apprenticeships directly. In some areas, a technician can also take certification exams.

An electrical technician typically performs maintenance, testing, diagnostics, and repair work on electrical equipment and systems. In some cases, a person in this field can even help in the design, manufacture and installation of electrical equipment. Often an electrical engineer does his job under the guidance of an electrical engineer. The exact job description of a person in this position often depends on where they work. Some people with this name work for energy companies, while others work with electrical equipment in a number of other places, including schools, railways, manufacturing companies, and even military establishments software engineer vs computer science.

How to become an electrician from scratch?

A person who wants to become an electrician usually graduates from high school in preparation for this career. In most cases, a General Education Diploma (GED) or the equivalent approved by the jurisdiction may also be considered acceptable. In addition to top-level training, a person who wants to become an electrician can take one to two years of study in an electronic program. Typically, these programs are available at vocational schools and colleges. A person interested in this area may also seek training as preparation for this job.

Often, electrical engineering programs can lead to accounting in electronics. For example, some vocational schools or community college programs may lead to certification in a field or Ph.D. in electronics. Some people can also enhance their knowledge of electronics by delving into a related hobby. For example, a person interested in this area might take up robotics as a hobby or automotive electronics. While this passion is not essential to securing a job, such knowledge can be impressive to potential employers.

Once a person has acquired the necessary knowledge to become an electrician, they can have many places for which they can apply for jobs. For example, he can apply to his local energy company. He may also find work in a factory or in the school system. In addition, a person interested in this field may seek employment in a transport company, an automobile industry, a hotel, or even a residential complex.

Monday, September 21, 2020

Google Translate gets support for neural networks

Google's branded translator has received support for machine learning and neural networks , according to a press release posted on the company's blog. The innovation will improve the skills of the language machine to find the most successful and close in meaning analogue, apart from literal perception.

An expanded version of Google Translate, capable of analyzing not only words individually, but also their place in context, will be available today in eight languages. There is no Russian among them, to the disappointment of many, yet. However, as the developers assure, widespread access to "smart" translation technology will be open in the very near future computer engineer.

In addition to the updated translator, Google has introduced an improved Cloud Translation API, which is based on neural networks. According to the creators of the service, this is the largest update that it has received in the last 10 years.

What is the purpose of an anthropomorphic robot?

This question is often asked. And I want to answer the following: whatever you want. The robot can act as a kind of "promoter". Let's say he can stand at the stand and hand out business cards, or other promo, thereby attracting the attention of people.

This I answered, and now to reality. The most important thing here is to make a "doll" with a computer and drives for which various purposes and functions are already invented. 

And the first pitfall is the rope of chaotic wires that pull from each servo. Such a web makes it difficult to transport the robot and try to program it to move computer engineer description

Just wrapped in wires And these are only servos, without sensors, sensors and other electronics

Everyone understood this when they hooked up and forced the robot to at least stand.angry

The solution to the problems turned out to be in the ID servos, which can easily and easily connect to each other and have their own unique ID. The output is just a thin wire for power supply and control of all drives

Replacing the servos and modifying the case prompted the launch of a fundraising project for a new filling. Detailed description here

More interested in further problems, to anticipate them.

For example, is it better to have one cool control computer, or to divide all nodes into lower-level controllers and manage them faster?

How will the robot's comfort zone be organized so that when the hand of a person who wants to touch it approaches, it leans back and turns on an evil melody?

And the most important task that always creates inconveniences is the power solution. The current capabilities only allow us to make a frame to support the robot and bring out the power wire from it along the top.

Of course, it's worth reworking the framework itself. Make it lighter, as the weight is quite significant. 

Well, an interesting riddle for an engineer is how to achieve the amplitude of movement of the hip joint? How to manage this in order to write pirouettes, balance, sharply expose your leg so as not to fall? Mechanics, hydraulics, soft robot technology?

Simple mechanics with a small number of degrees of freedom looks like in the picture below. That is why robots have such a special gait. Everything is too limited and muddy

It is very curious to see how the guys from Boston Dynamics implemented the mechanics of a two-legged robot. It is clear that there are millions of dollars of investments, where we have to get them with our plywood robot, but it's so interesting when programming goes beyond the computer and allows you to interact with the outside world!

Thursday, September 17, 2020

Description of the target audience of competitors

Behavioral, psychographic and demographic segmentation criteria will help to describe the segment that competitors are targeting: computer engineering vs computer science salary

Behavioral criteria. This group includes parameters that describe consumer behavior and the purchasing process: place of purchase, expectations from purchase, reason for purchase, purchase drivers, etc.

Psychographic criteria. Psychographic segmentation is carried out according to 3 criteria that characterize the personality type and behavior of the consumer in the market: attitude to innovation, values, life position, who is the idol for the target audience, etc.

Demographic criteria. Consumers are divided according to demographic characteristics into homogeneous groups by income, gender, age, social status, occupation, education, marital status, etc.

Comparison of the received data

After collecting data and analyzing competitors for the selected indicators, we organize the information received. The clearer the results are, the easier it is to draw correct conclusions. The most common presentation formats are:

Pie chart

The first chart shows what percentage of the total number of competitors studied uses the criterion in question.

Such a diagram is used to represent quantifiable data in 2 cases:

to monitor the frequency of use of the criterion by competitors.

to assess the level of expression of the indicator among competitors. The result is a diagram like this, which displays competitors and evaluation criteria:

Positioning map

Depending on the criteria and ultimate goals of the study, the map axes differ. For example, you can make a map based on value for money, ability to meet consumer needs and demand, target audience and prestige, etc. This form gives an idea of ​​the position of the company and competitors in the market.

To conclude

Inference from data is the most important point of analysis. The information received is supported by marketing knowledge, cases, experience and a vision of the market situation. Taken together, this makes it possible to achieve the set goals of the analysis and draw up a working strategic plan.

After collecting and analyzing information about competitors, we assess the feasibility of using certain marketing activities of competitors: master new channels of attraction and communication with the target audience, expanding the site's functionality, finalizing content, using new formats of communication with consumers. If all competitors are interacting with consumers on social media, then you should take a closer look at this channel. To optimize marketing in this way, you can create an action plan so that each action does not stretch over several months or years.

Wednesday, September 16, 2020

Where to look for the best developers

Skillotron service report, which unites programmers from 57 countries.

At the end of last summer, we launched the Skillotron gaming platform, a kind of free online service for self-testing the knowledge of IT specialists. Programmers themselves formulate questions for each other on different technologies and answer themselves.

Some of the statistics based on the results of passing Skillotron quizzes are publicly available, some we decided to present to the public for the first time here computer system engineering salary.

Since August, we have collected data from more than 7 thousand users and can show, for example, how the test results vary in different countries: which programming languages, to what extent and where are popular. Where players perform best, where people are most motivated, etc.

Based on these data, a wide variety of conclusions can be drawn. For example, where to look for programmers who may be needed in your project.

The cleverest

Of course, it was interesting to see where the players get the highest scores on the benchmarks. To do this, we measured the so-called "average score" based on the results of all passed quizzes by country.

As it turns out, you don't have to go to Silicon Valley to find the smartest developers in a country category. On average, engineers from Ukraine are better at solving IT problems than anywhere else. And if you look for programmers in America, then you should start from the South: Argentines are in second place in terms of results. However, if you are from Russia, then Belarus, the third country in terms of average score, may be closer.

Top 5 countries according to the average test score

Most multitasking

Often, knowledge of one language, even at a very good level, is not enough to solve complex problems. So we decided to find out where the most versatile programmers live. That is, people who pass testing for the greatest number of technologies.

According to game statistics, programmers from Armenia show interest in the largest number of programming languages, environments, methodologies, etc. They are followed by residents of Cambodia, Iran and Uzbekistan.

Top 7 Countries for Skills Tested

Most motivated

In addition to a solid knowledge of the subject and multitasking, the not-last quality for an IT-specialist is motivation in self-development. The graph below shows in which locations engineers are ready to spend the most time honing and testing professional knowledge.

Tuesday, September 15, 2020

8 reasons to integrate chatbots into your business

According to Forester, people spend 85% of their time on messaging apps like Facebook Messenger, Kik, Viber, and Whatsapp. 

Facebook Messenger already has over 11,000 bots, making it the best platform for implementing chatbot technology and running business today.

Many marketers are extremely interested in building their own chatbots. And it's not just the increased popularity of this technical novelty. Chatbots are also a great solution for improving UX and gaining valuable customer insight.

We  Oleg Chayevskiy , co-founder Beesender, identified 8 good reasons why your company should begin using chatbot technology 2018:


Computer engineer vs computer science

1. Chatbots are optimized for mobile devices 

Thanks to the mobile-first approach to chatbots, they are fully optimized. Also, you do not have to waste time and additional resources. Creating and using a bot is very easy.

2. Almost all of your clients have a messenger installed on their mobile devices

According to TheEconomist, more than 2.5 billion people use at least one of the messengers, be it Telegram, Viber, WeChat or Facebook Messenger. 

That is, more than a third of the world's population interact through the messenger. An impressive figure, isn't it?

3. Old communication tools are no longer relevant

49.4% of consumers would prefer to have a conversation through a messaging app rather than a phone call.

½ of all users is a really large figure, reflecting the shift in consumer behavior with the introduction of instant messengers and chatbot technologies. The conclusion suggests itself: your customers will prefer to communicate with you through the messenger, rather than using voice communications.

4. Chatbots create a unified brand voice

One of the main tasks of modern marketers is to create a unified brand presence on the largest social networks. To do this, they launch many campaigns on different platforms. At the same time, regular updates and maintaining the high quality of the published content are very important. 

When creating chatbots, they are integrated with social networks and unified into a single network. This allows you to regularly update your brand messages through one system on all platforms at once.

5. Consumers want active interaction

Consumers want to interact with brands through messaging apps. Not just receive messages, but with them offers, promotional codes, information about new products and the like. 

Again, a business chatbot is a great investment.

6. The trend of automation shows no signs of slowing down

Every day the number of active users of social networks is increasing by one million.

According to the latest Statshot report from We Are Social and Hootsuite, published on The Next Web, the number of active users of social networks and instant messengers has exceeded 3 billion.

The largest social network today is Facebook. It has over 2 billion active users, 87% of whom use mobile and 59% use Facebook every day.

Telegram has 100 million active users and overtakes VKontakte in this indicator. Recently, Pavel Durov said that 600,000 people are registered in the messenger every day.

7. Not just "how they want", but also "when they want"

51% of consumers want their business services to be available 24/7. The consultant cannot be available at any time of the day, but for a chatbot it is quite possible.

8. Instantaneous is the key

69% of consumers prefer to ask a bot questions because he will provide them with an instant correct answer. Customers who decide to spend their precious time asking a question and learning more about your product are not ready to wait for an answer within 48 hours. They want to receive answers to their questions here and now, and chatbots, in turn, can offer this.

Monday, September 14, 2020

IT-company SoftTeco is 11 years old!

In 2011  SoftTeco became a Resident of the High Technologies Park and received its first award “Best IT companies to work for in Belarus”. 

Since 2015, SoftTeco has been included in the TOP-10 "Leaders Matrix Belarus: Top Web & Software Developers" according to the Clutch analytical agency and firmly occupies its place in the ratings of IT leaders in Belarus in mobile and development and implementation of complex cross-platform software solutions. We work for large, medium and small businesses in more than 16 countries around the world.

SoftTeco today: types of jobs for computer engineers

- Professional team of 150 employees

- Multi-storey comfortable office in a modern business center

- Friendly SoftTecoTeam policy based on equality, respect and mutual understanding

- Comfortable and friendly startup atmosphere, focusing on employees and customers

- Productive work and great relaxation with colleagues

- Continuous development and movement forward!

We are proud of our cool team, our friendship and our work. Every day we create great stories together, find the right solutions and the right answers. New projects, new friends and partners, new victories are ahead!

Friday, September 11, 2020

10 tips for security and privacy at Zoom

With the introduction of social distancing and quarantine measures, people around the world began to look for new ways to communicate. The convenient and affordable Zoom service quickly gained popularity. But it quickly became clear that the developers were not quite ready for the fact that their creation would attract so much attention.

With this heavy use, Zoom's flaws instantly surfaced. We must give the company its due: Zoom is successful in handling surges and responds quickly to findings from security researchers. However, it is not possible to solve all the problems found with updates - and some of them should be kept in mind. Here are 10 tips to help keep your Zoom communications safe and private.


What types of engineers are there

1. Protect your account

First and foremost, the Zoom account is another valuable account, and it also needs to be protected. Use a strong, unique password and enable two-factor authentication: it will protect your account even if your credentials are leaked online (fortunately, this has not happened yet, but such a nuisance cannot be completely ruled out).

The service has a peculiarity: in addition to the login and password, the user receives a personal conference identifier (Personal Meeting ID, or PMI). It's pretty easy to spot - you can invite people to public meetings on Zoom through PMI. Be careful with it: only share your PMI with trusted people, as anyone who knows your ID can join any online meeting you organize.

2. Use your work mail to sign up for Zoom

Due to a weird  glitch that has not been fixed at the time of this writing, Zoom assumes that all email addresses in the same domain (unless it's a very popular domain like @ gmail.com or @ yahoo.com) belong to the same company ... Therefore, the service combines all accounts with the same domain into a group, whose members can view each other's contact information.

For example, this happened to users from Kazakhstan, whose addresses ended with @ yandex.kz. The same can happen with clients of other small (or little-known in the West) email providers.

Therefore, we recommend using your work email to sign up for Zoom: it's okay if your work contact information is recognized by colleagues. If there is no such mail, open a mailbox in any popular public domain to keep your personal information private.

3. Beware of Fake Zoom Apps

According to Denis Parinov, a researcher at Kaspersky Lab, in March the number of malicious files, the names of which include the names of popular video communication services (Webex, GoToMeeting, Zoom, etc.), almost tripled compared to last year. This means that attackers are actively exploiting the growing popularity of Zoom and similar applications in an attempt to disguise malware as video clients.

Don't fall for this trick! Download Zoom clients for Windows and Mac only from the official website of the zoom.us service  , and applications for mobile devices from the  App Store  or  Google Play.

4. Do not share links to conferences on social networks

Perhaps you want to not only communicate with colleagues or relatives, but also hold public conferences. It is now the only format available for public events - in large part for this reason, Zoom's audience is growing very rapidly. But even if your event is open to everyone, we do not recommend publishing a link to it on social networks.

If you are already familiar with Zoom, then you have probably heard of the so-called "Zoombombing" (Zoombombing). The term,  coined by Techcrunch journalist Josh Constine , refers to troll raids on Zoom to display inappropriate content. Right now, future attacks are being discussed in Discord chats and threads on 4Chan (riddled with trolls).

How do trolls know about upcoming events? It's not difficult to guess - from public sources, in particular social networks. Therefore, try not to post links to Zoom meetings in public resources. If you do need to do this, turn off the Use Personal Conference ID (PMI) option for these events.

5. Protect each meeting with a password

Password-protecting a conference is the most secure way to restrict the list of participants to who you want to see. It has recently been used by default, which is very good (note: do not confuse the conference password with the account password). Like links to events, conference passwords should not pop up on social media or other publicly accessible sites.

6. Turn on the waiting room

The waiting room  is another useful feature that is now enabled by default. The idea is that those wishing to join the meeting are put on a “waiting list” and remain on it until the conference organizer approves their participation. This function will be especially useful if the password from the conference is still in the public domain.

You will also be able to transfer already connected participants back to the waiting room if they begin to interfere with your communication. We recommend that you do not disable this setting.

7. Pay attention to screen sharing settings

Typically, video conferencing apps allow you to share your device screen with other participants, and Zoom is no exception. Pay attention to the following settings:

Who can share the screen - only the host or anyone in the conference. In the case of a public video conferencing, you definitely do not want random users to have this option, so it is worth turning this option off.

Whether simultaneous screen sharing of multiple participants is allowed. If you don't know for sure if you need this feature, chances are you won't need it, and it's best not to allow it. Just keep in mind that there is such a setting.

8. Use a web client whenever possible

Zoom apps have various flaws. For example, one of the versions  allowed attackers to gain access to the microphone and camera of the device . Another version  allowed websites to add users to calls without their consent . The Zoom developers quickly fixed the above and some other issues. Also, the service stopped sharing user data with Facebook and LinkedIn.

Nevertheless, it is unlikely that all problems can be solved quickly. And in the absence of an independent security assessment, Zoom apps are likely to remain unreliable - for example, continue to disclose user data to third parties.

Therefore, to be sure, we recommend using Zoom in a browser and not installing service applications. The web version runs in a sandbox and does not have the device permissions that applications usually require. This limits the damage it can do.

Unfortunately, there is another problem here. Even if you want to use the web interface, it may turn out that Zoom decided everything for you - it downloaded the installation file and requires an application to connect to the conference. In this case, you can at least limit the number of devices on which the service is installed to only one. Whether it's your second smartphone or a rarely used laptop, choose a device that contains as little personal information as possible. Yes, it sounds like paranoia, but it's better to play it safe.

By the way, if your company uses Skype for Business (previously known as Lync), keep in mind that it supports Zoom conferences and does not have the drawbacks mentioned. So it can be used instead of the Zoom client.

9. Don't Trust Zoom's End-to-End Encryption Ads

Zoom has become popular not only due to its pricing policy and its capabilities, but also because of the end-to-end encryption advertised by its creators. It assumes that all communications between interlocutors are encrypted and only call participants can decrypt them (and everyone else, including Zoom Video Communications employees, cannot).

Sounds great. But as security researchers have found, this is not the case in practice. Zoom's developers  had to admit that by "end-to-end" they only meant encryption up to the Zoom server. That is, although the video is encrypted, company employees, and in some cases, law enforcement agencies, can access it. But the text of the chats is really protected with end-to-end encryption, and Zoom employees cannot access it.

We are not urging you to opt out of Zoom immediately - there is no end-to-end encryption in other video conferencing services either. But keep this in mind and try not to discuss really important confidential matters on Zoom.

10. Think about what your interlocutors can see and hear.

This clause applies to all video communications services, not just Zoom. Before joining a conference, think about what your interlocutors will see and hear. Even if you are alone at home, it is better to clean yourself up and dress decently. You can also remove the password sticker if it comes into the camera's field of view.

The same goes for your device screen. If you are going to demonstrate it, close all extraneous windows that others do not want to see. This can be a page of an online store where you are going to buy a gift for one of the participants, or a job search site, seeing which, your boss is unlikely to be happy. Other examples will tell you imagination.

Thursday, September 10, 2020

Why is there no ideal platform for distance learning for schoolchildren in the world?

In a new release on the ITitov YouTube channel, Dmitry Titov raised the topic of distance education for schoolchildren. The author and host has collected tips and life hacks from private schools on what tools will help you learn from a distance today.

For example, the private IT school MyFreedom easily switched to online and sees this as an advantage for future programmers, because this situation immerses them in a real environment. Not going to the office, making decisions remotely - this is what IT people have encountered even without a pandemic. The private school has much more serious problems. What to do with empty classrooms?

"We just drove into the new office and started to solve the problem of how to save the school, people All counted, made another financial strategy and we had to give up half of the office.?", - says the founder of IT-school MyFreedom Elena Dinman.

The most difficult times are today for robotics schools. It is impossible to assemble a robot using Zoom under the supervision of a teacher. We have to rebuild the system of training students and teach them only to program these constructors computer engineering course.

"All our sites are open, but they are empty. It is very sad. We are a portfolio company Zubr Capital, and the guys are helping us a lot. We really lost 100% of our revenue," Dmitry Gayev, director of Robolab , shares the news with Dmitry Titov.

If you go to distance learning, then many "sores" are revealed. Some items simply cannot be transferred online.

"There are subjects that you cannot always translate online. When a child answers a poem by heart or a statement. It seems to me that when the coronavirus ends, education will be completely transformed. If you look at the school I went to and which modern children go to, then it is absolutely no different, "says Alexander Khomich, director of the Education for the Future Association.

One of the main issues with the transition to the "distance" is technical. Not everyone has a computer for every family member. The most difficult situation is with education in primary school.

"It is very difficult with first-graders, because an adult must be present during class, and they cannot always be there. Another obstacle is the child's lack of a computer. There is a smartphone, but this is not a tool that today allows you to fully study at home." , - Director of ITeen Academy Irina Vasilyeva comments on the situation.

According to Valentina Chekan, co-founder of the private school LuCh, distance education today is stressful for a student. In this situation, it is important to support each student individually.

"We need to work very well with the feedback and diagnostics of each student. We want the student to face the choice for the future profession already at the secondary school stage . "

"There is a UNICEF fund that deals with education analytics. Many say that distance learning is an extremely ineffective form ," continues the director of the private school LuCh Yevgeny Luferchik, when it comes to the benefits of distance learning.

And now the shock content. There is no single platform for online education of children in any country in the world. All the heroes of the new release of ITitov agree with this. The complexity of creating such a system lies not only in the technical part, but also in the organizational one.

"Such a platform has not been organized anywhere, so there is no need to say that we are lagging behind everyone, but I have forecasts who can do it first, " says Evgeny Livyant, co-founder of the 100 Points Center , sharing his forecasts.

Who can be the first to create a unique distance learning platform for schoolchildren? How do kids start building their businesses with complementary courses? As well as life hacks and tips for distance learning in a new issue on the YouTube channel ITitov. 


Wednesday, September 9, 2020

IT events poster in August

Dreamers Online Forum 2020

When:  August 1

Cost:  Free

Talented entrepreneurs who have created iconic projects during past crises will gather on one platform to share their experience with those who want to start and develop now computer engineering technology salary.

.NET Summit 2020

When: August 7-8

Cost:  paid

The 4th international conference .NET Summit 2020 will be held online on August 7-8. The main topics of the conference are practical experience in solving business problems using .NET and non-standard use of .NET stack technologies in projects.

IT Battle by ROI4CIO

When: August 10

Cost: Free

On August 10, a series of online competitions for corporate software vendors starts. 

Design Z-Day Online Conference

When: August 13

Cost: Free

The international online conference Design Z-Day is waiting for designers, business analysts and managers on August 13. 

AI-MEN 2020

When: August 25

Cost: Free

The third annual conference AI-MEN 2020 will be held online on August 25. This is an international conference on the use of artificial intelligence technologies, Data Science, Machine Learning, Big Data. You can participate in the conference free of charge, but only by prior registration.

FlutterConf.by Conference for Flutter Technology Enthusiasts

When: August 29

Cost: paid

The first conference in Belarus dedicated to Flutter technology will take place on August 29.

Tuesday, September 8, 2020

September IT events poster

Free Online BA Meetup

When: September 3

Cost:  Free

We invite you to an online meetup for business analysts.

MOBILE Z-DAYS

When: September 8-10

Cost:  Free

On September 8-10, a 3-day online conference MOBILE Z-DAYS will take place: 1st day - iOS, 2nd day - Android, 3rd day - Flutter.

IT-Security Conference-2020

When: September 9-11

Cost:  paid

The ONLINE conference "Information Security Technologies and Information Security of Organizations" (IT-Security Conference) is an annual effective platform for a constructive dialogue between the regulator, government bodies, the IT community and business communities of various sectors of the economy of our country in order to discuss the latest technologies and developments , development of joint solutions in the field of information protection and information security of organizations.

Russian Python Week

When: September 14-18

Cost:  paid

Professional conference for Python developers Russian Python Week 2020.

Big Data & AI Conference 2020

When: September 17-18

Cost:  paid

On September 17 and 18, a team of organizers from Global Innovation Labs for the 7th time gathers in one (this time virtual) space the best cases from the best Data Science and ML specialists - Big Data & AI Conference 2020.

Investor's Day Startup Competition

When: September 19

Cost: Free

Startup competition, where anyone can present their project to experts and investors and receive investment support computer engineers.

AI-MEN 2020

When: September 26

Cost: Free

The third annual conference AI-MEN 2020 will be held online on September 26. This is an international conference on the use of artificial intelligence technologies, Data Science, Machine Learning, Big Data. You can participate in the conference free of charge, but only by prior registration.

Development and administration of local networks Installation of SCS - the basis for building a network

The construction of a local network begins with the installation of SCS , which creates the foundation of a local computer network - LAN.

 local network includes a computer and telephone network. To build a computer network, symmetrical cables of at least category 5e / class D or optical fiber are required. To create a telephone network, it is enough to lay category 3 cables. The length of information applications lines depends on the category of transmission medium, application class, channel model, total length of flexible cables, and maximum operating temperatures.

Unshielded SCS provides high quality of transmitted signals with short line lengths. If the line length is close to the maximum allowable, a shielded system with a good parameter reserve is required. The choice of a shielded SCS ensures data protection from external interference, a solution to the problem of cable pickups, and a decrease in the effects of power wiring.


Computer science vs computer engineering

When installing a local area network (LAN), it is required to observe additional rules for laying power cables in parallel with low-current ones. Power surges cause unwanted pickup on local networks. Competent installation provides for compliance with the minimum permissible joint laying distances.

SCS installation - the first stage of network creation

The choice of SCS as the basis of a local network is the first stage with a long-term perspective. The cabling infrastructure of the building must ensure the operation of three to four generations of LAN equipment. To build a local network, customers have to take into account the existing network configuration, the perspective of the organization's network needs.

Installation of SCS begins after the approval of the technical design by the customer. When designing in parallel with installation, installation diagrams are provided to the Customer for approval. The schemes include the routes of cable channels, their type, routes of cable laying, the location of system elements - distribution points, connectors, points of consolidation.

In the case of overhaul with the simultaneous laying of cable systems, coordination of the stages of work performed by different contractors is required. When building a SCS or several cable systems as a subcontractor at a facility where a complex of construction work is being carried out, the managers of our company coordinate the work with other contractors.

In most cases, customers require testing. It allows you to confirm the quality of the SCS installation, to reveal hidden defects, to make sure that the normal operation of network protocols is ensured. We test 100% of the lines at every site. As an example, the EcoLAN website shows examples of test results and parameters of a typical category 6 line and a fiber-optic line of OM-2 category.

The quality of the SCS is determined by the reserve of parameters of the system, as well as by how much the reserve was maintained during the installation of the SCS. The higher the category of the system, the more the quality depends on the installation. This dependence is more pronounced when laying unshielded cable systems. The screen protects the "weak link" of the SCS from external interference - the connector. In the absence of a screen, external interference occurs in the most unbalanced part of the system.

In order to fully realize the capabilities of the SCS, it is required to ensure a minimum imbalance of symmetrical pairs during the installation of connectors, to withstand bending radii when laying cables, not to allow cable harness to be tightened, to take into account many details of the parallel laying of power and low-current cables, to ensure the equipotentiality of telecommunication and power grounding.



Friday, September 4, 2020

Digital Revolution 2020: Ten Best Practices for CIOs

The state of uncertainty that has accompanied digital transformation for several years has changed with the proclamation of an orientation toward the "enterprise of the future", IDC said. So what does the future hold for IT organizations?

The current state of digital enterprises can be summed up in the words of renowned science fiction writer William Gibson, "The future is here, it just isn't evenly distributed."

While some of the CIOs have plunged into the nirvana of hyperspeed, hyperscale, and hyperconnectedness, others are grappling with the fragmentation of digital transformation initiatives, and are being hit by competitors and other market forces.

Payback time for digital CIOs has yet to come, but they have little room to maneuver. Competitors are stepping up their digital efforts. Under these conditions, CIOs can and should take concrete steps to create the digital "enterprise of the future."

Predictions based on IDC FutureScape: Worldwide CIO Agenda 2020 Predictions provide up-to-date information on technologies, markets and ecosystems to help CIOs understand future trends, their impact on the enterprise, and take action to succeed in 2020.

By 2024, 80% of digitally advanced organizations will change the “walled garden” model, in which everything is in charge of the IT department, to a self-service model. Providing libraries of cloud solutions, functions-as-a-service (FaaS), and tools that require little or no coding and are easily digestible by employees without good IT training helps businesses respond quickly to changes market needs without the involvement of IT specialists. We only need guarantees of the security and compatibility of these solutions.

For such a transformation, IT directors need to clearly understand the desired future state, which is determined jointly with business leaders and line managers (line of business, LOB) and serves as a reference point for employees of the enterprise and its partners cloud architect requirements.

Recommendations

Invest in training the developers who design and build such digital tools, maintain relationships with tool vendors, and leverage their expertise.

Build digital platforms with data, API services, and microservices to create open self-service environments.

Open labs and centers of excellence to share knowledge between LOB developers and IT staff.

By 2023, 65% of CIOs will lead their organizations in establishing innovation hubs, sharing best practices, and engaging engineers across the enterprise. Since the line divisions are actively using new technologies, they employ technically competent managers and specialists, the CIO should turn the IT service into a center for the exchange of best practices and knowledge about digital technologies. This will enable the architecture and integration of digital efforts across the enterprise. The CIO and IT staff need to think ahead of time about making changes to meet the changing business needs, ensure incremental evolution of IT services and platforms, gain new skills, and empower IT to influence in real time.

Recommendations

Work with business leaders to focus on creating a culture of peer learning and mentoring.

Develop a plan for expanding skills at each stage based on the pace of evolution that can be foreseen.

Build partner networks to fill skill and competency gaps.

Due to the increase in the number of cyber threats and the need for new functionality, 65% of enterprises will intend to modernize their legacy systems and invest in new technology platforms by 2023. Updates and support for legacy systems will not keep pace with growing cyberthreats and costly upgrades, but convincing business leaders to upgrade their systems will be challenging. It seems more realistic to implement new functionality and capabilities.

Recommendations

Prepare a business scenario that reflects critical business needs, such as improving customer experience, to justify the cost of a large-scale legacy replacement.

Develop an optimization and modernization plan, get the support of line managers.

Use security first architectures and design approaches to avoid new security vulnerabilities.

By 2023, 70% of IT services will use a containerization strategy and API, and will also try to expand the portability of applications and improve hosting flexibility. Successful organizations will implement containerization strategies and redouble their efforts to leverage APIs and microservices to further modernize, automate procedures, ensure compute independence, isolate applications, improve quality, and increase scalability. CIOs who do not use container-based approaches will feel the lack of flexibility, mobility and scalability, which will ultimately lead to a significant loss of competitiveness.

Recommendations

Microservices, together with containers, should form the basis of architectural models for all new applications.

Implement and extend DevOps for continuous evolution.

To meet the demand for on-demand compute resources, use serverless models and features that are provided as services.

Until 2022, 70% of IT services from implementers and operators will turn into designers and integrators of digital solutions and will define each product, service and process. The challenge for IT is that line units, through vendors, will begin to strengthen their role in technology creation and deployment, regardless of the nature of IT support, which will also change. If IT managers refuse to change roles and responsibilities when implementing technological solutions in line departments, the consequences for them will be very sad. It is much better for the CIO to plan and manage the transition in collaboration with line leaders.

Recommendations

Build a digital platform and API strategies to enable secure and fast integration of diverse applications and systems.

Invest in in-depth design and user experience expertise.

Create centers of excellence for selecting and validating digital software and tools.

By 2023, 80% of organizations will accelerate software development. This will deploy updates and review code at least once a week. Many IT departments have already moved from waterfall to agile application development (at least in theory), but so far they are not always able to cope with the rapid implementation of reliable code in small chunks to continuously create new business value. IT departments should be able to deploy updates every week, even if only individual applications need it. The CIO needs to redouble efforts to move towards true agile development and DevOps.

Recommendations

Think about products and business results, not projects.

Use a modular approach to improve adaptability.

Accelerate DevOps adoption, continuous integration and deployment.

Trust subordinates to search for new approaches to the creation and implementation of software.

By 2022, 40% of CIOs will lead innovation in their organizations. The choice of CIOs as leaders in the digital transformation process is quite logical. They are uniquely positioned to be innovative leaders, have a deep knowledge of digital technology, are able to predict business changes driven by new technologies, and, more importantly, understand how business works. IT leaders who are successful as an innovation leader are able to articulate their digital vision and engage others in its implementation. The technical savvy of IT professionals remains essential, but their success will depend on their ability to communicate, build relationships, and deliver on their commitments.

Recommendations

Form the foundation for reliable delivery of IT services and prevention of potential problems.

Promote a digital vision co-developed with line leaders.

Highlight limited but significant digital initiatives and demonstrate their business value.

Through 2022, the introduction of artificial intelligence tools to expand, optimize and accelerate IT operations will remain a major transformation initiative for 60% of corporate IT services. IDC's August 2019 CIO Sentiment Survey showed the following. Representatives of 54% of organizations are convinced that artificial intelligence is of significant value for automating IT operations and optimizing IT. The challenge for CIOs is not to automate IT, but to focus on the opportunities that deliver the most value. The CIO should start by defining his strategic goals, such as cutting costs, realigning talent, increasing IT capacity, and the like.

Recommendations

Partner with universities, consortia, start-ups, other organizations and alliances to increase the number of AI specialists.

Automate AI operations and initiatives to connect disparate components and streamline processes.

Make service quality an important metric for the effectiveness of your automation operations.

By 2024, 75% of CIOs will rethink the resources available to them, in particular budgets, assets and talent. Allocating resources in real time and ensuring enterprise agility will result in huge cost savings. CIOs strive to speed up processes and increase their agility, but face various obstacles. The most significant of these is perhaps the lack of flexibility in allocating the necessary funding and resources. Flexible resource allocation is a significant competitive advantage for CIOs. It is the essential foundation for achieving true organizational agility, which is one of the top priorities for IT transformation among CIOs.

Recommendations

Work closely with HR and Finance to build new systems for recruiting, performance management, and budgeting.

Keep in touch with line managers, create technologies to synchronize resources and budgets for IT and line departments.

Leverage flexible cycles for continuous planning and balanced IT resource allocation.

By 2023, 60% of CIOs will implement employee development programs approved by senior management. After a series of failed, scattered and unrelated employee engagement initiatives, the most effective CIOs will embark on strategic, targeted programs that include lifelong learning, engagement and innovation in digital workspaces. Immersive experiences and workspaces will drive productivity growth and attract the best talent. In most cases, such programs are a critical component of enterprise initiatives.

Thursday, September 3, 2020

European information security standards in Ukraine

The Verkhovna Rada of Ukraine adopted the law “On Amendments to the Law“ On Information Protection in Information and Telecommunication Systems ”regarding confirmation of the compliance of the information system with information protection requirements cloud architect.

The law on the territory of Ukraine adopted the requirements of the ISMS family standards for certain categories of information, the protection of which is ensured by the legislation of Ukraine. Also, the law has amended the basic requirements for the protection of information, as well as the criteria for establishing compliance with these requirements.

Corresponding changes were made to the Law of Ukraine "On Information Protection in Information and Telecommunication Systems" and for the most part affected the ways of confirming the compliance of the information system with information protection requirements by establishing appropriate criteria.

The explanatory note to the above document states that the main purpose of the adoption of this law is to integrate European requirements and criteria for assessing information protection against cyber threats with the Ukrainian legislative data protection system. Standards that regulate data protection issues, cybersecurity - information security management systems, ISMS (Information Security Management System, ISMS).

The law touched upon the main topics of protection and exchange of information, such as cryptographic protection of information. The law established the main points and requirements for placement, storage of basic information resources, their protection and other regulatory requirements, both general and industry-specific.

The adoption of this law is undoubtedly a step ahead for information security in Ukraine. The implementation of international standards, European ISMS will provide uniform cybersecurity requirements for companies of all sizes, thanks to a single independent standards base. Also, this, unambiguously, will facilitate the procedure for confirming the compliance of systems with information security requirements, as well as public procurement in government agencies and organizations where information protection is ensured by law.

Webinar Risk Management. ISO 31000

Any business faces risks in its activities. Risk is at the heart of all management decisions. Everyone treats risks differently: some try not to notice them, some avoid them, but only a few systematically and consciously manage risks. Risk management is a process necessary for every company, especially those who are preparing for an IPO (Initial Public Offering), as well as financial structures to obtain licenses for their activities.

On August 26 at 10:00 (Kyiv time) we  invite you to the free webinar  “Risk Management. ISO 31000 ” ,where we will present our NT-RM31000 Risk Management course . ISO 31000 and explain the principles, structure and process of risk management to effectively identify opportunities and threats.

At the webinar, we will consider: amazon solutions architect certification

Consider the ISO 31000 series of standards

Scope, terms, principles and definitions of risks

The structure of the risk management system

Risk management processes

Tuesday, September 1, 2020

Heterogeneous virtual environment management

Microsoft and TechExpert are inviting virtualization experts to a hands-on workshop on the practice of managing virtual heterogeneous infrastructure. This event will be useful for those companies that face the following challenges.

Management of virtual environments from different manufacturers (Microsoft, VMWare).

Integration of virtual environments into a single managed space (unification of server infrastructure management).

Implementation of Hyper-V / SC VMM technology in the presence of virtualization infrastructure based on VMware.

Reducing the cost of managing a heterogeneous virtual environment.


What does a cloud architect do

The peculiarity of this master class is that a virtual server infrastructure will be deployed as part of a large-scale test laboratory, combining a number of the most common products. In particular, the infrastructure will include products from vendors such as Microsoft, VMware, Citrix, Hewlett-Packard. As part of the master class, options for complex management of this environment are proposed. The test lab will demonstrate the key planned and emergency situations that are most often encountered on real servers.

Special attention during the event will be paid to the latest infrastructure management tools from Microsoft System Center - in particular, Microsoft SC VMM 2012, SCOM 2012, SCCM 2012 and the latest product - System Center Orchestrator 2012. At the same time, the most interesting features of Virtual Machine Manager 2012 will be able to try it yourself - each participant will have at his disposal the necessary tools for the implementation of several key scenarios (within the framework of mini-laboratories).

The speaker at this event is the architect of infrastructure solutions from TechExpert, who has played various roles in a number of virtualization projects based on various platforms, including those presented at the event.

Venue

TC "Network Technologies", Kiev, Pobedy Avenue, 53a

Date

4-7 October 2011

Duration

1 day (8 hours)

Target audience of the

Company with at least 500 PCs, developed server infrastructure (at least 10 servers).

Trainees

IT managers, heads of departments and leading specialists responsible for the development and management of infrastructure

Participation fee

Free, by this invitation

Organizers

Microsoft

Company TechExpert Company

The

Activity format implies several key elements in the format:

demonstrations (within the test laboratory),

independent laboratory work,

mini-presentations.