Hello, this is IT Center Blog.
Company news from the first hand: everything that happened in IT Center yesterday, the day before yesterday and last Thursday. All publications are cleaned from white noise and synchronized with RSS feed.
Tags
All images © 2009–2023 www.svetlanalarina.com
Unauthorized use and/or duplication of text, photo and video material without express and written permission from IT Center Blog’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to IT Center Blog with appropriate and specific direction to the original content.
In 2016, the engineers of IT Center set up the workplace of the operator of EGAIS system in a new online format at the time. The work was carried out within the framework of the project of our Client, the main specialization of which is the sale of alcohol products.
There are servers within the structure of Rosalkogolregulirovaniya to account for the movement of alcohol products on the territory of Russia. These servers maintain the accountign database EGAIS. The operator of the Client connects to this system and enters there all the necessary information.
In 2016, to connect to the EGAIS, there was only one possibility — through the keys of Aladdin JaCarta. We will not discuss the functional of the system in this article, let's say just a few words about the key features.
The summer of 2017 was hot, dynamic and fruitful for IT Center, despite the endless +18 °C and rain.
Judge for yourself: we successfully closed two “cloud” and three web projects, a new client appeared in the IT Center cloud and we will write about it, the engineers of the company seriously modernized the IT Center Cloud infrastructure at the logical and hardware level, having purchased and having integrated the corresponding equipment, and the management held a record for themselves and others the number of negotiations: the assistants had difficulty in forming commercial offers for each separate meeting.
The WannaCry virus is a file encryption program. The cipherers themselves are well known, so consider the personal properties of WannaCry.
Another node was added to IT Center Cloud network: the Сustomer, with whom we are working for the seventh year, opened a new office in St. Petersburg.
This means that Check Point firewall works in the Сustomer's office now.
We continue the series of articles devoted to backup. Today we focus on practice: why manual backup is bad and how to solve optimally the backup task if you are an owner of small or medium business.