Where to start creating your own website
Where do any construction work begin? Can I hammer a nail without a hammer? Maybe yes. But is such work convenient and practical? And will it be effective? The questions…

Continue reading →

Apple Pay: what is it and how to use it
Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the…

Continue reading →

Cleaning your computer from dust
The topic Cleaning the computer (judging by the queries in the search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

Continue reading →

command line

IT consulting

IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is to improve the operation of management systems and office equipment available at the enterprise for the benefit of the business. High-quality and versatile consulting includes:

IT audit
optimization of existing ones and development of a strategy for introducing new IT solutions;
audit of business processes with various penetration depths.
It is unlikely that anyone today will seriously deny the serious role of IT processes in running a business, especially a large one. At the same time, the larger the business, the more difficult IT solutions will be Continue reading

Apple Pay: what is it and how to use it

Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the NFC protocol and only on terminals that accept contactless payments (they must have a PayPass or PayWave label). The system is compatible only with models older than the iPhone 6, including the iPhone SE, as well as with the Apple Watch. In the latter case, the system will be able to configure through the iPhone 5, 5s and 5c.

To pay, you need to bring the gadget to the terminal, select the card in the application and attach your finger to the Touch ID sensor. On Apple Watch, a payment is launched by double-clicking on the power button and does not require special authorization. Neither Apple Pay nor other payment services charge Continue reading

5 fashionable ways to hide from face identification

Today, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster Daily decided to try to trick the algorithm with makeup.

Different systems for recognizing a human face have different goals, which is why their algorithms differ. One of the first systems that were able to establish a person’s identity from a photo looked for nodal points on the image that made up the main features of the face, and measured the distance between them. The main measurement parameters are the distance between the eyes, the width of the nose, the depth of the orbit, the shape of the cheekbones, and the length of the jaw line. Key figures in digital terms Continue reading

Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

...

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

...

Why Kaspersky is not installed
The question of why Kaspersky is not installed is asked by many users. It is no secret to anyone that Kaspersky Anti-Virus is today considered one of the most popular…

...

BIOS update
Updating (flashing) the BIOS of any device is a responsible procedure. I do not write difficult, because there is nothing complicated there. However, any error made while updating the firmware…

...