Google first unveiled YouTube’s revenue

Google first unveiled YouTube


Anna Savelyeva

This is the first disclosure in almost 14 years since the purchase of the video service. In the fourth quarter of 2019, Alphabet reported how much the platform brought over this period and year.

According to reports, in the fourth quarter, YouTube advertising revenue amounted to 4.72 billion
dollars. For the year, the service brought in 36% more than in 2018 – $ 15.15 billion. You can see from the figures above that premium non-advertising subscriptions and Music Premium buy more than 20
million people. Combining its revenue with the sale of Pixel smartphones and Google Home smart speakers, the “Other” category was earned, yielding $ 5.26 billion in the fourth quarter.

This is the first data since 2006 when Google acquired YouTube for $ 1.65 billion. However, the profits that the video service brings, the company has not disclosed. Comparing the results with others
giants over the same period, we see that the video service has managed to exceed Twitch six times six times, but they are still, surprisingly, five times smaller than Facebook. In general, in general
Revenue for the quarter, Alphabet fell short of investor expectations, showing the slowest growth of 17.3% over the past few years. The amount was $ 46.08 billion instead of the expected $ 46.94 billion
but net profit reached $ 10.67 billion, higher than the expected $ 8.78 billion

financial results of companies

Google

Toyota and Panasonic form a joint venture

Toyota and Panasonic form a joint venture


Toyota Motor Corporation and Panasonic Corporation announce the creation of a joint venture manufacturing company, Prime Planet Energy & Solutions, Inc.
prismatic car batteries. The parties first announced the possibility of such business integration nearly a year ago – December 22, 2019. Key details have now become known.

The precondition for the creation of the company was the unanimous opinion of the parties that batteries, as a source of energy for cars and other modes of transport, will take on an increasing role in the development
society and improving people’s lives.

Prime Planet Energy & Solutions, Inc. will develop high-performance (in terms of capacity, capacity, lifetime, etc.) batteries: prismatic lithium-ion batteries for
solid-state electric cars for cars and other new generation. They will be delivered to Toyota car companies and any other customers.

The joint venture is expected to be operational from the first of April 2020. Hiroaki Kodu (Toyota) will be appointed Director and President. In total there will be five members of the management
directors including Mr. Hioraki: 3 from Toyota and 2 from Panasonic. The company will also have two auditors, one from each JV participant. The composition of shareholders will be divided approximately equally: Toyota
will be owned by 51%, Panasonic – 49%. According to participants, Prime Planet Energy & Solutions will form approximately 5,100 employees, including 2,400 employees in the
China.

production, rechargeable battery

Panasonic

MTS will create the basis for smart cities in the MoD

MTS will create the basis for smart cities in the MoD


MTS has announced the launch of a program for the development of a fixed data transmission network in the Moscow region, which will create a technological platform to launch innovative services for residents and
cities in the region.

The program is designed until 2023 and provides for the development of high-speed Internet access channels through the GPON fiber-optic network in residential and office premises in 36 cities of the Moscow region
with a population of 50 thousand people. The focus will be on cities where this coverage was insufficient. The choice also took into account the presence of mass development and the number of buildings
high surface, proximity to the Ring Road and a degree of economic activity.

This year a high-speed data transmission network will be built in nine cities: Podolsk, Sergiev-Posad, Domodedovo, Orekhovo-Zuevo, Serpukhov, Dmitrov, Shchelkovo, Ivanteyevka, Solnechnogorsk. IN
In 2021-2022 construction is planned in 20 cities, in 2023 – in seven other cities.

The plan is as follows: in four years, taking into account the existing network, MTS will be able to provide Internet and digital services based on it in 54 cities, ie in 75% of the cities of Moscow
area. More than 1.5 million households and administrative buildings will be connected to the fiber optic network.

Based on GPON communication channels, a backbone network will be built, responsible for the speed and reliability of mobile data transmission. A few years later, the standard will become the main one for
implementation of projects in business and projects “Smart city”, “Smart region”.

The total investment of MTS in the development of modern wireline infrastructure of the Moscow region in 2020-2023 will amount to about two billion rubles.

MTS has built more than 46,000 km of GPON optical communication lines in Moscow. 98% of the households in the capital have no technical connection to this network without New
Moscow. In the Moscow region, a fixed network was built in 18 cities and about 40 settlements. Fiber optic transmission technology is used in some cities and towns
GPON data, in others FTTB technology.

telecommunications

MTS | MTS

Oleksiy Nesterov moved to eGovernment Operator

Oleksiy Nesterov moved to eGovernment Operator


“The e-government” operator was headed by Alexei Nesterov, who previously held the position of Deputy Director of the Branch – Director of Projects of the North-West Macroregional Branch
Rostelecom. The corresponding order was signed by the chairman of the committee for digital development of the Leningrad region, Victoria Kuznetsova.

Alexei Albertovich has a higher technical education. In 1995 he graduated from St. Petersburg State Electrotechnical University. VI Ulyanov (Lenin) in the specialty
Microelectronics and Semiconductor Devices. In 2007 he underwent advanced training courses in the Management program at the St. Petersburg International Institute of Management.

He started his management career in 1998 as a regional manager of Nord West Group. He has more than sixteen years of experience in the IT field. Worked as a team leader
Corporate Sales of the MegaFon Northwest Corporate Clients Division. Then – Deputy Director of the Leningrad Regional Branch of North-West Telecom. WITH
In 2012, he held managerial positions at Rostelecom – he was the head of the department of promotion of products and services, the head of the department of sales to state customers, the director of the department
applied projects. Since 2017, he has worked as Deputy Director of the Branch – Director for Corporate and Government Segments, Project Director.

During his time at Rostelecom, he oversaw the implementation of the largest projects in the Northwest on the organization of a city video surveillance system in St. Petersburg, a system of weight and size controls,
Safe City and many others.

new appointments

Breakthrough strategy. Part 1. What is a change?

Breakthrough strategy. Part 1. What is a change?


Yuri Shojdin, Boris Yosypov

Despite the emerging crisis, and perhaps it is, thanks to it, today’s society continues to change at an incredible rate: technology, management tools, more and more companies are changing
comes to the need to create a horizontal organizational structure, digitalization changes the attitude to the collection, analysis and use of information, the world becomes transparent. Under such circumstances
companies are forced to adjust their attitude to change management, they too need to be done quickly and purposefully, and here we will have to again mention project activity as the main
change management tool.

The topic of change management is huge, and although Kozma Prutkov said that “no one will embrace the immense”, but we will still try and make a series of articles in which it is superficial, but tell about our
experience in designing and implementing change, we will offer tools and understanding of the sequence and logic of events.

You can’t talk about changing a company without knowing what it is. If you look at SI Ozhegov’s dictionary, change is an amendment, a change that betrays something former. physical
the meaning of the change is very well understood from Kurt Levin’s three-stage model, which consists of the following stages:

  • defrosting – unbalancing the system: identifying areas of change and planning for change;

  • implementation of change – in fact, the measures to change the system;

  • freezing – performing measures that prevent the system from returning to its previous state.

The caveat here is that the measures in the article are only part of the required steps at each stage of the change.

Identify strategic initiatives

Today let’s talk about where strategic projects come from and what companies need to do to come up with a first, comprehensive transformation plan.

Take a look at the schematic below, which “molds” our experience of 15 years of management in various top positions. This experience shows that for any business organization
it is very important to understand the strategy of changing your organization, that is, the business model strategic as a regular, iterative process. In order to agree on one
submission process strategic, And this picture is given. Let’s figure it out.

The vertical axis of an organization may be different, such as revenue, EBITDA, market share, and more. On the horizontal axis everything is trivial – a timeline. First, let’s describe point A –
the current state of the organization by selected metrics at this point in time. Point B roughly reflects the status of the company by the same metric, but in the future if we sail
we do nothing. That is, unless strategic development projects are made (breakthrough projects that can change the course of natural events). Point B balances in the market: market up,
point up, market down, point down.

Next, you should ask yourself a “simple” question: how do we want to change the metric selected to be displayed in the picture in the future, in the future? The answer to this question is usually
positions the leadership of the organization as “ambitious” or not so … So appears in the figure cherished point C. Between the current indicator of the organization at point A and the future indicator of the organization in
point C is a gap – in the language of management it is called problem. Top managers are called to solve this problem in a strategic session, which usually aims to answer the question “a
how do we get from point A to point C? After all, if nothing in the current activity substantially not change, then, as practice shows, the organization will fluctuate near the line from point A to
point B, and the amplitude and frequency of these fluctuations will depend on changes in macro and microfactors in the industry market. If you’re lucky, your organization will grow with the market, that’s all we are
participated in zero years in our country, and if you are not lucky, the organization will “perish” under the influence of adverse combinations of factors of distant (STEP) and neighbor (competitors,
suppliers, customers) environments.

img

The value of an internal strategic session in a company is to understand point A. It is a rather complicated and often impartial work to solve all significant current problems that do not give
organization of the opportunity to move to the desired point C. Based on our experience, to formulate correctly and correctly existing problems is not so easy, but to recognize them even more difficult. But without that
honesty audit of their own activities do not move further, do not delude yourself – the solution to the problem begins with its recognition. And of course, you can never set up the process for the first time
strategizing effectively. People need time and a tough but professional moderator, so if you don’t have one inside the company, then it makes sense to turn to experts.

As soon as during the strategic session, all the top managers manage to agree on the formulation of the most significant problems, we move on to the second part of the Merlezon Ballet – to understanding point C, and
it is very important here not to clamp down on your “whims”. It is necessary to unpack in the most comfortable and friendly atmosphere all the expectations of top executives and owners about the future state
organization – this is the formulation of VISION. In this image, visions must necessarily be accompanied by specific initiatives along with “slogans and good wishes”. For example, “a new system
rewards “,” introduction of a balanced scorecard “,” entry into foreign markets “, etc.

The next step, after describing the “problem field” in point A and the “strategic hotels” in point C, is to proceed to the formation of two groups of strategic initiatives. the first group
strategic initiatives are aimed at solving our problems from the “problem field” – each problem on one strategic initiative, we will call them “Improvement Initiatives”.
Similarly, we form a pool of strategic initiatives designed to implement all of our “wants” – we call them “Development Initiatives”.

To summarize, after a high-quality strategic session, we get a set of strategic initiatives, some of which “cure” current problems and have a chance to become in the future
“Improvement Project”, and part embodies our dreams and claims “development projects”. Here the question arises: we hold the session once a year, with the vision of point C and the criticality of the detected
problems can change within a year, what to do? The answer is one: hold more often. At the beginning of the article, we wrote that strategizing is a regular, iterative process, not a once-a-year binge
holiday homes, as is customary for us. The length of the cycle you choose depends on the capabilities and culture of your company, we usually do two or three times a year.

The strategic initiative format is close to SMART criteria – what exactly needs to be done? What indicator and its value will indicate the successful course of strategic implementation
initiative? Who is personally responsible for the successful implementation of the strategic initiative from the top managers present at the strategic session (future role of the curator) and who
Will the strategic initiative (the future role of the strategic project manager) be directly implemented? And of course, the date by which the target value should be reached
metric.

In our practice, the answers to these questions have given rise to a variety of emotions in the participants of the strategic sessions – from aggression, slamming doors to windows and up to
lethargic apathy and withdrawal from participation. The reason for such a spread of emotions is simple – the existing culture of the organization usually does not take such a rigid format of project-oriented
strategic. You have to admit that talking about transformation or change is easy, but breaking the established rules and the usual way of thinking and acting is architec- tical and painful for all participants,
don’t think that it’s a simple decision for a CEO or a shareholder.

Preparing for change

In order to somehow smooth out such transformational “breakdowns” of corporate culture and prepare development projects and their participants for implementation, we have created a set of activities that
high probability leads us to a positive result – launching strategic projects, that is, before the transformation process begins. Of course, to completely unify the process
we have not been able to prepare, yet the companies and their needs have differences. Two action programs are now in place: one focused on training and the other focused on mentoring. Thus
so, you can choose the most convenient option to use.

How it works: At the end of the strategic session, we invite all senior management and owners to consider the scenario of transforming the organization’s existing culture
through the implementation of the first or second program, we called them respectively “Breakthrough Strategy” and “Design Workshops”. What is their essence.

Breakthrough Strategy is a six-month training program with four modules:

  • constituent session, development of basic rules and restrictions;

  • the Soft Skills module, which includes a set of necessary tools;

  • change management;

  • design and project management.

The second Project Workshop program is a three-month, shorter, simpler mentoring program. It contains eight workshops one day a week, staffed
and the supervisor prepare their projects for protection on the board of directors or other collegial body, simultaneously obtaining the necessary knowledge.

The difference between the two programs, in addition to the duration, lies in two main aspects:

  • volume of material – only the project design module is implemented in the project workshop, the rest remains behind the scenes;

  • in the approaches below.

The Breakthrough Strategy is primarily used to form a “change agent guard”, whose members, apart from preparing their strategic projects for protection in the course of implementation
Writing homework, mastering management skills that allow them, without losing their current Combat functions, to cope with the basic challenges of project management.

“Design Workshops” – for a more “rigid implantation” of a project-oriented approach to the culture of the organization. In eight workshops, as in Soviet labor lessons, participants “master”
their strategic projects, and also by doing their homework, they prepare them for protection on the board of directors.

It is very important, at the end of the first part on strategic planning, to say that in our practice there is a cynical saying – “you can die from hunger, but you can from gluttony.” This tale,
given in the right place of the strategic session, cools the hot heads of top executives, who, in an effort to “do as much good as possible”, initiate more than 12
strategic projects.

The figure 12 is taken empirically and, in essence, reflects the logic of the Balanced Scorecard, namely the three “managerial” perspectives of this approach – “Market”, “Business Processes” and
Staff should not exceed 12 strategic projects, ideally four in each area. Bitter practice shows that if this boundary is broken toward the essential
increase in the number of strategic projects, there is a serious threat that the organization in the desire to change “everything and quickly” will enter the zone of “turbulence” – line staff
cease to understand what to do and to whom to obey, middle-level executives will be disoriented towards goals and ways of leadership, senior-level members are graciously expecting that “combos”
as always pull out all the strategic projects without them …

But not only is change manageability important, it should be remembered that the implementation of any project requires human and financial resources. “Step wide, break your pants” says the proverb, but oh
this in the following articles, in which we will consider in more detail each transformation program separately, well, on the “sweet” we will leave the question of the need of the project office and the role of the program
security throughout this story.

transformation

IT-Manager Magazine [№ 01/2020],


Yuri Shojdin

Yuri Shojdin

Member of the Board of Directors of the Russian Union of IT Directors, chairs the Information Security Committee.

Boris Joseph

Boris Joseph

Business Coach, Consultant, System Change Workshop

Anton Valkov has been appointed CIO of the X5 Retail Group

Anton Valkov has been appointed CIO of the X5 Retail Group


Anna Savelyeva

Photo: AIR / Anton Valkov stands in the center.

According to Vedomosti, the appointment of Anton Valkov to
the position of the director of information technology became known on February, 4th from the person close to the management of the company. Pranik will join X5’s board, replacing the previous one
CIO Fabricio Grunge and his acting director Allu Antonov. The information was confirmed by Anton himself, a representative of the retailer and a representative of Yandex.Market.

Former Yandex.Market operations director is already looking for a replacement while his position is replaced by logistics director Pavlo Yaroshevsky and director of customer care services Elizabeth
Rybinsk.

As the retailer noted, the X5 decided to become more a technology company than a retail one. According to this strategy, information technology will become the driver of business growth. after launch
Digital Transforming Holding spends more than 10% of their capital expenditures on them. X5 plans to compete with online stores, delivery services and food companies.

new appointments

The virus of numbers invisibly kills our privacy

The virus of numbers invisibly kills our privacy


Alexey Lukatskiy

The other day I saw the movie Text, quite depressing in nature, but very well showing the impact of information technology on our lives. The main character receiving his smartphone
the offender, began to “live” his life, communicating with his parents, with his superiors, with his beloved girlfriend. A few days later, they did not notice the difference between the protagonist and the murdered offender. AND
all you had to do was just messaging. If you distance yourself from the social nature of the film and look at its technological stuff, then immediately arises
some storylines that could make the main character even more different from the person who ruined his life. This also includes fingerprints that would allow access to
internet banking (and one-time codes or push and so would come on this smartphone), and work in social networks, and calls on the phone with voice-over with deepfake technology … So many more turns
a scenario could be devised. But this is not about it now. The film showed how addicted we are to the mobile devices that lie in our pocket or purse.

Lessons Learned After Watching the Text Movie:

  • set a long password on your smartphone (at least eight characters if the password is character);

  • use TouchID or FaceID biometric technology;

  • use multifactor authentication in applications, including email, messengers, social networks, online banks, game services, etc;

  • do not use the same passwords in different services;

  • change your passwords regularly.

Another movie I also watched with professional interest was the American Search, produced by Timur Bekmambetov. In the picture, the protagonist disappears daughter and he
starts searching by first guessing the password from her computer, and then, by going to different social networks and the internet bank of her child, she receives small but important clues and evidence,
which eventually allows the father to find the girl alive. And here digitization helps not only the protagonist to find his daughter, who is not familiar with the recommendations for digital prevention and
but also shows how much you can learn about us through our web footprints and geolocation.

Lessons to Watch After Watching a Movie:

  • Disable geolocation for most apps on your mobile devices, except for the ones that really need your location (such as a navigator)

  • include geolocation only for application needs;

  • check your browser history regularly and clean it;

  • prohibit Google, Facebook from collecting information about you (if you can) and accessing it and removing all personal information collected about you.

Swindlers on social networks

Moving on to more down-to-earth things. I guess I’m not mistaken if I assume you have a social media account, such as Facebook. I will also assume that you, as well
me, annoyed by the ad that shows there. Once in the social network of Mark Zuckerberg, tired of the utterly ridiculous advertising, I set out to set it up so that I would get
some benefit (FB has the ability to personalize advertising). But the result turned out to be zero – it’s like fighting windmills. After reducing one ad serving, I got another array,
mainly fraudulent. It has revolved (and continues to be) around three themes:

  • A unique investment “Durov platform” that helps to earn as much as the average Russian earns in a month.

  • Sberbank, which pays money for polls.

  • Various payments from the state provided for such a recently passed law.

The scale of such fraud in FB, of course, is impressive. In the last three months, I have seen three or five such messages a day, which have completely different authors but exploit one entirely
specific topic: we will help you make money quickly or get a lot of money. Several hundred fraudulent accounts that no one deletes. For each such advertisement I send a message to
Zuckerberg administration about the breach, but Facebook, unfortunately, is not particularly responsive to reports of fraudulent advertising. Whether they lack people (or louis), they are deliberately not removed
spam regarding Durov’s platform, which competes with their Libra (and maybe they just don’t care about Russia and knowingly ignore complaints). So far all my requests for them are gone
any response – in three months, I received only one response to several hundred complaints, in which I was thanked for being vigilant and promised to sort it out.

I must say, none of the domestic regulators or law enforcement agencies do this either, leaving ordinary users alone with fraudsters, well aware of how
to hook users who have become too trusting of any “news” on the Internet and who have lost their critical thinking. The most annoying thing is that unlike phishing sites and
Clone sites that can be detected and blocked on FB are hard to do: you don’t know what’s hidden behind the fraudulent message (and you can’t blacklist them, even if you have them
home URL filtering solution), and Facebook itself does not fight such posts.

Advices:

  • Develop critical thinking and do not trust the “earn fast, no effort” offers. Remember, free cheese only comes in mousetrap.

  • Enable anti-malware mechanisms in your browsers.

  • Use integrated cybersecurity tools for your personal devices – smartphones or computers – to help prevent them from infecting or stealing personal information.

sale of data

In preparation for another performance on one social network, I came across a group (and a mini-investigation showed that such groups and channels are full in Telegram and other messengers), which
traded access to camcorders installed … And well, if they were at the facilities of the CFI (and they are, for example, in the control airports) – let this FSTEC with the FSB deal with – ordinary citizens
nothing directly threatens. But open to all comers full of cameras in apartments, offices, country houses, medical centers, strip clubs, kindergartens, brothels, etc. And you can see there
completely different things – from the sexual life of tenants or housekeepers to medical procedures, from striptease to dressing, from poking in the nose to features of behavior interest people.

These data are for sale (the cost of access is from 150 to 200 rubles for one object), or they can be found on their own using specialized search engines. I tried to do it already
after a couple of minutes he was looking at a working shop in St. Petersburg, and another one, at someone’s garage in a country house. Even special programs are offered, scanning the Internet and
trying to pick up passwords to cameras. In this case, it is the users themselves who forget to change their default passwords on the cameras or set easy-to-guess passwords. but
can they be blamed for this? Only partially. But social networks could more closely monitor such actions, identifying groups, channels and chats where there is a lively (and inexpensive) trade in access to
cameras and archives from them. And this is a direct invasion of privacy that comes under the Criminal Code. But no one is struggling with it, and law enforcement agencies somehow have little concern for it
of this occasion 🙁

Advices:

  • By implementing a “smart home”, change the manufacturer’s default passwords (and generally refer to the safety documentation section).

  • Use a secure remote connection to your devices so that it cannot be eavesdropped and your administrator password is intercepted.

digital footprints

Well, it is not necessary to use social networks, says the paranoid reader, and it will be in its own right. But, unfortunately, it is almost impossible to implement this advice today. Social networks, smartphones, the Internet, smart homes and
other manifestations of the digital virus have long infected us and are not treatable by becoming part of our immune system. Even worse is the case with today’s youth. According to the conducted
research, she sees nothing wrong with exposing her personal life and personal information to the public on social networks, her own sites, blogs, virtual worlds and
etc. Moreover, the closure of such information makes rogue youth in their environment. According to the authors of many studies, providing such information about yourself is digital
identity (perhaps not the most successful translation of the term online or digital identity) of a teenager or a boy / girl. In addition to forming the identity of the disclosure of their personal data
provides membership to a group of peers who also freely disclose information about themselves and share details of their privacy. And people of the older generation are no strangers to that
habit. Just look at what Facebook users post about themselves and how they make contacts. An empty profile is almost unlikely to be accepted into a group or to receive / accept an invitation
Friendship. But if for the people of the 1980-90’s generation their disclosure of their PDN is more likely an inevitable evil for online communication, then for the 2000-2010 generation it is a matter of course and there is no doubt
and questions.

Prevention and hygiene

What are all these not-so-good examples of the use of digital technology we are so used to? They show that the problem of protection against the “virus of the number” lies at all where
the concentrated efforts of our legislators and regulators. They are focused on technical protection and developing responsibilities for organizations (we don’t have cyber security for citizens at all
doesn’t care if it’s not the big officials or the stars of the show business); while raising awareness and educating contemporary youth, children, the elderly and other categories of people in
issues of securing your protection in the online space. If Internet users are less mindless about spreading their personal data right and left, they will start using simple, but
effective digital hygiene practices, will critically evaluate everything they are offered on the Internet and will cease to mindlessly monitor there, the effect of this behavior will be much higher than that of
the use of certified security, certified objects of information and obtaining all licenses for activities in the field of information security.

The most unpleasant thing in this whole story, which is not quite clear as adults, namely they are 99% interested, learn what they need to do to improve their information
security? Instructions for purchased cameras or mobile devices do not emphasize this. Courses? So they are not (almost), and in any case it is still necessary to think of what to do on them. General culture
IB in the country? It also does not, and regulators as a whole do not care what it does (the attempt to create the foundations of state policy in the field of culture formation in Russia failed). If you add up the stories below
together, it turns out that the huge layer of users we have absolutely not protected from modern cyber threats, which, in the conditions of digital transformation, is growing. Run somewhere?
Nowhere. An application to make? No one, and the result is predictable. Learn yourself? Where? Give up the Internet and gadgets? Already impossible. Deadlock? ..


In fact, the “number virus” can be defeated. But not by the efforts of the state (he has other interests) and not by the independent efforts of the citizens themselves (they simply do not think about the risks of their behavior,
which leads to “digital cold” or “digital pneumonia”). A business that is not in words but in actuality engaged in digital transformation can help to realize that without proper training
people who do not make a quality leap forward. Over the last year, I had to take part not only in various in-house professional development activities, but even write down a whole
a course on this topic, which discusses the risks described above and the methods of neutralizing them. And it is natural. Considering that the weakest link in corporate IB is people and
attackers often launch their attacks from ordinary users and their home computers and social media accounts, then training is not only helping to protect the digital business
but also makes the whole world safer. This is the key to the success of the fight against the “digital virus”.

informational security

IT-Manager Magazine [№ 01/2020],


Alexey Lukatskiy

Alexey Lukatskiy

Cisco Security Business Consultant.

Golf helps to play the new Garmin watch

Golf helps to play the new Garmin watch


Nikolay Blinkov

The Approach S62 allows you to select the right hockey stick and get right there.

American smartwatch maker Garmin has introduced a new model, the Approach S62. It is, like its predecessor, the Approach S60, focused primarily on the active-lover
lifestyle, and the watch itself is a sports model equipped with a GPS receiver and new features. The uniqueness of the hours is that they are designed for golf – and they can
even schedule game results using direction, wind speed, and impact data.

The price starts at $ 499. The watch is equipped with a large, round TFT (LCD) display (1.3 inches in diameter) with 41,000+ colors and a resolution of 260×260 pixels. Display area is up 18% compared to
Approach S60. The display practically does not dim in the bright sun, and the main functionality of the clock is dedicated to fitness.

However, information about the “iron” of reasonable hours is very scanty. We only know that the owner of the novelty has 1 GB of memory. And a powerful battery lets you work in GPS mode “smart” hours before
20 hours and up to two weeks in standby.

The key golf feature of the Approach S62 is Virtual Caddie. The program helps you to choose the right stick for hitting based on the typical range of blows given by the stick and wind parameters (speed and
direction). Complementing this feature is the PlaysLike Distance program, which allows you to determine on the map where to aim and obstacles on the way to the hole, as well as the impact range given
field bias.

Also in the “smart” clock has an AutoShot tracking feature. It measures and automatically records the impact range. You need to access additional automatic game monitoring features
Establish a clock pairing with compatible sensors for the Approach CT10 keys. In addition, golf collects statistics.

Yes, it allows you to analyze and view the game using the statistics widget; the data is calculated in the Garmin Golf application, and then there is a clock transmission. In this section you can
track sports performance. These include the handicap index, the percentage of hits and misses on the fairways, the percentage of hits and misses for the baseline hit. And also the percentage of green regulation
(Hit the target with the planned number of hits).

For successful use of golf on this watch, the model contains more than 41 thousand color preloaded CourseView golf course maps worldwide. In addition to golf, the model Approach S62
has kept the basic functions of smartwatches needed in everyday life. These include the pulse rate measurement function on the wrist, the Pulse Ox sensor for determining blood oxygen saturation, and
also – Garmin Pay contactless payment system.

Reasonable times

IT-News Magazine,

The Big Four has developed anti-fungus anti-swing numbers

The Big Four has developed anti-fungus anti-swing numbers


Anna Savelyeva

Megaphone, MTS, Beeline and Tele2 have developed antifrod platforms to protect commercial bank customers from fraud using social engineering. The platform integrates with the switches
the telecom operator and the bank’s CRM system and defines different types of events. The system distinguishes calls from bank customer service from fraudsters’ calls even when using a swing of numbers and helps
to prevent the illegal withdrawal of money from customer accounts. In addition to the operators, Tinkoff, Gazprombank, Raiffeisenbank, Moscow Credit Bank, MTS Bank and VTB, take part in the testing.

As explained by the participants, the antifrod platform helps to reduce the number of cases of illegal withdrawal of money from customer cards by swinging numbers. The product is primarily aimed at cases where
Fraudsters, under the guise of a credit institution, are misleading, receiving bank card information, and withdrawing money from customer accounts.

The telecom operator and the bank synchronize the signal traffic data with the bank CRM system on the basis of special software. Tele2 further enriches this data with the help of
big data analytics. In addition, the operator monitors all calls to customers from the so-called A-numbers – phones from which bank employees can call cardholders.

Tele2 conducted a pilot project to test the voice control system with Tinkoff. The operator and the bank have tested the platform to determine the various types of frod communications:
calls to clients from the swing of bank numbers, calls to the call center of the bank from false customer numbers, calls from “prison call centers”.

Two smart real-time systems exchange data about calls to general customers from the bank’s phone numbers. If a person is calling from a credit institution, but the antifrod platform is out
the bank does not confirm the call, so the call comes from fraudsters. In this case, the credit institution’s security system may promptly block the transaction being attacked by the customer to
prevent unauthorized transfer of funds from his account.

The platform does not block the calls themselves. Each potentially fraudulent event has its own code, the antifrod platform exchanges these codes with the bank, but the final decision to block
The bank accepts suspicious transactions according to its models.

Calls from the so-called “prison call centers” Tele2 determines on the basis of big data analytics, combining information about the call and the type of object from which the call comes.

According to RBC, citing its source, the operators’ decisions are based on the software of the Swedish company Hexagon.

“We have initiated negotiations with other participants to launch a universal platform that protects subscribers of all operators. But a really working system, tested with one of the largest banks
“Tinkoff” is only available in Tele2 “, – says the operator.

According to RBC, citing its source, the operators’ decisions are based on the software of the Swedish company Hexagon. Some participants have been developing for five years and finally in 2019
joined forces.

MTS has been told that their antifrod has been running since December 2019. The carrier’s system makes an online request to the traffic control center during the call and determines if it comes from a partner bank. if
the bank replies that the call from this number is not happening right now, the operator blocks the call and notifies the systems of the bank to promptly suspend unauthorized access to the client’s account and
prevent withdrawals. The bank itself provides the operator with a list of clients with MTS numbers.

The Megaphone system works a little differently. She informs the bank directly during a call that a customer has now received a call from a blacklisted number. As a result of this person’s operations
In the near future will be delivered with special attention. In addition, the bank sees reports of fraudulent calls to the call center with the substitution of the customer number.

VimpelCom did not disclose details of the operation of its antifrod, but Beeline’s representative stated that the operator works with all major banks.

According to FinCERT, the Central Bank’s cybersecurity unit, in 2018, 97% of thefts of customer payment cards were made using methods
social engineering (malicious misrepresentation by deception or abuse of trust). In total for 2018 fraudsters illegally withdrew from the cards of the Russians 1.4 billion rubles.

information security in banks

Megaphones | Megaphone, Beeline | Beeline, MTS | MTS, Tele2 | body 2

A new layer of being. Part 1

A new layer of being. Part 1


Oleg Heidarov

The universal mind, wishing to know itself, created gross matter,

So that when she self-organizes herself, she creates information,

Looking into which, as in a mirror, he knew himself.

almost Hegel

Preface

You can imagine a parade allele. Aristotle, of course, begins with a volume of his “Analyst” under his armpit. Next comes an incomprehensible crowd of ancient philosophers who turned it all into Logic.
It is a pity that they are not painted by name. They just deserved it. Medieval theologians are sadly sidelined. Most of them are out of business. Among them, smiles Thomas Aquinas.
As if saying: “And I was the first to try to describe the god with logical statements.” Descartes smiles. It seems to be nothing, but it has done a lot for mathematics as a science and those sections of it that
leading to IT. And finally, there is a couple – Babbage and Lovelace. Looking at this attractive young woman, you will not guess that without her the history of cybernetics and computers would certainly have happened, but for sure
much later. She is a Byron heiress, the poor Lord would have known his daughter and had never seen! Followed by the well-known Johann von Neumann, he exclaims: “We did not build computers, we
designed the universe! »Already every person of familiar characters is reaching for him, from Gates, Jobs to Zuckerberg and Bryn. Near them, as it should be invisible, curators from the special services are moving, right there
much of what we know in modern IT was born, but people love myths so much, and myths about single geniuses sell well in an era when everything is created by large teams. Well, in order.

Introduction, or Why Not a Virus

Admittedly, the topic of the virus numbers has somewhat embarrassed me. However, the virus has a very clear description. With clear signs, the virus is always a parasite that lives on through another system,
owned by the owner. The virus is always massively replicated, it embodies the idea of ​​replication, and the information of the genome, or program code, or else – this is the second time. In digitalization, the viral,
apparently there is, only the term itself. Our “great linguists” are not far from pop stars from the 90’s who don’t eat bread, let’s apply English to the wrong place – and in these Russicisms they crawl there,
where the concept of IT has been around for a long time.

At first glance, IT penetration is remotely similar to viral expansion. There were completely different components to what we call nature. It later emerged what we refer to as
“Planetary Civilization”. Both technologies are penetrating now and then, they are ubiquitous. However, we do not see signs of viral expansion. What to consider as such? The fact of penetration? And what
it penetration? Here we see that wherever IT has penetrated, quality is changing. However, not always for the better, but it makes sense to talk about the rebirth of the system. The virus does not behave that way.
The virus does not upgrade the system, here is something else, let’s try and deal with it. And we must not start from today.

the first wave

When was the first information tsunami? Long ago on the branches sat our ancestors primates. In fact, even then, they made a set of sounds. It was probably no accident. First, the hands
(Sorry, paws) were busy. Secondly, in the thick forest crown the voice was probably very appropriate. In principle, all this existed not only in them and was part of the first signal complex
systems.

Man’s innovation is that he was able to move to abstract concepts, that is, to form a second signal system. He did it not alone. In addition to the monkey relatives, this obviously
engaged in whales and dolphins. However, without abstract thinking, there is no modern language. It is through symbols that we build a message. It is through her, the second signaling system, that we lie alone
one. Remember what gentlemen do? All their work is to capture the manifestations of the first signal system, in a language we cannot lie. But in the language of the first signaling system
we cannot describe the problem and its solution in a general way. It was the emergence of the second signal system and abstract thinking that made this possible. In other words, the first virtualization took place in
our heads. Complex non-hereditary information separated from the somatic organism and healed his life. Obviously, such context-independence was a major step in the transfer of the accumulated
information. And she helped us get out of the woods and build our first homes. So the “virus numbers” first appeared in our heads. It was more correct to say, of course, not about the figure, because in theory
codes The code is not necessarily a digit.

the second wave

Think of the same monkeys, whales and dolphins. In terms of the second signaling system, they are our relatives. However, these whalers hunt whales, not whales, “human-being” on humans. Evolution? Certainly. but
what did we buy in her course? Here, for example, it is appropriate to mention nomads. They often had a tradition of forcing a messenger to sing songs, for the message had to be conveyed accurately, and you would not throw the words out of the song.
Speaking in modern terms. The messenger was the bearer of the information. And to protect against interference, excessive coding using rhyme and melody was used. All this in the aggregate
increased the resiliency of the data transmission system (author – messenger – addressee). I guess the reader already guessed. There was no writing in the poor. This is what sets us apart from monkeys and whales.
None of them, in the framework of their “civilizations,” made this important step. We are the only ones to formalize the storage of information on external media and to use these media. It doesn’t matter what
used: cuneiform, hieroglyph or alphabet – the main thing, formalization of storage and its consequences:

First, the non-random mechanism of information transmission became indirect. When we read a mathematics textbook, much of what is written in it is created by authors who are not already alive. that
the external media not only made more stable and voluminous storage of information, but also eliminated the need to transfer it “from hand to hand.” These are obvious things to us. But in time
Ancient Mesopotamia was appropriate to speak of a “writing virus” that is pervading everywhere. In my opinion, in terms of philosophy, it is still appropriate to speak about a new level of organization of information.

Second, literacy-level abstraction contributed to thinking-level abstraction. For example, when we write down a mathematical formula and do its transformation, we operate
symbolic representations. In fact, we work with abstractions of abstractions and rules of transitions between them.

Third, such written impersonation of information has allowed a radical change in the ways in which it is transmitted. There is also secrecy, since the letter can be written secretly and given to the messenger in a sealed
the form. And speed, through the mail pigeon. And range, such as in a note in a bottle drawn by ocean currents. So the “writing virus” also penetrated all areas of ours
being. The asynchronous exchange of information is an innovation he brought with him.

And finally, the main thing. Although the actuator for the accumulated information is still the human body, but the way of working with it has already allowed in some cases to operate information, and
material object. I will explain by example. The decoding of cuneiform Sumerian tablets clearly states that some of them are accounting information about the delivery and storage of a natural product. IN
mainly grain and bulls, but not only utensils and imported goods too. In addition, there are receipts for the admission of grain to public storage in excess of the tax. About this from a farmer
issued plates – in fact receipts, which in modern terms can be called a tax certificate and a certificate of deposit with the state grain bank. Yes, it is not the Rothschilds who invented the banks. so
that, as is often the case in history, was the right moment – remembering the well-forgotten …

the third wave

The next qualitative leap, which I would call “wave of energy”, occurred at the turn of the XIX and XX centuries. It started not with Alexander Bell, but with Alexander Schilling. For those who are not aware,
recall that the Morse patent of 1840, and the demonstration of the Schilling electric telegraph of 1832. However, it is worth noting that Morse developed a five-bit code and a printer. that
That is, he applied a digital signal with a clear coding system to transmit. Remote communications have counted more than one millennium by now, and even varieties of telegraph
have been in existence for over a hundred years. However, with the invention of the electric telegraph and then the telephone, several key events occurred:

Point-to-point connections have appeared. All the classic technologies meant a lot of human-machine repeaters. And even Bell’s first PBXs, even though they provided for a telephonist,
meant that as a result there will be a point-to-point connection. The electric telegraph immediately earned in point-to-point mode.

Secondly, it was in electrical circuits that a qualitative philosophical leap occurred. Electromagnetic wave, a substance that has no mass and has a limit according to modern concepts
speed. That is, information has mastered the fastest way in our universe to transmit. In any case, we do not know the others yet, and everything from the momentum in the telegraph to the laser beam in the fiber is the essence
electromagnetism.

Equally important is the speed of light per se. Man, of course, adapts everything to his perception and wants everything now. Given the speed of light in the universe and in the dimensions of the Earth, the concept of “this
second ”becomes -“ everywhere ”. Agree, it’s close to everything at once. It follows that one can speak of an “electricity virus” or an “electromagnetic communication virus” that has penetrated
everywhere, and changed not only our way of life, our production, but also our communication.

The twentieth century was the age of the financial aristocracy, which, for objective reasons, ruled the world. It was her, choosing the United States as its headquarters and destroying all possible in World War II.
competitors, took over the world through the dollar. Remember where the banks started? That’s right, from the fact that they put gold in the chest and gave out a piece of paper. Or a clay tablet. That is … In short, they gave out
instead, an information construct that implies the following aspects:

  • Natural and philosophical. Logically, this is a huge energy saver when we whenever possible go from moving material objects to where information can be moved. I will say more without this
    opportunities we would not have in modern civilization. Think of the expensive and sophisticated Concord and TU-144. After all, in their person died supersonic aviation. Instead of a costly but very fast tipping
    carcasses from continent to continent we transmit very quickly and fabulously cheap information. Only the fabulously wealthy sheikhs are now willing to overpay for supersonic movement, and perhaps
    to show off, not for the real cause.

  • The “move” electromagnetic wave in this universe is the cheapest, but, in addition, there is an opportunity to separate relatively “fast” processes and “slow”, where there is still work with
    material objects. This, in turn, allows you to optimize “slow” processes. If, for example, we have oil futures, then all the sales are going virtually, and the shipment is already
    in fact and whenever possible in the point-to-point scheme. The “slow” process can be very slow, but most cost-effective.

  • The very activity of the financial institutions that governed civilization contributed to the rapid growth of the economy through lending. The caveat that worked at this stage should be made here
    development of civilization and now we are just going through a period when it no longer works.


Summarizing the results of the “electromagnetic communication virus”, we can say that much of what we have now and is presented as “digitalization” is not really a new trend. All these are personal
offices, sports reports, etc. just say that our state has finally woken up and rushed to catch up. I’m also for patriotism, but let’s remember how many years the “digital state” was in that
same Estonia or Finland? Recall how the dotcoms (who, incidentally, now remembers this term?) Changed the parity of the dollar-euro currency basket and did so at the very beginning of the 21st century.
In fact, conceptually everything was done by the end of the 1970s. It took the development of microelectronics and telecommunications to “catch up”. It took about $ 4 trillion to invest in those
money, beginning of the XXI century to build the infrastructure.
Fifteen years ago, your obedient servant participated in what was so hotly debated as digitalisation. Back then, it was really new and there were a lot of mistakes. In that sense, by the way,
The Russian state is in a very favorable position. The transfer environment built him a business in the 1990s and zero, with complete renunciation of ownership. The solution is 5-7th level OSI now
are taken from the library of waste and for every taste. Import substitution is required – the analog is written. I have not seen the idea of ​​import substitution in IT at the idea level, and I do not need to invent in the “old” segments
bike.

To be continued…

digital transformation

IT-Manager Magazine [№ 01/2020],


Oleg Heidarov

Oleg Heidarov

CEO of Hyprometiz