Wednesday, March 4, 2009

Protection is free

"Plizzz give a key for antivirus, ceased litsuha"! Who among us has not seen the mountains of such requests in the network? Some may even remember their similar requests. But what is behind them? Personal financial crisis? Conflicting desire to feel secure using unsafe hacked antivir? Single answer will not bring anybody, but you can definitely argue that this is a mass delusion, of which we now try to get with you.

Do you know, dear friends, that to date the number of illegal users of licensed software security outnumber legitimate? This is anecdotal evidence, because officially confirm it yet very few people capable of, and even those who could officially confirm it, usually for one reason or another do not do. What is the problem, do anti-virus and firewall redirector in fact so expensive that many people can not legally allow them yourself? Oh no, not, it is not the point. Just the mass of people everywhere and in all prefer that the well-advertised, what say, only in narrow circles (on this logic, by the way, they would be worth to trust their intimate secrets no better friend in the lurch proven, but, for example, Philip Kirkorov). And if it is also possible to get "for free", the desire to increase twofold: "Not only that I have a very cool and popular antivir, so I still use them, as the cool gangster - FREE!" This is the first comprehensive reason. Investigate whether this is really cool.

A little to the issue of the popular antivirus

The topic is not easy, so a little bit aside from the main issue to think objectively. What kind of cars most often stealing? True, those who are in great demand. It is clear that there are "special" and "accident", and other exceptions, but most cars are popular - that is statistics. Next kinematics fleeting glance at a familiar problem to us. Under what Axis is written in dozens of times more viruses than for the rest combined? Again you are right - of course, by all adored "Wind." Why should ordinary hacker-kryakeru a month from morning to night over the worm plug for "conquest" of the world? It is quite satisfied and 90 percent (well, a plus / minus / taxes ...), but to write "zlovreda" under Windows guy spends less than a week. Therefore, in practice, despite all the frightening statistics and advertising, sitting under an Ubuntu without anti-virus, you risk your data even less than under Windows with the latest security system. True, Linux still also need to be able to fine-tune for the safe operation, so that you can take it that I exaggerated a bit, although I do think what is =). And now think about the major current issues. Imagine a huge worldwide network of ground. They drive tanks, soldiers running around, flying planes and vanity in a panic plain - users of the popular operating systems. That he is constantly screaming in loudspeaker: "new yellow suit is now a much more powerful than the old red, just buy it - it not only protects you from bullets, but from small fragments, even ..." And this multi weight wears (or rather, barely moves his feet under the weight of the built-conditioners and other vital equipment), but do not think that this bright massive hull only draws attention to the enemy and slows movement. In fact, you will be better protected by using a lightweight, but nebrosky flak jacket. Indeed, the bulk of new viruses can circumvent popular defense, and to bypass the less well-known pro crackers often simply do not want to waste time because of the low popularity of these security features. Hence arises the paradoxical balance between the powerful and popular antivirus malopopulyarnymi serednyachkami. Protective mechanisms of the leaders in the security field there are more, but more effort is spent daily virtual criminals in search of ways to circumvent these protections. The choice, of course, is up to you - I just gave you the information to the meditation. Now we proceed to the consideration of price / quality security software.

Fee-based, free, stolen

By purchasing a license software, you are in the vast majority of cases, not only to pay the developers, but also acquire professional support on all possible subjects. By phone or e-mail always available to assist you with any software installation, setting, prompt settlement of options for exceptional situations. If you are using a licensed antivirus or firewall redirector, the developers will try to advance to warn you personally about the new virtual threats and how to combat them. In this set of services and is a simple and reliable method of paying security. The only negative here is that for such services must be paid. What should I do? Free cheese is only a mouse. Or not?

There are a number of free information security systems. They are often produced by developers of toll products to attract the attention of the user or independent developers who wish to thus protect their networks against attacks from infected machines: in order to prevent a pandemic of plague medicine should be free for all. In most cases, these programs have all the basic virtues of paid counterparts, although support for these products can be minimized or even absent. But do you want for a price of zero rubles and zero cents, you not only have developed a full product, but also gave full support? For these purposes, the Internet is a huge number of forums for the exchange of experiences on which you will always have something that will advise and explain everything that was not before a hundred times already explained. Do not want to pay money - use the free version. Even taking into account some of their shortcomings on the paid counterparts, they still give you more assured protection than hacked selling product. Today's giants in the field of security by contrast are well aware that the lion's share of their products being used illegally. Once and for all stop this is impossible, and such action would materially lessen the visibility of the product masses. Therefore, the major developers of antivirus products do not try to completely prevent the possibility of illegal use of their product, but only imperceptibly to the user reduce the effectiveness of protection. Such an approach makes much more valuable results than the outdoor ban. A person who uses the product illegally, sooner or later noticed some annoying bugs and a broken anti asked to move to a legal version of the product, whether paid or free line representative for virtual security.

And bugs are different:
- Release date signature database is already different from the current more than a month, and the program continues to argues that the framework is relevant;
- Unknown processes overload the machine, significantly slowing down the system, but the antivirus persistently said that the system is clean;
- Hanging and unexpected departures of antivirus software, etc.

Although, by and large, listed the symptoms do not necessarily indicate that you are using the illegal copy. The reasons for all this, of course, may be canceled, and no error, and rare, but tags are achieving virusopisateley. Nevertheless, the authors placed the license of software, and will be put to put more and more cunning trap to the illegals. Therefore, always be thinking a few hours before deciding to entrust the protection of your computer cracked antivirus. This is not much more reliable than the protection of his own apartment from thieves secret way to connect to a neighbor alarm. Now, I hope you understand that guaranteed protection for your computer will have to fork out a bit. If only enough money for a computer and a widescreen monitor, it is worth finding free antivirus and firewall redirector - perhaps not the most convenient, but nevertheless, it is a reliable way to protect data. Using hacked antivirus and firewall redirector, you can if you are for someone to pay - then you can for that money to insure your data and get financial compensation (for drugs) in the event of their loss.

Summing up

In general, the case clearly that the cause of the dark =). Of course, with a bad habit is easier to accept than to fight. "Worth my kryaknuty eset or Casper, and everything in order with him always," - many will think, and I will not argue with them. There are people who do not update the signature database for months and even years. They have a different perception of the virtual world, they feel safe, if known, the antivirus is installed so that the spices, which itself does not feel comfortable even for three licensing system security. But this material is not for them. They are even afraid that the majority of free antivirus no Russian language ... What? And you're afraid of? Do not be afraid that such a view, if you know a lot of red pop-up windows kryaknutogo his counsel, except for the words "Warning," "virus found", etc. Still the most important messages of protection - it is non-translatable names and number of blocked ports. And if it scares you, because you can search and Russifier;). Do not worry because of the fact that you have little or nothing at all heard about free ways to protect information. After all, a huge percentage of the sale of fee-based program is to their advertising promotion, and even free products to produce profitable, not that that spin. Such products are rarely hear coincidence - they even purposely sometimes quite difficult to find. Nevertheless, it is quite possible, even introduce you to each of them closer this time, I no longer work. Search engine to help you, and the magic word "free antivirus" sosluzhit you good service.

And now that's all. Thank you for your attention to new meetings!

"Get Money for Clicks" - Fastest Growing Domain Parking Company in the World.

Banks under fire. Malicious software vs. financial companies.

WASHINGTON - FEBRUARY 12:  Former Homeland Sec...Image by Getty Images via Daylife

For many people, the word «hacker» associated with the word «bank». This is not surprising, because for several decades, crackers, who like to «get» a lot of money to pay their tactical look at the banks. And this is understandable: that may give the greatest amount of money, if not an attack on a major bank?

But break the servers that control the transactions and accounts - it ungrateful. That will attract too much attention, and increased attention increases the risk of being caught. It is therefore much more interesting for an attacker with a very different version - it is to gain access to the assets of the bank's clients. Everything is simple enough: less than the scale-breaking - more likely to remain at large - is inversely proportional to, in mathematical language. It is at this, I would like today. In this article I will explain the following points: the type of work, and malicious software that specializes in banks and other financial organizations, social engineering techniques used by crackers, an attack that takes place in order to get account information, or to intercept the transaction management. And also to reflect on the theme, «but as to avoid».

Financial malware - it is called zlovredy are targeted at financial companies in the classifications of anti-virus laboratories. In doing so, monetary malware may include not only the program of one class (for example, not only Trojans-daunloader'y but keylogger ', etc.). To begin with, I think, would be useful to run a little bit of statistics. This is help us in understanding the current situation at the moment, and its contrast to the situation that occurred in the past.


According to Kaspersky Labs, after reducing the activity of writing financial zlovredov at the end of 2006 was marked by a sharp jump in the number of the network, which has already occurred in 2007. Pay attention to the schedule (Fig. 1) - shows that the jump was not impulsive, but just the opposite: the average is almost consistently kept at a sufficiently large. Naturally, the increase in the number of malicious software aimed at finance, and brought to the increase in attacks on banks. The current situation is slightly different, because values began to decline (see chart), but the number of attacks on the banks remained at the same level. The first reason that led to this turn of events, I would like to highlight a wide choice of technologies attacks. Crackers are using different techniques as a matter of fact, and not all of them require the participation of malicious software - hence the difference. The second reason is that most burglars prefer to modify the finished program, rather than write something completely new. This is understandable - why sit for several days, if a couple of hours?

In the main bank zlovredy targeted to a specific region. This led to the creation of software that can carry out an attack on some banks (usually 1-3), typically located in the same region. An attacker can not prepare zlovreda for the bank of another country before you are not acquainted with its structure protection, and make it easier for the whole bank, which is handy. Below is another graph, which reflects the percentage number zlovredov able to attack more banks (Fig. 2). Moreover, in recent times there has been the introduction of or attachment to the type of financial zlovredam rootkit (rootkit) technology, whose main task is to protect the malware from antivirus systems and technology verification. Given that the root-kits are now at a fairly high level of development, and technology allows successful anti cheat, it is difficult to work well antivirus laboratories.

By means of protection concerns and polymorphism, but not one that you all think. The point is that classical polimorfik viruses easily determined by antivirus scanners. At the next level of development has been actively used server-side polymorphism, which is that the script will update the code is not in the body of the virus, but on a remote server. Thus, the algorithm of the script can not be analyzed, and thus determine zlovreda much more complicated - just generic-detection (detection of the common grounds of malicious software), but it is not so reliable as the signature.


Phishing mules and money (money mules) - two techniques of deception. In doing so, the first designed to steal information from people by deception, and the second - «clean» the stolen money. Let us in turn. Activities list «linden» letters is still high - this suggests that deception is effective. Users fall for again and again. The reasons for this are could be several. Perhaps the most foolish - disregard information about phishing lists - our traditional national «maybe proneset». The second reason can be described as a simple lack of awareness of users in terms of security, as a result - ignoring the message that there is no certificate. In general, the outcome is the same - you no doubt passes on the link and enter data about your account (a plastic credit card) in the form of fake bank website. There is also fault the banks, and it is that in most of their security systems using static passwords. Attacker to receive a password and access to an account in his pocket. Change the situation can only dynamic passwords, which can sent to the client by mail, SMS or just transferred into the bank on the media. However, most banks prefer simple static passwords - this is their weakness.

Money Mules (still referred to as drop), as I said, are designed to «wash» money. It is all quite simple: the vacancies posted on the website ad. «Finance Manager», entering into the contract, have no suspects. When financial mules used by the system of electronic money: the purses come mule means that it must be translated into other wallets, while keeping a commission of 5-15%. This helps the machine to avoid penalties if the operation would be revealed and traced the bank or the officials. In addition, the mules, in most cases be treated as accomplices, so do not hang tag «easy money» in this lesson.

the Net

I think that the subtitle seemed strange to you. I will now make a little explanation: it collected information about all the attacks, which in one way or another connected with traffic, its transmission, etc.

First in the queue is the attack, which is widely used for breaking them - to divert the traffic. One of the easiest ways is to change the redirection file hosts, which is located in the rute system at system32\drivers\etc. With this file, you can avoid requests for DNS-server. These servers (DNS) convert domain names into IP-addresses, because the request to the server can only be at. If in some way to change the file, you can ensure that when you enter a certain domain name request will be sent to the fake server.

The next list will be already familiar to many and not once described me attack MitM (Man-in-the-Middle). Let me remind you: this attack is, as is clear from the title, that of service-recipient and host-sender, there is a channel to intercept the data. Naturally, the data sent by the user, may be modified or «podpravleny» to obtain the desired result of an attacker. Naturally, the interception takes place through financial zlovredov, who worked as a spy on the target computer. In such cases, the owner of the account in the Internet banking could trigger a transaction and podpravlennaya information daily on the server, make another one.

Another technique of the attack, which belongs to the new school, a Man-in-the-Endpoint. This attack is different from MitM'a only that the change in traffic is not on the «middle», and on the local machine. The time, of course, much more, but for the illegal transaction does not present any extra IP, which, again, reduces the likelihood of attracting attention. The process is roughly the form: Trojan infects a system and sends traffic to the remote computer, where virusopisatel, analyzing the information, prepares for another trojan attack to a specific bank resource.

And what can we do?

Clearly, that protect the banking system permanently, it is simply impossible. When the main drawback was static passwords, the problem solved (and very successfully) any zlovredy who intercepted keystrokes or fraudulent forms to the fake sites. When all the wake and were put into service a system of dynamic passwords, it decided the problem with static, but the attackers did not stop - the battle went attacks aimed at the traffic. Therefore, the only thing that can be done - to keep the state, to Science and analyze suspicious transactions. It will decide the part of the problem, and the remaining part should be addressed by continuing to update security systems, as in the war Hack vs. Security resistance varies in two directions and is not likely to come into balance more than one century. Therefore, everything depends on the speed. Unfortunately, the losses from attacks on financial institutions to grow, that pet peeve. Therefore, it is hoped, only for professionals in the field of IB, which, under the force in some way to bring some stabilization in this field. At the finish, I - I hope that the information led you to think about the situation, and most importantly - on its state:).

"Get Money for Clicks" - Fastest Growing Domain Parking Company in the World.

Software perspectives

In the first days of the new year, as in the past few weeks last year, IT-community of Russia and the CIS countries are actively discussing the short and medium term regional software market. However, even more so than many on the market, but the entire software industry in the post-Soviet space. Interestingly, the various participants in the debate are sometimes to the opposite conclusions.

In 2007, the Russian market run software grew by 35%. According to experts, the turnover on the Russian market run in 2007 - m amounted to $ 3.7 billion turnover of Russian companies in the world - $ 1.7 billion in 2008 on the Russian market has already risen to five billion dollars. To obtain similar figures for the entire CIS, it is enough to increase the performance of the Russian one and a half times. The structure is sound boxed software sales in 2008, according to the study of association of independent software developers ISDEF, is as follows: 65% sales fall to corporate clients, 20% - in the public sector, and only 15% of software products acquired private users. And the progress - even a few years ago, private (household) users to provide less than 5% of the market for software - piracy is the norm, albeit slowly takes the position. However, all these figures from the experts ambiguous attitude. For example, Famatech CEO Dmitry Kurashev believes that «an objective assessment of the real software market is not easy: the financial information of most IT-companies will not be disclosed».

However, market participants concerned about something else. In the structure of the software market as the reasons for its rapid growth over the past few years, laid, say experts, «mine, finished sdetonirovat at any time». The point is that the mechanism by which to grow sales, was completely identical to the mechanism of growth of the raw materials of Russia's economy. Head of Sales Softline explain these mechanisms as: «The growth of sales of software depends on many factors. Of course, one of the key factors include the redistribution of income from the commodity market, then there are companies that earn more, are willing to spend more, including the acquisition of licensed software. Now, in a crisis (and the fall in oil prices), deprived of easy oil money, private corporate clients can sharply curtail the purchase of software. And that 65% of the market. Already about 70% of Russian companies have taken steps crisis, and many of them save including the updating of existing IT-infrastructure. Of course, the software market believe that just to save on software does not. Thus, the CEO of Alawar Entertainment Lyskovsky Alexander (who is also chairman of the Association of ISDEF) said that the «cut costs by refusing to license the software - still, that does not have to save». Well, director, online supermarket for Softkey Felix Muchnik sure that «Reducing the cost of IT in the company - this is the same as a dismissal of a cook in a restaurant». But not only corporate customers reduce spending on software - private users are not lagging behind. This indirectly contributes to the fact that in 2008, according to experts somewhat overshadowed the process of Russia joining the WTO. And with that, and decreased activity of law enforcement officers in the field of intellectual property protection, including the fight against piracy. Private users feel more secure that there is a negative impact on sales of software for home PCs. Another trend is even more curious: as noticed by experts, private consumers began, where possible, use free software, replacing the expensive commercial programs non-profit counterparts to have less, but sufficient functionality. That is, we can say that the level of technical literacy average user is increasing, along with his legal knowledge.

Summarizing all the above. Year 2008 financial plan was for the most successful software companies in Russia and CIS countries in the history of this market. But by the end of the year the situation has been very heavy, near-critical. And now the company is seriously thinking about how they survive at all in 2009. For information on how to realize the huge potential growth market, that market participants will consider later. However, the most farsighted begin to act now. The Russian company Softline has launched a venture fund volume of $ 20 million fund will invest in small companies engaged in software development. In Softline believe this area is very promising, while noting that the financial crisis is difficult to look for new projects.

For information: company Softline operates on the market since 1993. The main area of activity - sales of software. Also Sofline is IT consulting and training. Turnover in 2007 amounted to $ 292 million, exceeding three times the figures of 2006.

Child venture fund Softline Venture Partners (SVP) is planning to invest in software developers in Russia and CIS. This told the head of corporate finance unit Softline Igor Chekun. At first planned to use their own funds, while total fund intends to invest in start-up to $ 20 million Igor Chekun said: «The company is considering investing in start in the field of software development, which have interesting developments in various fields of IT-market. We would like to make the first investment in the first half of 2009 ». Softline now considering the possibility of attracting funds from the fund «Russian Venture Company» and other investors. The volume of investment in one project will, on average, at $ 500 thousand - $ 1 million fund is scheduled to yield at least 35%. However, other market participants are not confident in the success of Softline Venture Partners. Top-manager of one of Russia's largest venture funds said: «IT start-finding in the current environment is not easy - there is almost no new projects under construction. On the other hand, existing startups poumenshilis appetites - they are willing to negotiate with the venture capital community on a much more favorable conditions for the funds ». According to the Director of Venture Capital Investment «Troyka Dialog» Artema Yuhina, in the presence of free funds to invest in IT - one of the best ways of investing money. In turn, the director of a venture investment fund ABRT Nicholas Mitushin sure that the project venture fund Softline be successful, as the company invests its own money to the project. Mitushin said: «Investing in a software company so well that they almost immediately generate revenue and save money. Example - a company dealing with virtualization».

"Get Money for Clicks" - Fastest Growing Domain Parking Company in the World.

Trends in the development of mobile solutions in 2009

Person with PDA handheld device.Image via Wikipedia
Apparently, in 2009, significant changes occur in the market of mobile systems. This will be the year when the mobile way of life will become an integral part of reality. With the advent of mobile Internet devices (Mobile Internet Device - MID) and netbukov access to mobile computing and the Internet. Mobile devices have become a well-deserved popularity with many different types of users - kinomanov and designers, young people and children, social workers and inveterate gamers. Interest in these technologies is growing inexorably, and we are seeing the emergence of new patterns of use of mobile devices. They become kontekstnoorientirovannymi, ie provide the user with information in accordance with its current location or needs.

The rapid spread of super systems

Since in 1981, was the first mass produced laptop computer, notebooks have become the main impetus of the market of mobile computing. Sales of mobile systems worldwide is growing at a pace that is projected in 2009, they constitute more than half of all PCs sold in the world (about 170 million units). Netbukami similar to super laptops, already interested in inveterate fans of the Internet, people wishing to have additional PCs, and children. These devices are typically used for simple computer tasks, listening to music, working with e-mail communication in social networks and web-surfing, and their popularity is growing steadily. According to DisplaySearch, just before the end of 2008 will be sold more than 14 million netbukov.

Mobile Internet Device (Mobile Internet Device - MID) - another category of super systems. These handheld computers are ideal for those who need all of the Internet on the go. They are ideal for Internet applications such as video, music, games, blogs and e-mail. In early 2008, Intel Corporation introduced its most diminutive Processor Intel ® Atom ™, which is designed to create a super system. The emergence of this powerful processor is a prerequisite for the creation of mobile computing devices, new categories. Some manufacturers have already launched similar systems on the market. In 2009, the expected expansion of the range and geographical spread of devices in this category. According to the ABI Research, total production of these devices will grow to super 10 million units in 2008 to 200 million in 2013. In 2009-2010 is expected emergence of the next technological innovation. Intel Corporation plans to begin production of its next MID platform code-named Moorestown, which will allow to expect further improvement and development of devices in this category. Innovations implemented in this platform will enhance the market of smartphones and will help to create communication devices MID. Manufacturers are already actively developing this area, and soon the new hardware, applications and functionality - from the global navigation systems and determine the position (GPS) and mobile TV receivers and voice and video devices on the basis of service Skype.

Mobile health

Features Intel ® Health Guide - Personal «Medical Assistant» - is much broader compared with the opportunities available today, the remote monitoring systems. This device is not only equipped with a wireless operating system for the transmission of the main indicators of the patient's body, and alarms, but also allows the physician to communicate directly with the patient through a video connection. The attending physician can not only remotely interact with the patient, but also constantly receive the most current medical data. The device is designed for people who do not require hospitalization, but suffering from chronic diseases - heart disease, diabetes, hypertension or chronic obstructive pulmonary disease. Do not forget the essential moral support. Many people are very reluctant to agree to undergo treatment at the hospital unless absolutely necessary. Intel Health Guide enables them to receive
high-quality care, while at home. This device also helps to cope with the problems associated with the aging population and increasing number of chronic patients. It was expected that in 2009 a system of this type are widely available on the market.

The devices, which communicate in social networks, even in the way

Social networks have become well-established phenomenon of our everyday lives. On the Internet regularly have new forums on a variety of topics. As in other cases, members of social networks want the device to communicate even on the road. In 2009 and subsequent years will be significantly enhanced mobile access to sites based on the technology Web 2.0, to create their own content. Informa Telecoms company issued a forecast that by 2012 almost a quarter (23%) of all mobile phone users will use their devices to communicate in social networks. The growing desire to constantly stay in touch quite understandable, but not all sites of social networks support mobile access. MID devices might be a solution to this problem - they offer full Internet access and supports all formats of information. In 2009, due to the expansion of mobile access to social networks will increase the demand for easy and convenient device, as well as access to the Internet, does not depend on the location or site that he wants to visit.

The development of innovative devices

At the Intel Developer Forum in 2008 introduced the concept Intel UrbanMax. This unique design provides a new perspective on the usual principle of tablet PCs.

It requires a screen that can move, shape and lay out, full keyboard and optical mouse controller, a built-in key space. Such devices are of different feelings. They may be called the «excellent», «pleasant at first sight», or «supernatural», but it is very thoughtful design feature - to attract your attention and raise questions. And among the thousands of barely distinguishable between the mobile systems for all possible applications of the device based on the new concept of the difference between a measured combination of sound design, usability, functionality and attractive appearance. But now there are devices that are truly genuine surprise. Precursor devices in this category came the summer of 2008 - so jeans Beauty and the Geek. The flexible keyboard is placed on the leg, loudspeakers affixed to the knees, the mouse is in the rear pocket, a joystick - for the lightning. Undoubtedly, these tehnodzhinsy severely altered the meaning of mobile computing. Unlikely that you will find these jeans to collapse during sales, but it ironically reflects the view of the promising trends - fusion of mobile computing and everyday life. Perhaps, in 2009 within the framework of recent initiatives on the design of devices MID, conducted in the Czech Republic, a more innovative solutions. Ordinary people propose innovative ideas - from the glamor of accessories to futuristic gadgets (

Mobile Games

The popularity of computer games has remained at a high level - according to the JPR, the total market value of the PC game in 2008 exceeded $ 20 billion in 2012 is expected to increase to $ 34 billion, while increasing the share of notebooks as compared to desktop PCs.

The trend of growth will affect not only the PC. The popularity of handheld gaming devices, too, will go up. According to Juniper, the market of mobile gaming devices will grow from $ 5.4 billion in 2008 to more than $ 10 billion in 2013. During 2009, gamers can experience the unprecedented pleasure, because Sales will be several models of gaming notebooks based on the advanced quad-processor Intel ®. After the release of the revolutionary model of ASUS G71 at the end of 2008 gives gamers the emergence of other new products. This fantastic mobile system designed specifically for games. Thanks processors Intel ® Core ™ 2 Extreme processor for mobile PCs have opened up new possibilities for games and multimedia on the go.

Kontekstnoorientirovannye device

Imagine that you are in Shanghai and lyubuetes Majesty buildings and continuously boiling the life of one of the largest megacities in the world. There is only one problem - you do not know the Chinese language. But in reality it's not a problem. MID with appropriate software allows you to perform interpretation and translation of inscriptions on the houses, restaurant menus and conversations in real time. And this is not a fantasy: some applications that support it to a new use, is available now. Today, to obtain information from the Internet, you must first comply with its search. But soon a worldwide network will be more proactive, predictable and kontekstnoorientirovannoy. This means that you need information or services will be provided, depending on the location, time and situation - the system will anticipate your needs. For example, while in the store, using the built-in camera, MID, you can get additional information about a product that you want to buy. Enough to photograph the good, and the MID will be automatically associated with the product reviews and user feedback. In 2009, expected to release set of applications that support such functions, as well as increased use of wireless technologies to provide accessibility to information in transit.

Internet anytime and anywhere

The era of pervasive broadband wireless connection is not far off. Let us recall technology WiMAX.

In 2009, a significant step forward in the development of wireless networks thanks to mobile broadband wireless technology WiMAX, providing affordable communications with the speed of data transmission at the level of a few megabits per second. Will provide sustainable cover large areas, and users who want broadband connectivity on the go will have a greater degree of freedom. What's even better, dvuhstandartnye adapters Wi-FI/WiMAX, which are equipped with notebooks based on the platform Intel ® Centrino ®, allows users to stay connected. In 133 countries, 407 networks have already deployed WiMAX, and during 2009 will be a lot of new networks in the Americas, Europe and Asia. WiMAX Forum has over 530 companies including Intel, Nokia, Motorola and Cisco. His task - help in the development of wireless networks and encourage the development of certified devices, providing the best quality. Among the many devices that are already supporting WiMAX, are the Nokia N810 Internet Tablet WiMAX Edition, which has a maximum capacity of connections. Now, mobile employees and fans of online entertainment will not have to choose between speed and mobility. Be prepared to appear in the coming year an even larger number of devices with support for WiMAX.

Mobile security: the invisible eye

People who have a laptop, afraid of losing it or are afraid that it may be stolen. Such thoughts can really spoil the mood of any but the most important thing - that this trouble would have prolonged adverse effects. For commercial and governmental organizations, constantly working with sensitive information, it can become a disaster that will cause difficulties in the work or the lawsuits and fines, or even lead to loss of business. All this can be accompanied by the uncomplimentary comments in the media. Despite the strong concerns and greater attention, the number of accidents and related data theft is not decreasing - on the contrary: they occur with increasing frequency. Concern is the fact that, according to the Institute Poneman, more than 50% of professionals in the mission are kept in their notebooks confidential corporate information, while 65% do not take any action to prevent loss or abduction of their systems. In 2009, the IT department will be able to get this situation under control through the introduction of tools for remote tracking of laptops and an active protection of data against unauthorized access regardless of where these systems. Hardware technology to prevent theft of data and their PC will soon become a necessary component of business notebooks. New technology allows us to detect potential criminal situation and respond to them in accordance with the programmed IT policy. As has already been selling laptops with enhanced protection. They realized the additional features for remote disconnect unauthorized users, as well as to delete or lock the hard drive when the system is declared lost or stolen. Integrated solution for remote control of a corporate PC-based Intel ® Anti-Theft PC Protection and for Absolute Computrace. Such manufacturers as Fujitsu Siemens Computers, and Lenovo, have already announced the early release notebooks with the functions of protection against abduction.

View in Mobile mode novelties from the world of video

Today you can decide when and where to look favorite movie. You can familiarize themselves with the novelties of cinema, even in transit. CD Players and DVD are included in the standard configuration of today's notebooks, but in 2009 a list of supported video standards will be significantly expanded. Laptops processor technology with Intel ® Centrino ® 2 allows you to watch high-definition video in a standard HD-DVD and Blu-ray.

We are entering an era of digital movies and music, so our shopping habits are also changing. The largest online music store Apple iTunes Store (iTS) began selling digital movies in June 2008 and has already taken a leading position in the British market of online movies. In iTunes purchased daily or take out more than 50 thousand digital copies of films, watching people around the world. Another popular entertainment - watching TV on the Internet. One of the examples of best practices in this area - the service of BBC iPlayer, which the audience is constantly growing. In November 2008, the British Broadcasting Corporation BBC announced that, through this service has already seen about 250 million TV shows. The audience appreciated the unlimited choice of place, time and conditions for viewing their favorite television programs. During the 2009 range of programs and films available through this service only increase.

Future prospects: mobile laptops and PCs with variable shape

After 2009 a lot of innovation that will take mobile devices to new levels of functionality and capabilities. Users now look forward to the technologies that could completely change everything about the mobile devices. All users have certain claims to the mobile systems - from the time of the battery is not always convenient to form these devices.

Imagine that you are at the airport or other public place, and your laptop battery is not discharged and recharged. Based on the principles of open physicists at Massachusetts Institute of Technology, Intel researchers are developing technology for wireless power Wireless Resonant Energy Link (WREL). It is expected that this technology will help ensure safe and efficient power without wires. A new revolutionary development based on the use of its own oscillation frequency receiver cavity. Similarly, a professional singer can make the glass vibrate and even break it using only your voice. If your laptop will be a few meters from the radiating cavity, the battery starts to charge. Let's again look to the future and present computing device that changes its physical form, depending on the method of its use. Intel scientists are conducting research related to the application of millions of tiny mikrorobotov, also known as catom, for the manufacture of materials with variable shape. Disappear usual concepts: body, screen and keyboard. Mobile PC will be very thin when it is in your pocket, take the form of telephone handset, when you want to call, and become large and flat device with a keyboard when watching movies. Of course, such technology will be in a fairly distant future, but Intel Corporation makes every effort to bring this time.

"Get Money for Clicks" - Fastest Growing Domain Parking Company in the World.

Silicon Valley and its «honest children»

City of BerkeleyImage via Wikipedia

The phrase «Silicon Valley» has long become common nouns - now they refer to any techno, all separate areas of concentrated high-tech production and development. But those who use this expression, as a rule, very little is known about the history of the same - the first - the Silicon Valley. Let's try to fill this gap.


Silicon Valley - District of California, featuring a high density of high-tech companies - especially computer and telecommunications. Silicon Valley is located in the vicinity of the San Francisco Bay: in fact it is a space between the cities of San Francisco and Los Angeles. Today, the main factors of this valley, a phenomenon referred to as the presence of Stanford University and major cities in less than an hour away, the sources of funding for new companies, as well as superb Mediterranean-type climate. It all started back in 1891 when, in a valley near the town of Palo Alto as a bequest a large landowner Lilenda Stanford opened Stanford University. Graduates of the new school well behind them, but at the time to find a job in California, as a rule, could not, therefore, were forced to move to the east coast of the United States. Therefore, in the 20's of the twentieth century, the Administration Stanford University, having decided to raise the prestige of the university to employ teachers from the east coast. One of them was a former graduate of Stanford electrical engineering professor Frederick Thermal Technological University of Massachusetts. Thermal seriously concerned about the problem of brain drain, and he began to support students in their quest to found a company near the university. Among these students were William Hewlett and David Packard. In 1937, a small company Hewlett-Packard with a starting capital of $ 538 began to work in the garage - it now hangs a bronze plaque: «Birthplace of Silicon Valley».

The emergence of Venture

During the Second World War was a great demand for new technology by the military - and innovative companies to grow like mushrooms. But after the war gosfinansirovanie defense programs have been largely phased out, and the university began to experience financial difficulties. In the early 50's Frederick Thermal (he became the rector of the university) took the initiative to donate free land to rent (sell it to prevent a testament Lilenda Stanford) companies operating in the field of hi-tech. The first tenants were Eastman Kodak, General Electric, Shockley Transistor, Lockheed and Hewlett-Packard. Thus was formed Stanford Industrial Park - the first in the world of techno. At the same time, to accelerate the economic development of the western coast of the USA, was founded Stanford Research Institute. He has coordinated and funded by government programs for which involved private companies are concentrated. At the time, leading state associated with the defense, aviation and space exploration. To avoid stagnation in the post-war industry, the American authorities in the early 50's created the Institute for Small Business and SBA adopted the Law on Investment. The law envisaged the creation of small business investment companies whose capital is ensured not only by private sources, but also the state (on concessional terms). In practice, it looked like this: if the project received the approval of SBA, then the investor to invest thousands of dollars were added to three additional nine thousand from the state.

In the 60 years of work first began to venture capital firms (venture - a risk venture). Their creators were aware that the most important thing in hi-tech-business - not financial assistance to young companies, and investing in their own business knowledge and experience. Then the company gets not only the funds needed for development, but also necessary, as well as an opportunity to build their business processes. In the late 60's venture capital investors have begun to finance the company's Stanford Industrial Park. Then it was associated with greater risk - of the ten companies, two smash. However, in the event of a successful investment is brought up to 300% of your earnings and pays for three dozen unsuccessful investments. Successful investments have been three of the ten remaining companies have worked without any special achievements, about 40 per cent yield. Such cooperation is beneficial to scientists - they have access to funds much more than government spending. Venture business added to the three components of techno (education, science, production), the fourth - financially. «Intellectual capital, plus venture capital», - as in Silicon Valley today and formulate a formula for success. At 70 280 hectares, owned by the university, was not enough to accommodate all comers. The new company began to absorb the nearby town of San Jose - the capital of the valley, and then the whole valley, and then called Silicon. In addition to Stanford University, a major role in the development of the whole range of Silicon Valley located in the neighborhood played the University of California (Berkeley) and University of San Francisco. Development of Silicon Valley has led the world's three innovative breakthrough. This development of semiconductor technology in the 70's, computer technology in the 80's and network technologies and the Internet in 90 years. Only a few decades, Silicon Valley of the bold experiment has turned into profitable enterprise: the combined annual income of 4,000 companies located in the Valley - $ 500 billion

The phenomenon of Silicon Valley

Today, many states in their attempt to repeat the success of Silicon Valley. In Europe and Asia being built or already built similar to a technology, government subsidies are allocated to the hi-tech, etc. However, the professor, Nobel laureate in economics Gary Beker, long studied the phenomenon of Silicon Valley, I am sure: for the development of dynamic industrial clusters requires a flexible economic environment, rather than state-owned industrial program.

In 1999, venture capitalists invested more than $ 6 billion in new companies Valley - start. Stanford and the University of California continues to lead in shaping the new IT-companies. In addition, in the U.S. very few obstacles to the creation of new firms, private equity investments and exit at the level of the open joint stock company. The elimination of artificial obstacles to the founding of companies (as is done in the U.S.) is very different from the generous subsidy programs in Germany, France and some other countries. Subsidies lead to the creation of «sound» new companies, which mainly meet the demands of bureaucrats, not markets. Incredible spontaneity characteristic of Silicon Valley, you can not play due to bureaucratic support.

Fairchild and Fairchildren

For the semiconductor industry company Fairchild Semiconductor has become some what firm Marconi - radio and Xerox - in the copying of documents. But most important, it was not science and not patents, but the people and their ideas. Later, former employees of the company became known as the Fairchildren.

History of Fairchild Semiconductor begins with the transistor inventor William Shokli. Back in 1945 Shokli, then worked at Bell Labs, carried away by the idea of a semiconductor amplifier, working like a vacuum tube. Idea was supported by staff Shokli Bell Labs - Bardin and Brattayn. The first working transistor engineers created in 1948. This development in the 1956-meters, all three received the Nobel Prize - this was the first Nobel awarded not for the pure science and for technology. Interestingly, co-author Shokli - John Bardin - the only one who received the Nobel Prize for Physics twice, and for very different things. The second award he was given in 1972 for an explanation of the phenomenon of superconductivity. In 1955 Shokli retired from Bell Labs and was founded in Palo Alto company Shockley Semiconductor Labs - one of the first Silicon Valley startups future. The company that was the first and only to deal specifically semiconductors. However, not a business - it is believed that Shokli was a weak manager. In addition, he made a bet on the structure of germanium, while it was clear that the future of silicon.

In the 1957-m eight leading engineers left the company Shokli and founded his own company - a Fairchild Semiconductor. The names of two of the eight all know today: that Robert Neuss, and Gordon Moore. And then, in the 1957-meters, the founders of Fairchild asked for money to the financier Arthur Rock - the only who their ideas seemed interesting. Rock has found those who had agreed to invest the required $ 1.3 million - enormous for the time value. Since this event is counted, and the history of the new mode of financing of innovation projects - venture capital investments. It was Arthur Rock first used the term «Venture Capital». Initially, the production process in Fairchild Semiconductor to look like this: silicon and germanium wafers manually loaded into the hot oven for doping. Then they saw the diamond sector to separate «slices» or «chips», which under the microscope by hand sweat finest gold wire findings. In the 1959-m Robert Neuss put forward the idea of chips - a chip in which all connections are drawn to the crystal directly in the production process. Later it was found that a little earlier a similar idea put forward a member of Texas Instruments, Jack Kilbi. To be honest, Neuss technology was developed in more detail - it was a so-called planar technology with aluminum interconnection, which is used today. Although Kilbi applied earlier (in February 1959 - on) than Neuss (in July the same year), but Neuss earlier received a patent. After ten years of trials, it was decided to take Neuss and Kilbi inventors chips together: Kilbi nominated as the first idea, Neuss - as the creator of works of production technology. In 1963, the Department of linear integrated circuits at Fairchild led a young engineer Robert Vidlar. He became the first developer of semiconductor operational amplifiers (OC). They have been used to perform operations - adding, multiplying, integrating, etc. - Over analog signals - in particular, analog computers, which then tried to compete with digital technology. Vidlar one of the first realized that the cost of the chip for almost indifferently, as the transistors on the fit - ten or a hundred. In 1966, Robert Vidlar resigned from Fairchild and moved to the National Semiconductors - the firm that later in the late 80's Fairchild rescued from bankruptcy.

To conquer the world

But the most famous Fairchildren become themselves the founding fathers - the same Neuss and Moore. In the 1968-meters, they resigned from Fairchild and founded Integrated Electronics. Its abbreviated name - Intel - now known to all. I will not now go into the history of Intel - it requires at least a separate article. I note only that the investor in the new company has been the same Arthur Rock. Incidentally, it is partly an obligation we have and the birth of Apple. Almost simultaneously with Intel Fairchild emerged from the depths of another famous company - AMD. Its founder Jeremy Sanders was educated in the field of electronics, but found his true vocation as a seller. At Fairchild, he appeared in the 1961-meters, and soon became director of marketing. Soon, Sanders realized the main feature of semiconductor manufacturing: the growth in sales volumes will reduce the value of chips in the tens and hundreds of times, and this, in turn, expands the market. This electronic chip itself is not worth almost nothing - virtually his entire cost of the sum of money invested in the development and organization of production. Accordingly, if the release of millions of chips, the cost would be pennies. That is, to overtake the competition, it is possible from the outset to establish the lowest price. So Fairchild and received. Sanders later recalled: «We are going to make chips at the factory, which we have not been using production methods that we have not yet developed, but only worth attention is that we come to the market price of $ 1.05 per chip, particularly stoivshy $ 150 . We sold in the computation of the future ». This marketing model has been very successful. And in the 1969-m, followed by Moore and Neuss, Sanders resigned from Fairchild and began searching for investors for the new company. Arthur Rock he refused, saying: «All the technology companies, which I lost money, were founded by people from the marketing department». However, it is interesting that one of those who invested money in a project that has become ... Robert Neuss. However, the primary role in the new venture has been the fact that the U.S. government (and many companies are giants - for example, IBM) have never ordered the products from firms monopoly. Therefore, the leaders of Intel simply have to create a competitor.

A feature of the company, called Advanced Micro Devices (AMD), were, firstly, the absence of any technological developments in the portfolio of the founder. After all, the company was created not an engineer, and the seller. The second feature is characterized by the words of Sanders: «First, the people, and then products with profits going». AMD - one of the first companies in Silicon Valley, which was clearly articulated corporate culture. No wonder that after the crisis that followed the attacks of 11 September, AMD has become almost the only company to fully pay to the dismissed employees. Until the mid-90's are not involved in the development of AMD processors, while conducting their own research in the field of flash memory (currently it has 13% of the market). In the 1995-m and it took over microprocessors that have successfully won market share in bulk Intel. In January 2000, Sanders left the post of CEO founded his company. At the time of departure, he was the oldest of the existing senior executives Fairchildren. Fairchild itself in 1996-m withdrew from the NS and then became an independent and prosperous company. One of its innovations have become famous, in particular, MOSFET-transistors - crystals, resulting directly from the logic chips to control the various power devices. But the main thing - today Products Fairchild necessarily present in almost every electronic device.

"Get Money for Clicks" - Fastest Growing Domain Parking Company in the World.

Upala Asya, but not all

Quiet Internet PagerImage via Wikipedia

December 9, the company AOL has once again showed all his very special relationship to the users of the same protocol ICQ. Around the dinner, many users of older versions of clients ICQ, as well as some alternative clients when trying to connect to the ICQ servers have received the message type: "ICQ version 5.1 is no longer supported. Download a free authorized version of ICQ from the official web-site ICQ. "From the contact with the nickname« 1 ». No other information on the contact was not, though, and so could guess who is the author of this message. Meanwhile, all other contacts in the list were from this time are not available. However, even alternative and old customers, the problem affected only those who have tried to connect to the server. Customers that have already been online and not made reconnection has long publicly stated that they "worked".

In fact, of the popular clients for Windows to remain fully operational, only ICQ and ICQ Lite sixth generation, as well as RNQ and Miranda. Unfortunately, at that time nor RNQ, neither Miranda download from the official site of virtually no one has been able to because their servers are simply not willing to withstand such an influx. Official forum project QIP was also unavailable for a long time, because users QIP'a thousands lomilis there to find a solution to the problem. At hundreds of Russian-speaking forums of different thematic focus could be observed anger users of alternative clients, враз deprived of the usual and simple way of communication. As usual, someone suggested to noise under the false solutions to the virus in the kit. Doubters users with tears set the standard ICQ, AOL proklinaya for her tricks. Happy Miranda and RNQ proudly glorified the creators of their clients. Advanced users QIP Infium find innovative solutions - to change the ID-client issued a server on the "QIP 2005. While on the QIP 2005 the latest versions of this trick did not work despite the fact that this ID is preinstalled by default.

Approximately one hour after the PE developer QIP Ilham Zyulkorneev reported that the new Infium already tested and will soon be posted, and 2005-and yet finalized. Very soon, an updated version of QIP Infium, QIP 2005, as well as versions for Windows Mobile and Symbian S60 are available for download immediately from several sources, and references to them were first published on his personal blog Ilgama and then - and at the official site QIP. The next day, struck the technical illiteracy of many journalists who Ilham Zyulkorneev decided himself to shed light on events. According to him, nothing unexpected does not happen, and the QIP team has always been ready for such a surprise from AOL, which issuing a new version of ICQ Lite decided to make use of all the new official client, containing the advertisement, which is a major company earnings. Because all versions of QIP using LoginID (call it so as not to be confused with a customer ID, which does not affect the logon process on the server) of ICQ 5.1, the QIP "fell under the hand." Why, for some other clients are not affected? The answer is simple: they use other LoginID, some of them - non-existent. Why QIP can not use other LoginID? Because users of QIP very much, and because the QIP - not authorized AOL'om client, as well as all the alternative clients including new MailRu Agent with ICQ, QIP should not come from the common crowd, pointing more or less LoginID, because it can affect the statistics used by the clients of AOL. "Perhaps in future versions, we will provide our users with the ability to change LoginID, to somehow avoid a similar collapse," - encouraged by Ilham Zyulkorneev.

Nevertheless, QIP from this event, too few wins - thanks to a free "promotion" of the ICQ number of concurrent users at the online-jabber-server the first time exceeded 300 thousand. However, as expected, the company AOL is not going to lose its legitimate monopoly on ICQ, and will continue to put every obstacle in the way of informal third-party clients using its servers without any financial compensation for their content. The only question is that, if the strategy chooses AOL? After all, not every user is able to come to terms with such a clear indication of which version of the client to use it. If the seller in the store, you will be obsessed specify what products to buy, instead of being polite and available to tell about the real benefits of a new model to the old, then you most likely prefer to go to another, albeit less popular, the shop, suspected wrong . Of course, ICQ, we do not sell, but simply offer: if you want - use, do not want to - not forced. But we are watching advertisements for the use of "free ICQ, and thus, this comparison is not without meaning. Alternative clients today offer much more, but their limitations are often only in the inability to predict the next rightful owner prank official IM-network. It is particularly upset about this, because there is always an alternative (eg, open systems XMPP or Jabber, commercial MSN, Yahoo). And to maintain a sustainable relationship with their friends and colleagues the best choice will always be simultaneous contact on several protocols, because in this case the fall of one of them will not lead to complete loss of ability to communicate. In any case, it's up to you, dear friends, stay in touch!

"Get Money for Clicks" - Fastest Growing Domain Parking Company in the World.