Axoft

MathWorks accelerates aerospace design with MATLAB and Simulink

MathWorks accelerates aerospace design with MATLAB and Simulink

MathWorks introduced new flight analysis and visualization capabilities for aerospace design with MATLAB and Simulink. In the 2018b Release, the Aerospace Blockset adds flight management analysis tools to help analyze the flight performance of aerospace vehicles. Aerospace Toolbox adds the ability to customize user interfaces with cockpit flight instruments for visualizing and analyzing the movement and behavior of aerospace vehicles. Engineers can now develop continuous workflows from the early stages of vehicle design and development to in-flight prototyping, which shortens the time between design and testing.

Aerospace design must comply with strict design and regulatory requirements to ensure compliance with standards such as MIL-F-8785C, DO-178 B and DO-178 C, for which engineering teams usually rely on Simulink and DO Qualification Kit. Engineers working with their own or third-party flight visualization and analysis tools can now work directly in the Simulink environment for flight simulation, visualization and analysis. By using Model-Based Design and Simulink in the early stages of the design workflow, teams can more easily maintain models and code. They can also exchange models between groups and contractors to ensure that all requirements are met.

“The ability to model, model, analyze and visualize is crucial for a highly regulated aerospace industry. That’s why Simulink has become the preferred design environment for these engineers, ”said Paul Barnard, director of design automation marketing, MathWorks. “Now these teams can shorten the design time even more because they can iterate to create prototypes in a few weeks instead of many months. This will help them meet deadlines for development, while ensuring high accuracy and standards compliance, ”says site Aithority

Aerospace Blockset helps engineers quickly simulate, simulate and analyze the dynamics of spacecraft. In R2018b, a new flight control analysis tool has appeared, allowing for an expanded analysis of the dynamic characteristics of aerospace vehicles. Tools include start-up templates and functions for calculating and analyzing the flight qualities of gliders modeled in Simulink.

Aerospace Toolbox provides tools and functions that help analyze and visualize the movement of an aerospace vehicle using reference standards and models. New in the R2018b is the addition of flight instruments that display measurements using standard cockpit instruments.

About the company: MathWorks is an American company specializing in the development of software for mathematical calculations and simulation.

To purchase MathWorks solutions, please contact AXOFT Ukraine Sales and Development Department by phone +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

IceWarp awards in the Corporate E-Mail category

IceWarp awards in the Corporate E-Mail category

IceWarp received the CIO CHOICE 2019 Award of Honor and Recognition as the most preferred brand in “corporate email”. This prestigious recognition was presented at the exclusive Red Carpet Night, celebrating innovation and excellence in the ICT ecosystem (Information and Communications Technology), created by CORE Media.

Already for the 7th year, the annual recognition of CIO CHOICE focuses on Information and Communications Technology (ICT) brands, which demonstrate a constant demand for excellence and form the basis of success in the industry. Recognition is awarded on the basis of independent voting in India by CIOs, the winners of which are listed on the CIO CHOICE 2019 website.

CIO CHOICE is the largest and only platform for online voting where CIOs identify and select products that have earned their trust. When ICT is recognized by CIO Choice, it means that its product, service or solution has been approved by CIOs.

There is an outstanding advisory group made up of CIOs from different verticals who lead the whole process, with KPMG as a knowledge partner.

Anoop Mathur, founder and president of CORE Media, said: “Congratulations to IceWarp for being honored with the CIO CHOICE 2019 award. Choosing a CIO is absolute evidence, since this poll by the CIO ultimately matters to any brand or product, so like this is the voice of the client. The CIO CHOICE trust mark gives corporate CIOs the confidence to interact confidently with a recognized brand for the first time, helping both ICT brands and CIOs. ”

“We are truly pleased that we have again been chosen as the preferred brand in this segment,” said the director general of Pramod Sharda in IceWarp. He further added: “I am immensely grateful to the CIO community for their continued faith in us and help in winning for two consecutive years. This also demonstrates our corporate email leadership. ”

IceWarp ability to provide solutions in line with industry standards and requirements for small and medium-sized enterprises and large enterprises in different regions and constant technological innovations helped us achieve this goal. What distinguishes us is the individuality, flexibility and support that we offer to our customers. The value we bring to customers is what the CIO values ​​in the “corporate email category”.

About company:

IceWarp, Inc. is a software development company based in Springfield, Va., that provides messaging, voice and collaboration solutions for small, medium and corporate enterprises. IceWarp has offices in the USA and the Czech Republic. The company has been operating since 1998 and is used by more than 50,000 companies worldwide. IceWarp Messaging Server is the main IceWarp product that is used as an alternative to Microsoft Exchange.

For questions about the acquisition of IceWarp solutions, you can contact the sales and development department of AXOFT Ukraine by phone +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Attacks on industrial machines: security risks associated with connected radio remote controls

bart-ransomware

Attacks on industrial machines: security risks associated with connected radio remote controls

Trend Micro published the results of the A Security Analysis of Radio Remote Controllers for Industrial Applications study (PDF, EN) (“Analysis of systems of remote radio control of industrial equipment from a security point of view”), in which company experts consider the vulnerabilities of such systems on the example of the seven most popular manufacturers, the main types of cybercrime attacks on businesses with their use and key methods to prevent such attacks.

Radio remote control systems are widely used in manufacturing, construction, transportation of goods and other areas. They are equipped with many cranes, drilling equipment, engineering equipment and mining equipment, which is characterized by a long service life, high replacement costs and difficulties in updating the firmware and software. In this regard, in the era of the fourth industrial revolution (Industry 4.0), which involves the active interaction of devices with each other and with the outside world and the massive introduction of automation, such industrial equipment can become another “weak link” in protecting the enterprise from cybercriminals.

Considering the fact that millions of units of remotely controlled equipment are used in the world, which are practically unprotected from intruders, the latter can intercept the management of such equipment at the software level, substitute commands coming from the control panel, initiate emergency shutdown and organize various types of attacks using these methods . Among them it is necessary to single out: sabotage and temporary suspension of the enterprise’s activities, the scale and damage of which will differ greatly depending on how important the affected enterprise is for the industry; theft of products from ports and automated logistics centers using hoists and other radio-controlled equipment; extortion, in which the attacker purposefully causes a halt in production or damage to valuable equipment, leading to losses, and then demands a ransom in exchange for stopping the attacks.

The study examines the main methods of protection that are used in the development of remote radio control systems by the most popular manufacturers and their weak points, for example, secure connection using a common access code for the transmitter and receiver, and password protection of the transmitter terminal, unlocking certain transmitter functions using key cards and the use of redundant protection systems (say, an infrared communication channel that turns off the receiver if the remote control goes beyond ICS his actions). In the first cases, attackers may sooner or later learn passwords or make a copy / steal a key card, and in the latter, bypass the security protocol or act knowing the radius of its work, Trend Micro experts say. At the same time, the effectiveness of the applied methods of protection substantially depends on the general level of information security in the enterprise, and it is impossible to call them by themselves reliable or not.

In general, in the course of the study, Trend Micro found out that the industry (as opposed to the consumer sphere) practically does not develop the cyber defense culture of radio-controlled equipment, despite the fact that its cost and possible losses many times exceed the cost of consumer equipment. At the same time, one of the results of Trend Micro experts has already been the growing interest of equipment manufacturers on this issue and the acceptance of responsibility to customers for ensuring the cyber security of their products. The full research report is available on Trend Micro site.

About Trend Micro

Trend Micro Incorporated, the global leader in cybersecurity solutions, helps make the world safer for sharing digital information. Trend Micro’s innovative solutions for consumers, businesses, and government agencies provide layered security for data centers, cloud-based business solutions, networks, and endpoints. Trend Micro has more than 6,000 employees in 50 countries.

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

MAXON’s MoGraph module in Cinema 4D received an award

maxon_logo

MAXON’s MoGraph module in Cinema 4D received an award

The MoGraph module in Cinema 4D became one of the winners of the American Academy of Motion Picture Arts and Sciences awarded with a science and technology award. The award recognizes technological advances that “demonstrate a proven track record that makes a significant contribution to the film making process,” says the Academy’s official release.

The Academy praised MAXON developer Per-Anders Edwards for the initial design and development of the MoGraph toolkit, which “provides a fast, procedural and intuitive workflow for motion graphics designers to create animated three-dimensional graphics used to develop titles and fictional user interfaces in movies “.

“MAXON is proud to be able to facilitate the work of the best and brightest talents. We congratulate and thank Per for his pioneering work on MoGraph tools for Cinema 4D, while at the same time celebrating the contribution of the entire company to this incredible achievement, ”said David McGavran, CEO. “Our goal is to constantly update our software to simplify the work of artists who create complex visual effects. MoGraph, of course, embodies this philosophy “

The Academy’s science and technology prizes are awarded to men, women and companies, the discoveries and innovations of which have made a significant and long-lasting contribution to the creation of films. Nine technical achievements presented by 27 individual laureates will be honored at the annual presentation of the Academy’s scientific and technical awards on Saturday, February 9, 2019, in Beverly Wilshire in Beverly Hills. The presentation of the scientific and technical awards of the Sci-Tech Awards has become the main event of the Academy Awards season.

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Cyberpolice informs about the spread of a new virus

VirusRemove

Cyberpolice informs about the spread of a new virus

Ukrainian cyberpolice recorded cases of the spread of a new virus disguised as a message from state institutions. Malicious software is aimed at users who are private notaries of Ukraine, and work on PCs running MS Windows.

For the transfer of malicious software offenders used postal services of Ukrainian companies www.ukr.net and www.i.ua. The message with harmful applications came allegedly on behalf of government agencies, including courts of various instances. To infect users’ computers, attackers used several types of viruses that have similar functionality. At the same time, various methods of their distribution were used, for example, users received archive files that externally looked like PDF files, reports the Department of Cyber ​​Police.

The criminals even falsified the contents of these files – outwardly they looked like a scanned document created on behalf of a state institution. In other cases, the spread of the virus occurred with the help of documents of the DOCX format with an embedded malicious “OLE” object. After the user opened the document, the malicious software was launched and an entry was automatically added to the registry of the operating system for its automatic loading.

During the in-depth analysis, the cyber police experts installed: each time the virus was launched from the system disk folder by the link: \ ProgramData \ Microtik \ winserv.exe. After that, the malicious software went into a hidden connection standby mode and provided full access to the victim’s computer resources.

According to the analysis, this virus is a modified version of TektonIT’s legal RMS software (RMS is a professional computer remote control product)

The Department of Cyber ​​Police, in order to avoid infecting their computers, advises users to adhere to the following tips:

First, in no case do not open letters from dubious recipients with dubious content. Before opening it is better to receive confirmation from the sender of such a letter by other possible means of communication.

Second, install licensed operating system software and use anti-virus software.

Third, systematically update the operating system and software products.

Fourth, do not allow access by unauthorized persons to the personal computer.

Also, users can independently prevent the automatic launch of such a virus, for which the following steps should be performed:

• Start the registry editor (to do this, press the “Start” key and enter the “regedit” entry for the search);

• Locate the following registry branch – HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Run

• Personally delete the found entry with the following content – “Microtik”

• On the system disk of the operating system, delete the folder -: \ ProgramData \ Microtik

• Restart computer

Leading global information security companies such as Trend Micro and F-Secure always recommend users to be careful with open links and attachments, as well as with the files you install on your computer. It is worth remembering that the majority of viruses, phishing and malware come to corporate networks via mail or a web browser, so you should carefully pay attention to which links you click and download on your PC. The presence of anti-virus, anti-spam solutions significantly minimizes the risk of “catching” the virus in corporate networks. That is why solutions (antiviruses, antispam) for safe work with PC from Trend Micro and F-Secure help to level the threat of virus penetration on PCs, experts of AXOFT recommend.

More information about Trend Micro and F-Secure software solutions can be obtained from AXOFT managers by phone at +38 044 201 03 03 or by e-mail: axoft@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Trend Micro started selling Apex One launched and technical support in Ukraine

Trend Micro started selling Apex One launched and technical support in Ukraine

Trend Micro, the global leader in cybersecurity solutions, announced the official launch of its Trend Micro Apex One™ endpoint security product. The product redefines endpoint security with a wide range of capabilities, delivered as a single agent, with SaaS consistency and local deployments. This simplified offering improves automatic detection and response and provides effective information that increases customer safety and offers channel growth opportunities.

Apex One Solution Overview ↵

Apex One is an evolutionary solution (renamed from OfficeScan) provides three key points: automatic detection and response, insight and research, and the all-in-one ability to simplify deployment.

Test version of Apex One ↵

Also, the other day Trend Micro announced the expansion of technical support for Russian-speaking corporate users of its software products. Now, technical support of Trend Micro software solutions is provided in a number of CIS countries (including Belarus, Kazakhstan, Russia, Moldova and Ukraine) and Georgia.

For assistance in Ukraine, you can call the toll-free phone number: +380-44-392-13-97 or promptly make a request on the technical support page: https://trendmicro.alp.ru

About the company: Trend Micro, a Japanese company founded in 1988, creates innovative information security solutions that allow enterprises and individual users to securely share digital data. With more than 25 years of experience in the field of security, the company is a recognized leader in the market for the protection of servers, “cloud” security systems and small businesses.

For questions regarding the purchase of Trend Micro solutions, you can contact AXOFT Ukraine sales and development department by calling +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

F-Secure introduced a new endpoint protection solution Rapid Detection & Response

F-Secure introduced a new endpoint protection solution Rapid Detection & Response

Solutions and prevention of endpoint protection are very effective when it comes to combating cyber threats, such as malware. F-Secure and its managed service providers now provide businesses with even better weapons with the new F-Secure Rapid Detection & Response and its innovative features, including Broad Context Detection ™ and Elevate to F-Secure.

F-Secure Rapid Detection & Response, available through F-Secure’s global partner network, is an industry-leading end-point detection and response (EDR) solution that monitors organizations ’IT environments and their security status to detect suspicious behavior, says company message.

It provides contextual visibility for the automatic identification and visualization of advanced threats by combining light endpoint sensors with advanced data analysis, artificial intelligence and machine learning capabilities.

The solution, developed by an experienced threat search team, allows you to use your own IT team or a local, managed and certified service provider supported by F-Secure experts to protect your organization from advanced threats.

Broad Context Detection ™ narrows data and differentiates patterns of malicious behavior from regular user behavior to quickly identify real attacks, which significantly reduces the number of alerts that IT staff must pay attention to.

According to an EMA study, 79% of security personnel are overwhelmed with a large number of warnings about threats, and they are forced to send out most of the alerts that are triggered daily every day, without attention. Verizon’s data breach report in 2018 Verizon reveals that 68% of violations take months or more to detect, and overloading security warnings, including false alarms, can tire on company IT personnel with constant alarms.

“F-Secure Rapid Detection & Response quickly detects targeted attacks and allows you to effectively respond to incidents with built-in automation to stop attacks when they occur,” explains Jyrki Tulokas, vice president of products and services, Cyber ​​Security in F-Secure.

However, some detections may require more in-depth threat analysis and guidance from specialized cybersecurity experts. F-Secure’s rapid detection and response has been enhanced with the ability to send tough incidents to threat hunters.

This service is activated by selecting the F-Secure “Promote” feature on demand. It employs cybersecurity experts from the F-Secure 24/7 monitoring and response team. It has now become available as an on-demand promotion service to provide expert advice on how to deter and eliminate targeted attacks.

“In this unique service, F-Secure cybersecurity security experts analyze methods and technologies, network routes, traffic origins and time frames when an attack is detected,” says Tulokas. “This means that companies can now be confident that the required skills and resources will respond to even the toughest targeted attacks.”

F-Secure’s unified endpoint protection, detection, and intelligent response are cloudy managed and provide one client for Windows and MacOS. It also works in conjunction with other endpoint security vendor software.

Detailed review of Rapid Detection & Response ↵

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

SolarWinds acquired 8MAN, access rights management platform

SolarWinds bought 8MAN, access rights management platform

SolarWinds acquired acquired German company 8MAN, an access rights management platform (ARM), which expands MSP’s software security and IT management portfolio.

8MAN was renamed SolarWinds ARM and immediately available to SolarWinds MSP partners and corporate IT clients. According to Jim Hansen, vice president of security products, software was particularly easy to present to SolarWinds customers, since its ease of use and ease of trial capabilities coincide with the business model of SolarWinds, the company said in a press release.

The new security software product, SolarWinds ARM, is an access rights management tool that helps IT administrators and security administrators manage user privileges, improve adherence to policies, automate the provision of users, and protect against malicious internal abuse. With automated user accessibility, policy analysis and reporting, compliance and prevention reports, and increased productivity and processes, SolarWinds is committed to making life easier for IT and security administrators. SolarWinds ARM is designed to help companies of all sizes take the first step and help them build their security knowledge.

“8MAN is pleased to be part of the SolarWinds family, and this step was part of our strategic plan, which allowed us to reach the next level of security innovation,” said Stephan Brack, CEO of 8MAN. “We have developed a solution that will help IT security professionals and security administrators improve security by managing user access, matching and automating time-consuming tasks such as user accessibility.” Their technological expertise and growing security portfolio make SolarWinds the ideal Partner solution to sell our product worldwide. ”

About the company: SolarWinds is a leading provider of powerful and affordable IT infrastructure management software. Our products provide organizations around the world, regardless of the type, size, or complexity of their IT infrastructure, with the ability to monitor and control the performance of their IT environments, whether in the field, in the cloud, or in hybrid models.

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Frequently Asked Questions for Windows 10 IoT Enterprise 2019

Frequently Asked Questions for Windows 10 IoT Enterprise 2019

 

What is Windows 10 IoT Enterprise?

Windows 10 IoT Enterprise is the most complete version of the operating system based on the Windows 10 kernel with advanced security and administration features. Since Windows 10 IoT Enterprise is technically identical to Windows 10 Enterprise, the device manufacturer and end user can use the same tools to manage and administer both personal computers (laptops) and specialized devices. But it should be noted that the licensing and distribution of Windows 10 IoT Enterprise and Windows 10 Enterprise are different. Additionally, it should be noted that Windows 10 IoT Enterprise is available in LTSC and SAC variants.

What’s new in Windows 10 IoT Enterprise 2019?

Windows 10 IoT Enterprise 2019 is a new step in the development of the proven Windows 10 IoT Enterprise. The following functions have been added to the functionality already existing in the previous Windows 10 IoT Enterprise:

»10 year LTSC level support
»Support Azure IoT Device Management
»Supports Windows AI Platform for Azure IoT Edge
»Improved Assigned Access

More about the new features of Windows 10 IoT Enterprise 2019

Where is Windows 10 IoT Enterprise used?

Embedded operating systems are designed to create various highly specialized devices. The main differences of highly specialized devices from universal devices include:

»One or more applications required for the device to function can work on the device. Restrictions must be configured via Assigned Access or Shell Launcher features.

»The device is ready to use right out of the box. The OS has already been configured.

»Unnecessary functions, ports and peripherals are blocked at the program level.

»Device manufacturer provides full technical support for the device.

»The manufacturer distributes Windows 10 IoT Enterprise only with a ready-made device in the pre-installed form.

What is the level of service support for Windows 10 IoT Enterprise?

For Windows 10 IoT Enterprise 2019 there are two options for LTSC and SAC service support.

LTSC (Long Term Service Channel) – the most popular option for highly specialized devices. As part of the 10-year LTSC support for the operating system, only security updates are released. Functional updates that add various new functions to the operating system or interface changes within LTSC are not released.

SAC (Semi-Annual Channel) is an analogue of desktop OS for workstations. Demanded in specific scenarios when you need an EDGE browser, Cortana voice assistant or Windows Store. For SAC, both security updates and major functional updates are issued 2 times a year.

Licensing of Windows 10 IoT Enterprise 2019

The licensing model for the new Windows 10 IoT Enterprise 2019 is similar to the licensing of previous versions and is optimized as much as possible for device manufacturers. The cost of the license depends on the type of processor used in the device. The simpler and weaker the processor, the cheaper the license. The list of processors listed in the licensing table. If the table does not have your processor – you need to purchase a High End license.

What are the key benefits?

»2-3 times cheaper than desktop Windows 10 due to the nature of licensing

»Full compatibility with applications and devices for Windows 10

»Not updated without user permission, does not receive automatic updates

»Protected from unwanted actions by personnel or intruders

»Price depends on the processor model in the device

»Microsoft technical support until 2028 (guaranteed 10 years after the release of the new version)

»Ready distribution – save on employee training and build your own image

»You can enable a telemetry zero level at which the OS does not send personal data.

System Requirements for Windows 10 IoT Enterprice

The system requirements for Windows 10 IoT are given in the detailed description on the Microsoft website.

System requirements

Application

To purchase Windows 10 IoT Enterprise 2019, contact AXOFT Ukraine Sales and Development Department by calling +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

JetBrains announced the release of Kotlin version 1.3

JetBrains announced the release of Kotlin version 1.3

JetBrains team announced Kotlin version 1.3 release. The developers stabilized the coroutine’s work and introduced the Kotlin / Native beta. The language is now supported by the Google Cloud Platform, the Spring framework and the Gradle system.

New in Kotlin 1.3

◊ Library release kotlinx.coroutines version 1.0 for working with coroutines.

◊Beta release of Kotlin / Native – LLVM backend for compiling the source Kotlin-code into separate binaries. The new version provides fully automated memory management and is able to interact with C, Objective-C and Swift. In addition, the Kotlin / Native runtime promotes the use of immutable data and prevents any attempts to share unprotected changeable code in threads.

◊New libraries to support multiplatform projects. In addition to kotlinx.coroutines for coroutines, the JetBrains team presented libraries for handling HTTP requests and serialization. You can create such a tool yourself by adding dependencies specific to the platform to the public API.

◊Support for innovations introduced in Kotlin 1.3 in three IDEs: IntelliJ IDEA Community Edition, IntelliJ IDEA Ultimate and Android Studio.

◊Implementation of “contracts”

◊Experimental support for inline classes and four subspecies of the unsigned integer type.

◊Ability of nested ads in annotation classes.

◊Inclusion in the standard support library Kotlin / Native and Kotlin / JS.

You can read more about Kotlin 1.3 on What’s New page on the Kotlin website. Many innovations presented by developers on KotlinConf: a playlist with performances is available on the YouTube-channel JetBrains.

The previous version, Kotlin 1.2, was released in November 2017. She suggested compiling both in JVM bytecode and in JavaScript for using the language in both the frontend and backend. In that version, the compiler was significantly optimized, the standard library was replenished with new packages, and extensions for working with sequences and collections appeared.

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения