By submitting the form, I give my consent for the processing
of my personal data according to this agreement

ITMO at a Glance

Search results for «CTIo» 5311 results

  • Jobs of the Future: Who Will Design Emotions and Preach IT Knowledge?

    …cular, and robotics in general, leads to the necessity of such new professions as emotion designer and semantic field producer. They may sound vague, but in fact, each has certain functions and options. For example, semantic field producers will be in charge of creating a general worldview and managing information streams. What is the connect…

    13.02.2017

  • International Experts on Business Incubators and Accelerators in Russia

    … incubators were based in universities or non-governmental organizations; then, private funds and corporations began investing in their development, which affected the incubator’s functions: they've focused on developing particular technologies. Another change was switching to supporting a wide range of startups instead of developing "key" projects. Previously, incub…

    10.02.2017

  • Big Data for Insurance: How Algorithms Affect Car Insurance Prices

    …h is saved in security archives of companies. In big companies, specialists in this field analyze both scattered data so as to look for common features, and the whole amount of transactions in order to find potential frauds. That’s how Visa works — they monitor all transactions online so as to find suspicious ones. Thanks to such algori…

    10.02.2017

  • ITMO Launches a New Set of Massive Open Online Courses

    …grams, I became sure that correctly trained basic skills allow more than just to work effectively, but to also learn new features faster. This course does not only teach the basic functions of the program, but shows how to apply them to complex and nontrivial tasks. Whatever project you work on — AutoCAD will surely be of great help to you", notes Filipp Perepelitsa,…

    09.02.2017

  • Meadowsweet Decoction Showed its Activity in Cancer Preventing

    …rov Research Institute of Oncology and ITMO University in Saint Petersburg in collaboration with Central Siberian Botanical Garden in Novosibirsk, Russia, showed that meadowsweet decoction may be used as a basis of a diet for preventing nervous system cancer. Meadowsweet is a perennial herb growing in forests of the Northern hemisphere. For a long time, deco

    08.02.2017

  • Neural Interfaces to Control Reality: a New Project at the Future Technologies Accelerator

    …Neural interfaces can be used for many actions and operations for which we now use speech or control devices. For example, when one wants to turn on a computer, one presses a button, or when one wants to make an order at a cafe — asks the waiter. Neural interfaces are designed to do these things using mental commands. As of now, most researchers develop neural interf…

    08.02.2017

  • 5 Things You Need to Know Now

    …Tesla CEO Elon Musk to build a second factory in Europe, 40 gamers used the popular online building game to construct a virtual replica—in just 35 hours—of the company's battery production plant. Campaign by hologram. French far-left candidate Jean-Luc Melenchon appeared to supporters by hologram on Sunday in a technological first for a presidential campaign in Fr…

    06.02.2017

  • The Master Provocateur

    …ge to witness the magnificence of the Malachite Room, or the shimmering visual wizardry of the golden Peacock Clock, or just to marvel at the old masters in the museum’s regular collection. For these visitors, the shock and awe of stumbling upon Fabre’s eerie dancing skeletons, baying hounds of hell and monstrous three dimensional dinosaur fossils, all created fro…

    03.02.2017

  • ITMO University Takes Part in the "Innograd" Project

    …to open a Unified Center for Geoinformation Urban Studies, which will serve as a base for ITMO’s Higher School of Geoinformatics. The center will be in charge of high technology production of research complexes for the agricultural sector based on drones. Also it will include a test site for unmanned aircraft systems and a school for engineers. The manufacturing faci…

    03.02.2017

  • CODA: The New Approach to Virus Protection

    …Malware Usually, malware is created as follows: a hacker writes the code, tests it on his OS, and then searches for ways to bypass the antivirus protection. First antiviruses detected malware by the MD5-hash, but hash changes if you change at least a symbol in the code. So, more complex methods were developed, like detecting viruses by particular pieces of the cod…

    03.02.2017