Tuesday, December 30, 2014

Neurosoft and Comarch will provide software for Wroclaw … – Business portal wnp.pl

System Cases portal was launched in 11 courts of appeal, 45 district courts and 60 district courts. The system works around the clock. In relation to the contractor was required, inter alia, preparing solutions for import decisions and the reasons compatible with both SAWA, Judge 2 and Praetor. In addition, also the automatic anonymisation, the publication of judgments and verifying the accuracy of the published decisions. The solution is to ensure that the import of the documents, specify the type of the imported document, data compression, encryption, data transfer and automatic software updates importing. Defined system components, methods to ensure its safety and mileage publication decisions.

The only bidder was a consortium of companies Neurosoft and Comarch Poland, which have ordered for 6 237 330 zł gross.
LikeTweet

Monday, December 29, 2014

Info Systherm provide software for the registration of land in … – Business portal wnp.pl

The full name of the contract is “Supply of software to keep records of land and buildings and records villages, streets and addresses integrated with the software used in the Lodz Centre for Geodesy and data conversion.” As part of the contract the contractor has to provide software to keep records of land and buildings in accordance with applicable regulations. Software must include an integrated part of the descriptive and graphical viewing module and have the data available from a web browser. The software is to be integrated, at least at the level of the database m. In. applications POD document management system, module Property Records Management System Possessions, Geoinfo, a platform for exchange of data with Geoinfo 6 Map, GIS portal and data repository Oscan.

To be negotiated Sygnity faced two companies offer $ 2 656 800 zł gross and Systherm Info, which proposed the execution of work for 1 685 100 zł VAT. Selected offer Systherm Info.

LikeTweet

Saturday, December 20, 2014

Polish software – Onet.pl

Researchers from Slupsk Technology Incubator developed software for the robot, whose task will be to catch a special mesh waste circulating in orbit and bringing them toward Earth to burned in the atmosphere. In February there will be testing machine.

More: www.wprost.pl

LikeTweet

Polish cleaner software Earth orbit – On 24

Researchers from Slupsk Technology Incubator developed software for the robot, whose task will be to catch a special mesh waste circulating in orbit and bringing them toward Earth to burned in the atmosphere. In February there will be testing machine.

Over the last few years, abundant in space missions in orbit will have accumulated more than 27,000 different kinds of garbage, such as the remains of rockets and satellites. The European Space Agency plans so “clean orbit” – within three years will be developed complete “garbage”, which will bring junk in orbit, where under the influence of high temperature will burn them.

– Actually, this project is already in the final stage. Now we face tests in Canada on a plane, in the interior of which will prevail conditions of weightlessness – said in an interview with tvn24.pl Arkadiusz Śmigielski from the company Opti Nav, one of the three working on the project “Clean Space.”

– Grid behaves differently when it acts on the air resistance, and otherwise, when it is in space. We were standing in the middle of the equipment to see how they behave after launch, as these networks are growing, then the position of the nodes rozrysujemy – tells Śmigielski.

During the tests in Canada in early February will be able to give away 15 shots.

TVN 24

‘; }} If (! Expand_pos) destObj var = ‘# comments-container -‘ + id_element + ‘-‘ + id_parent; destObj else var = ‘# comments-container -‘ + id_element + ‘-‘ + id_parent + ‘-‘ + expand_pos; if (oJsonObject.large_votes_buttons) $ (“# comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .html (oJsonObject.large_votes_buttons); $ (DestObj) .html (returnHTML); if (first_level) {coments_textCollapse (destObj); $ (‘# List-comments-combobox-order’). Val (oJsonObject.orderIndex); } $ (‘# Comments-container -‘ + id_element + ‘-‘ + id_parent) .animate ({opacity: 1}); }}, Error: function () {$ (‘# comments-container -‘ + id_element + ‘-‘ + id_parent) .animate ({opacity: 1}); $ (‘Body’). Css (‘cursor’, ‘default’); }}); } Function comment_toggleAnswers (id_element, i d_parent) {var answbtn = $ (“# comment-answers – ‘+ id_element +’ – ‘+ id_parent); answcntr var = $ (‘# comments-container -‘ + id_element + ‘-‘ + id_parent); if (answbtn.hasClass (‘answers-link-down’)) {answbtn.addClass (‘answers-link-up’); answbtn.removeClass (‘answers-link-down’); if (answcntr.text () == ”) {comments_get (id_element, id_parent, false, false, false); } Answcntr.slideDown (); setTimeout (function () {coments_textCollapse (‘# comments-container -‘ + id_element + ‘-‘ + id_parent, true);}, 500); } Else {answbtn.removeClass (‘answers-link-up’); answbtn.addClass (‘answers-link-down’); answcntr.slideUp (); }} Function comments_showAlertForm (id_element, id_parent) {$ (‘.comments-newComment’). Hide (); $ (‘.comment-Item’). RemoveClass (‘comment-item-added’); $ (̵ 6;.comment-Item’). RemoveClass (‘comment-item-addform’); $ (‘Body’). Css (‘cursor’, ‘wait’); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘alert-form’: 1, ‘id_element’: id_element, ‘id_parent’: id_parent, ‘url’ : comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, ‘default’); if (oJsonObject) { $ (‘# comments-newComment -‘ + id_element + ‘-‘ + id_parent) .html (oJsonObject.html); $ (‘# comments-newComment -‘ + id_element + ‘-‘ + id_parent) .fadeIn (); $ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .hide (); $ (‘ # comments’ + id_parent) .addClass (‘comment-item-addform& #8217;);}}, error: function () {$ (‘# comments-newComment -‘ + id_element + ‘-‘ + id_parent) .html (‘There was an error’); $ (‘body’). css (‘cursor’, ‘default’);}}); } Function comments_showAddForm (id_element, id_parent) {$ (‘.comments-newComment’). Hide (); $ (‘.comment-Item’). RemoveClass (‘comment-item-added’); $ (‘.comment-Item’). RemoveClass (‘comment-item-addform’); $ (‘Body’). Css (‘cursor’, ‘wait’); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘add-forms’: 1, ‘id_element’: id_element, ‘id_parent’: id_parent, ‘url’ : comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, R 16;default’); if (oJsonObject) { $ (‘# comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent) .fadeOut (20); $ (‘# comments-newComment -‘ + id_element + ‘-‘ + id_parent) .html (oJsonObject.html); $ ( ‘# comments-newComment -‘ + id_element + ‘-‘ + id_parent) .fadeIn (); $ (‘# comments’ + id_parent) .addClass (‘comment-item-addform’);}}, error: function () { $ (‘# comments-newComment -‘ + id_element + ‘-‘ + id_parent) .html (‘There was an error’); $ (‘body’). css (‘cursor’, ‘default’);}}); } Function comments_hideAddForm (id_element, id_parent) {$ (‘# comments-newComment -‘ + id_element + ‘-‘ + id_parent) .slideUp (); $ (‘# Comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent) .fadeIn (); $ (‘.comment-Item’). RemoveClass (& #8216;comment-item-addform’); } Function comments_submitAddForm (id_element, id_parent) {$ (‘body’). Css (‘cursor’, ‘wait’); $ (‘# NewComment-wait -‘ + id_element + ‘-‘ + id_parent) .show (); $ (‘# NewComment-wait -‘ + id_element + ‘-‘ + id_parent) .html (‘Sending data …’); $ (‘# NewComment-error -‘ + id_element + ‘-‘ + id_parent) .html (”); $ (‘# NewComment-text -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 0.3); $ (‘# NewComment-moreinfo -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 0.3); $ (‘# Comments-newComment -‘ + id_element + ‘-‘ + id_parent + ‘.newcomment-buttons’). Hide (); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘send-comment’: 1, & #8216;id_element’: id_element, ‘id_parent’: id_parent, ‘text’ $ (‘# newComment-text -‘ + id_element + ‘-‘ + id_parent) .val (), ‘nick’: $ (‘# newComment-nick -‘ + id_element + ‘-‘ + id_parent) .val (), ‘ uid ‘: $ (‘ # newComment-user-id – ‘+ id_element +’ – ‘+ id_parent) .val (),’ fbuid ‘: $ (‘ # newComment-user-fb-id – ‘+ id_element +’ – ‘+ id_parent) .val (), ‘TYPE_1′: ($ (‘# newComment-type-1 -‘ + id_element + ‘-‘ + id_parent) is (‘: checked’)? 1: 0), ‘TYPE_2′: ( $ (‘# newComment-type-2 -‘ + id_element + ‘-‘ + id_parent) is (‘: checked’)? 1: 0), ‘type_3′: ($ (‘# newComment-type-3 -‘ + id_element + ‘-‘ + id_parent) is (‘: checked̵ 7;)? 1: 0), // ‘id_parent’: id_parent, ‘url’: comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json ‘, success: function (oJsonObject) {$ (‘ body ‘). css (‘ cursor ‘,’ default ‘); $ (‘ # newComment-wait – ‘+ id_element +’ – ‘+ id_parent) .hide (); $ (‘# newComment-text -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 1); $ (‘# newComment-moreinfo -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 1); $ (‘# Comments-newComment -‘ + id_element + ‘-‘ + id_parent + ‘.newcomment-buttons’). FadeIn (); if (oJsonObject) {if (oJsonObject.error) {$ (‘# newComment-error -‘ + id_element + ‘-‘ + id_parent) .html (oJsonObject.error); } Else {$ (‘.comments-newComment’). Hide (); $ (‘.co mment-Item’). RemoveClass (‘comment-item-addform’); if (oJsonObject.html) {$ (‘# comments-container -‘ + id_element + ‘-‘ + id_parent) .html (oJsonObject.html + $ (‘# comments-container -‘ + id_element + ‘-‘ + id_parent) .html ()); $ (‘# Comments-container -‘ + id_element + ‘-‘ + id_parent) .fadeIn (); }}} Else $ (‘# newComment-error -‘ + id_element + ‘-‘ + id_parent) .html (‘There was an error. No object.’); }, Error: function () {$ (‘# newComment-wait -‘ + id_element + ‘-‘ + id_parent) .hide (); $ (‘# NewComment-error -‘ + id_element + ‘-‘ + id_parent) .html (‘An error’); $ (‘Body’). Css (‘cursor’, ‘default’); $ (‘# NewComment-text -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 1); $ ( 216;# NewComment-moreinfo -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 1); $ (‘# Comments-newComment -‘ + id_element + ‘-‘ + id_parent + ‘.newcomment-buttons’). FadeIn (); }}); } Function comments_submitAlertForm (id_element, id_parent) {$ (‘body’). Css (‘cursor’, ‘wait’); $ (‘# Allertcomment-wait -‘ + id_element + ‘-‘ + id_parent) .show (); $ (‘# Allertcomment-wait -‘ + id_element + ‘-‘ + id_parent) .html (‘Sending data …’); $ (‘# Allertcomment-error -‘ + id_element + ‘-‘ + id_parent) .html (”); $ (‘# Allertcomment-text -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 0.3); $ (‘# Comments-alertcomment -‘ + id_element + ‘-‘ + id_parent + ‘.newcomment-buttons’). Hide (); $ .aja x ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘alert-comment’: 1, ‘id_element’: id_element, ‘id_parent’: id_parent, ‘text’ $ (‘# allertcomment-text -‘ + id_element + ‘-‘ + id_parent) .val (), ‘TYPE_1′: ($ (“# comment-alert-type-1 – ‘+ id_element +’ – ‘+ id_parent). is (‘: checked’)? 1: 0), ‘TYPE_2′: ($ (“# comment-alert-type-2 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)? 1: 0), ‘type_3′: ($ (“# comment-alert-type-3 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)? 1: 0),’ type_4 ‘: ($ ( “# comment-alert-type-4 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)? 1: 0),’ url ‘: comments_geturl (),& #8217; curl ‘: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, ‘default’); $ (‘# allertcomment-wait -‘ + id_element + ‘-‘ + id_parent) .hide (); $ (‘# allertcomment-text -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 1); $ (‘# allertcomment-moreinfo -‘ + id_element + ‘-‘ + id_parent) .css ( ‘opacity’, 1); $ (‘# comments-alertcomment -‘ + id_element + ‘-‘ + id_parent + ‘.newcomment-buttons’). fadeIn (); if (oJsonObject) {if (oJsonObject.error) {$ (‘# newComment-error -‘ + id_element + ‘-‘ + id_parent) .html (oJsonObject.error); } Else {$ (‘.comments-newComment’). Hide (); $ (‘.comment-Item-text -‘ + id_parent + ‘b.clRed’). Remove (); $ (‘.comment- Item-text -‘ + id_parent) .html (‘ The report has been sent! ‘ + $ (‘.comment-item-text -‘ + id_parent) .html ()); $ (‘.comment-Button-alert -‘ + id_parent) .attr (‘disabled’, ‘disabled’); }} Else $ (‘# allertcomment-error -‘ + id_element + ‘-‘ + id_parent) .html (‘There was an error. No object.’); }, Error: function () {$ (‘# allertcomment-wait -‘ + id_element + ‘-‘ + id_parent) .hide (); $ (‘# Allertcomment-error -‘ + id_element + ‘-‘ + id_parent) .html (‘An error’); $ (‘Body’). Css (‘cursor’, ‘default’); $ (‘# Allertcomment-text -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’, 1); $ (‘# Allertcomment-moreinfo -‘ + id_element + ‘-‘ + id_parent) .css (‘opacity’ ;, 1); $ (‘# Comments-alertcomment -‘ + id_element + ‘-‘ + id_parent + ‘.newcomment-buttons’). FadeIn (); }}); } Function comment_zoomIn (id_comment) {$ (‘# comments’ + id_comment + ‘.comment-item-text -‘ + id_comment) .addClass (‘comment-item-text-Zoom’); $ (“# Comment ‘+ id_comment +’ .comment-button-zoom-in – ‘+ id_comment) .hide (); $ (“# Comment ‘+ id_comment +’ .comment-button-zoom-out – ‘+ id_comment) .show (); } Function comment_zoomOut (id_comment) {$ (‘# comments’ + id_comment + ‘.comment-item-text -‘ + id_comment) .removeClass (‘comment-item-text-Zoom’); $ (“# Comment ‘+ id_comment +’ .comment-button-zoom-in – ‘+ id_comment) .show (); $ (“# Comment ‘+ id_comment +’ .comment-button-zoom-out – ‘+ id_comment) .hide (); } F unction comment_showAllUserBox (id_element, id_parent) {$ (‘.newcomment-user-box -‘ + id_element + ‘-‘ + id_parent) .hide (); $ (‘# NewComment-all-user-box -‘ + id_element + ‘-‘ + id_parent) .show (); $ (‘# NewComment-type-1 -‘ + id_element + ‘-‘ + id_parent) .attr (‘checked’, ‘checked’); comment_canSendComment (id_element, id_parent); } Function comment_showLoginUserBox (id_element, id_parent) {$ (‘.newcomment-user-box -‘ + id_element + ‘-‘ + id_parent) .hide (); $ (‘# NewComment-login-user-box -‘ + id_element + ‘-‘ + id_parent) .show (); $ (‘# NewComment-type-2 -‘ + id_element + ‘-‘ + id_parent) .attr (‘checked’, ‘checked’); comment_canSendComment (id_element, id_parent); } Function comment_unsetFBprofile (id_element, id_parent) {$ (‘.comment-newComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘alt’, ”); $ (‘.comment-NewComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘title’, ”); $ (‘.comment-NewComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘src’, ‘http://www.wprost.pl/G/blogi/ face_blog_default.jpg ‘); $ (‘# NewComment-moreinfo-fb -‘ + id_element + ‘-‘ + id_parent) .hide (); $ (‘# NewComment-infobar-4fb -‘ + id_element + ‘-‘ + id_parent) .show (); $ (‘# NewComment-user-fb-id -‘ + id_element + ‘-‘ + id_parent) .val (”); $ (‘# NewComment-type-1 -‘ + id_element + ‘-‘ + id_parent) .attr (‘checked’, ‘checked’) ; $ .ajax ({Type: “POST”, url: ‘/F/ajax/profil.php’, date: {unsetFBprofile: 1}, dataType: ‘json’, success: function (oJsonObject) {}, error: function () {}}); comment_canSendComment (id_element, id_parent); } Function comment_assignFBprofile (id_element, id_parent) {$ (‘# assignFBprofile-error -‘ + id_element + ‘-‘ + id_parent) .html (”); FBConnectInit (function (_FBuser) {if (! _FBuser) {$ (‘# AssignFBprofile-error -‘ + id_element + ‘-‘ + id_parent) .html (‘There was an error. No connection to Facebook.’);} Else if ( ! _FBuser.id & amp; & amp;! _FBuser.name & amp; & amp;! _FBuser.link) {$ (‘# assignFBprofile-error -‘ + id_element + ‘-‘ + id_parent) .html (‘There was an error. No connection to the service Facebook or not all the data has been transferred. ‘);} else {$ (‘ .newcomment-user-box – ‘+ id_element +’ – ‘+ id_parent) .remove (); $ (‘ # newComment-user-fb-id- ‘+ id_element +’ – ‘+ id_parent) .val (_FBuser.id); $ (‘ # newComment-infobar – ‘+ id_element +’ – ‘+ id_parent) .html (‘ ‘); $ (‘ .comment-newComment-form – ‘+ id_element +’ – ‘+ id_parent +’ .comment-newComment-thumb img ‘). attr (‘ alt ‘, _FBuser.name); $ (‘ .comment-newComment-form – ‘+ id_element +’ – ‘+ id_parent +’ .comment-newComment-thumb img ‘). attr (‘ title ‘, _FBuser.name); $ (‘ # newComment-type-3 – ‘+ id_element +’ – ‘+ id_parent) .attr (‘ checked ‘,’ checked ‘ ); if (_FBuser.link) {$ (‘.comment-newComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newCo mment-thumb img’). addClass (‘pointer’); $ (‘.comment-NewComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). Click (function () {window.open (_FBuser.link, ‘facebook’) ;;} ); } If (_FBuser.image) {$ (‘.comment-newComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘src’, _FBuser.image); } Comment_canSendComment (id_element, id_parent); }}); } Function comments_vote (id_element, id_parent, id_vote, vote, is_large) {$ (‘body’). Css (‘cursor’, ‘wait’); if (is_large) {$ (“# comment-large-votes – ‘+ id_element +’ – ‘+ id_parent +’ a ‘). click (function () {return false;}); $ (“# Comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .animate ({‘ opacity ‘: 0.3}); } Else $ (‘# comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent + ‘.form-button-vote’). Animate ({‘opacity’: 0.3}); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘set-vote’: 1, ‘id_element’: id_element, ‘id_parent’: id_parent, ‘id_vote’ : id_vote, ‘is_large’: (is_large? 1: 0), ‘vote’: vote, ‘url’: comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, ‘default’); $ (‘# comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent + ‘.form-button-vote’). animate ({‘opacity ‘: 1}); if (oJsonObject) {if (oJsonObject.error) {if (oJsonObject.voted == 1) {$ (‘ # comments-toolbar2 – ‘+ id_element +’ &# 8211; ‘+ id_parent +’ .form-button- vote ‘). attr (‘ disabled ‘,’ disabled ‘); $ (‘ # comments-toolbar2 – ‘+ id_element +’ – ‘+ id_parent +’ .form-button-vote ‘). addClass (‘ form-button-vote- Voted ‘);}} else {if (is_large & amp; & amp; oJsonObject.large_votes_buttons) {$ (“# comment-large-votes -‘ + id_element + ‘-‘ + id_parent) .html (oJsonObject.large_votes_buttons); $ (‘ # comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .animate ({‘ opacity ‘: 1}); } Else {$ (‘# comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent + ‘.form-button-vote’). Attr (‘disabled’, ‘disabled’); $ (‘# Comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent + ‘.form-button-vote’). AddClass (‘form-butt on-vote-voted’); $ (‘# Comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent + ‘.form-button-vote-yes’). Val (oJsonObject.votes_yes); $ (‘# Comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent + ‘.form-button-vote-no’). Val (oJsonObject.votes_no); }}}}, Error: function () {$ (‘body’). Css (‘cursor’, ‘default’); $ (‘# Comments-toolbar2 -‘ + id_element + ‘-‘ + id_parent + ‘.form-button-vote’). Animate ({‘opacity’: 1}); if (is_large) {$ (“# comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .html (‘ ‘); $ (“# Comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .animate ({‘ opacity ‘: 1}); }}}); } Function comment_canSendAlert (id_element, id_parent) {var txt1 = $ .trim ($ (‘# allertcomment-t ext -‘ + id_element + ‘-‘ + id_parent) .val ()); var ret = false; if ($ (“# comment-alert-type-1 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .hide (); ret = true; } Else if ($ (“# comment-alert-type-2 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .hide (); ret = true; } Else if ($ (“# comment-alert-type-3 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .hide (); ret = true; } Else if ($ (“# comment-alert-type-4 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .show (); ret = ((txt1! = ”) & amp; & amp; (txt1.length & gt; 20)); } If (ret) $ (“# comment-alert-send – ‘+ id_element +’ – ‘+ id_parent) .removeAttr (‘ disabled ‘); else $ (“# comment-alert-send – ‘+ id_element +’ – ‘+ id_parent) .attr (‘ disabled ‘,’ disabled ‘); } Function comment_canSendComment (id_element, id_parent) {var txt1 = $ .trim ($ (‘# newComment-text -‘ + id_element + ‘-‘ + id_parent) .val ()); var .trim txt2 = $ ($ (‘# newComment-nick -‘ + id_element + ‘-‘ + id_parent) .val ()); acetamide var = $ .trim ($ (‘# newComment-user-id -‘ + id_element + ‘-‘ + id_parent) .val ()); iduf var = $ .trim ($ (‘# n ewComment-user-fb-id -‘ + id_element + ‘-‘ + id_parent) .val ()); var ret = false; if ((txt1! = ”) & amp; & amp; (txt1.length & gt; = 3) & amp; & amp; (! $ (‘# newComment-moreinfo -‘ + id_element + ‘-‘ + id_parent) is (‘: visible ‘))) {if ($ (‘ # newComment-type-3 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # newComment-moreinfo – ‘+ id_element +’ – ‘+ id_parent) .show (); $ (‘# NewComment-moreinfo -‘ + id_element + ‘-‘ + id_parent) .removeAttr (‘disabled’); } Else {$ (‘# newComment-moreinfo -‘ + id_element + ‘-‘ + id_parent) .slideDown (function () {$ (‘# newComment-moreinfo -‘ + id_element + ‘-‘ + id_parent) .removeAttr (‘disabled’ )}); }} If ($ (‘# newComment-type-1 -&# 8216; + id_element + ‘-‘ + id_parent) is (‘: checked’)) {ret = ((txt1! = ”) & Amp; & amp; (txt2! = ”) & amp; & amp; (txt1.length & gt; = 3) & amp; & amp; (txt2.length & gt; = 5)); } Else if ($ (‘# newComment-type-2 -‘ + id_element + ‘-‘ + id_parent) is (‘: checked’)) {ret = ((txt1! = ”) & Amp; & amp; (acetamide & gt ; 0) & amp; & amp; (txt1.length & gt; = 3)); } Else if ($ (‘# newComment-type-3 -‘ + id_element + ‘-‘ + id_parent) is (‘: checked’)) {ret = ((txt1! = ”) & Amp; & amp; (iduf & gt ; 0) & amp; & amp; (txt1.length & gt; = 3)); } If (ret) $ (‘# newComment-send -‘ + id_element + ‘-‘ + id_parent) .removeAttr (‘disabled’); else $ (‘# newComment-send -‘ + id_element + ‘-‘ + id_parent) .attr (‘disabled’, ‘disabled’); } Function comment_loginUser (id_element, id_parent) {var txt1 = $ .trim ($ (‘# newComment-user-nickname -‘ + id_element + ‘-‘ + id_parent) .val ()); var .trim txt2 = $ ($ (‘# newComment-user-pwd -‘ + id_element + ‘-‘ + id_parent) .val ()); $ (‘Body’). Css (‘cursor’, ‘wait’); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘login-user’: 1, ‘l’: txt1, ‘p’: txt2, ‘url’ : comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, ‘default’); if (oJsonObject) { if (oJsonObject.error) {$ (‘# newComment-user-err -‘ + id_element + ‘-‘ + id_parent) .html (oJsonObject.error);} else if (oJson Object.id_user & gt; 0) {$ (‘. newComment-user-box – ‘+ id_element +’ – ‘+ id_parent) .remove (); $ (‘ # newComment-user-id – ‘+ id_element +’ – ‘+ id_parent) .val (oJsonObject.id_user); $ (‘ # newComment-infobar – ‘+ id_element +’ – ‘+ id_parent) .html (‘ ‘); $ (‘ .comment-newComment-form – ‘+ id_element +’ – ‘+ id_parent +’ .comment-newComment-thumb img ‘). attr (‘alt’, oJsonObject.username); $ (‘.comment-newComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). attr (‘title’, oJsonObject.username) ; $ (‘# newComment-type-2 -‘ + id_element + ‘-‘ + id_parent) .attr (‘checked’, ‘checked’); if (oJsonObject.userurl) {$ (‘.comment-newComment-form-& #8216; + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). addClass (‘pointer’); $ (‘.comment-NewComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). Click (function () {location = oJsonObject.userurl;}); } If (oJsonObject.userthumb) {$ (‘.comment-newComment-form -‘ + id_element + ‘-‘ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘src’, oJsonObject.userthumb); } Comment_canSendComment (id_element, id_parent); } Else {$ (‘# newComment-user-err -‘ + id_element + ‘-‘ + id_parent) .html (‘There was an error’); }} Else $ (‘# newComment-user-err -‘ + id_element + ‘-‘ + id_parent) .html (‘There was an error’); }, Error: function () {$ (‘# newComment-user-err -‘ + id_element + ‘-‘ + id_parent) .html ( 216;There was an error’); $ (‘Body’). Css (‘cursor’, ‘default’); }}); } Function comment_textareaAutoHeight (textarea) {/ * if ($ .browser.mozilla) {var tah = $ (textarea) .height (); if (tah – & gt;

Read R & oacute; wnież

->

LikeTweet

Friday, December 19, 2014

Note on a new threat – malware blocking … – Computer World

The latest version of ransomware TorrentLocker
 labeled as Win32 / Filecoder.Dl, encrypts files on your computer and
 demanding payment of a fixed sum for decryption. It is worth
 noted that a new threat in recent months
 infected almost 40,000 devices , most
 in Europe.

Protect your PC for free using
 Avast antivirus

The worm spreads via e-mail – Users
 receive message with an attachment , which has
 alleged to be an invoice or document relating to the consignment
 courier. Its opening leads to infection. Cybercriminals
 require the equivalent of 1180 euros or $ 1500
 
 Bitcoin virtual currency. The information to which they arrived
 ESET experts that have decided to pay the ransom 570
 people.

page & # x17C; & # x105; dish ransom - information prasowa.jpeg Ransomware detected by ESET experts
 ransom demands Bitcoin virtual currency.

Ransomware is a type of malware
 software that can be
 extremely dramatic consequences. It is worth remembering the basic
 safety rules – do not let us open suspicious attachments
 to e-mail. You should also try to get to our
 PC acted as
 the best anti-virus program.

“You can also read:
  The legalization of marijuana in Poland- attention to a new scam on
 Facebook

Source: ESET, photo .: ESET, Cindy Yamanaka |
 zumapress.com

LikeTweet

Thursday, December 18, 2014

Comtegra provide IT software and hardware for UMCS – Business portal wnp.pl

Order is divided into four tasks. The first is the supply of computer equipment for the needs of the University System commissioning Study. This includes the supply, installation and commissioning of a set of server virtualization in the development of infrastructure and license servers VMware vSphere 5 Enterprise Plus for the included server and the delivery of two FC SAN switches, as well as a complete system backup. The Purchaser also expects to raise license versions of VMware vSphere 5 licenses for the Enterprise version of VMware vSphere 5 Enterprise Plus for eight processors.

The second task involves servers for the implementation of the new system of employee e-mail e. The third concerns the HP Software License Agreement and the bones IC RAM for your HP Proliant DL 380 G7 and inserts GBIC slots for switches FC SAN Switch HP StorageWork and the fourth delivery of the host CPU.

The tender was attended by three bidders: ComPlus, System Data and Comtegra. The latter company have ordered in three jobs for a total of 702 185.02 zł gross. The fourth task is canceled.

LikeTweet

Wednesday, December 17, 2014

Why do we need software updates? About this today at 18:00 – dobreprogramy

As usual, longer welcome on Wednesdays at 18:00, on our
 weekly live straight from the editors. The leading topic
 our discussion today will update the software, and
 broader sense, the quality of what we buy and what we charge for free.

Do you even today we can expect the software that
 satisfy the quality standards imposed eg. car engines? Whether
 easy delivery of the software update makes his
 creator of the rozleniwili? Is it really a cure (patch) can be
 sometimes worse than the disease (gaps in the program)?

The discussions, which roll on the pages of our website show that
 for users there is no single answer. Similarly, there is no
 one answer among software developers. We know the systems
 operational and software extremely conservative in providing
 update software we also know that the changes and improvements he gets on
 round. Added to this is also available as a software
 service, by some referred to as permanent beta – because
 Yet let’s opening, no one knows which version
 Google Docs uses, and no one can do anything, if such
 Web software starts behaving “strangely”.
 To an older version, we can not go back.

Of course that’s not all, as we say in the
 today’s program, but does not reveal anything too early.
 Turn on in our discussion by calling during his lifetime for
 using Skype (login: dobreprogramypl). We remind you that daredevils,
 dodzwonią who receive our portal gadgets, t-shirts or
 cups. Shy can certainly vouch for special
 chat – the most interesting raised the issues we consider in
 During our discussion.

We recommend to use the Skype calls from the headphones
 and previous testing the microphone using the interview test
 (Echo) of the communicator. Remember, too, that our broadcast
 YouTube is delayed by tens of seconds, so for a quick chat
 Please mute the video player. This avoids interference, and
 picture and sound from the studio without delay receive Skype.

For the record and – dedicated to Windows 10 and Chromebooks discussion from last week:

LikeTweet

Tuesday, December 16, 2014

Companies are increasingly investing in software – Money.pl

2014-12-16 14:53

The growing popularity of the use of information systems in Polish enterprises is a sign that our market has appreciated their role in support of the implementation of the business objectives. Still, the level of computerization of domestic companies differ on how the situation in Western companies, which to improve its competitiveness for years to successfully use the powers given to them by specialized software.

Tangible benefits flowing from the introduction of the system in the enterprise computer, made in the case of the largest companies in their use has become the norm. Polish and foreign corporations operating in our country, use sophisticated systems designed specifically for their needs. Implemented in software supports the implementation of complex tasks in a way that allows for efficiency impossible to achieve with traditional methods of work. Also, SMEs face more often decide to buy highly specialized systems, and even custom dedicated software, fully adapted to the processes carried out by them. This trend is the result not from fashion to modern technology, and radically improve the organization of work, which allow you to achieve advanced business applications.

optimization

The main reason why companies decide to implement information systems , is to optimize their operation. With the right software it is possible to significantly accelerate the performance of daily activities. This saves a lot of time workers who can focus on other activities, contributing to a greater extent by the company to generate additional profits. Implementation of the system lets you organize your work and its standardization, which make the implementation of all business processes much easier and more transparent, both for regular employees and their managers.

The computer system stores all relevant to business information, allowing you to access them at any time. Disappears thanks to a lot of problems with getting the necessary data that have been stored in the form of paper documents. Employee – rather than, for example, to browse through a stack of binders in search of an invoice from the previous quarter – it just gives the contractor the application data and returns it with all necessary information.

– The implementation of an adequate system also improves communication within the company, leading to data integration and improve their flow. No good exchange of information between the different departments of companies is one of the most common problems, the solutions of which customers expect from us – says Tomasz Derczyński HDF Poland, the company involved in the design of IT solutions for industrial and service companies.

Measuring the effectiveness of

Implementation of the system allows effective control of the results of business activities undertaken. Lack of appropriate tools to measure the effectiveness of one of the greatest ills management. Thanks

read more

LikeTweet

Sunday, December 14, 2014

Windows 10 will have support for software Cortana … – gry-online.pl



 
 
 

The network leaked version of the Windows 9901 operating system 10, which is scheduled for release next year. It is available in the application that allows access to Xbox Live and Cortana software.


 

Yesterday, 19:00 ?? James Mirowski (gry-online.pl) ?? game in the world

 

Just yesterday we reported that Microsoft apparently plans on January 21 tell us details about the new tactics on the games, and they have already received a foretaste. The network leaked version of Windows 9901 10 , in which we noted, inter alia, to software and application Cortana connecting a computer with Xbox.

No specifics about playing on Windows 10. It is for the app to Xbox Live. (Source: The Verge) - Windows 10 will have the use of the software application to Cortana and Xbox - news - 2014-12-14

No specifics about playing on Windows 10. It is for the app to Xbox Live. (Source: The Verge)

For the players, of course, the most important is this last feature. That application will serve as a gateway to the environment Xbox – achievements, friends list or shop , which is already about to connect closely with the Windows Store. Let’s just hope it’s not all what he said Phil Spencer – the head of the Xbox brand – to mention that Microsoft will want to turn to the people playing on the PC. Addition, there are new animations. Redmond giant also resigned from the classic control panel. As announced in early December software is implemented Cortana, well-known people who use smartphones running Windows Phone . Admittedly, it still does not work quite well, but Microsoft has a lot of time to fix it.

More details will be announced probably already January 21, when the Redmond company will host a conference, devoted to the tenth version of Windows. As announced earlier, Phil Spencer, corporation is going to turn back toward the neglected recently players PC . Recall that the last such attempt is associated with activation of the platform Games for Windows LIVE, which turned out to be a huge flop.

  1. The official website of Microsoft
    

readers comments


makmakpl 2014-12-14 – 19:28

Until I could play in such a halo, or forze, I will wywalał these applications right away.

gorn18 2014-12-14 – 19:44

UP The same sentence in which we shit, we play on the PC than on Xboxach.

Aexoni 2014-12-14 – 19:51

WOW! REVOLUTION! APPLICATION FOR XBOX! WOW!
 
 I take right away!

Predi2222 2014-12-14 – 19:56

Even pasting this link, but it does not hurt to repeat http://youtu.be/XWv43kME6v8?t=18s

Bezio1292 2014-12-14 – 20:08

Oh back on Steam.
 Hi: D

aope 2014-12-14 – 20:59

The program to account shoe was already by default in Windows 8, so it’s nothing new. New in this news only Cortana.

Klblaz 2014-12-14 – 21:18

The truth that the PC market is neglected, but that does not change any Games for Windows LIVE, which was terrible pile. Steam is now – so we wystarzczy. The purpose of Microsoft is to optimize the system and DirectX’a 12.

kaszanka9 2014-12-14 – 22 : 06

As it is to be a great support is probably wearing a joke.

Mitsukai 2014-12-14 – 22:09

Still zadzwinia me how people can connect with each other completely not related events, and on this basis they extend their applications.

Meno1986 2014-12-14 – 22:53

Cortana works well to not to say very well (in English). Unfortunately, the program still does not support the Polish language, which reportedly took place in November and December … We have nothing. :)

aope 2014-12-14 – 22:57

The purpose of Microsoft is to optimize the system and DirectX’a 12.
 
 Look how joker: & gt;
 
 Steam is now – so we wystarzczy.
 
 Monopoly and gradual reduction of user rights, however, such a beautiful thing ambassadors of slavery. Renting games as you can see it is doing well. Congratulations.

pixario 2014-12-14 – 23:01

For a long time you can play games with the XBOX360 and ONE on windows 7 8 (slip at a gaming) but Micro $ oft will not let it just does not pay them and such revelations like this in the news we are undergrowth funny

Skinner 2014-12-15 – 2:07

Why Micro $ hit invented Windows TT ….

LikeTweet

Friday, December 5, 2014

Warmia and Mazury Regional Office – Business Pulse

placing an advertisement: required.

The notice involves: contract.

SECTION I: CUSTOMER

I. 1) NAME AND ADDRESS: Warmia and Mazury Regional Office, Al. Marshal Jozef Pilsudski 7/9, 10-575 Olsztyn province. Warmian-Masurian, tel. 89 5232779, fax 89 5232779.

  • The website address of the contracting authority: www.olsztyn.uw.gov.pl

I. 2) Type of contracting authority: local government administration.

SECTION II: OBJECT OF THE CONTRACT

II.1) DESCRIPTION OF THE SUBJECT OF THE CONTRACT

II.1.1) Title attributed to the contract by the contracting authority: update your antivirus software and virus signature database software currently operating on the network along with the management console for comprehensive protection of computer systems Warmia and Mazury in Olsztyn Provincial Office and the Office of the delegations in Elblag and Elk.

II.1.2) Type of contract: delivery.

II .1.4) determining the object and the size or scope of the contract: 1. Object of the contract includes an update anti-virus software (license renewal for the protection of 531 workstations) and virus signature database software currently operated (ESET NOD32 Antivirus Endpoint Client) in a computer network along with the management console for comprehensive protection of computer systems in the Warmia and Mazury in Olsztyn Provincial Office and the Office of delegations in Elblag and Elk, or provide equivalent software.
 2. For the equivalence of anti-virus software in relation to that specified in the terms of reference should be understood that the following requirements:
 1) offered the software meets the specification of functional requirements defined in the detailed description of the contract – Annex 5 to the terms of the contract,
 2) the contractor will implement the software equivalent of a maximum of 15 days from the date of the contract, the operations will be carried out during the working hours of the contracting authority,
 3) the contractor will train technical staff (6) in the use, management and administration of the program,
 4) The Contractor shall prepare and forward contracting manual electronic version of the user interface software installed on your computer (proportion to the number of licenses),
 5) The contractor will make a full uninstall of the software of the existing license 531 (with locations in Olsztyn, Elblag, Elk), including the removal of entries in the Windows registry,
 6) the contractor will install the software on the computers in the number according to the number of licenses required (531 pcs.)
 7) the contractor joins offer functional specification confirming compliance of the offered software requirements set out in the detailed description of the contract.
 3. Object of the contract includes an annual update antiviru s software and virus signature database software (for the period from 12.19.2014 r. Until 12.18.2015 r.) Or shorter – depending on the date of the agreement and the date of its execution, the term This update is complete 18.12.2015 r. (provision also applies to software delivery equivalent).
 4. A detailed description of the contract is contained in Annex 5 to the terms of the contract.

II.1.6) Common procurement vocabulary (CPV): 48.76.00.00-3.

II.1.7) whether submitting a partial offer: .

II.1.8) whether submitting variants: not.

II.2) DURATION OF THE CONTRACT OR TIME LIMIT FOR COMPLETION: Duration in months: 15.

SECTION III: LEGAL, ECONOMIC, FINANCIAL AND TECHNICAL INFORMATION

III.1) bid bond

Information on security: Purchaser does not demand bid bond.

III.2) down payments

III.3) CONDITIONS FOR PARTICIPATION IN THE PROCEEDINGS, AND DESCRIPTION OF THE EVALUATION OF FULFILLING THE CONDITIONS

  • III. 3.1) The powers to carry out the activity or activities, if the law imposes an obligation to have them

    Description of how to assess compliance with this condition

  • III.3.2) Knowledge and experience

    Description of how to assess compliance with this condition

  • III.3.3) Technical potential

    Description of how to assess compliance with this condition

  • III.3.4) persons capable of performing the contract

    Description of how to assess compliance with this condition

  • III.3.5) Economic and financial

    Description how to assess compliance with this condition

III.4) INFORMATION STATEMENT OR DOCUMENTS TO BE PROVIDED FOR THE CONFIRMATION OF FULFILLING THE CONDITIONS OF PARTICIPATION IN THE PROCEEDINGS AND NON UNDER ARTICLE. 24 UST. 1 LAW

III.4.1) in demonstrating compliance with the conditions referred to in Art. Paragraph 22. 1 of the Act, but a statement of compliance with the conditions of participation must be submitted to:

III.4.2) in confirming the non-liability pursuant to Art. 24 paragraph. 1 of the Act, shall be submitted to:

  • a statement that no grounds for exclusion;
  • current copy of the register or from the central records and information about the business, if separate provisions require registration or records in order to demonstrate the absence of grounds for exclusion on the basis of Art. 24 paragraph. 1 point 2 of the Act, issued not earlier than six months before the deadline for receipt of requests to participate in the proceedings or the award of tenders;

III.4.3) Documents foreign entities

If the contractor has his habitual residence outside the territory of the Republic of Polish, submits:

III.4.3.1) in the country in which he has his habitual residence attesting that:

  • no liquidation or bankruptcy – issued not earlier than six months before the deadline for submission of applications for admission for the award of contract or tender;

III.4.4) Documents related to belong to the same group

  • list of entities belonging to the same group company within the meaning of the Act of 16 February 2007. on competition and consumer protection or information that does not belong to the group;

III.6) OTHER DOCUMENTS

Other documents specified in point III.4) or in point III.5)

1) the completed tender form – Appendix 4 to the terms of order,
 2) prepared by the contractor functional specification confirming compliance of the offered software requirements set out in the detailed description of the contract – Annex 5 to the terms of the contract; obligation to join the offer of functional specification takes place only in the case of equivalent programs offered,
 3) in the case of contractors together applying for the order – the power of attorney to represent them in the contract award procedure or in the procedure and conclusion of the contract, signed by all contractors jointly applying for the award of the contract, to the power of attorney must be accompanied by evidence that the person signing the power of attorney is authorized to make representations on behalf of the contractor,
 4) The tender form must be signed by the person / persons authorized to make representations on behalf of the contractor, t he authorization must be attached to the offer unless it appears from the documents annexed thereto; power of attorney (mandate) must be presented in the form of original or notarized copies.

SECTION IV: PROCEDURE

IV.1) MODE OF CONTRACT AWARD

IV.1.1) Award Mode: Open.

IV.2) Award criteria

IV.2.1) Award criteria: price and other criteria relevant to the subject of the contract:

  • 1 – Price – 70
  • 2 – Time of delivery – 30

IV.3) amendment to the agreement

provides for significant changes provisions of the agreement in relation to the content of the offer, under which the selection of the contractor:

Acceptable changes of the contract and determining conditions for changes

1 . Ordering a possibility to change the agreement in relation to the content of the offer of the Contractor in the following cases:
 1) changes in laws affecting wages Artists – resulting privilege Parties to change the amount of the salary,
 2) occurrence of circumstances which could not be foreseen at the time of conclusion of the contract, unlawful force majeure – entitling Party to amend the agreement to the extent required for its proper implementation,
 3) occurrence (disclosure) during the execution of the agreement circumstances justifying make clarifications / additions / changes to the contractual provisions favorable to the Employer, the Contractor pay the above situation will not be increased.
 2. The basis for changes referred to in paragraph 1, be submitted by one of the parties and its acceptance by the other Party.

IV.4) ADMINISTRATIVE INFORMATION

IV.4.1) Web address, which is available on the terms of reference are: http://bip.uw.olsztyn.pl/pl/ bip / tenders /
terms of reference can be obtained at: 10-575 Olsztyn, Al. Marshal Jozef Pilsudski 7/9, room 316.

IV.4.4) Time-limit for receipt of requests to participate or tenders: 12.12.2014 10:00, place : 10-575 Olsztyn, Al. Marshal Jozef Pilsudski 7/9, room 354.

IV.4.5) Date of offer: period in days: 30 (from the deadline for submission of tenders).

.IV.4.17) Will there be any cancellation of the contract award procedure, in case no funds from the budget of the European Union and non-returnable funds from the aid granted by Member States of the European Free Trade Association (EFTA), which were to be intended to finance all or part of the contract:

LikeTweet

Wednesday, November 26, 2014

Take care of backup and current software – Computerworld

Small companies can not afford to create the march of the security department. From what you should start?

Any organization that intends to build their environment in a safe, should start from the basic issues. First you need to take care of the backup copy. The organization should implement a policy of performing backups, make sure to be reliable. The effectiveness of backup should be tested in practice, making sure that the most important information from this backup, you can play, if needed. The recovery process needs to go even in the event of a fire that destroyed the corporate office. That means backups to a remote location. In one way or another – a copy must be done to be able to use it. These are the basics, so that the company can still work.

See also:

What is the next step?

The second stage is the process of updating the software. The company must be sure that the process works system and application updates and fixes are made. The process must include not only the workstations and client systems in the office. It must also apply to smartphones, tablets, servers or routers. Make sure that they work for the latest operating systems and applications, with all available security updates on any device. Only when both the company solve basic problems can think of safety equipment such as virus protection, firewalls and intrusion detection systems and prevention network. This is not the most important – important are the basics, such as backups and updating.

These are the basics, but small companies often simply do not know how to go about it.

For all the policies are necessary, for example. perform backups. Must be written, tested and observed. This applies to all aspects of security in the organization. Assumptions security policy must cover all.

What is the next step? How does an organization that already has implemented the base, has to deal with the threats?

The company must monitor your network, both the movement and the attached devices, and detect any changes. The company wants to detect deviation from the norm, and therefore needs to know the condition called normal. Monitoring should be pointed out that a normal day, at a given time we have this kind of network traffic, the amount of data passing to and from the locations in the network. When a company has a pattern of normal traffic, can detect anomalies, deviations from the pattern. On the basis of these findings it can be concluded about the possible events. Then you will be wondering why this laptop sends to China in the chair. 2. in the night – and this is not normal. The detection of anomalies similar to the time it is impossible to have a normal pattern by network activity.

How can then detect malicious software, which is now a real scourge?

This is a known problem. Malware analyze more than 25 years and we know how to do it.

Is it that simple?

In theory, a simple problem, but in practice Detection is difficult because the attackers have access to all the weapons that we can use. When someone prepares today malware, first retrieves all available anti-virus programs. After writing malware attackers check them before deployment, making sure it will not be detected. If the antivirus software detects the virus, developers begin to change the code in a way that was not detected. The attackers have almost unlimited time to search and bypassing security measures in companies. Meanwhile, we who care about security companies, we do not have unlimited time to detect and block malware threats. A clash between virus writers and defenders is not fair, because the attackers have access to the tools used in the defense.

What in that case would you recommend to companies doomed to an unequal battle?

First of all, you need to act. Security specialist cleaner is like – his actions do not see until it is. You might be wondering why so much money is going to clean up, since everything is clean. When you reduce the budget, it turns out that here and there begins to be dirty. The same applies to safety. It is said, hey, we do not have problems with viruses, then why do we need anti-virus? If it does not, the problems with malware appear.

How to solve problems with the budget?

Budgeting is not easy. There can be no common sense in protecting information through the firewall for $ 1 million, if the same information is worth 0.5 million. The process begins with an assessment of the value of their resources and assess risks. You must specify from whom the company needs to defend itself, and how the organization stands out from the others. Who is the enemy? With what risks we face? Who will be the aggressor? These questions need to ask anyone before begin considering a defense strategy. First, you need to assess the risk.

LikeTweet

The software determines the competitiveness – Inwestycje.pl

IT Solutions determine the competitiveness of the financial market, especially in the face of competition from smaller, specialized finance companies and the growing role of digital channels to communicate with customers. Cooperation with technology companies and software companies are forming an increasingly important area of ​​banking.

Related software makes financial firms offer gets better, both in terms of cost and quality of our services. According to the company Balazs Fejes Epam Systems banks must recognize that the basis of their continued success in business is IT.

 – In case the quality of service customers expect from banks, the bar has been raised very high. This implies an increase in the share of digital channels and changes in the client’s needs and preferences. In addition, a number of scandals in the financial markets that have taken place since the crisis, meant that consumers are increasingly skeptical about the services provided by banks and the values ​​they bring – says the expert.

But the changes may mean great opportunities. Recent years have been a period of uncertainty rash of new clients and companies offering financial services at low cost. – New players directly offer customers a range of traditional banking products such as cash loans, currency exchange, financial management, payments, or trading in shares – says Balazs Fejes.

In this way, serious competition for banks become technology companies proposing excellent and efficient service, as well as some vendors, particularly in the areas of financial market require greater discretion. – This is just one of many areas where the owner of the traditional relations between the bank-client becomes firm, providing application and an interface with which a client has an active contact. As we grow deeper relationships between customers and technology companies, banks may be increasingly excluded from the game, and their role can be reduced to the role of providing services and supports transactions become increasingly less visible to the customer – says Balazs Fejes.


 They are efficient, creative and have the infrastructure needed to provide high-quality investment advice at a cost a fraction of the cost of traditional services companies. Supporting investors carrying smaller investments, private banks who and companies involved in asset management, would not receive individualized counseling, software developers do not need to employ a large number of professionals to provide financial advice. – They assume that this market segment is not dependent on personal contact with the customer, so they treat software as a range of products, focusing in its operations on the aspect of technology and trying to ensure the highest level of user satisfaction with the offered software package – says the expert.

What’s in this situation can do the banks? According to an expert from Epam Systems can work with technology companies and companies making up the software, may offer its technology under the brand distributor. They can also reduce the risk of competition through acquisitions. – Those who do not acknowledge the fact that software and technology is the future, will be behind and lose their competitiveness. Mark, are increasingly dominated by software for banks reality – sums Balazs Fejes.

 Source: Epam Systems

 [QNT]

 

LikeTweet

Monday, November 24, 2014

FinSpy – hunt for the Trojans – Computer World

For years, Gamma Group (today FinFisher) is under fire
 because of its spy software FinSpy.
 The findings of Reporters Without Borders, Privacy International
 and organizations dealing with human rights that
  in recent years, the company sold its system
 inwigilacyjny not only the German Federal Office
 Kryminalnemu (BKA), but also a totalitarian countries
 and applying torture
.

Now the hacker attack unearthed secret documents,
 which cast a nasty suspicion: Is vendors
 Gamma cooperate with anti-virus? Computer World takes
 lead.

Hacker provides transparency

pebbles, which caused an avalanche, was an attack on a web server
 Gamma at the beginning of August. Hacker hiding under a pseudonym
 “Phineas Fisher” stole secret documents of the company, published it on
 Twitter and handed WikiLeaks website.

spyfiles4S.jpg


 (Click image to enlarge it)

Published documents are striking. The materials
 published by Wikileaks as Spyfiles4 is a list
 customers, and its countries like Bahrain, Qatar,
 Mongolia, Pakistan, Singapore and Vietnam
. Gamma
 previously denied the supplied software
 spyware to countries where it is alleged rights violations
 man. The Munich branch of the company is not responsible for
 PC World editors question.

“You can also read relationship with the world’s most important conference
 DEF CON 22 hacker

In the case of lying on the Gulf of Bahrain documents
 Wikileaks reveal unpleasant details: table provides
 of detailed information about opponents of the government spying
 on the Gulf monarchies, calculated under surveillance equipment
 and shows the operation of spyware. Bahrain, according to the
 organizations dealing with the protection of human rights is a country
 employing torture
. And according to the arrangements of
 Watch Bahrain FinSpy being followed by the opposition in the country
 Persian Gulf are actually in custody.

finspyS.jpg WikiLeaks next secret documents
 Gamma also published FinSpy spy program. Above
 shows the control panel will spy software.

Spyfiles4 raises a lot of nasty suspicion

In the shared package was also Wikileaks
 Test table dated 4 April 2014. It cites
 all popular antivirus programs in the world
 and document the tests for detection of spyware Trojan
 Gamma. Scary – according to the table, in the current
 time, only one security program is able to detect
 Gamma Trojan
This raises the question: Are the programs are not
 just effective enough to recognize FinSpy? Or maybe
 are deliberately blind because antivirus vendors
 cooperate with spyware companies such as Gamma?

ceo.jpg Maik Morgenstern, CTO AV-Test: “Gamma
 optimizes spy programs until the software
 Safety will not be able to detect them! “

Computer World FinSpy checks

Computer World decided to check out this heavy suspicion.
 Editors Security Centre lucky, because a hacker Phineas
 Fisher is dispersed in mid-September and Wikileaks
 FinSpy Trojan released version! Computer World immediately
 into action and analyzed the software together
 with independent experts from AV-Test.

The result: the analysis of the code shows that it is actually
 about the “state of the Trojan”. His potential inwigilacyjny
 is scary
. The program connects to the camera
 and microphones infected devices and creates screenshots
 OSD. FinSpy keyboard entries and read this
 it can capture passwords. Sends the recordings of the conversations
 Skype and chat to secret server, it can be deleted,
 change, and download files and smuggle to
 the infected machine’s own figures. Trojan can even
 restore deleted files.

FinSpy in recognition test

From the World Computer analysis shows one thing, that the discovery
 WikiLeaks is not the current generation of Trojan, but his version
 four years ago. It also contains some modules.
 Missing for example, the function by which administered FinSpy
 security software against a harmless program
 thereby preventing the unmasking. Despite this
 Computer World AV checks with experts from Magdeburg, or
 popular antivirus programs detect spy
 software.

As expected, the test antivirus software with
 old pest has not brought a surprise. Only
 four relatively little-known manufacturers – Command, F-Prot,
 QuickHeal and Total Defense – did not know FinSpy
.
 All other recognize it by analyzing the code (heuristics)
 or by “APB virus” (signature).

Alarm canceled? Not at all! The information Edward Snowden
 that the NSA which invests millions of dollars in development
 Trojans. It is doubtful that the US software vendors
 protection must be detected. German manufacturers are lighter.
 G-Data spokesman Thorsten Urbanski says plaintext that the company
 had no inquiries from Gamma or state authorities. –
  If you try to influence us, given our clear
 refusal
– says Urbanski. Computer World finger on the pulse.
 When they float FinSpy new variants, will also be tested.
 We promise!

“Read also: Chinese do not want Kaspersky and
 Symantec. We know why!

Photo: alphaspirit / 123rf.com

LikeTweet

Wednesday, November 12, 2014

When the business needs of individual software? – INFOR.pl

Individually designed software will almost always be regarded as the best solution, but it is not always absolutely necessary. If our company does not feel any problems with the communication line customers-employees-company-supplier, if the software we use 100% meet our needs, it may be a sign that the solutions that we have fully satisfy our needs. In such a situation there is no need to invest in dedicated software.

However, if the CEO is not able to immediately obtain data on sales or people with various departments after several days of waiting for a simple answer from another department, it may be signal that the processes in the company need to be improved, what often can help you better matched systems. A well-designed program should be in response to specific problems that have emerged in the company.

Imagine a developer creating a group. Often built for each housing estate created a separate company, which aims to reduce business risk. In each such company must keep separate accounts.

Although there are plenty of commercially available accounting programs, each of which focuses on just one company. The Capital Group needs something more – a program that would maintain separate accounts for each company, but at the same time, allow the sharing of costs between certain companies and construction. This is a very specific need and would be hard to find on the market suitable, ready program. In this case, the obvious solution would be custom-made software.

How to choose accounting system

But also quite traditional companies can benefit from the systems’ tailor-made “. An example would be a program supporting the work of the company executing construction works.

Such software can consist of multiple modules. One of them will support the project management module, in other words, the order, which goes to the company. It will allow you to track the progress of the project.

Prior to the adoption of the project to implement the request from the client will go to the module inquiries where prepared and then sent back to the client, is valuation. Data on jobs may be getting directly to the field workers who carry out orders and means that their performance on mobile devices, eg. On tablets. When the order to the service module will verify that the work done is still under warranty or not. In contrast, invoicing module enables customers to easily issuing invoices. By storing all data in the system (for projects, orders, quotes, invoices etc.), we will be able to easily generate reports, tables and statistics. Significantly accelerate the pace of information retrieval, which can be crucial in deciding the management.



LikeTweet

Tuesday, October 14, 2014

Autodesk provides their software … for free! – CHIP

It is estimated that the value of the initiative, Autodesk will be over 80 million. This initiative will support teachers in nearly 13 600 secondary schools in Poland.

Progress in the development of technology for 3D design and manufacturing result in a change in professions related to designing and creating. The development of mobile technology and cloud-based also means that you can design at any time and place. Almost everyone who has a good idea, can turn concepts into reality, and we believe that it is the present students will shape the future face of the world “- says Wojciech Jędrzejczak, CEO of Autodesk in Poland. “ educational institutions providing free access to Autodesk software, we provide schools with the tools used by professionals around the world in their daily work .” – Adds Wojciech Jędrzejczak.

Portfolio of solutions for 3D design and Autodesk teaching materials are used in educational institutions to increase learning outcomes by:

  • Raising the skill levels of students (ranging from junior high schools) in the subjects related to the natural sciences, technology, engineering, or mathematics digital art .
  •  

  • Transfer of pupils and students with specialized knowledge and skills in 3D design to facilitate the achievement of personal goals and subsequent professional success.

  •  
  • Support teachers in inspiring creative and innovative thinking, using an interdisciplinary approach to education, to develop cooperation skills and practical problem-solving, which are essential in today’s job market.

  •  

This is another part of Autodesk’s commitment to education in Poland. For several years, because students and faculty can enjoy free access to Autodesk software for personal use through the Autodesk Education Community portal. Currently, the company is expanding access to free software to schools and secondary schools. As part of this offer by Autodesk Academic Resource Center, students can use in class with a full portfolio of professional solutions Autodesk 3D design, as well as cloud applications, widely used in various industrial sectors.

Science based on the solutions commonly used in the industry allows for more efficient training, to better prepare young people to enter the labor market. 3D modeling, simulations and analysis allows students to more easily understand the principles of product development, it gives a great sense of impact on the reality and triggers creativity. “- says Tadeusz Lewandowski, Vice-Rector for Student Affairs. Wroclaw University of Technology.

From the point of view of school education – access to modern 3D software is a huge asset. Our experience with the pilot project Design the Future, confirmed that education and spatial thinking skills related to the design are important elements of the curriculum. These tools trigger students’ creativity, technical sense, the desire to create. Youth is open and ready to learn. What’s more he realizes that the knowledge and ability to use design software will be able to also use in later professional life “. – Says Grazyna Knast, Deputy Director of Middle School No. 11 in Poznan.

To apply for free access to Autodesk, visit www.autodesk.com/academic.

LikeTweet

Thursday, October 9, 2014

Malware infecting ATMs – PC Format

cybercriminals operate at night – only on Sundays and Mondays. Without inserting a bank card bring a combination of numbers on the keyboard ATM, call for further instructions from the operator, introduce another set of numbers and ATM starts to cash. Then leave the place without arousing any suspicion.

Action criminals consists of two stages. At the beginning of gain physical access to the ATM and put in the boot CD to install malware, which Kaspersky Lab has given the name of Tyupkin. After re-booting the infected ATM is under the control of attackers. After a successful malware infection triggers an infinite loop, waiting for a command. To attack was more difficult to identify, the malware intercepts commands Tyupkin only at a specific time – on Sunday and Monday night. In these hours, criminals can steal money from an infected machine.

Recordings obtained from security cameras in infected ATMs showed the method used to access the cash machine. For each session, a newly generated key is composed of a unique combination of numbers (based on the random numbers). Thanks to any person outside the gang will not be able to accidentally benefit from fraud. Then, a person standing at the ATM receives instructions over the phone from another gang member who knows the algorithm and is able to generate a session key based on the number shown. This is to prevent attempts to independent cash withdrawals by those intermediaries for infecting ATMs.

If the key is correctly entered, the ATM displays information about how many resources are available in each cartridge with money, encouraging the operator to chose which cassette wants to rob. Then, ATM seems 40 notes at a time from the selected cartridge.

Malware Tyupkin

At the request of one of the financial institutions , a team of experts carried out an investigation on the present cybercriminal attacks. Malware identified and named Backdoor.MSIL.Tyupkin have so far been detected in the ATMs in Latin America, Europe and Asia.

“The last few years have seen a significant increase in the number of attacks on ATMs using the equipment to clone credit cards and malware. Now we are witnessing the natural evolution of this threat, in which cybercriminals are climbing up the chain and attack the financial institutions directly. They do this through self-infecting ATMs or carrying out targeted attacks on banks. Tyupkin Malware is an example of the use by attackers ATM infrastructure vulnerabilities “- said Vicente Diaz from Kaspersky Lab.” We advise banks to examine the physical security of their ATM machines, and network infrastructure, and consider investing in appropriate security solutions “- he added.

How banks can reduce the risk

– Examine the physical security of its ATM and consider investing in a high quality security solution.

– Replace all locks and keys universal in the top cover ATM and resign from the manufacturer’s default settings.

– Install the alarm and ensure that it is efficient. The cybercriminals behind the software Tyupkin infecting only ATMs that do not have the safety alert.

– Change the default password, the BIOS ATMs.

– Ensure that machines have an updated anti-virus protection.

Photo principal comes from the source: © 123RF / Picsel

LikeTweet

Wednesday, October 8, 2014

Warner Bros uses software piracy, which … – PCLab.pl

Warner Bros uses advanced robotics to track pirated content hosted on the network. One of the largest film studios was forced by the court to disclose data on its anti-piracy system, which was important as motivated public interest. From the available data we learned some interesting information on the operation of the robots themselves.

The emergence of the network of official data on anti-piracy systems Warner Bros aftermath ending settlement litigation on Hotfile file hosting service. Under the framework of film production companies paid $ 80 million. Initially, Hotfile founded his case to Warner Bros., in which the company was accused of abuse by searching the database files on your host. In time, however, withdrawn from the prosecution.

 Warner Bros

The case would have died a natural death, if not for the Electronic Frontier Foundation, whose representatives have asked the court for disclosure on how the Warner works. Label of course, opposed the proposal, explaining that only through secrecy antipiracy system is so effective. However, the court dismissed the complaint and ordered the disclosure of all data related to searches your network for unauthorized content.

The company reluctantly, but released on the web first set of documents. It turns out that the collection of information is a specially designed software that is described in the text as robots. Interestingly, these programs are so programmed to mimic human behavior, so finding specific content to be very simple. The script searches about 200 selected sites for keywords and on this basis defines what type of materials has to deal with.

This method is not very precise, because the found files are in no way verified. It may therefore be that the robot finds a material named as one of the films released by Warner Bros., report it, and this really will not have anything to do with him. Therefore, in section antypirackim company also people are employed, namely seven people. Information about their tasks have been classified by the label.

Many questions still remain unanswered. It is not known example. Why software developed by the company has been focused on monitoring the application users JDownloader. We do not know the numbers of false positives and the process of verifying the authenticity of entries. It is possible that successive waves of publication of secret documents tell us about it a bit more.

Middle-earth: The shadow of Mordor – Review

LikeTweet

Tuesday, October 7, 2014

How much is the system and how much the software. – Swiatobrazu.pl

It is Friday, October 7, 2014, 12:37


How much is the system and how much the software.

Author Message

doing great

Posting Freak

Joined: on Monday, March 17, 2014, 19:35
Location: 77

I’m interested in is the only original software to create movies and burn them, but also programs do not unnecessary.

System /> Windows 8.1 – price
Windows 7 – price

program for video editing:
EDIUS – price
Sony Vegas Pro – price
Adobe Premiere Pro CS6 – price

program to burn DVD:
Nero – price
CloneCD – price
CD Burner XP – price

others /> …..

Tuesday, October 7, 2014, 09: 30 View Profile

Star

Active Freak

Joined: Thursday, March 17, 2005, 13:59
Location: 1346
Location: Ruda of Silesia

Whom to target this question? Why do not you do this statement alone? Is Google the name you associate with something?


_________________ /> Sony HXR NX 70, the SONY CX-560 Processor: Intel Core i7 3820 3,60GHz, 32GB 1600MHz DDR3, Graphics: Nvidia GTX 570 with CUDA, RAID0 2TB + 1TB HDD, Windows 7 64 bit, Blackmagic Intensity Pro card, BLU -RAY HD LG GGW-H20L, Adobe Production Premium CS 5.5.
Tuesday, October 7, 2014, 9:35  View Profile

Pinto

Active Freak

Joined: Monday, January 23, 2006, 15:20
Posts : 1548

Summit laziness, ineptitude or insolence?

Tuesday, October 7, 2014, 10:15  View Profile







Who is online

Users browsing this forum: trek and 2 guests




can not post new topics
can not reply to topics
can not edit your posts
can not delete your posts
Do not can post attachments


LikeTweet