Increasing military collaboration and productivity with Troop Messenger

No Comments

image

Picture this:
You’re leading a peace-keeping mission and simultaneously safeguarding your nation against the enemies. It’s a multi-state effort, that involves an active contribution of your colleagues from different departments, some working next door, and some in remote areas.

As a leader, there is a dire need for you to maintain an active collaboration and real-time data sharing with all the team members. You also need to integrate with third-party contractors who are handling other mission-critical services.
Read more →

Top 10 Team Chat Software for a Self-Hosted environment specifically designed for Large Enterprises

No Comments

imageYou need a platform to host your enterprise work conversations! Indeed that’s the only way you bring your teams together to work, exchange ideas and discuss more work. Making your teams rely on personal chat applications at your workplace is no fun when you seriously look for productive outcomes from them. Instead, give them the best team chat software like Slack, Messenger Troop, Flock, Microsoft Teams, Mattermost, etc., to stay informed and monitored about all the work routines and updates.These days, the business entities, corporates, Start-ups, SMEs, large enterprises, etc., are bombarded with many collaboration tool options. And, most of the tools are available in the variants of SaaS and Self-Hosting.Data is crucial for every industry, but enterprise risk management is true of high priority for large enterprises and Governments. That being said, an instant messaging solution that delivers self-hosting is recommended for such kind of data-specific industries. Let us have a look at the following business collaboration tools that safeguard the internal communication needs of these entities. Read more →

Natalya Kaspersky asks to increase state support of Russian software developers to 39 billion ₽

No Comments


Natalya kasperskaya, CEO of Infowatch and the head of the working group on information security in the framework of nutsprogramme “Digital economy”. Photo: Eugene Reasonable / Vedomosti

Natalya Kaspersky told “Vedomosti” that will meet with the relevant Deputy Prime Minister Maxim Akimov and asked to increase the state support to Russian software developers: “Now the budget envisaged for this purpose 5 billion rubles is very little,” she explained.

The meeting in the government already planned.
Read more →

Microsoft ended support for Windows 10 Mobile

No Comments

image

Microsoft announced the end of support for Windows 10 Mobile (1709). Since December 10, the users no longer receive security updates, technical support, etc.

Users will be unavailable internal service and backup. The services for uploading photos and restoring from a backup will be available during the year. Read more →

Top 10 App Development companies in 2020

No Comments

The year 2019 is coming to a close as getting nearer to 2020. The end of 2019 will be the end of a decade in which app development proliferated, and in which software technology reached greater heights.

But as years come by, the importance of apps is only going to increase even further people begin to use technologies such as IoT, chatbots, AI/ML software in their daily lives.

App development includes more than just mobile apps. It also includes development for applications for other types of devices, such as PC, tablets, wearables, etc. However, the growth of mobile apps alone gives great scope for running profitable businesses in this space.

As per research by iResearch, revenue from paid mobile app downloads and in-app advertising alone would reach up to $581 billion dollars in 2020, and reach almost near the trillion-dollar mark by 2023.
Read more →

[Translation] Analysis of data privacy in the mobile app and on the website TikTok

No Comments

TL;DR I have carefully examined the protection of data privacy in the app TikTok and on their website. Revealed numerous violations of the law, vulnerability and deception confidence of users.

In this article the technical and legal details. In a more simple presentation without the technical details see the article in Süddeutsche Zeitung (in German).

For redirection and traffic analysis was used by mitmproxy. The video shows how the device information, time of usage and a list of videos watched, go to Appsflyer and Facebook.

Read more →

Communication within a remote team — our experience

No Comments

In this article we decided to reveal the inner kitchen. In a remote team is one of the main elements of communication. Will explain how we organized, with the SLA parameters and specifics.

image
XKCD (1810)
Read more →

China will completely refuse from foreign computer hardware and software in state agencies

No Comments

China has announced plans of the full import of computer hardware and software in state agencies. To switch completely to “native” software and hardware China wants to 2022.

As writes the newspaper The Guardian, we are talking about replacing about 30 million units of computer equipment that is used in public institutions. The government’s strategy, which is designed for three years, has been dubbed “3-5-2”. In accordance with it, next year’s replacement for 30% of this technique, 50% in 2021 and remaining 20% in 2022.
Read more →

Huawei has promised to launch a HarmonyOS on their devices in 2020

No Comments

image

Head of software development Huawei van Chenglu at the conference the company said that the operating system HarmonyOS will appear in devices as early as 2020. It will be available in China, and beyond.

While Android, however, will remain a priority of the OS. HarmonyOS will be completely open source, it’ll be in August 2020, approximately simultaneously with the release of Android 11.

It is not known what devices the new OS will be introduced in the first place and whether among them the flagship Huawei. Read more →

In the Linux distributions I found a bug. It allows you to intercept a VPN connection

No Comments

image

The specialists of the University of new Mexico have discovered a vulnerability that makes it possible for attackers to intercept the VPN connection on the device *NIX. A bug also allows you to embed any data in the TCP flows for IPv4 and IPv6.

The developers of the Linux kernel identified the vulnerability ID CVE-2019-14899. “The vulnerability allows an attacker to determine if the victim is connected to a VPN, to calculate the IP address assigned by the VPN server, and establish the fact active connections”, — stated in the description of the security problem. Read more →