Sunday, January 31, 2016

/ Oyonnax: a software to track students misbehave – The Progress

parents can follow the pedagogical support measures and sanctions their offspring live online and through a software created on site and unique in France.

& gt; More information in our editions subscribers Monday, February 1st.

LikeTweet

Saturday, January 30, 2016

HDRinstant: version 2.0 of the software is available – The world of photography

The start-up launches originally from Montpellier HDRlog HDRinstant 2.0. This second version of the software includes a new design and an extended range of algorithms Tone Mapping .

JPEG - 189.5 kb
The HDRinstant 2.0 software is able to achieve sharp images from, among others, videos.

Like the previous version, 2.0 HDRinstant allows amateur or professional photographers to produce HD and HDR images from videos or pictures taken continuously. According to the brand would be as effective with shots taken with a drone and images in low definition.

HDRinstant 2.0 is available in three versions freemium ( Free and Premium contraction , Ed): Free, Light and Professional. The Free version allows to achieve sharp images from videos with an algorithm, while the Light version uses two algorithms for the Tone Mapping thereby improving rendering. The Professional version for its HDR imaging uses a patented algorithm and offers even more advanced treatment.

The software is available for Mac and Windows. The Light version costs € 25 while the Pro version is available at 75 €.

 - The site HDRinstant

LikeTweet

Friday, January 29, 2016

Deutsche Bank accused of using deceptive software on the … – Novethic

Published Friday, January 29, 2016 at 14h51

According to information disclosed today by the Le Monde Deutsche Bank is accused by many of its customers have used deceptive software to handle foreign exchange transactions in its favor.

A class action complaint was filed on Dec. 21, 2015 before a New York court. The plaintiffs – investment and pension funds, multinationals but also central banks in Europe, Africa and Asia -soupçonnent the largest German bank to have “ inserted a slightly different algorithm for the passage of a order execution, to reject operations are unfavorable to him “.

The Barclays was accused of similar practices and was sentenced in November to 150 million fine, the paper recalls. Deutsche Bank has so far rejected these accusations. But this new deal comes a little more still affect his reputation, already suffering. The bank ended the year 2015 with a record loss of 6.8 billion euros and its turnover fell by 15% last quarter. Bonuses leaders were frozen and shareholders have already been warned that their dividends would also be frozen for two years.

Concepcion Alvarez

LikeTweet

Free software, remedy the opacity of algorithms – The Gazette (subscription)

In a text published in The Gazette January 12 (“ Uber and the necessary social control algorithms ), the researcher Yves Gingras raised the very pertinent question of the opacity of the algorithms used by digital services to which we are becoming accustomed in our society (eg Uber). The subject was discussed again at the radio show Large Medium January 14. This issue concerns us as citizens and activists of the free software.

The philosophy of free software, we believe, casts a critical light on the issues of digital and, hopefully, will help the Quebec public to find it a little better.

M. Gingras invites us to exercise a social control on the decision algorithms , real Black Box one does not know. We agree. Society needs Programs [Computer] that people can read, fix, adapt, improve instead of Black Box we provide the key industry players, we said Richard Stallman, founder of the movement for free software, in a 1994 essay.

While we want to exercise adequate social control algorithms, we must consider not only the laws, regulations and institutions but also the source code of software with which algorithms are implemented. Unfortunately, the software source code is usually hidden from view by a user abuse of copyright of the developers, typically companies that own them. Free software does exactly the opposite, exploiting copyright to protect the freedoms of users against potential abuse of the developers.

Scenarios

Hypothetically, one can very well imagine the user Uber community (online service) evolving independently of the undertaking Uber, its business model, its practices, its choice algorithms. What would the Uber community (users, carriers, developers and technical operators) if the online service had no owner, it was the common thing of all? Many scenarios are possible. Among these scenarios, which are more ethical, legal and very beneficial for both service users and society in general. It is the lack of freedom that prevents the materialisation of the best scenarios we could design.

The opacity of software, it is easy to realize, caused, causes and will continue to lead to abuses of all kinds. Since the Snowden case, it is the abuse relating to the right to privacy (mass surveillance) and the right to freedom of expression (censorship) that attract the most public attention. However, it should be understood that the list of possible abuse by a guarded secret software is very long. She will go on lying in the coming years, at a time when software world swallows .

LikeTweet

Thursday, January 28, 2016

When Google creates software that wins the most complex game … – Atlantico.fr

The game of Go is the most complex game in the world, far more complex than chess. Until recently, most experts thought that it would take decades for software to be able to beat a human at the game of Go. But yesterday, Google announced a software developed by one of its teams artificial intelligence, Deepmind, named AlphaGo, beat the European champion of Go, 5 to 0.

What is the GB and why so difficult?

The Go is a board game abstract, which is played on a grid of 19 intersections by 19. Players place black and white stones on each in turn intersection. The goal is to surround the stones from each other to capture and, ultimately, to control at least 50% of the surface of the game.

The game of Go is extremely complex.

<- partner tags: videoad (top) -> <- pwbreak ->

There are 10 to the power 761 possible games of Go, more than there are atoms! in the universe, against 10 power 120 possible games in chess.

To be good at Go, one must be able to detect subtle patterns on the ground, and think strategically. The first software to have defeated a champion chess was a “brutal” approach: he had stored a large quantity of chess in his memory, and statistically determined to play the next round, depending on what was indicated in its database. This approach is simply not possible in the game of Go, because of the astronomical number of possible combinations. Most major experts of Go are often unable to explain why this or that choice works – the game requires a importnate amount of intuition, exactly what is missing computers

L. original approach AlphaGo

The usual approach, statistic, “brutal”, could not walk. But the team of Google, after a British startup, Deepmind, recently acquired by Google, uses the latest, most advanced artificial intelligence technique, the “deep learning”, as reported by the MIT Technology Review. The deep learning just trying to reproduce the level of abstraction of which the human mind is capable. How to “design” a picture? We just think of it as a series of pixels, or as color gradients – what a computer can do very well. Or you can map the as a series of forms that can be compared to other forms. It is this more conceptual approach which is represented by the deep learning. By a series of conceptual multiple elevations (for “Color gradients” to “forms” to “face” to “Mona Lisa”), the deep learning software allows to approach the level of conceptualization of a human mind.

AlphaGo has two simulated neural systems, which operate in parallel. Instead of trying to assess all possible contingencies statistically, like a chess software, which is impossible to Go, AlphaGo will focus on the next few possible moves that can be evaluated. Equipped with this conceptual approach which reconciles the human, AlphaGo can then compete with human players. And unlike human players, AlphaGo is never tired or upset – and unlike a human, it can cause by playing several million games per day

<- partner tags.! videoad ( bot) -> <- partner tags: mediabong ->

LikeTweet

Wednesday, January 27, 2016

Software Asset management and optimization software assets – JDN

The Software spending is often greater than the hardware expenditure in the budgets of IT production, can represent 30-40% of the total budget. This quota share is steadily increasing for several years.

undeniably, most companies
 effective in optimizing their software assets (licenses and
 maintenance) are those that have developed – or are in the process of
 up – an approach Software
 Asset Management (SAM).

Software Asset Management is defined,
 according to ITIL as a set of skills, processes, organization and
 tools that aim to manage, control and protect software assets
 now and throughout the life cycle of software.

A recent study by CA Technologies indicates
 88% of European companies expect to face an audit
 their licenses
 software over the next 12 months and the costs of compliance
 can be significant.

When we last speaking, we
 had explained how and why companies should put in place
 SAM solution. We asked the opinion of an equipment distributor
 Computer very important player in its market, to illustrate this.

From these exchanges that
 Editors always find a way to more complex business models and
 rules of the game to make extremely difficult to compare prices. The
 dealer explains that before returning to negotiations, the first step is
 to be well prepared: Understand the existing contract, needs and volumes
 by profile or business, budgetary constraints, new models
 licensing (especially SaaS) … Be accompanied in this process
 Negotiations were an asset to the company, in order to have all the
 understanding in legal terms, but also services, volumes, terms, and conditions
 contractual and commitment levels.

Even with “captive” publishers, we must
 ie find the most daring negotiating levers like playing on
 Process schedule, leave the table or compare with
 prices in other countries (India, USA, UK, …).

And in this case, be assisted by a firm to tender negotiations and go test the break points,
 preserves contractual good relationship in the future.

Software Publishers have created an ecosystem
 very complex licensing, covering the purchase terms for licenses,
 associated maintenance services and support services. No one can change one
 the licensing ecosystem imposed by an editor. During negotiations, it is
 therefore recommended to involve operational ISD and Legal Service
 at the preparatory stage of the negotiation.

All in all, not to be victims
 this complexity, the best solution for the customer’s editors
 to implement a process of Software Asset Management (SAM).

Whatever happens, we must control its
 existing volumes and changes in scope. Indeed, the optimization of
 costs can not be done when the customer knows what he needs, and when
 he needs. And Software Asset Management is the keystone of a
 Effective software management.

Finally, the signed contracts are complex but …
 they include all key – sometimes well hidden … – Optimization
 technical and economic of this item of expenditure so important for CIOs. They
 should not sleep in closets … should the Operational
 ownership and throughout the life of the contract!

LikeTweet

Video Daech: PGP software jihadists pretend to use – L’Express

Sunday, January 24, organization Islamic State broadcast a video macabre glory of the terrorist attacks of 13 November in Paris. In the latter, between close-ups of beheadings and threats of future attacks, we can see a staging of the use of Pretty Good Privacy (PGP) data encryption software. Although several errors in representing this encryption -and enquête- of the elements seem to prove the fictitious nature and directed to its use in the context of the events of November 13, it is more than likely use all of Daech even methods to protect their online exchanges.

READ & gt; & gt; Video Daech: are encrypted messages terrorist authentic?

According to the opinion of several experts interviewed by Express, such as computer network engineer Stéphane Bortzmeyer, it is almost certain that even Daech be able to use encryption software as PGP. But what exactly is this program, how does it work and what is it for?

How does PGP

Pretty good privacy is software that has existed since the 1990s to encrypt – code – the data to make it incomprehensible, for example an email. Once encrypted, the message can only be read by the person with the right key. For the principle of PGP based on the creation of a pair of keys, one public and one private. These keys must be used together and created simultaneously.

https://www.ipbs.fr

The operation may seem complicated but it is actually very simple. A user created a key pair and then widely disseminate its public key on the Web -site, email etc. Anyone wishing to send an encrypted message using the public key. Once the received message, the user only has to use his private key to decrypt the message. The latter, as its name suggests, must obviously remain secret.

Sacha wrote a message. It encrypts it with the public key of John … who decrypts it with his private key. flossmanuals.net

Ensure the identity of the sender

But that’s not all, PGP provides another particularly interesting option: the cryptographic signature of a message. The goal: to allow the recipient to verify the identity of the sender, but the message was not modified in transit. To sign a message, the sender must encrypt both with the recipient’s public key, but also with its own private key. The recipient, he must decipher the message with its private key, but also with the public key of the issuer, as shown in the diagram below.

The orange color corresponds to the key “public”, the blue private keys. Guardian

A rather simple tool to use

Contrary to what one might believe, the use of PGP encryption through various tools readily available on the Internet, is particularly easy, even for novices. YouTube tutorials made by minors, even if they are laborious, are there to prove it. The popularity of PGP also lies in its reputation for sanctity. Decrypt an encrypted message without possessing -the decode clef- theoretically require tens or hundreds of years, depending on the level of the encryption key.

No wonder this method is praised by advocates of privacy -of increasingly battered on Internet- but also by malicious people. It could however soon be replaced by a new method for privacy protection more effective, the Pretty Easy Privacy . A system that automatically chiffrerait all email messages, as explained The World.

LikeTweet

Tuesday, January 26, 2016

Software Anti-Fraud cash to mandatory VAT in 2 years! – The echoes

The companies subject to VAT who use accounting software or management or a cash system to record payments from their customers must necessarily be equipped with software or secure and certified as from 1 st in January 2018.

This software will thus satisfy the conditions of fastness, security, retention and archiving Data to avoid the intentional deletion of revenue. These conditions will be specified by the tax authorities. In addition, companies will hold either a certificate issued by an accredited body, an individual certificate of publisher conform to a model that will be provided by the administration, to attest the use of such software.

Note: most companies can comply with this new obligation by updating their POS software

. Certificate presentation default or certificate during a tax audit, companies will incur a fine of € 7500 by software or system fund concerned and will be required to comply within 60 days .

Accuracy: will count down this time from the delivery or receipt of the report issued by the administration of Control unexpected or proposal or rectification of the notification of ex officio taxation under a different control (eg audit of accounts).

After this period, the undertakings which have not regularized their situation will again be liable to fine of € 7500

Note: if the lack of justification will be found at an unexpected tax audit, the company will not incur any penalty if it produces the certificate or certificate within 30 days of delivery or receipt of the minutes.

Last, the Directors will have the opportunity to intervene unexpectedly in the premises of undertakings to verify the possession of the certificate or the certificate for each box of software or system used. In practice, the control may be between 8:00 and 20 hours or, outside these hours, during normal business hours of the activity. A notice of intervention will be presented to the company from the start of control by officers of the administration. And at the end of this check, they will draw up a report recording the references of the software and any breaches of the new requirement.

Art. 88 of Law No. 2015-1785 of 29 December 2015, OJ 30

LikeTweet

Bureau Veritas and CEA published a guide on software … – electronic (Register)

 In addition to reading the guide, companies that wish to can obtain, after assessment by Bureau Veritas, a certificate of conformity of their embedded software.

 Bureau Veritas, a specialist in conformity assessment and certification, has just published a co-written guide with CEA Tech, technological research center CEA, designed to optimize the development and evaluation of embedded software. Titled “Software guidelines – Development & amp; Assessment “, it sets a new standard to enhance and verify the reliability and performance of embedded software and covers all phases of development, commissioning and operation.

 While the mechanical elements are gradually replaced by embedded software, the guide “Software guidelines – Development & amp; Assessment “presents best practices for developing embedded software. Many recommendations as requirements are well established for the development meets two requirements of optimal operability and high risk tolerance.

 Released in free access, this guide is for all sectors that do not have industry standard imposed [car convenience equipment (multimedia, air conditioning ...), robotics and connected objects (automated handling, bracelets and watches online ...), defense , industrial and agricultural machinery ...]. Companies that wish to can obtain, after impartial and independent assessment by Bureau Veritas, a certificate of conformity of their embedded software.

 This certification, obtained through evaluation of each requirement will ensure that all the recommendations applicable for the software have been met. In the client’s interest, the evaluations may be performed continuously monitoring including upstream development cycle, from the software design phase to validate the system.

 “Today, the increasing digitalization of our equipment is increasing the number of embedded software. Faced with certification costs up to 20% of their total cost of creation, it is vital for companies to have strong guarantees of reliability and stability, “says Franck Sadmi responsible activity” Software ” Bureau Veritas.

 The guide can be downloaded by registering on this page: http://www.bureauveritas.com/white-papers/software-development-assessment

LikeTweet

Energy Management: CertiNergy employ the Ubigreen software – Monitor

CertiNergy and Ubigreen, two companies active in the field of energy efficiency, have formalized a partnership January 19. As part of consumption monitoring contracts, CertiNergy offer its customers to use the IT platform of Ubigreen.

In the emerging area of ​​energy management, time begins alliances. French companies and CertiNergy Ubigreen announced January 19 a partnership. The first propose consumption control contracts including IT tools of the second. “This offering aims to support a customer in its efforts of energy performance, said Patrick Porte, deputy general manager of CertiNergy. The meters installed by our teams transmit their data to the Ubigreen software. Our optimization engineers will base their advice on collected information. “

Founded in 2008, CertiNergy started in trading of energy saving certificates of (EEC). It has grown since then. The activities of the energy sector and services now cover the implementation of energy audit, implementing saving actions and seeking funding for these operations. “In this area, the measure is essential. One can not understand immeasurable situation observed Patrick Porte. Our group has the expertise in energy efficiency and counting. Today, the market tends to add to the services of digital monitoring platforms. “

This is where Ubigreen. Since 2013, the company markets a line analysis software of energy consumption or emissions of CO 2 . “Our product is for all sites, metered or not. In the first case, we retrieve the data aggregated by the centralized technical management. If the building does not have the necessary systems, we can define a counter plan with a payback time of about one year, “says Julien Meriaudeau, president of the company.

The computer program further comprises a prediction module for future consumption. Following an energy audit, CertiNergy can advise the use of a monitor with a connection to the platform Ubigreen. The installed supervision will highlight areas where savings are possible. This form of accompaniment will last three years.

With this partnership, the software company is expanding its range of potential customers. CertiNergy is well established in the industry, unlike Ubigreen. Early this year, the young company is also working to expand its device. Its teams develop a power purchase simulator. The user will be able to estimate its needs and organize its tenders accordingly. “Our tool will facilitate these procedures. In this way, they could be more frequent, says Julien Meriaudeau. Our tests are already well advanced. We should publish a final version in June. “

LikeTweet

VW case: the existence of a program to distort emissions … – CCFA

According to a report German SÜDDEUTSCHE ZEITUNG newspaper (01.22.16), the existence of software to distort the emissions of Volkswagen Group models of diesel engines was a “open secret”.

According to the internal investigation by the German manufacturer, many executives and employees in the German car group engine development department were aware of the existence of such software.

Indeed, the culture of secrecy would have prevailed in this department, and installation of a faker software to achieve the emission reduction targets was openly discussed in 2006.

An employee would have given warning in 2011 by preventing an officer outside the engine development department. But this leader – according to preliminary information, it would be Heinz Jakob Neusser, then responsible for developing Volkswagen -. Would not have reacted

According to the internal investigation, “rather than admit the Executive Board that he was not able [to reach emission reduction targets in the US], the department opted for a fraud. “

Until the announcement the results of the internal investigation, Volkswagen had argued that only a small number of employees were aware of the manipulations and had denied that officials were involved.

Volkswagen declined to comment this information. (REUTERS 01.22.16, AutomobilWoche, ZEIT 01.23.16, 25.01.16 ECHOES)

LikeTweet

Monday, January 25, 2016

Software Anti-Fraud cash to mandatory VAT in 2 years! – Les Echos Business

The companies subject to VAT who use accounting software or management or a cash system to record payments from their customers must necessarily be equipped with software or secure and certified as from 1 st in January 2018.

This software will thus satisfy the conditions of fastness, security, retention and archiving Data to avoid the intentional deletion of revenue. These conditions will be specified by the tax authorities. In addition, companies will hold either a certificate issued by an accredited body, an individual certificate of publisher conform to a model that will be provided by the administration, to attest the use of such software.

Note: Most companies will comply with this new obligation by updating their POS software

In the absence of the certificate or statement on the occasion. a tax audit, companies will incur a fine of € 7500 by software or system fund concerned and will be required to comply within 60 days

Accuracy:. this deadline will count from the delivery or receipt of the report drawn up by the administration in case of unannounced or proposal or rectification of the notification of ex officio taxation under a different control (eg . verification of accounting)

After this period, companies that have not regularized their situation will again be liable to fine of € 7500

Note!: if the lack of justification will be found in an unexpected tax audit, the company will not incur any penalty if it produces the certificate or certificate within 30 days of delivery or receipt of the minutes.

Last, the administration will have the opportunity to intervene unexpectedly in the premises of undertakings to verify the possession of the certificate or the certificate for each box of software or system used. In practice, the control may be between 8:00 and 20 hours or, outside these hours, during normal business hours of the activity. A notice of intervention will be presented to the company from the start of control by officers of the administration. And at the end of this check, they will draw up a report recording the references of the software and any breaches of the new requirement.

Art. 88 of Law No. 2015-1785 of 29 December 2015, OJ 30

LikeTweet

The Argus Group is launching a new control software VO – Auto News

Reconciling professional sales process with new consumption habits of buyers of used cars, now largely turned to the internet, this is the ambition of Planet VO2, control software VO of activity.

It took an investment of 10% in turnover and 18 months of work of Argus Group’s research teams to create this new software based on an approach called User Experience or UX for user experience. To design a tool closer to the expectations of VO actors, professionals in automobile distribution were interviewed during meetings in the field and specific customers were surveyed to determine what their needs and expectations. With the key, a Planet VO tool [1] with automotive management capabilities already available in the previous version of the software (Planet VO), the Argus VO repository and VN, the rating system Argus with Cote Argus and values Market Argus. Add intelligent business services, statistics and customer management.



A specific interface for each user

From the commercial secretary to the seller through VO the sales manager and the sales manager, each user has a specific interface. Planet VO2 is accessible from the web and operates on all media. A smartphone application is also available for the return journey, tracking and reporting tasks of the activity.

Note now possible interfacing with the service dealership new cars, finance and the aftermarket. Other features will in future enrich Planet VO [2] image for monitoring the performance of small ads or adding new SONAR versions (geographic Observatory ads and transaction VO).

LikeTweet

Saturday, January 23, 2016

South Africa: Skype saves the life of a family – RFI

Crime in South Africa sometimes leads to very unusual situations. A couple in the process of being robbed by two armed men could be rescued thanks to the Skype call software. The mother was in line with her son, a student in Paris at the time of the attack.

The night of his birthday, Tessa Reddy is in line with his son Skype . She lives in the Melville neighborhood Johannesburg while the young man is in Paris where he studied.

But while his wife and son argue, the father falls face to face with two armed men who come to enter his home.

Burglars threaten with a gun, and then hang up the room where his wife is, always in line with their son.

The robbers assaulted his parents

The student hears the thieves threaten and brutalize his parents. From Paris, where he found the young man while warning his brother and other family members in Johannesburg and Cape Town.

The arrival of the Police alerted by relatives routs thieves. They still stole several thousand euros in materials and cash.

Tessa Reddy believes that his ordeal could have lasted long hours without the intervention of his son, at the other end of the world.

This story, widely reported by the South African press, recalls another: that of a South African journalist, stripped while he was on live TV a few months ago .

LikeTweet

Friday, January 22, 2016

Recap IT: Audit Oracle software tense at Mars, SigFox in … – LeMondeInformatique

This week was marked by a rain of 248 patches that s ‘hit on many Oracle products. The IT news has also been marked by the emergence of a new generation of soldiers raised through a neural chip grafted to even the brain. Meanwhile, in the white desert of Antarctica, an IoT project is conducted through SigFox on behalf of the Princess Elisabeth polar station.

How is an audit software with Oracle. very badly at Mars Oracle is at least as well known for its aggressive sales strategy for software licenses for its database technology. And a recent dispute with the food giant Mars Inc. about an audit clearly shows that this reputation is not unfounded

.

US Army wants to create cyborg soldiers. After Hollywood, the US military intends to place on the battlefields of cyborg soldiers equipped with an electronic chip to communicate better with his troops.

SigFox sets foot in Antarctica . and launched a foundation Technology low-frequency network and low consumption of startups SigFox is being tested – with connected sensors of the Belgian company Sensolus – by members of the Princess Elisabeth polar station in Antarctica. The nugget Toulouse also announced the creation of a foundation to support the growth of connected projects, especially in the environment and health.

A salvo of 248 patches for Oracle products. The Redwood Shores editor yesterday delivered a record number of 248 patches and prompts administrators to apply them immediately.

LastPass hacked with a simple phishing attack. security password manager LastPass has new been questioned by security specialist at the last Shmoocon.

LikeTweet