In may, 2020 on the 2020 fair Build, Microsoft announced the launch of the cloud Microsoft Cloud for Healthcare in the status of accessibility for users from 28 October 2020 with combining components such as Azure, Microsoft 365, 365, and Power Dynamics Platform.     Microsoft has prepared this cloud for its healthcare Department to process structured and unstructured data about the health of platform users and provides customers with very wide opportunities and options: from various bots for interacting with AI to protecting patients with reduced immunity for various reasons from any epidemics and intra-clinical infections using virtual doctor visits, with a full set of protection, including personal data of those who Microsoft said in a statement that Microsoft…

(More...)

The Linux Foundation, a non-profit company, and the edX training system published an analysis of demand for open source software development specialists and trends in this area in their 2020 Open Source Jobs Report.     Ignoring the coronavirus pandemic, the search for specialists with development skills in open source technologies not only continues to be high, but also shows steady growth.   Companies are constantly increasing the number of vacancies and recruitment of employees, while offering expanded educational opportunities for existing employees in order to further develop their competencies.   Approximately 93 % of headhunters admit to difficulties filling such vacancies as open source software developers, and in 63% of cases, it turned out that their companies launched open…

(More...)

According to data from the analytical report of J'son&Partners Consulting on the network security market (indicators for standard products were considered, as well as the consumption of Security as a Service (cloud security services)), with the forecast horizon until 2025, the global volume of services reached $ 26 billion in 2019, of which cloud information security systems accounted for 24%, that is, about $6.2 billion.   At the same time, the market for information security and cyber security services is expected to grow by at least 11% in the 2020-2023 period and reach a volume of $ 40 billion by 2023.     Analysts believe that as a driver of growth, cloud models will be able to show growth in…

(More...)

IBM Corporation, which started as a hardware manufacturer, is moving even more to the side, increasingly moving into the service sector, in particular, at this time – in the cloud service.   IBM has announced plans to spin off a separate public company as a division with the function of managing infrastructure services. It is expected that the annual revenue of this new company will be about $ 19 billion, and will focus on hybrid cloud applications and an artificial intelligence system.   According to the company's CEO, Arvind Krishna, the procedure for allocating resources for the formation of a new company with the provisional (conditional) working name NewCo (new company) will be completed by the end of 2021.  …

(More...)

Google published an open letter in response to a lawsuit filed by the US Department of justice related to violations of antitrust laws.   In response to the main articles of the charges, Google said that the search engine chosen by users is a conscious choice, and not out of necessity due to the lack of analogues in the market and the information infrastructure itself.     In Google believe that such complaints can, in the end, only hurt end-users of the services of the Corporation because the company's engineers work tirelessly to improve the search results, and claims and power structures based on the controversial arguments, not covering complete the picture as a whole, that creates grounds for abuse…

(More...)

The non-governmental organization Amateur Radio Digital Communications (ARDC) from California (USA) sold 4 million IPv4 addresses to Amazon for $108 million. Amateur radio at one time was allocated in the network 44 (44.0.0.0/8), also familiar to many users under the name AMPRNet, a certain set of addresses for research and experiments with digital communications. The coordinator was the non-profit organization ARDC.   The block (44.192.0.0/10) of approximately four million AMPRNet IP addresses out of the 16 million available was sold to Amazon by ARDC in mid-2019, but only now has the transaction value been announced. Amazon paid ARDC approximately $27 for each IPv4 address. "The non-disclosure agreement with Amazon, which related to the sale of our redundant IP addresses, required…

(More...)

Nokia and Google Cloud executives have signed a strategic partnership agreement that will see NOKIA move its it infrastructure to the Google Cloud over the next five years. The agreement stipulates that NOKIA's data centers and SERVERS will be relocated from all over the world, including various software components.     As presented in Nokia's press release, this transaction shows the direction of growth trends and the desire for stability in the direction of an IT strategy focused on the latest modern cloud technologies, as well as efforts to actively strengthen and match the time in their digital aspects of activity, which also provides additional opportunities for both cooperation and employees of the company, while improving the quality of service…

(More...)

The Freedom House research group stated in its report that many governments are using the coronavirus pandemic to tighten control over Internet Users.   They believe that the situation of real freedom of speech and privacy has steadily deteriorated over the past six months.     It is also noted that during the restrictions and special conditions of activity during the pandemic, society has become much more dependent on digitalization, and the Internet itself is more controlled by various structures. This trend has continued since 2010.   The analysis was conducted for 65 countries around the world, and the conclusion of the study is that the most difficult situation is in China. According to the Freedom House group, officials in…

(More...)

Due to the release of the iPhone 12, according to surveys, many users choose the iPhone 11 that has fallen in price to $ 600…   After the announcement of the iPhone 12, the Barclays Bank analytical group reported a decrease in the short-term profitability of Apple shares with a decrease in the average selling price of smartphones from the latest line. This information caused the target price of the company's shares to be significantly lowered.     Despite all Apple's attempts to reduce the cost of its new smartphones by actions such as removing the 12-wire EarPods and power supply from the iPhone package, analysts at Barclays Bank believe that this will not recoup the costs incurred by the…

(More...)

Sophos researchers, who have been specializing in the security of IT systems for quite a long time, have identified and described a new type of phishing attack that is characterized by an extremely atypical design- namely, the absence of links in the email text.   Such a non-standard approach significantly advanced the attackers in deceiving even highly doubtful users who did not recognize the threat in such mailing messages.   Usually, the standard mechanism of the algorithm of a typical phishing approach schematically consists of three stages: - the end user receives a special email with an embedded link leading to a fake site; - when you click on the phishing link specified by the user, a web page opens…

(More...)

There is an opinion that Google uses its resources based on its dominant position in the information technology market in terms of search and control over the Android OS to increase its share in browsers – meaning Chrome.   During 2020 alone, several investigations were conducted against the IT giant (a series of which, however, were initiated against other major technology companies). The antitrust case against Google is currently being investigated by the US Department of justice – and one of the aspects being considered is whether it makes sense to force the Corporation to sell Crome and part of its advertising business… The Ministry of justice is considering such a proposal in preparation for an antitrust trial that began…

(More...)

Over the past few years, there has been a breakthrough in technologies that can significantly reduce power consumption in computer systems.   A team of chemists and physicists from the University of California, Berkeley, reported the creation of a metal-like wire made entirely of carbon. This detail was the last in the Arsenal of tools that allow you to start making carbon-based transistors. The researchers say that they worked on the new technology for several years, and eventually they were able to make semiconductors and insulators from graphene nanoribbons, which are narrow strips one atom thick.     The silicon structure of modern transistors has long required modernization – more than 40 years. At this time, the limit of performance…

(More...)

IPO mania and high investor activity recently suggests that a repeat of 2000 is not far off…   They are already comparing the jump in profitability and capitalization of digital industry giants with the boom of the late 20th century, which preceded a sharp drop-then in a short moment the value of such large companies at that time, such as Cisco, Intel and Oracle, fell by 80%, and the recovery to the previous level took about 15 years on average.   This was a period of the Domino effect of many failed companies in a chain, when one pulled the other, and also many simply failed separately.   Despite the speculative nature of the modern market, many investors, however, in…

(More...)

Nvidia has decided to share its plans for developing its own strategy for the next few years, during which it aims to create a new type of chip designed for use in data centers.   The main breakthrough in the proposed technology is the independent execution of those functions that are currently involved through solutions created by Intel – NVIDIA's main competitor.     This also applies to Intel chips that are used in video game graphics, but recently they also solve problems of artificial intelligence, even with image recognition.   Typically, the chips are installed in conjunction with Intel CPUs, which take over some of the computing, but NVIDIA wants more.   "Using artificial intelligence, the chips can detect…

(More...)

This is the opinion of Eric Reidmond, co-founder of the Open Source Initiative and author of "the law of Linus "and the book"Cathedral and Bazaar".   Indeed, his arguments make you think... Eric says that the direction in which Windows is moving is to become an emulation layer on the Linux kernel. This is the result of many steps that Microsoft has taken since the time when Android was still "underdeveloped" - it was only designed and actively tested, but even then components from Linux began their way to Windows 7 (under the guise of such names as "support for the UNIX printing subsystem "and"extended network support"). Thus, starting with the integration of network protocols, *nix began to be implemented…

(More...)

In 2020, many previously widely unused technologies, thanks to the development of the situation in the world and contrary to the forecasts of analytical agencies for 2019, finally began to grow and fully work in the global industrial space.   What can be attributed to industry? With the arrival of IT technologies (data centers, cloud solutions) in almost all areas of our life, up to the concepts of "smart cities", autopilots in taxis, sea vessels and mining equipment, it is already difficult to surprise anyone with something new.   However, the field of biotechnology has been hidden from public attention for a long time due to its knowledge intensity in terms and definitions – for example, genetic engineering is still…

(More...)

Since 2019, many mobile operators around the world have predicted the development of 5G networks by leaps and bounds – only in reality, despite the brave start of the service, everything was not so rosy.   The most interesting thing is that the operators planned very large investments for various projects related to the development of fifth-generation networks, but many factors, including the coronavirus pandemic, made their own strict adjustments to their plans.     Even at the level of initial calculations for the payback of building networks of this level, it was clear that the return on investment would not be as fast as it was in the case of third – and even fourth-generation networks-then there were completely…

(More...)

The United States district court (judge Carl Nichols) temporarily suspended the ban on TikTok, which was supposed to take effect on the order of US President Donald trump by granting a request from ByteDance.   In practice, this means that ByteDance (and, accordingly, TikTok) will have additional time to settle the process and get approval from both Chinese and American regulators to bring it into compliance with all the norms and requirements of both technical and legal nature on both sides of the unfinished transaction for the sale of the Oracle and Walmart service.   From the background: On August 7, trump signed a decree requiring the sale of the service to US companies by mid-September 2020 ("On combating the…

(More...)

In recent years, the development of AI (artificial intelligence), coupled with ML (machine learning), has shown completely different horizons in the field of corporate IT technologies- and this applies to absolutely any field of activity of companies.   Data processing has turned from routine operations in modern data centers into a rather exciting process that affects the interests of completely previously disjoint segments of business processes.     According to data for 2019, 37% of enterprises use AI to some extent when analyzing their work processes, which gives an increase of 270% over the past 4 years.   Such an opportunity, such as collecting data to form business ideas, inspires many minds and shows the real potential of technology that…

(More...)

The UK's largest trade Union, Unity, has strongly criticised the sale of ARM to NVIDIA. According to their assumptions, this will lead to the reduction of thousands of jobs.   Unity also appealed to the government to block the deal because of the potential threat of disrupting the growth of the country's technology sector.   So do some politicians, in particular, and Edward Miliband.       Unions and politicians also don't believe in NVIDIA's long-term policy, with its promises to preserve the location of ARM's headquarters and plans to build a research center in Cambridge with a supercomputer based on ARM processor systems.   They also suggest that after the full package of conditions for this deal comes into…

(More...)

In the fall of 2020, Apple plans to debug the full-scale industrial release of its A14 processors, which finally fully use the latest 5-nanometer technology (TSMC).   As part of the annual technology conference, the main details of both 5-and 3-nanometer processors were presented.   Based on the fact that Apple processors are manufactured only by Taiwan Semiconductor Manufacturing Corporation (TSMC), which is paid very good money by Apple to ensure that their latest products (iPhone and iPad, with the addition of iMac in the near future) use only the most modern technologies developed by TSMC. At the annual technology conference TSMC Technology Symposium, the announcement of production process optimization was presented, which is already beginning to draw a General…

(More...)

In connection with the upcoming release on the market in November 2020, Microsoft Corporation launches its new cloud service Xbox Game Pass Ultimate.   Since at this time it is also planned to start selling Xbox Series S and X game consoles, such a step to open a cloud gaming service, according to the Corporation, should significantly increase Microsoft's competitiveness in the confrontation with Sony's consoles.   Most importantly, to participate in games for Xbox consoles in the new mode, you do not even need to purchase the console itself.   The fact is that, in addition to Xbox consoles, the Game Pass Ultimate service will support the game on devices with the Android operating system with the appropriate game…

(More...)

In the official channel (blog) YouTube on September 14, it was reported that the video hosting company plans to launch the latest platform on which you can create and publish short videos.       This service, apparently, to some extent copies the functions of the TikTok app, and will be called Shorts.   It will be aimed at fans of recording short videos on a smartphone, and also as a bonus will give them the opportunity to overlay music, various special effects and develop networks of subscribers.   The experimental springboard of the service, where beta testing will take place, is planned in India-there is an atmosphere that is quite conducive to such tests – this means a direct…

(More...)

While there are marketing wars between major players in the field of various high-tech products-NVIDIA has acquired ARM-the main developer of mobile processors.   The transaction became known from the information posted on the company's official website. As it became known, the industry giant will need to pay the previous owner (SoftBank) 21 billion dollars in shares, as well as 12 billion in cash.     This gives SoftBank the opportunity to potentially earn another $ 5 billion from future earnings. In addition, SoftBank employees should receive a total of about $ 1.5 billion due to additional obligations under this transaction.   The final transition, after complying with all the rules and getting all the approvals from regulators in the…

(More...)

Google is constantly improving its system of apps and services to make them easier to use. This often happens unexpectedly for users who themselves do not know how much they needed the new feature implemented by Google – the company processes a huge amount of information in order to analytically, at the tip of the pen, understand the nuances of user interaction both with the interface itself and within the program system… That is, in the near future, users will be able to exchange applications without an Internet connection, that is, they will be able to send applications downloaded from Google Play offline, using the P2P data transfer Protocol, completely without using any intermediate third-party services – the implementation of…

(More...)

For sure, almost any modern person who uses Whatsapp for everyday communication in various networks knows the expression "text bomb".   This expression describes a message in a special format that causes the app to freeze or even restart a smartphone running both Android and iOS.   Not so long ago, journalists discovered entire "factories" for the production of such messages. And although the problem itself is several years old, there is still no clear explanation of the reasons why "enthusiasts" make such messages and send them to other users. At this time, Whatsapp developers can not completely eliminate the ground for exploiting such a vulnerability, and the reason is not in the desire to continue this epic: when a…

(More...)

Owners of marketplaces (for example, such as Google Play and the App Store) can legally prohibit vicious internal policies that lead to antitrust violations and discrimination against business partners, which are SOFTWARE developers.   Having reasoned philosophically and applied the usual logic, Russian parliamentarians submitted one draft law to the State Duma of the Russian Federation on September 1, 2020.   The idea is to regulate the activities of marketplaces: in particular, to deprive companies that use app stores, including Google and Apple, of half of their profits by reducing the Commission for developers, as well as all additional quarterly payments.     Also, one of the provisions of the bill suggests that the owners of marketplaces will be required…

(More...)

Recently, various background information around the Epic Games and Fortnite, became interesting for the attention of cyber communities facts – who and how is trying to use the warmed-up audience to their advantage – and, strangely, all versions have as their object under the pretext lighten the wallets of the naive audience. Some plan to do this right now, and others-to convince that the constant overpayment of several tens of percent is for their own good… Eset, an information security company, for example, has received data about phishing in order to collect credit card lairs using the Fortnite brand.   The main page of the phishing site has a list of 150 addresses associated with Fortnite. They fuel interest and…

(More...)

After the may update of Windows 10, the antivirus built into the operating system received a completely original and potentially dangerous feature – namely, the ability to download files from both the local network and the Internet via the command line.     After conducting a security study of this function, it turned out that it was possible to download a file that the antivirus would not have missed – that is, the built-in antivirus does not check the downloaded files…   Thus, a security expert (Mohammad Askar) was able to download "Cobalt Strike" (SOFTWARE designed to test system protection) in this way (via the download function in the Windows Defender command line). Initially, the Cobalt Strike program is designed…

(More...)

By degree of relevance:   the game Crusader Kings 3 was deliberately released by developers without DRM protection — it even works multiplayer…   Paradox Interactive, releasing its strategy Crusader Kings 3, from the first minutes attracted the attention of several thousand gamers who subscribed to the game page in the CrackWatch service… But they were expected to be very disappointed-the developers refused to protect the game in any way.       In the discussion, it was reported that when you log in to your Paradox account, including on an illegal copy, you can start multiplayer.   As for the popularity of the game-the Steam version is in a record position for online - in the first few hours,…

(More...)

At this time, The Tiktok buyer is expected to be announced to the General public within the next 24 hours.   Among the possible bidders to acquire TikTok assets in Australia, New Zealand and the United States are such whales as Microsoft together with Walmart and Oracle.   Interesting fact: due to recent changes in the export legislation of the PRC-bytedance Corporation (owner of TikTok) you will have to go through the procedure of obtaining permission from the Chinese authorities before purchasing part of the company in the United States.       At this time, it is known that ByteDance has previously decided on buyers – but only Microsoft, Walmart, and Oracle have so far refrained from any comments…

(More...)

Apparently, everyone is thoroughly fed up with cheaters – their manner of behaving in cyberspace from the position of having exploits for purchasing in-game currency finally upset the company Rockstar, which cleared GTA Online of such "players" at the end of August.       Several tens of thousands were" reset" (!!!) accounts – the company's developers brought out of the shadow economy, the enormous wealth of exploit exploiters…   For example, the glitch of buying an apartment or garage made it possible to get millions of game dollars in half an hour or less. The effectiveness of this approach, which clearly violates the principles of game equality and the agreement with the company itself – which, as usual, no…

(More...)

Developers of US universities from the States of California and Iowa, as well as from Mozilla Corporation, offered a program to a wide audience to determine whether the browser can be tracked by its "fingerprints".   For information: now standard cookies are not the only way to identify a user and track their behavior. Currently, many sites use the so - called "fingerprint" - a set of unique information about the browser configuration and settings to identify and track the user, even with cookies disabled. The FP-Inspector program is designed to recognize site attempts to track the browser by its "fingerprint" and block such actions. Machine learning technologies are used in combination with dynamic and statistical analysis methods, and the…

(More...)

Apple blocked a recent Facebook update on Thursday that revealed the payment structure for in-app purchases.   Thus, the opportunity to provide users with information about the 30% tax in the App Store for customer purchases via the social network was covered.   Facebook felt that, especially given the overall economic situation in the world due to the pandemic, it would be useful for people to find out exactly how their payments are spent – that is, where the funds actually flow. "Now, more than ever, we need to be able to help people understand where money really goes. Unfortunately, Apple rejected our transparency notice regarding its 30% tax, but we are still working to make this information available inside…

(More...)

Sony has started registering applicants for the purchase of PlayStation 5 game consoles. You will be able to register to pre-order one of the first next-generation consoles from a limited batch.   "There will be a limited number of PS5 consoles available for pre - order, so we will be inviting some of our existing consumers to be one of the first to pre-order one of the PlayStation," Sony said on its new registration site.       "Pre-orders are accepted on a first-come, first-served basis, so as soon as you receive an email invitation, we recommend that you follow the instructions and act quickly."   In other words, you will need a PlayStation Online ID to register. Sony requires…

(More...)

When Apple announces the new iOS 14, analysts predict risks for the advertising industry.   Now, after the release in September 2020, all apps installed with the App Store must explicitly get the user's consent on whether they agree to "share" (that is, provide data about themselves) with advertising platforms (that is, first of all, analytical databases that accumulate data about the client).       In order to assess the importance of what is happening, let's analyze the current system for purchasing ads on Apple mobile devices.   Question: what does the user care about all these purchases and what does this have to do with practical digital side effects for specific consumers?   Let's assume that most users…

(More...)

Since August 13, 2020, the heated controversy that arose as a result of a long-standing contradiction in the policy of such giants as Apple and Google in relation to software developers has not subsided. The financial foundations of these corporations are based on basic principles, which are the constant collection of 10 to 30% of all payments from digital products sold in their stores. Of course, no one disputes the fact of their merits in the organization and investment in the development of their operating systems. But at the same time, we should not lose sight of the fact that many startups with minimal profitability and unique offers on the market due to this policy can not get proper development,…

(More...)

Despite massive attacks on Citrix and Pulse Secure VPN to hack corporate networks in the first half of 2020, however, the RDP remote desktop Protocol remains the undiminished leader.       Attacks on the corporate sector - became statistically record high until August 2020.   The three most exploited attack areas in 2020:   - to compromised RDP endpoints; - email phishing and - use of corporate VPN devices. Thus, attacks on RDP today are switched from access to home computers and systems to corporate, which is quite natural: having received compromised access points to home computers, with the accumulation of information-the number has grown in quality-to corporate (including by extracting information about corporate RDP access points from home…

(More...)

According to a published report by Dell, penetration into the cyber environment using vulnerabilities at the hardware level has recently become quite popular among hackers. Not to say that this was such a closed topic – these vulnerabilities have been known for many years; but only now, with increased protection at the software level and implemented everywhere corporate systems for tracking security loops-such options as the use of loopholes in the hardware of both computers and network equipment have become more relevant.         At the same time, despite the critical nature of the level of attacks at the hardware level, only 59% implemented a hardware protection strategy. And this is despite the fact that 63% of companies…

(More...)

"The most successful person is the one with the best information."  Benjamin Disraeli     Seagate Technology PLC has published a report on data usage. It was compiled after a survey of 1,500 leading companies in the world (500-Asia-Pacific region with Japan, 475-Europe, 375-North America and 150-China).   Data is a reusable representation of information in a formalized form suitable for transmission, communication, or processing (defined by ISO/IEC 2382-1:1993).   When increasing the accumulation of volumes of relevant data, the quality of management and their use is important. IDC estimates that company data will increase by 42.2% per year in the coming years.     What the study made clear: only 32% of the data is used by corporations to…

(More...)

At the WWDC 2020 conference, Apple released information about the plan to switch over the next two years on computers with chipsets from Intel to products of its own design and production. The architecture, according to the company's previous statements, is ARM. In addition, AMD's products (in terms of graphics accelerators) will also lose their relevance in the light of Apple's own solutions.     However, it is unlikely to expect the announced integrated graphics accelerators from Apple in the near future – according to official plans of the company, even in 2021, MacBook Pro 16 laptops and iMac monoblocks will use Central processors from Intel and AMD Radeon graphics will be used. The latest computer models, at the same…

(More...)

Google is working hard on the third operating system after Android and Chrome OS. This is an open source real-time operating system called "Fuchsia". The OS first appeared in August last year, but then it was just a command line. Now the mysterious project has a crazy new interface that we can take a look at. Unlike Android and Chrome OS, Fuchsia is not based on Linux - it uses a new microkernel developed by Google called "Magenta". With Fuchsia, Google would abandon not only the Linux kernel, but also the GPL: the operating system is licensed as a combination of BSD 3, MIT, and Apache 2.0. Abandoning Linux may cause some shock, but the Android ecosystem seems unwilling to…

(More...)

After offering to pay in the game Fortnite in its own payment system, first Apple, and then Google removed the ability to both download and update from their stores...   The launch and direct offer to pay directly, bypassing the Commission of the IT giants, which is 30%, in fact, was a Declaration of war. Application developers from all over the world have repeatedly raised the issue of this Commission over the past few years, considering it unfair – as in the end, many startups do not go to launch, and existing applications eventually get their mark-up out of the pocket of users, which negatively affects the ability to continue supporting and updating.   At this time, the official reason…

(More...)

The Russian Antimonopoly regulator FAS (Federal Antimonopoly service) has declared Apple a violator – the regulator said that the company abused its dominant position in the iOS app market by restricting third-party apps in the App Store using non-competitive methods. Similar lawsuits against the IT industry giant have been filed in many other countries in Europe and Asia. Russia also issued a court decision on a complaint filed last year by Kaspersky Lab in relation to the parental control program Kaspersky Safe Kids (KSK). Interestingly, the FAS of the Russian Federation made such a conclusion from the review of the materials that Apple reserved the right to reject the application of a third-party developer even if it fully meets the…

(More...)

Artificial intelligence began to be actively developed about ten years ago, when the power of computers allowed us to conduct large — scale calculations and engage in so-called deep machine learning-to download large amounts of information and calculate them.   However, now the development of neural networks is under threat. The University of Massachusetts found that to increase the productivity of existing models of artificial intelligence only 10 times will require a total of 100 quintillion (10 to the 20th degree) dollars — this is 100 million times more than all the money in all countries of the world combined (according to various calculations, this is about 60-80 trillion (10 to the 12th degree) dollars).   Scientists found that from…

(More...)

Today, there are many hidden threats to access levels in various IoT devices – this has been widely discussed recently. But few people imagine the real state of Affairs: all those small devices that have a real operating system, which the average person does not even know that it can be here – in cars, planes, space satellites, as well as in printers, cellular cards, Bank card chips, and, finally, in pacemakers – can be subject to hacking and unauthorized access, and not only to them, but also to those systems where these devices have access by default. This can be both personal computers of specialists and company servers, as well as cloud services. That is, pacemakers, insulin pumps for…

(More...)

On August 6, 2020, President Donald trump, in his letter to the speaker of the House of representatives and the President of the Senate on countering the threat from TikTok, presented facts that, in his opinion, pose a threat to the national security of the country under the international emergency economic powers Act and the National emergency law.   All this data is reflected in an Administrative order that launches additional measures regarding information and communication technologies by the Chinese company ByteDance Ltd and Its Tiktok application.     In addition, another Chinese app, WeChat, owned by Tencent, also poses a threat to the economy and national security. The key points of the President's address are as follows: - automatic…

(More...)

Since the summer of last year, the voice assistants of the IT industry giants have begun to undergo changes after several major data leaks. It is no secret that companies such as Microsoft, Google, Amazon, Apple and Facebook have recently passed "deanonymized" voice message data to their contractors for processing. As we have already found out, this deanonymization of messages is very superficial – that is, with minimal analytical abilities and basic knowledge in the field of IT, it is quite possible to fully authenticate each individual user – whether it is Siri, Cortana, Skype, Alexa or Google Assistant. All this data, as previously reported, contains a set of data that is not processed properly: that is, knowing the IP…

(More...)

Microsoft made the decision to install service packs before the final build of 2004 and may 2020, bypassing the explicit consent of operating system users. This forced update is a prerequisite for maintaining technical support after 2020.   In order to determine which version or build of Windows is used on users ' computers, the company first began using an artificial intelligence system. In other words, all previous versions that, according to Microsoft, do not meet the requirements of confidentiality, security, and software flaws in the operating system will be updated.   However, support for the Enterprise and Education versions (enterprise and education, 1890 and 1903) will continue until may 2021. For other users, the support period will be limited…

(More...)

Potentially, changing one processor platform to another, in this case – from Intel to ARM architecture – is an unpredictably lengthy process that includes both technological and financial and marketing aspects of the company's activities.   Of course, the main question is why is this transition happening? Why is Apple switching to ARM, especially its own production?   The new name of Apple's ARM processors is "Apple Silicon". This, as well as the fact of avoiding the use of processors from Intel, was announced at WWDC 2020. The transition is planned to be implemented gradually, over 2 years.   The decision to change the processor platform was officially made to strengthen the position of autonomy and management of the bundle…

(More...)

"Bloomberg" and "new York times" through their sources provided information about the conduct of "Microsoft" negotiations on the acquisition of the Chinese video application "Tik-Tok".   "Tik-Tok" has long been under attack from many governments, including in the United States, where President Donald trump recently announced plans to ban the use of this video application in the country. The essence of criticism from the trump administration is problems with national security, the privacy of underage users, and the possibility of the Chinese government's influence on the owners of the app.   And, although TikTok is not a public company, some bytedance investors value TikTok at about $ 50 billion, and The Times at $ 100 billion.   In the light…

(More...)

Apple has finally given iOS users the opportunity to become full participants in testing beta versions of new releases of operating systems for smartphones and tablets. Currently available for testing iOS14. There was also a parallel not so much with the interface, but with the features and functions that have long been implemented in Android, namely: The ability to place widgets in any place (page) on the desktop (and not in a specialized menu); The ability to place two widgets in the menu (in iOS13 and previous ones – strictly one in a row); "Picture in picture" video viewing Mode (although there is no official Youtube app yet, but this is easily fixed by viewing via Safari); Due attention to…

(More...)

The Xbox Series X could be a breakthrough gaming device. Microsoft's Velocity system improves the console's performance, taking its capabilities to the next level of development… Functionally, Velocity Architecture is a set of technologies from Microsoft designed to optimize data exchange in the Xbox Series X buses with the exception of" bottlenecks "- that is, on the principle of"the squadron moves at the speed of the slowest ship". The Velocity Architecture complex has four parts: SSD, hardware decompression of information, a new API for working with data on SSD, and a system for intelligent loading of textures in RAM. According to Microsoft, a set of measures to optimize the device will allow developers a greater degree of freedom, also when…

(More...)

One of the most popular content management systems is WordPress. Why? - easy to operate, there are thousands of themes and plugins, you can create any site. It is not surprising that with such a set of advantages, WordPress "lives" in 35 % of all sites on the Network. But the popularity of WordPress pays for those who often come to the attention of hackers. That is, the main focus when using - the protection of your WordPress site; and no matter, it is a personal blog business site. If we talk about WordPress security, users are usually divided into those who take security seriously and take all necessary measures, and those who rely on the case... To understand the…

(More...)

A major failure of Garmin services, presumably caused by the activity of the new WastedLocker virus, has been going on for several days. Representatives of Garmin do not confirm this information, but many researchers and specialists are inclined to this scenario, judging by the scale, structure and results of the attack. This failure has the status of a worldwide failure, and the Garmin Connect system used in synchronization with servers is not functioning, and the other functions of the devices are not violated. In any case, the company in the first hours referred to minor technical failures and problems, but then in its Twitter account recognized the presence of such a large-scale problem. According to the materials provided by DownDetector,…

(More...)

Against the background of high-profile fraud on the accounts of celebrities in last week's hacker campaign to collect cryptocurrency-additional research has shown serious vulnerabilities in the security of the social network. It turned out that, first of all, many employees, including those who are not directly employees of Twitter, that is, hired by third-party organizations (that is, at the second level of outsourcing!), had access to the level that allows you to change user privacy settings. New details are constantly emerging about potential security breaches, including the FBI investigation. That is, in fact, thousands of employees not only had access to account privacy settings, but could also change their access level when transferring their accounts in the course of their…

(More...)

In May 2020, a critical vulnerability was discovered in Windows DNS Server (code name - SigRed, identifier - CVE-2020-1350). According to the CVSSv3 (vulnerability assessment scale), she received 10 points out of 10. Such figures of this rating mean extreme simplicity in using error, operation does not require practically competence. It is possible to use this vulnerability, including for remote automated attacks, since no pre-authentication is even required. The vulnerability has existed for 17 years, and poses a danger to versions of Windows Server (2003-2019 vol.). During operation, you can send specific DNS requests to Windows servers, which will allow the execution of arbitrary code and can potentially compromise the entire structure. How the Windows DNS server handles incoming and…

(More...)

This was a "prank" to collect cryptocurrency, and the consequences could be much more serious. On July 15, 2020, a campaign was launched, attacking the Twitter accounts of many famous rich people (bill gates, Jeff Bezos, Kanye West, Barack Obama and Elon Musk). From their accounts, tweets were published about their alleged desire to "share" their assets with other users of the social network, and to receive them, it was necessary to send an amount to the specified bitcoin wallet, with a refund of twice within 30 minutes… "I return bitcoins to all my subscribers. And I will double the amount when sending the currency back. You send me 0.1 bitcoin and get 0.2 bitcoin back!" — it was indicated…

(More...)

It will also feature other new features, such as inserting information from messages with SMS passwords into browser web forms and a new animation engine. Today, Google has released its Chrome version 84-of course, with automatic updates from previous versions. There were almost no external changes – almost all of them relate to the browser's internal software (API, developer tools). Chrome 84 features updated APIs: the web OTR API and the AI animation management system, and some experimental features (with the API: Wake blocking, idle detection, and content indexing. Also, this version is the first release of Chrome that blocks pop-up notifications on websites that abuse this feature. Summarily: Web-OTP API-actually created by Apple, but Google has agreed to support…

(More...)

The twentieth century has pleased companies with the appearance of computer systems, starting from conducting bulk calculations on the first lamp devices, then with the appearance of personal computers and network computing infrastructure, which is now approaching the deployment of a completely different level of system in cloud clusters… But business owners and officials, due to their specific organization and strategy of thinking aimed at maximizing the optimization of processes in the conditions of capitalism and excessive verification of the correctness of investments – began to wonder by the end of the twentieth century – is everything so good with the consequences of computerization of business (processes, reporting, and others)?   It seems that everything from the point of view…

(More...)

Specialists of the it company "Trend Micro Incorporated" conducted their own research on the prospects of 5g network security - "Securing 5G Through Cyber-Telecom Identity Federation". In short, the conclusions are very disappointing, as for the security situation at the moment – it is possible to implement many types of attacks on such networks, from the hardware to the software level of penetration. Of course, many of these attacks are not immune to the current network – only the situation is changing radically due to the difference in data transfer speed and, as a result, in the efficiency of potential hackers. In particular it and software vulnerability on SIM cards, unauthorized roaming to connect to "need" a phishing cell tower…

(More...)

2019 brought an unprecedented growth of the technology industry – just look at the UPS and accumulated assets of BigTech companies during this time. Their expansive growth has started a new level of competition – the results we are beginning to reap now. On the one hand, this unprecedented growth of structure, which brought a good digital community only positive bonuses: the final victory of cellular standards (up to the history of the USB type-C), the beginning of a new start AMD, coordination of claims Qualcomm (for the benefit of smartphone users), which appeared in full claim to the giants of the digital industry from various legislative, regulatory and public bodies of the various States, and much more. Of course,…

(More...)

With 200 million native American users, TikTok, which has a simple user interface, background music options, and various special effects, has become a growing force on the national social media scene, and the ban has forced fans to look for options. Roposo, an Indian video-sharing social media app similar to TikTok that has been around since 2014, has seen its user base grow by 22 million in two days after India banned Chinese apps.     The number of roposo downloads on Google's Android currently exceeds 80 million, and Bhangadia expects it to reach 100 million in just a few days. Before the ban, Roposo had about 50 million installations on Android devices, making up the bulk of India's nearly…

(More...)

The order even blocks employees from being transferred to the American offices of their own companies.   Green card holders are not currently affected by the new order, but the administration says the immigration restriction order will leave 525,000 vacancies in 2020. Tech firms are resisting the trump administration after the President issued an order suspending the issuance of many types of work visas that allow highly skilled workers with families to enter the US and work for us technology companies. This information updates and expands on an earlier order issued in April. Both the April and June orders claim that hiring employees from other countries at this time would put the United States at an economic disadvantage, while the…

(More...)

The ban on Chinese short-video apps like TikTok and Likee has led to an increase in downloads of Indian 'clone' apps such as Trell, Bolo Indya, Mitron, Chingari, and Roposo, but the battle to replace them with India-made ones is far from over, investors said. Gaining downloads is just the first step, they said. Retaining users, getting them to create a digital footprint and making them addicted to the app is crucial in this 'winner takes all' market, they added. According to industry estimates, around 12-15% retention is considered good for a short video app. So, a few million downloads just does not suffice in the cut-throat industry, they said. "The kind of money needed for scaling won't come into…

(More...)

The internet is home to immeasurable numbers of dangerous malware and viruses. Being familiar with dangerous vices and practicing safe web surfing habits are extremely valuable in keeping your computer healthy, but only go so far. And with random acts of software sabotage being replaced with phishing, ransomware, and identity theft; employing competent antivirus software is more vital than ever. Kaspersky Total Security is in a league all on it’s own in malware detection. It also uses extremely little RAM allowing it to run 24/7 on your PC with inconsequential changes in your system performance. And although Kaspersky Total Security is renowned for it’s malware security, it hosts several other important features like payment/password protection and encryption, antivirus/antispyware, protection from…

(More...)

To those who don’t know, PowerShell is a scripting language and command-line shell even more powerful than Command Prompt. It has become the default option in Windows 10, and its strength and intelligence is what’s made it the preferred choice of IT specialists. The cmdlets (command-lets) is a versatile tool that allows you to execute many handy operations such as automating Windows and automatically running on a VPN based on the app being launched. The easiest way to launch PowerShell is through the taskbar by pressing Windows + X, then clicking “Windows PowerShell.” The Creators Update for Windows 10 allows PowerShell to be seen in the Power Users menu by default; if you don’t see it there iw would be…

(More...)

A new Google Chrome extension released by Check Point called ZoneAlarm Web Secure Free provides users with free protection from multiple dangerous vices on the internet. This is big news for everyone as it is rare to find something that can protect from phishing, malware, and viruses and it's completely free. By adding the ZoneAlarm Web Secure Free extension to Chrome, users’ default search engine will switch to Check Point’s ZoneAlarm Safe Search which is up to date on online threats and security risks, allowing you to observe the potential risks of any links brought up by your searches. Not only has it quickly risen to one of Google Chrome’s most popular extensions, but it has come to light at…

(More...)

With a massive spike in internet traffic during the quarantine, cyber criminals are letting loose many dangerous new viruses to target unassuming individuals. With Google Chrome being the most used internet browser of the last few years, the precarious new malware plaguing the web disguises itself as a Google Chrome browser update. The hiccup in employment and production as a result of the COVID-19 pandemic is affecting Microsoft just as much as any other business establishment; and as a result Google is postponing many of the release events it’s had planned for the near future - opting to prioritize the limited manpower to cyber security. Google Chrome users have been warned to watch out for the counterfeit browser update whose…

(More...)

Rumors have long circulated of Apple using system updates to slow down older iPhone models in order to compel users to buy new ones. These were recently confirmed in a US District Court in San Jose, California; and the settlement agreement is going to cost Apple anywhere between 300 and 500 million dollars. Owners of affected iPhone models will receive $25 per affected device. This sum could fluctuate based on how many people file their claims as well as legal fees and expenses approved by the court. This legal battle has gone on for over two years with Apple refusing to admit to their ruse. In 2017 the company admitted to using software updates in order to slow down older…

(More...)

An unexplainable glitch in recent IOS updates has consequently led to an overconsumption of data in many users’ iPhones. Users plagued by this issue are charged extraneous fees by their cellular provider and some are outright liable for stepping beyond their data contracts’ fair use policy. Apple has not resolved the issue in any recent patches; and the danger of the bug is that most consumers suffering from it will have no idea it is even happening (until it is too late). By navigating to Settings > Cellular > Cellular Data you may find an entry labeled “Uninstalled Apps” consuming data at an alarming rate. Even with Cellular Data shut completely off, many users report gigabytes of data being consumed…

(More...)

The infamous Paradise ransomware prevalent since 2017 has reemerged with a new strategy to sneak past Windows’ defenses and infect PCs. Their new approach isn’t recognized as malicious and once the infection commences users will be locked out of their entire system. Cyber security experts believe Paradise’s new malware is still in the prototype phase, not yet in its final beastly form. Paradise ransomeware’s new variant begins its transmission through phishing emails, generally of a commercial nature, in order to compel targets to open an IQY attachment. Internet Query Files (IQYs) are text files read by Microsoft Excel, which is why the majority of software wouldn’t block it or fly a red flag. These files however, download data from the…

(More...)

Several new leaks surrounding Apple’s smaller MacBook Pro may be good reasons to reconsider purchasing the laptop until the fully renovated MacBooks are released towards the end of this year. The future model is promised to veer away from the infamous butterfly keyboard as well as completely remake the display. The larger 16 inch MacBook Pro from last year delivered the scissor-switch Magic Keyboard, however Apple’s smaller laptop models still house the abismal butterfly keyboards that consumers have long complained about. If the lighter, more compact MacBook model is what you’re looking for it would be wise to hold off on any purchases until the consummated models hit shelves later this year. The new MacBooks are also reputed to operate…

(More...)

Malicious software has found a dangerous new method to infect users’ computers without them realizing a thing. The way in which these Trojans and Backdoor Malware are able to clandestinely corrupt your PCs without any notable indicators is now through bogus website security updates. The new phishing technique reported by Kaspersky has to do with Certificate Authorities, which exist to boost online security by acting as an encryption formula for communication between a browser and a server. These are common in e-commerce and aim to cosign trust in a domain. A substantial number of different websites have recently been compromised by two new nefarious programs called Mokes and Buerak. When a user visits a compromised domain they are met with…

(More...)

The free updates provided to Windows users are an asset these days, allowing customers to constantly wield stronger and more reliable software without the need to purchase a new operating system every couple of months. One of Windows 10’s new updates however, jeopardizes its users’ PCs by masking the true intent of some malicious files users might come in contact with on the internet. Windows 10 users have become more vulnerable to malware and ransomware with the new Windows update labeled “KB4535996”. Although Microsoft does not acknowledge any issues with the said update, claiming they are “not currently aware of any issues with this update”; one of the biggest quality of life fixes with KB4535996 actually exposes Microsoft customers to…

(More...)

Apple has big news for 2021 with a custom arm processor equipped Mac. Although very little information is circulating regarding the new Mac, Apple confirms that the custom arm processors would be built by Apple and liberate their product from the balancing act that was being tied together with Intel. Rumors regarding the Mac’s shift from Intel to Arm have been circulating since before 2020, but the Apple manufactured chip won’t see any action this year. What stimulated the move was a vision to be able to run all the same apps available on iPhone and iPad on the Mac. The iPhones and iPads already run arm-based chips and certain previous Mac models have already operated the hardware. If all…

(More...)

Android’s Google Play store has been pumping out all kinds of great games and intelligent apps since the start of 2020. Alongside some of the creative new games and advanced utility that came out this week, a highly anticipated supplementary app has been released - akin to one of Nintendo’s biggest juggernauts since the start of the twenty-first century. Kick-Flight is a free to play arcade style brawl game. Similar to the prominent Super Smash Bros series, the game consists of choosing fighters and bouncing around the map trying to defeat opponents. Players work in four man teams and fight against real opponents from similar regions. The gameplay is unique and fast paced making it one of the most entertaining…

(More...)

As a brand Apple never fails to outdo it’s prior accomplishments as well as generate buzz in the tech community. To begin the new decade Apple is releasing an all new MacBook Pro; after listening closely to the public and gathering together the best minds in tech Apple is excited to launch their new juggernaut of a laptop. The big upgrade to the new MacBook is Intel’s tenth generation “Ice Lake” processor. According to testers of the new laptop the unit boasts 12% higher CPU performance and almost 30% stronger in GPU tests. A common complaint with the past MacBooks was Apple’s shortcomings in releasing computers capable of playing modern PC games. So to those looking to game on their…

(More...)

The Internet of Things is going through a boom right now with many rival tech companies coaxing us to nest their products in our homes, workplaces, cars, you name it. These Internet of Things or IoT devices refer to devices connected to the internet which can link with other devices and communicate without human-to-computer or human-to-human interactions. From intelligent thermostats to security cameras to virtual assistants who can be told to play music, all these devices are presented as extremely cheap and “must-haves” for the bargain price. But actually this is because these devices’ only purpose isn't to make your life easier. The data collected by these IoT devices daily isn’t going in one ear and out the other. It…

(More...)

Ransomware had its humble beginnings as a common threat to the average Joe, but the statistics show that not only are the attacks growing more complex but they also provide an even bigger threat to businesses. The spoils from a successful cybercriminal campaign on a business are proving to be much more rewarding, as the FBI notes that ransomware numbers have stayed more or less the same for regular citizens, but rose over 300% in businesses. This number reported by the FBI is even more staggering because private businesses have no obligation to report these attacks, meaning the actual number is likely significantly higher. But the other major target for ransomware has been publicly funded institutions. In 2019, cybercriminals hit…

(More...)

As the internet began to take off in the mid 90’s, certain zealous individuals saw the potential in investing in the web. One such entrepreneur Mike O'Connor took it upon himself to claim several sleek or precise domain names; such as bar.com, cafes.com, shelter.com, you name it. Naturally, with the exponential growth of people starting and running their own websites, O’Connor’s “classic” domains multiplied in value. One domain however, is more sought after than all the rest, and for more than just a prestigious looking header for an ambitious business. This precious domain O’Connor has finally released for auction is corp.com; and the reason for its notoriety comes from a loophole in the early Windows service called Active Directory. Because…

(More...)

Looking to boost the performance of your website hosting as well as budgeting to save your business money can be overwhelming with all the different options available. Virtual Private Servers, or VPS’s, are the best form of web hosting because they combine all the strengths of conventional methods while also allowing you to pay for exactly what your business needs to stay ahead of the curve and still save money. The most basic form of web hosting is called Shared Hosting, where you have one physical server being shared by multiple customers. What is being shared is the fundamental resources of the server such as RAM, CPU, and disk space. What makes Shared Hosting so simple is the lack of…

(More...)

Sundar Pichai, CEO of Google and head of day-to-day operations announces that in 2019 Youtube was able to generate over one billion dollars per month in advertising revenue. This was the first time the company revealed how much money the media giant has been raking in. Despite the promising statement, investors have continued to dump their shares. Alphabet (Google’s parent company) shares have dropped about 4% after the markets closed. This is likely because Alphabet stated that their revenues for the prior quarter did not meet expectations. With advertising alone, YouTube brought in $15.15 billion in 2019; $4.72 billion in the fourth quarter. Youtube is generating more wealth through more than just advertisements: YouTube TV and movie rentals, to name…

(More...)

Almost exactly two years ago Steam set a record for players with 18.5 million accounts. This February, the popular gaming platform has set a new high with 18.8 million users online simultaneously. Although the record for players in-game at once still holds at 7 million, there is reason for optimism in the platform as the recent milestone coincides with record numbers of hours played in all of Steam’s top games. The previous year was progressive for Steam to say the least, boasting constant improvements to the client and the games catered to it. Valve has also been able to procure the Chinese market, making the Chinese language Steam’s new most popular language. They are even pushing to extend their application…

(More...)

In a new overhaul by Google, the Google Earth app allows you to see the stars and galaxies that surround our globe. Say goodbye to the empty, black backdrop. The app that once only carried resources capable of observing the planet has had a massive overhaul. The Google Earth App on smartphones and tablets can now observe all of the stars in our universe. Unlike before when the app contained just the Earth and a plain black background, this new update paints the world and adds new functionality to Google Earth mobile. Google credits the innovation in smartphones for their decision to move forward. Over recent years, tablets and smartphones have matured exponentially; allowing Google to begin to bring the…

(More...)

Planning to run an online business which absolutely requires an understanding of the necessary security measures that need to be in place before getting started. And, SSL certificates are the best solution to this statement. So, we are here to provide you with the best lined-up SSL Certificates services & also ensures you with the quick online issuance, 24/7 support, advanced encryption & strong warranties. SSL Certificates are becoming a popular trend for almost all the websites & blogs. An SSL Certificate is a protocol for allowing the data encryption on the internet. SSL Certificates are becoming a popular trend for almost all the websites & blogs. An SSL Certificate is a protocol for allowing the data encryption on the…

(More...)

The Benefits of SSD Hosting Are you looking for comprehensive website hosting? If so, SSD hosting just might be the right service for you. SSD hosting uses solid state disk drives which use non-volatile memory to store data. Below you will learn three of the main benefits of using SSD hosting as opposed to other hosting types.The Benefits of SSD Hosting Are you looking for comprehensive website hosting? If so, SSD hosting just might be the right service for you. SSD hosting uses solid state disk drives which use non-volatile memory to store data. Below you will learn three of the main benefits of using SSD hosting as opposed to other hosting types.

(More...)

Should I Consider Cloud Storage? Are you using the cloud to store your data? If not, then you really don’t know what you’re missing out on. Cloud storage has many benefits that just about anyone could take advantage of. No matter what your data storage needs are cloud storage just makes practical sense. Today we are going to learn more about cloud storage and why it might be right for you.Are you using the cloud to store your data? If not, then you really don’t know what you’re missing out on. Cloud storage has many benefits that just about anyone could take advantage of. No matter what your data storage needs are cloud storage just makes practical sense. Today we…

(More...)

Getting the perfect domain name for your business website is more important than the website itself. It doesn’t matter how much money you spend on designing a beautiful website, if your domain name doesn’t look professional or relevant to your brand, people will certainly be suspicious of your business. Your website’s domain name is also the most important part of your online marketing strategy. It’s how people will recognize your brand when they search for your business on Google or find a link on Facebook.It doesn’t matter how much money you spend on designing a beautiful website, if your domain name doesn’t look professional or relevant to your brand, people will certainly be suspicious of your business. Your website’s domain…

(More...)
GPD Host Contacts
GPD Host Social
Pay with Confidence

Copyright © 2015 - 2020 GPD Host All right reserved.