Hitachi Vantara acquires Waterline Data

Hitachi Vantara acquires Waterline Data

Hitachi Vantara integrates the intelligent data cataloging technology developed by Waterline Data into the Lumada Data Services suite of services.

Hitachi Vantara has announced its intention to acquire Waterline Data. The company offers data mining solutions for DataOps methodology that allow customers to receive
knowledge of large datasets and ensure compliance with regulatory requirements such as the General Data Protection Regulation (GDPR).

As noted in the company, Waterline Data technologies will complement Hitachi Vantara’s expertise in DataOps implementation and will be a key product in the Lumada Data Services complex.

Waterline Data has developed a machine-based cataloging technology that automates the process of metadata discovery in analytics and management
data in different information environments. It is widely used in the financial services, healthcare and pharmaceutical industries. Technology can be applied to large amounts of data in environments
based on Hadoop, SQL, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud, deploying relevant solutions across the organization or in the cloud.

Waterline Data solutions are based on proprietary technology that eliminates the barriers to successful data lake operations. For example, to correctly identify insurance numbers
requirements in the lake of data in the size of several petabytes, the solution of Waterline Data is enough to recognize as a requirement number only one field. Then this technology generates a unique “imprint”,
allows to accurately recognize and mark all such fields in the data lake regardless of their formats, names or sources. When creating so-called “prints” systems are used
based on artificial intelligence (II), which performs automatic operations to identify, classify and analyze distributed and disparate data resources.

The integration of Waterline Data technology with Lumada Data Services will allow customers to create a common metadata structure and overcome the disparity of data sets distributed between
cloud, data center, computers and devices at the border of the network.

The acquisition of Waterline Data is expected to be completed by March 31, 2020. Following the acquisition of Waterline Data, Hitachi Vantara will provide these technologies to customers as stand-alone
solutions and integrated components of Lumada Data Services.

buying companies


Cisco Webex is mastering artificial intelligence

Cisco Webex is mastering artificial intelligence

Oleg Marsavin

According to research, there are now up to 25 million meeting rooms in the world, with their number increasing daily. At the same time, 78% of respondents are not satisfied with the available equipment
65% said more than half of them needed video conferencing equipment. Cisco notes that 300 million people use its collaboration tools.
The use of artificial intelligence (AI) in the Webex Meeting enables new functionality to be provided to these users.

About six months after the acquisition of Voicea, Voicea’s Enterprise Voice Assistant (EVA) recognition technology was integrated into the Webex Meetings video conferencing platform
Cisco. New features include automatic recording and transcript of conversations, which Cisco says will eliminate the need for detailed recording during meetings.
Transcripts are now searchable, so team members who have missed meetings can quickly find key topics of discussion without listening to the entire video.


Back in 2017, after acquiring MindMeld for $ 125 million Talk AI startup, Cisco added the Webex Rooms meeting room solution to AI talking functionality. New version
Webex Assistant for Meetings understands voice commands to perform transcription tasks, protocols, and summarizing. Conference participants can focus on
discussing the topic without being distracted by the recording and in parallel highlight important points in the course of the meeting. You can now search all recorded appointments, and the assistant will record the items that
you must complete and prepare a summary report.

“Communications remain an important part of today’s business. Communication channels are growing and users have different preferences. Cisco today provides a single platform,
which provides an intergenerational bridge, allowing people to communicate in a way that is closer to them, while remaining in the same information environment, ”says Sri Srinivasan (Sri
Srinivasan), Senior Vice President and General Manager, Cisco Collaboration Group.

At the annual Cisco Live conference in Barcelona, ​​it was announced that Webex Assistant for Webex Rooms will be able to communicate with users in Spanish in the near future
language. Spanish is one of the most widely spoken languages ​​in the world; it was one of the first languages ​​customers requested to teach Webex Assistant. Users will soon be able to communicate with the devices
Webex Room in English or Spanish, with Webex Assistant responding in the language in which it was addressed. Now, as representatives of Cisco assure, Webex is ready to learn and others

The new version of the voice assistant, including the transcription service, does not yet have a price tag, but will start testing in March.

Cisco is one of the leaders in cybersecurity, so security and privacy of customer data
companies in a special place. Webex uses end-to-end encryption and a multi-level security system. Also, according to Aruna Ravichandran (Aruna
Ravichandran), Cisco Collaboration’s Head of Marketing, “all Cisco video and audio devices receive continuous updates from the cloud. So they are constantly at
up to date. Gathering up-to-date analytics allows customers to access device and conference room usage statistics, as well as manage automatically
availability of meeting rooms when canceling or postponing meetings. ”

Cisco has also updated its portfolio of contact center tools, including Voice’s integration with Google Cloud’s Contact Center AI (CCAI). It gives customer support
transcripts of calls and a summary of actions. Then, call highlights are automatically synchronized with Customer Relationship Management (CRM) systems, making it easy
cope with past support issues.

The introduction of the Webex Experience Management tool based on the acquisition of CloudCherry was also announced. This tool provides deeper analysis and understanding
the client experience and the mood of the agents on the call.

Other announcements at the Cisco Live Europe event in Barcelona include the new Webex Room USB Video Device, which allows access to Webex in small businesses. new video device
The entry-level Cisco Webex Room USB offers high quality and security in compact video devices for meeting rooms and small office spaces.
The comfortable use, ease of installation and operation of this device may be of interest to small organizations that are just beginning to enter the world of video conferencing, but
want to get a business-class solution that does not cause additional problems and costs.

Artificial intelligence, videoconferencing


An account of how one company managed access and what came of it


Lyudmila Sevastyanova

Managing access rights in the corporate network of the enterprise, frankly, the case is not the most interesting and not very simple, but necessary. If the company is small, then this one
inflammatory try to organize the process manually. What works out, especially given the growth of the business, and how can this provision be managed, saving both human and temporary
resources, I’ll tell you.

Lived-was the owner of one small company. According to ancient recipes, honey was cooked for the citizens before the holiday. And as he began to introduce his products in the product of all useful to add and develop
own recipe, customers did not hang up. The glory of his establishment went far in the region.

He equipped his production with overseas equipment with software control, recruited a couple of dozen workers, put them behind computers – they sit and work. Okay-oh-oh-oh …

The business is growing, five hundred people have joined the company in three years. Heads of departments appeared, and those – subordinates. His honey was not enough, he agreed with the neighboring beekeepers
for the supply of raw materials. There are different business processes in the departments, all the regulations approved above and even some information systems. Got the owner – you need this whole farm somehow
order and wrote a decree. And the staff went to each other to walk, roll over the papers, ask for access. All kinds of interesting cases have happened here. And what,
we will tell below.

Case Study 1. The marketer comes to sysadmin: “I punch you, good man, give me access to” 2C: Enterprise “, I need a contract with
lawyers and accounting to coordinate. ” “Not a question,” he replies. – Only fill me a piece of paper in the whole form, and make sure to specify all 10 parameters. ” The marketer left with nothing and for a long time – thought
think, gather information and fill in a piece of paper.


Case 2. Someone in charge of the head of the external liaison department to provide beekeepers with access to their systems,
to keep track of their deliveries and to keep their supplies late. And this is a serious matter – many suppliers have been divorced so that you do not let anyone in the domestic possession, you need him with the main
the governor of IBeshnik to agree. And the one on vacation was – a garden in the village of Kukueva digs. And the suppliers left to ponder, to wait for the return of the garden.


case 3. Started in the department head of sales, a special program that has everything
customer information and customer relationship history was stored and Salle was only used. And it went so well in sales, it was so convenient: what kind of a fighter needed customer information – he went into the applet,
found the customer and found out all his secrets, all his pranks with wishes.

One annoyance: they began to ask anyone to access this program: both marketers and financiers, and there are others. And it seems to increase sales and improve customer service
asking for access – how to give? As a result, visit the head of all the affected permissions, and a year later can not understand who and why in his program goes and what data pulls from there. Year by hand along with
Technicians understood (in a fashionable “recertification of access rights” carried out), and did not finish – drowned in paperwork and procedures.


Case 4. Five hundred workers are not twenty. They need to issue and block accounts, they need access to different systems like
sale to give – all handles, handles. And one and a half sysadmins (one half-time worked) became slaves on the galley: the sub was spent on managing access rights for workers, and the rest
south – to extinguish the fire (restore the network after crashes and disturbances and equipment to be repaired). All other work duties are usually overtime and on weekends. The guys were bored …


Case 5. When business is underway, that’s where it usually comes from, and envy appears. Somehow an incident happened: one of the secretaries of the recipe stole
new and customer base, and gave the competitors a lot of money. As a rule, they noticed not immediately, but only when customers began to go to the competitor en masse. So, we have to figure out how this one is
the grief-worker got access to the secrets, who gave him access to it and for what reason. This responsible task has been entrusted to an employee of the IB service: investigating, dear, this fact handles and
glasses. For a long time digging security – and deep and wide, as you will understand here: six months have passed since the malicious, and the corporate environment has changed, and business processes. In general, they spat on it
business in the company went on to work …


Let us turn, however, from the contrivance to the reality. In a modern company of a similar scale, the process of access control described above will look something like this (see Scheme 1):


Familiar? So. Comfortable? No. Effective? No, especially given the total digitization of recent years.

As you can see, if a company pays insufficient attention to access control and identity management, then the manual costs of solving such problems can be enormous! what
do? Of course, change the approach. Authentication and authorization management is the key to security and is of great importance to all departments. Let’s see how he coped with this task
the wise owner of our already big company.

… And he looked at all these cases and realized: it is time to automate the process of access control. By that time, the number of employees was already close to a thousand souls.

He called the good guys on the carpet – techies and security guards – and said, “Get me a system to work as a tablecloth. To self-accounting users when hiring
created, granted basic access rights to them, and when released, blocked. To block access during sickness and vacation. So that the employee is strangely in it quickly needs the application
fabricate, so that the application is the same who needs to go for approval. And that any violations of the rules of granting access and conflicts different itself identify and eliminate in a timely manner. Well, quickly
published all the historical access information – whether you want in a month or in a year – for reports from all kinds of auditors and regulators. So it was appropriate for investigations of different cases. ”

The security guards and technicians thought what the system should be like, and they realized that it was time to implement IdM (identity management), and even better – an advanced IGA (identity management and
administration)! What is a miracle-judo? And there are no miracles here: the system itself gives all workers access when and where it is needed. How is she so artful? Yes through automatic control
user lifecycle. So through current policies and infrastructure created to support this process.


What is she, this self-made tablecloth? First, it identifies and analyzes users’ rights – when, with what such a miracle, and by whom. Secondly, the decision itself (according to the politicians)
accepts – Issue the requested access or rotate gate. It itself (on demand) creates reports when audit or certification of access is needed. And the life cycle controls them
manages roles in all information systems and does not give unnecessarily. Here are such miracles!

And he introduced in his company the wise owner of this miraculous system. And as he analyzed the effect and gasped:

  • 53% reduced the time spent by business people in order to approve applications, audit access rights (in our opinion – certification) to spend, etc .;

  • in company systems, the number of unnecessary users decreased by 15%, and the number of applications for sysadmins decreased by 85%;

  • plus, it was 50% easier to get data from theft theft systems.

And as a result, all the employees of our already big company of happiness!

… Now, in reality, let’s see how the process of access control resulting from the use of the IGA system described in Scheme 1 has changed (see Scheme 2):


Together: When the rights management process is designed and automated, companies do not need to allocate more and more resources and resources to keep afloat and provide
business needs a level of service and security. It is a very, very tangible tool to save resource costs of access control.

That’s the fairy tale end! And there I was, drinking sweet honey, but still telling me how to make the access control process simple and effective so that everyone could save money so easily. And, of course,
secure – to get access quickly and not to violate regulations.

management accounting, automation

IT-Expert Magazine [№ 01/2020],

Avast eliminates Jumpshot subsidiary through scandal

Avast eliminates Jumpshot subsidiary through scandal

Anna Savelyeva

Avast has announced plans to discontinue servicing its Jumpshot daughter and start eliminating it. The company has assured that all other products will continue to operate as usual,
users will not see any changes.

“Avast’s main task is to keep its users safe online and to control their privacy,” explained Andrzej Vlczek, Avast CEO. – Any
actions that compromise user trust are not acceptable to Avast. We decided to close Jumpshot after it became apparent that some users were being exposed
we have a dubious relevance of providing Jumpshot data to our mission and principles. ”

Jumpshot customers can contact Deren Baker, CEO of Jumpshot, for more information. Jumpshot will fully pay the bills of its suppliers as usual
order for the products and services provided. Jumpshot will also notify its customers in a timely manner of termination of data services.

For employees who have accidentally fallen into this story, the company promises to minimize the consequences of this decision. Recall that at the end of January 2020, the Motherboard edition claimed that
Avast sells customer data to large corporations through its Jumpshot subsidiary for millions of dollars. Even though there was no personal information, it was possible to install it
the identity of some users.

IT market, information security


The Ministry of Communications insists on a single 5G network instead of several

The Ministry of Communications insists on a single 5G network instead of several

Anna Savelyeva

The agency does not support the plans of fifth-generation operators in Russia and refuses to allocate frequencies without competition. “Big Four” is not jokingly worried about the prospect of falling behind
5G development.

According to the government’s idea, frequencies will be allocated without bidding to one operator, and he, in turn, will have to give access to a single network to all comers. Earlier, the market agreed on the concept
development of 5G networks, according to which Vimpelcom (Beeline), Rostelecom, MegaFon and MTS will create joint ventures to release the necessary frequencies. Subsequently, each participant will be able to build their own networks.
However, in the latest version, the Ministry of Communications returned to the idea of ​​an infrastructure operator.

The ministry found it inappropriate to set up a joint venture just to clear the frequencies. Yes, and clear anything: 3.4-3.8 GHz fully closed, 700 MHz consistent, and conversion,
the plan now being developed can only be implemented in the 4.8-4.99 GHz band. According to Oleg Ivanov, Deputy Minister of Digital Development, Communications and Mass Communications, this could
to engage the already existing LTE Union formed by T2 RTK Holding, MegaFon, MTS and VimpelCom for the same purposes with 4G implementation.

He also stressed that the option with the infrastructure operator will help participants to reduce costs by one and a half or two times compared to the construction of individual networks, and to create infrastructure
rather. According to the Ministry of Communications, the independent construction in Moscow will cost about 157.6 billion rubles by 2024, while a single network will cost 55.4 billion rubles. But if the operators
do not agree, do not see them frequencies.

“It’s one thing to create an industry-wide organization that gives access to 5G networks to everyone, and another thing – when specific companies try to share frequencies,
everyone is in their interests, ”RBC quotes him.

Operators, in turn, believe that this approach will not allow them to “flexibly choose in which regions, with whom, and under what conditions, to jointly develop 5G, as this is the key to maintaining
competition. Also, in their view, the concept will not solve the problem of spectrum shortages to ensure the fast-growing traffic flow, and simply delay the start of the standard. even
if they agree on the infrastructure operator and the single network, it still relies on frequencies.

5G, Operator, Telecommunications

5G in Russia

MTS | MTS, Megafone | Megaphone, Rostelecom | Rostelecom C, Beeline | Beeline

scorched earth

scorched earth

Andrey Kuzmenko

From ancient times, in all countries and in all peoples, there were decrees that one should understand the consequences of one’s actions and categorically not do fools on an equal footing. Regardless of
socio-cultural context human civilization brought out a set of rules to minimize life’s problems: do not spit in the well; Don’t cut the bitch you’re sitting on; both ring and respond. were going
centuries, epochs changed, and the wisdom of the ancestors began to be perceived as truism, as obvious banality, as something that does not carry valuable semantic load: do not do what is not worth it, and you
achieve what you want. However, ignoring the fundamental laws, regardless of the nature of such laws (physics, psychology, sociology), leads precisely to the same consequences from which we
prudently warned the wise ancestors thousands of years before the hour of C. Of course, the business environment and management practices were no exception. It suddenly turned out that
the obvious win-win situation can be transformed into its opposite. What does it take? Yes, just for everything, to “burn a clearing” …

Houston we have problems!

Recently, employers in the US are increasingly faced with the following situation: the personnel department recommended an employee for a vacant position, he passed the interview, agreed to
offered conditions, agreed on the day of leaving work, as suddenly the employee took and disappeared. As he dived into the water … At the same time, as they say, nothing aired. Well, it didn’t happen, it didn’t happen –
It happens. But the fact is that the phenomenon has become so widespread that it has become noticeable within the national economy: almost every fourth of the surveyed applicants (28%) is ready
The “chasm” after the successful interview ended! In this regard, even the article was published in Forbes, the Russian-language translation of which can be found at the link. It states that every such “disappearance” is costly
to the employer at almost $ 4500 .. How to estimate this amount? Well, for example, a man who gave up at a US flying school and wishing to get a job as a civil aviation pilot can count
for a salary of $ 50-60 thousand a year, which is about the same $ 5 thousand a month. Mnemonic rule: an employee who does not come to work costs a company one of his monthly salaries. In a situation with
Rates are rising in the IT sector: both in the United States and in Russia, under existing realities, earnings are higher here than in a number of other industries, and given the criticality of many projects to the time factor,
the situation at the employer can be catastrophic. As they say, who has not had time, he is late … forever. And this despite the fact that an explanatory employee is very difficult and often quite long after
time. In addition, IT professionals are characterized by increased labor mobility: he collected things, picked up a laptop, and found himself in another country. How did the Americans get to that life? Author of the article
Forbes transparently hints at one of the reasons, and I will use this hint to share my own thoughts about it.

We will call you back!

This phrase has become a parable in the tongues! Many have heard and spoken many. But not everyone knows where she left and what she really means. I also didn’t know it until a few years
so I did not get into the hands of Gavin Kennedy’s book “You can agree on anything!”. It has a very short paragraph in Chapter 17, “How to relinquish authority:” By the way, professionals are not very
love saying “no”, which is reflected in the classic phrase: “Thank you, we’ll contact you later”, and at the bottom of the page, in a note from the translator, is the original phrase in English: “Don’t
call us, we’ll call you ». The exact translation sounds like “Do not call us, we will call you”. Unexpectedly … Obviously, the first part of the phrase (Don’t call us), which is missing from the Russian translation in
to its original meaning, there is something key! I began to understand further and the situation became clearer.

If we consider the English language in the context of Western business culture, the meaningful translation into Russian will be something like this: now we are not ready to start with you
cooperation, because you are somewhat “not enough” to meet our requirements and wishes, but if it so happens that suddenly we will not find anyone better (which is unlikely), then here you and
we will call. Obviously, in most cases, there will be a more successful job applicant in the competitive job market than the one who was “promised to call.” However, “in the majority” does not mean “at all”!
In real life, there are situations where both “cancer and fish”, and instead of “crucian” it is quite possible to hire a “pig”. It is clear that not from a good life and not in any sphere, but the fact remains. Thus
so, at first, the phrase was not a “polite refusal”, as it is now called, but a strategy of engagement with the extractor: a rather specific tool for a very specific situation. And till
at times it worked, but then something went wrong …

And what if …

At some point, the staff responsible for recruiting staff at Western companies (especially in the US) decided to “drop” the first semantic part of the phrase and focus entirely on the second. already
it is difficult to say that this was the reason, but employers, represented by staff members and managers, decided to change the existing order in “their favor”. Simply put, a phrase from a section
instrumental was forced into the category of rhetorical, only here is the “official announcement” for those who on the “other side” did not. And why? We have the same business we are in
we use resources optimally, and there is nothing to spend time and money on any nonsense and other misfortunes. We have capitalism! Is it unpleasant for the applicant? But, as science science teaches us psychology, man
he is responsible for his emotional reactions, which means that this is solely his problem. Let him rejoice next time! And, in fact, that can counteract the prospect of such a “red
agility »? But the paradox is that there was no need to oppose the applicants’ side. For some reason, the employers’ side forgot that changing the entrance conditions is obligatory
will change the output. With careful burning of the soil to the basalt base, it suddenly turned out that it is no longer possible to grow anything here … Surprise!

The principle of “contract binding” is the cornerstone of the relationship between human society. By unilaterally changing the rules of the game to their own advantage, they were tempted to encroach absolutely
should not. To underestimate the fact of the original arrangements – is to translate interaction between people to a qualitatively different level, where everything (!!!), and not just one broken rule ceases
work, or rather, start working differently. Strict rulers of antiquity stopped this very cruelly: once, and there is no head in the amateur to redraw the basic way of public
interaction. And the applicants simply went to the “next level”, where they were so carefully pushed out. If we are not ashamed to turn the situation around in our favor, we will do the same! Well, for what
fought …

The IT industry has its own “corporate” wisdom: if something works as it should – don’t touch it! And in this situation, it works best! If there is any tool already tested,
has shown its practical utility and has clear limits of application, it is not necessary to do it “better”. A simple and short phrase that in some cases sounded the same people
for other people, it was understandable, productive and productive in the following context: if an applicant is objectively unsuitable for a vacant job, then he or she should be denied immediately
(Reasonable, tactful and friendly); if they did not refuse right away, but promised to call under certain conditions, which means “social contract”, then they would call. I would venture to assume
that the final trigger for the collective unconscious American was interviewing or appearing on such popular TV talk shows by staffing agencies that
enthusiastically uttered phrases like “In his career with 17,000 times he said” we will call you “, but never called”.

What about us?

And almost 30 years ago, the Soviet era ended and the New Age began, without exaggeration. The past is gone, and the future has only to be created. In this case, let’s be honest, nobody really
did not know how to do it. The Soviet system of education did not train cadres for a capitalist society, but economists (western format) were needed right away,
jurisprudence (commercial law), public relations, management, marketing and a bunch of other amazing disciplines for the Soviet man. And besides, it turned out that in the majority
the inhabitants of the post-soviet space were quite mediocre in foreign languages ​​and had a far-flung view of foreign culture (in the broad sense of this
words). As a result, the introduction of foreign techniques and approaches usually took place with the copyist, without any comprehension and adaptation. Once in the West, the interviewers ask why the hatches
round, we will ask that too. If they say “we will call you back” at the end of the interview, and they do not ring as a result, so will we. The event is rich and successful, everything has been there for decades
worked out, called best practices, that’s how we do it and eventually live.

In real life, it looked something like the one described in Alexander Derevitsky’s wonderful book: “when I had to interview with an avalanche of contenders rushing to me after
successful newspaper recruitment announcement, I was wrong – I trusted the recruitment of future employees to the secretary. I needed good sellers. It was important to me that they were nice people. And I asked:
“Lena, miss me only those you like.” – What about the others? – Let them leave their phone number, we will “call them back” …

And this is infinitely wonderful: “do not hang up, your call is very important to us, you will be answered by the first freed operator”, and you spend thirty minutes “hanging” in roaming and you cannot understand,
if your call is really that important, why didn’t anyone answer it?

They and we

In the context of American culture, indignation and further reaction began to grow because of the breach of the “collective bargaining agreement”, and we began to develop along the path of interpersonal conflict. to ours
the age-old question: “Do you respect me?” – an unequivocal answer was given: “Not only I do not respect, I do not even consider a person.” If Americans perceived the situation as a change in the rules of the game in the market
work, then we had a rollback to the institute of “class struggle.” Here is a quote from one profile blog about staffing: “… But my colleague, on the contrary, never calls back candidates in this case
refusals, and I was wondering why? I am not her manager and I cannot force anything to do, but here we had a conversation on this topic … I asked her why, to which she replied that earlier
she had always been involved, but when she was matched several times, did she start thinking that she might not even call? … The deciding factor was the candidate who started threatening her and,
after she just hung up, cut off all the company’s publicly available phones. That is why she does not call anyone at all in case of refusal … ”. Instead of
in order to mutually negotiate, positional confrontation began. And in both cases the result is losses. The hammer with the wai-fay and the touch-screen did not justify itself. To kill ordinary with a hammer
nails are much more convenient, faster and at no extra cost. The wise ancestors were once again right: nothing grows on the burned earth …


As for the practice of management in the field of information technology, it should be remembered that people working in it, as a rule, are well educated, intellectual, and most importantly, involved in large-scale information
streams: The internet has really changed the world and the people in it. In addition, many were abroad as tourists and some worked there. Therefore, they can answer in their personal experience
the question “how is it really?”. Enthusiastic juggling beautiful phrases managers will always be perceived by people as something with a minus sign. If the company really is
values, goals, relationships, processes, and results that are not ashamed of, employees do not need demonstrative presentations for their perceptions. When a manager tells employees every day about
the importance and value of feedback, and he is pleased that he can not be called simply by saying “we will contact you”, then he definitely cuts the bitch on which he sits …

IT personnel, team building

Business in number

IT-Manager Magazine [№ 01/2020],

A session of digital magic, or What will be written on the cage with the bull?

A session of digital magic, or What will be written on the cage with the bull?

Mikhail Susorov

We have gentlemen

it is customary to believe in a word.


More recently, the development of objective controls has lagged somewhat behind the development of actual control objects. In particular, in passenger aviation, black boxes (but in reality
bright orange spheres) began to spread widely only in the late 1950s. These were quite large and heavy structures, the principle of operation was reminiscent of a tape recorder instead of a tape.
Their appearance has helped to significantly advance the issues related to the study of the causes of various problems with aviation technology – if the record is preserved, then the chances of establishing the true cause
what happened was growing significantly. It is hard to deny that everything happened after the crew commander said, “Now I will show you all how I know” left on the tape recorder.

With the advancement of technology, these devices have become smaller, lighter, able to record more different parameters already on solid-state media, quickly transfer to the destination the necessary data and,
finally, they began to spread to other fields of activity. Various camcorders in entrances, cars, in cockpits, outside of airplanes, transfer of online taxi coordinates, controllers in
trains, anti-aircraft facilities for the control of various vehicles, video and radio transmissions with the transmission of information via the Internet can be attributed to such facilities. If something happens – y
today you will have information on the basis of which you can do useful actions for you.

The next logical step in this direction should be the means of objectively controlling the parameters of individual categories of citizens. After learning how to track the perimeter of a citizen’s home,
under house arrest, it is logical to automatically call for a bracelet (issued, as well as a bracelet on the foot, by the state), such as a single disabled person or a retired person if his / her heart rate,
breathing or pressure, measured with the same bracelet, out of normal? And if he did not suddenly respond – automatically call an ambulance. And if he answered, make sure
that it was the citizen who had to answer that he was in a position to take measures to restore his health to the norm, that he had all the necessary things, etc.
Technically, to implement this approach, everything is needed right now, is being produced in large circulation and is being implemented in systems offered by commercial organizations in the market, which makes them
not available to all citizens to whom they could benefit.

For the operation of such systems, information is continuously collected, stored somewhere, and stored for some time, which, in fact, is already provided by law. But the next question arises
more and more relevant – and how much can you trust the information that is collected in the future? Will it be objective and credible? Will it change during storage? It is worth changing literally
a couple of digits – and the meaning of the information can change dramatically. For example, what does a person’s birth date mean? And can there be a file with the creation date 02.32.1567? What is this, a programmer mistake?
Or the operator? Or is it not a mistake?

The main problem with online citations is

that people immediately believe in their authenticity.

In the not-too-distant past, there is one interesting discussion with colleagues now alive, whose assumptions, which at the time seemed fantastic, do not seem so today. It was about
making copies of material objects using molecular or even isotope-level technologies. That is, when we visit the Louvre, we see, for example, the Ritratto di Monna Lisa del Giocondo. And
we come to the Hermitage and see there the same smile with the precision of an atom. And modern methods of examination (in the case of copying, although the word “copy” does not reflect the essence of the phenomenon of isotopic composition)
will be able to distinguish one thing from another. Or from the third. And when technology takes a step further – a full copy of the Louvre will suddenly appear somewhere in the Urals. And the question is: what about
to consider this original if there are no ways to find the difference? Because numbering atoms, as well as numbering zeros and units of computer programs, mankind will obviously not learn quickly if
will learn in general. There is no question of creating texts in the style of a particular writer, and the question in the bookstore is: “Is there something new from Dostoevsky?” – very soon will cease to be
as a joke. Generators of scientific articles, reports on various topics for different audiences, and even poems and theses are already available to the masses right online. You can even assume
that this text is similarly written by some neural network for the purpose of testing it.

In today’s real world, we have fully accessible technologies for creating different moving images that are indistinguishable from reality on the screen (or multiple screens)
look. And soon it will be impossible to even be armed. Soon it will be possible to watch fresh films with the participation of Charles Spencer Chaplin or Vladimir Vysotsky in the performance of themselves. AND
it is no longer possible to distinguish the result of the computer from the image of a real person or an unreal hero from a fairy tale. Unless, of course, movies like this
“Gravity” in the cinema of the city of Korolev, where viewers with engineering education of the last century will watch this movie as a comedy, because the laws of physics were sacrificed by the authors of the picture
entertainment picture.

After all, if you add just a couple of details to the picture, it will look clearly more modern and more accurately reflect the essence of the action …

You just have to look more closely at this,

the future will suddenly come to itself

NV Gogol

If the attitude of a static image from a set of pixels is skeptical right now, in the era of photo editors, then further skepticism about moving images made with
the use of three-dimensional models of high sampling will only intensify. Where, for example, the same Vladimir Semenovich on a couple with Peter Alekseevich will fight in preference with Leo
Nikolayevich and Mikhail Vasilyevich, unhurriedly talking on a cell phone with Nikolay Vasilyevich.

The consequences of such a dynamic and widespread development of Homo Sapiens sensory technologies will be highly ambiguous. If now different pictures and video pictures can be considered at least somehow
corresponding to reality, it is not for long. Further development of various optical technologies will easily transfer a flat image from the screen into the usual three-dimensional world. And on the one hand,
Of course, it will be nice to see historical characters say so in action, go to a Louis Armstrong or Dalida concert, hear “original” Mozart. But on the other – they still remember which one
Orson Wells was sent to the North American United States by simply “forgetting” to warn the population that the artwork of his family member sounds on the air. And that’s only when
involvement of only one sensory body. What will happen to the audience when they see the Imperial Stormtrooper riding their Tyrannosaurus rex and hear
their battle cry on their own ears? Probably some part of it (graduates of engineering majors by far not all higher education institutions) will be able to assume that it is, for example, a hologram. but even
they, given the development of modern genetic engineering, are able to respond quite unpredictably. The bulk of the audience, first of all, will flood the Internet with videos, photos and will rush
into mathematical discussions about the likelihood of a dinosaur meeting on the street.

How much do you personally wonder about a photo of a video camera that shows your car made in Italy if you were in Argentina with your car while shooting? as
fast insurance companies will be swamped thoroughly srezhesessirovannymi and very similar to real DVRs? And just as “authentic” photos? How do you respond to
a situation where, when crossing the border, it becomes clear that the organism with the front of the head and fingerprints that the biometrics system recognized as being due to you is already on the other side
Borders? And the same organism is already the master of your property, showing all the same. How will your boss react if he is called by your CEO (naturally, with
his numbers) and will give a very short and specific instruction? We will add that in response to a call to the number of the general one will get to the same subscriber – base stations are now very widespread
phenomenon. And finally, does anyone have to teach a robot to sign documents identical to natural ones?


Based on the above, it is possible to give quite obvious recommendations (as long as the visualization technology has not yet broken into the surrounding 3D-reality) on the work with digital information.

1. Any information on any screen can be considered reliable only with certain probability.

2. Any information on any screen can be rearranged without leaving any trace.

3. Making digital reality a reality is relevant today, though not the easiest task.

digital transformation, digitalization

Business in number

IT-Manager Magazine [№ 01/2020],

ALP Group has set up a Research and Development Lab for ERP and i-ERP

ALP Group has set up a Research and Development Lab for ERP and i-ERP

The ALP Group Corporate Information Systems Department (ALP-IS, or DCIS) has announced the creation of a new ALP Lab unit to conduct research and
research and development work required to execute particularly complex customer projects, internal development projects, and to develop promising product lines and access to
new segments of the Russian IT market.

DCIS will work in the ALP Lab in several main areas:

  • R&D, allowing you to choose a way to solve any complex business problem with the help of information technology, and to improve the characteristics of such a solution by applying ready-made
    DCIS technology platforms.
  • Initial elaboration of the feasibility of creating new products for promising market niches (for example, for marking goods). The release and maintenance of commercial products
    is the area of ​​responsibility of the ISIS practice on corporate software development.
  • Finding opportunities to use new information technologies in ERP and i-ERP systems that have reached a level of maturity that allows them to be deployed without unacceptable risks for
    customer or IT company. Currently, these include: continuous process improvement (process mining), process robotization (RPA), data integration (with the simultaneous solution of different
    data quality improvement tasks), integration of i-ERP services and systems and centralized management, data analysis (including Big Data and classic BI), machine learning (ML), and
    different prognostic models.
  • Assessment of the maturity of other promising information technologies (eg, various II variants, “digital doubles”, enterprise management in real time) and timely
    updating the list of mature IT.
  • Identify ways of digital transformation of organizations that allow them to increase their flexibility and adaptability, harnessing the potential of information technology, while excluding or maximizing
    reduce resistance to the organization of innovations.
  • Monitoring the development of foreign decisions in the field of enterprise management, adapting new ideas to Russian reality and finding an import-independent option for their implementation, which gives
    real advantages for Russian customers.

As explained in the ISIS, the company sees many customer needs for which there are no adequate IT products yet. Ideas for their creation will be tested in the ALP Lab, where specialists
“Spun” the idea and find how to solve the problem beautifully, correctly and efficiently (based on 1C products, proprietary technology platforms and developments of DCIS, as well as products of other companies).
This will reduce the burden on other practices and increase the concurrency of work. Authors of ideas for new developments can participate in their development and benefit from the motivation system.

A virtual unit form is selected for the ALP Lab. It has a set of processes that support activities, concentrate required competencies and provide
consistency of technical solutions and repeated use of successful ideas, templates, concepts and other past developments. At the same time, employees of the virtual unit continue to participate
in the work of other JISC practices, and keep in touch with internal and external customers, understand their “pains” and changes occurring in the market.

ERP system

ALP Group

The capacity of the shadow market for banking customers’ data exceeded 1 billion rubles

The capacity of the shadow market for banking customers

Natalia Solovyova

The Garda Technologies Analytical Center (Intelligent Computer Systems Holding) has released the results of an analysis of the shadow market for Russian banks’ databases. The past is 2019
characterized by several large-scale leakage of financial customer data. Bases of financial organizations of Crimea appeared in open sale, there was a serious jump in prices for such shadows
data. The capacity of the shadow market database of the banking sector analysts estimated at an amount in excess of 1 billion rubles.

Background and methodology

Over 350 were analyzed during the study
advertisements for the sale of databases of banks and other financial organizations, which were found on the shady trading sites and social networks. Data hosted by abusers in the open
access or were there because of the negligence of the owners, were not taken into account.

Among the “paid” offers, which in 2019 placed on the market sellers, experts have identified 191 unique database of clients of financial institutions in different configuration.

The report provides impersonal statistics. Moreover, all owners of compromised data analysts of “Garda Technology” reported the leaks.

Victims of “shadow” business

Last year, 70 064 796 customers of 42 Russian financial institutions received open sales. A large part of them were federal-scale bases as well as bases
regional branches of banks. The highest-demand offers are the most rarely found – regional sorting databases.

By the number of sales bases of regional branches of banks, the unconditional “palm of primacy” was received by the Moscow region (493 thousand entries). Altai (478 thousand entries) was also included in the TOP of the leaders,
Nizhny Novgorod region with Samara (426 thousand entries) and the Leningrad region (355 thousand entries), as well as the Crimea (11 thousand entries).

Insiders are the main providers of illegal information

Analyzing the information on the completeness of the data and interviewing the sellers, the authors of the study, we can conclude about the sources of leakage.

The lion’s share of the products supplied to the information market – 91% of the data – is accounted for by the share of insiders, bank employees who cooperate with sellers. They usually sell the bases in xml format,
obtained as a result of unloading from automated banking systems (ABS) or additional CRM programs.

8% of data is provided by bank intermediaries – third-party lead generation services that offer to submit an application for selection and receipt of offers from banks, or employees of banks working on promotions
or in mobile offices. The information they provide is lists of names and contact information.

The share of information obtained through banking system vulnerabilities, database breaches or other external actions accounts for 1%. The collection of such data is usually targeted and high-budget oriented
customers. The databases contain a large amount of personal and banking information, and having a fraudster can easily simulate the actions of the client and withdraw money from his banking

Eternal values ​​of the shadow market: “fresh” unloading and VIP data

The cost of selling the banking sector database depends on a number of factors: the prevalence of the offer, the completeness of the data and their relevance.

Above all, unique bases are valued in the shadow market. For example, fresh off-the-shelf ABS shipments: the cost of one entry from such a base varies from 5 to 2,000 rubles. Average
the cost of a unique database of banking – 334 000 rubles for 30 000 user records.

Exhausted, replicated databases that are marketed are usually re-sold and sold on a massive basis. Here, the cost of one entry, depending on the volume of purchase can reach 50 cents. at
to the freshness of the database, the dynamics of pricing for replicated databases are less dependent on completeness. For example, information about VIP clients of a regional branch of a large
Bank, with passport data, card number and current account balance, current 4 years ago (for 2015), was openly sold for 15-20 thousand rubles for a base of 20,000 records. by
The same money could be bought from a fresh base of 300,000 paid clients for 2018, but only with full names and phone numbers of clients.

However, the most complete data occur in the illegal market is extremely rare. The main body of data in the open sales is Lida, personal data sufficient for ringing.

According to the authors of the study, the market of trade credit database of financial institutions shows a constant positive dynamics, which is explained by a significant excess of demand over supply. by
Compared to 2016, databases jumped sharply. If in 2016 the maximum value of one record did not exceed 10 rubles, then in 2019 it reached up to 2,000 rubles.

The average price offer in the market in 2019 is 175,000 rubles for 45,000 data of financial institution clients.

Impactors of illegal origins

The validity and relevance of the DB are the most pressing issues for the shadow players. Marketplaces, as well as official marketplaces, maintain their registers of “conscientious” and “unfair” sellers,
provide “guarantor” services and use other methods of dealing with “violators”.

According to experts, over the past three years, the parameters of the relevance of the data sold have changed significantly and “freshened up”. If in 2016 the bulk of the database hit the market with a gap of 2-3 years,
then in 2019, the market was literally flooded with traders offering fresh downloads of information. This change is attributed, first of all, to the change of the scheme of sale on the illegal one
market. If 3-5 years ago, as sellers, most often, insiders acted, “merge” the database after leaving work, then today sellers are engaged, mainly, the intermediaries who receive the data
at once from several informants and protect their anonymity.

However, the database for 2016, which accounts for about a third of the illegal financial institutions data market, is still relevant. Most users whose data
“Leaked” to the Network, in three years did not change either passport data or account number, and their financial status also remained approximately at the same level.

Banking data shadow sales are up 25% annually

In 2019, the total value of openly sold database of financial institutions exceeded 345 million rubles. However, according to analysts of Garda Technology, the actual capacity of this market is 1 039 632
336 rubles. According to experts, the database lifecycle does not end with a single sale. On average, open market databases are sold to different buyers three times. Number of sales
limited due to market features. Spent DBs can also be sold again at a discounted price or in bulk with other databases.

Compared to 2016 data, the shadow banking market increased by 76%. Such dynamics, in comparison, correspond to the average growth rate of digital services, cloud services and the market

finance, security

IT-News Magazine,

OPPO started to cooperate with DNS

OPPO started to cooperate with DNS

OPPO has announced a collaboration with DNS, a digital and household appliance retailer. The brand’s stores will feature six brand models: Reno2, Reno2 Z, A9 2020, A5 2020, A5s and A1k.

On this occasion, the purchase of OPPO smartphones in DNS stores will be multi-action: consumers will be able to make installments 0-0-12 or get 10% bonuses on ProZaPass card
the cost of the device.

Discounts on kits will also be available. When buying any OPPO smartphone, complete with a protective film on the screen and a case, the buyer will be able to purchase any other discount
mobile accessory and will save from 1000 to 5000 rubles.

The DNS retail network is represented in 400 cities of Russia and has overcome the bar of 1,500 stores.

The Reno2 series of smartphones focuses on camera technology and design. OPPO Reno2 and Reno2 Z are equipped with a four-module camera system and a unique sliding module of the front camera. In the series as well
uses 5x hybrid and 20x digital zoom and video stabilization.

The A-Series relies on a long-term recharge and is dedicated to the Z generation, while the A5 2020 and A9 2020 are the latest lineup updates the company introduced in the fall.

retail, Distribution

Oppo, DNS