<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>שירותי מחשוב - genie שירותי מחשוב לעסקים</title>
	<atom:link href="https://www.genie.co.il/en/tag/%D7%A9%D7%99%D7%A8%D7%95%D7%AA%D7%99-%D7%9E%D7%97%D7%A9%D7%95%D7%91/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.genie.co.il/en/tag/שירותי-מחשוב/</link>
	<description></description>
	<lastbuilddate>Mon, 29 Jul 2024 14:23:35 +0000</lastbuilddate>
	<language>en-US</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.genie.co.il/wp-content/uploads/2021/05/fav-200x200.png</url>
	<title>שירותי מחשוב - genie שירותי מחשוב לעסקים</title>
	<link>https://www.genie.co.il/en/tag/שירותי-מחשוב/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>הסבת עסק למחשוב ענן &#8211; לא סיפור פשוט</title>
		<link>https://www.genie.co.il/en/moving-business-to-the-computing-cloud/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 14 Aug 2022 10:00:11 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8131</guid>

					<description><![CDATA[<p>Cloud computing represents one of the most significant trends in recent years, in the field of technology and computers. Cloud computing services embody a long list of advantages, starting with remarkable simplicity and the absence of the need for daily maintenance, the starting point can be complex. Here are several highlights that will help you move forward into the world of cloud computing in your business. Choosing a type of provider for cloud computing for businesses point […]</p>
<p>The post <a href="https://www.genie.co.il/en/moving-business-to-the-computing-cloud/">הסבת עסק למחשוב ענן &#8211; לא סיפור פשוט</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cloud computing represents one of the most significant trends in recent years, in the field of technology and computers. Cloud computing services embody a long list of advantages, starting with remarkable simplicity and the absence of the need for daily maintenance, the starting point can be complex. Here are some highlights that will help you move forward into the world of cloud computing in your business.</p>
<h3><strong>Choosing a provider type for business cloud computing</strong></h3>
<p>The starting point should be that there is not one cloud computing service that is similar to another. Therefore, choosing the specific provider that provides these services must be wise. The main diagnosis is between three main types of providers:<br />
1. Global public providers - all the big names: servers from Microsoft, Google, Amazon DigitalOcean and more<br />
2. Companies that provide integration and computing services - including the ISP companies (Bezeq International, 012 Smile, Netvision) and the integration companies (Binet, Taldor, IBM)<br />
3. Independent suppliers - can certainly be large as well. For example, one of the prominent names in this field in Israel is Triple C</p>
<p>It is too short to go into detail here about every doubt there is, all the more so when it comes to the service packages it offers. However, there are a number of highlights that are important to consider: from an economic point of view, many believe that Digital Ocean&#039;s service is particularly profitable, and is therefore suitable for small to medium-sized businesses and organizations (SMB). On the other hand, others will actually recommend choosing a provider located in Israel, which may provide a quick and immediate response in the event of a malfunction or request.</p>
<h3><strong>The comprehensive tests and the assimilation procedure</strong></h3>
<p>It should be taken into account that in any case there may well be &quot;birth defects&quot; when joining a cloud service, especially during its implementation in the business: a scenario in which the business does not run in an exemplary manner in the first few days after - is not unthinkable. A useful recommendation, in this context, can be a careful examination of the field and joining a cloud service package only after understanding it for approval. There are guides on the Internet that make it possible to understand &quot;who is against whom&quot;, while consulting from professional companies operating in the field can also help.<br />
To avoid misunderstandings in the future, it is important to find out in advance what the characteristics of the service package are: the level of security (the cloud does not guarantee absolute security), the method of communication, the terms of the financial agreement (there are many packages that include a significant increase in prices after a certain period of time), the method of management and learning, stability The supplier and more. It is important to pay due attention to the technological options offered by the service package and make sure that they are suitable for specific needs: virtual storage and backup, an interface that supports Hebrew, personalization of the systems, and more.</p>
<p><strong>Do you need advice for converting the work environment in your business to the cloud? </strong><a href="https://www.genie.co.il/en/cloud-computing/">Click for more information on genie&#039;s cloud computing services</a></p><p>The post <a href="https://www.genie.co.il/en/moving-business-to-the-computing-cloud/">הסבת עסק למחשוב ענן &#8211; לא סיפור פשוט</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>אופיס 365 מורידה את הוצאות הרישוי בעסק שלך</title>
		<link>https://www.genie.co.il/en/office365-cut-expenses/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Mon, 28 Mar 2022 09:17:42 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[אופיס 365]]></category>
		<category><![CDATA[המשרד הממוחשב]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8256</guid>

					<description><![CDATA[<p>Every organization, of any size and in any field of activity, should be managed by computerized means - the various Office programs from Microsoft offer exactly that. What is important to emphasize is that for businesses and organizations of small to medium size, there is a much more recommended option, which can save them a lot of money. This is exactly where Office 365 comes into the picture, which expresses the transition of a work environment to [...]</p>
<p>The post <a href="https://www.genie.co.il/en/office365-cut-expenses/">אופיס 365 מורידה את הוצאות הרישוי בעסק שלך</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Every organization, of any size and in any field of activity, should be managed by computerized means - the various Office programs from Microsoft offer exactly that. What is important to emphasize is that for businesses and organizations of small to medium size, there is a much more recommended option, which can save them a lot of money. This is exactly where Office 365 comes into the picture, which expresses the transition of a work environment to which we have become accustomed to a virtual cloud. You won&#039;t believe how convenient, simple, cheap and safe it is.</p>
<h3>This makes management more convenient</h3>
<p>Office 365 allows, to a significant extent, &quot;to be with and feel without&quot;. On the one hand, the business people can use all the familiar tools they have learned to use and have already implemented in their work, such as software: Word, Excel or Power Point, Outlook. On the other hand, the software itself is not installed on personal computers located in the business, but is located on a virtual server that the business is connected to via the Internet (after all, every business needs a communication network in order to run well).<br />
The direct meaning of this is that the operation itself becomes many times simpler, when the responsibility for installing the software and maintaining it is saved from the business people. From an economic point of view, this is also a smart step: the use is made of infrastructures that also exist for the business, when equipping the cloud package is cheaper than the software itself. In other words, <a href="https://www.genie.co.il/en/products/office365/">the transition <strong>For Office 365</strong></a> Makes it possible to reduce the licensing expenses of the business, as well as its general expenses, to a significant extent.</p>
<h3>Several advanced functions</h3>
<p>Beyond moving the playing field to that of the virtual cloud, the Office 365 work environment includes a number of technological innovations that must be considered. Among other things, this is a box of about 25 gigabytes available for use by users (a volume that is always suitable for small to medium-sized organizations) and contains antivirus, synchronization software for the cell phone, spam filtering and more. The infrastructure includes the possibility of managing video and audio calls, making conference calls as well as remote control of the system.</p>
<p>All of these fit like a glove to the characteristics of the present time and the needs that exist for the various businesses. By using the Internet or a dedicated application, for example, the business people can manage it from anywhere and at any time, even when they are not physically in the office.</p>
<p>Learn more - <a href="https://www.genie.co.il/en/products/office365/">Implementation of Office 365 for business</a></p><p>The post <a href="https://www.genie.co.il/en/office365-cut-expenses/">אופיס 365 מורידה את הוצאות הרישוי בעסק שלך</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>חוק הגנת הפרטיות &#8211;  כדאי שתיקחו אותו אישית</title>
		<link>https://www.genie.co.il/en/privacy-protection-law/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 04 Apr 2021 12:47:33 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=14358</guid>

					<description><![CDATA[<p>גיא הוכמן – מנכ&#34;ל Genie  בעיכוב קליל ואופייני שנמשך שנים, אושר בקריאה ראשונה בישראל התיקון לחוק הגנת הפרטיות. החוק מגדיר את נושא הגנת המידע, מבטל תקנות מיושנות ומקנה סמכויות משמעותיות יותר לרגולטור באופן שמתקרב לחוק הפרטיות של האיחוד האירופי (GDPR), אך עדיין לא מעניק לאזרחים שליטה מלאה בשימוש שנעשה במידע שלהם. במאמר זה אעסוק בעקרונות [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/privacy-protection-law/">חוק הגנת הפרטיות &#8211;  כדאי שתיקחו אותו אישית</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>גיא הוכמן – מנכ&quot;ל Genie </strong></p>
<p>בעיכוב קליל ואופייני שנמשך שנים, אושר בקריאה ראשונה בישראל התיקון לחוק הגנת הפרטיות. החוק מגדיר את נושא הגנת המידע, מבטל תקנות מיושנות ומקנה סמכויות משמעותיות יותר לרגולטור באופן שמתקרב לחוק הפרטיות של האיחוד האירופי (GDPR), אך עדיין לא מעניק לאזרחים שליטה מלאה בשימוש שנעשה במידע שלהם.</p>
<p>במאמר זה אעסוק בעקרונות החוק, במטרותיו ובהשפעותיו על הארגונים והעסקים שמשתמשים במאגרי מידע. היערכות נכונה תאפשר לכם לכבד את פרטיות הלקוחות שלכם ולחסוך מעצמכם קנסות כבדים, אישום פלילי ופגיעה במוניטין</p>
<p>Your customers live, buy and hang out online and on social networks and you, as marketers who know how to leverage their consumer behavior, benefit from valuable big data, which allows you to get to know your customers and sell more to them. But all this goodness has a price: the possibility of violating their privacy.</p>
<p><strong>Privacy protection - a law with teeth<br />
</strong>&quot;A person shall not harm the privacy of another, without his consent.&quot; This is the language of the Basic Law on Human Dignity and Freedom from 1981 which states that violation of privacy is a criminal offense and a civil wrong. In 2017, the Knesset approved the privacy protection regulations, which detail the manner in which the information security obligation is applied to any entity that manages or processes a database of personal information.</p>
<p>In fact, the privacy protection regulations are a revolution in information security regulation in Israel. They impose on you, business owners, companies and organizations that hold databases containing personal information, administrative, technological and legal obligations regarding the way you secure the information - and this according to the sensitivity of the information in your possession:</p>
<p>· Security level for the database with a single authority.<br />
· Basic security level for information, such as: full name, phone, address.<br />
· Medium security level - social security number, medical information, financial information, consumption habits, political opinions, beliefs and more.<br />
High level of security - business and public databases that are designed to collect information for the purpose of providing it to others, or that contain sensitive information about 100,000 people or more, or that the number of authorized persons to access this information exceeds 100.</p>
<p>For each level of security, the law defines regulations detailing the manner of application that will ensure the privacy of the record holders:<br />
Writing an information security procedure, performing physical controls to protect the information, such as access control or security cameras, response procedures to information security incidents, mapping the computer systems connected to the databases, how information security is managed, and more.</p>
<p><strong>Do not meet the requirements of the law? You will find that his bite hurts.<br />
</strong>The enforcement of the Privacy Protection Law is already felt on the ground and the members of the Authority for the Protection of Privacy are no slouch... The authority has administrative enforcement capabilities in all sectors of the economy and the authority to investigate criminal investigations, up to the point of filing charges.</p>
<p>Therefore, if you want to avoid heavy fines and a criminal record, get ready today to protect your customers&#039; privacy. Our privacy protection teams at Genie, which include highly experienced information security managers and legal advisors, will accompany you in the planning and implementation of privacy protection solutions, in a structured process that includes 5 steps - until you meet the requirements of the law:</p>
<p><strong>1. Mapping the databases<br />
</strong>Mapping all the computer systems and databases that are in the possession of the organization and contain sensitive information to which the Privacy Protection Law refers: databases of customers, leads, employees, suppliers and more (yes, even an innocent Excel file on the laptop of Tzipi from sales, may complicate you...).</p>
<p><strong>2. Checking the level of information security<br />
</strong>Identifying the level of information security required in the relevant databases.</p>
<p><strong>3. Gap survey<br />
</strong>Finding the gaps between what is present and what is desired in the organization&#039;s information security systems.</p>
<p><strong>4. Application and implementation<br />
</strong>Writing a procedure for the protection of information and implementing information security tools to comply with the requirements of the Privacy Protection Law.</p>
<p><strong>5. Management folder<br />
</strong>Preparation of a management folder to respond to information incidents and to present the information protection system in a surprise audit<br />
of the Authority for the Protection of Privacy.</p>
<p>Successfully!<br />
<strong>Guy Hochman - CEO </strong><strong>Genie</strong><strong> </strong></p><p>The post <a href="https://www.genie.co.il/en/privacy-protection-law/">חוק הגנת הפרטיות &#8211;  כדאי שתיקחו אותו אישית</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</title>
		<link>https://www.genie.co.il/en/data-recovery/</link>
		
		<dc:creator><![CDATA[doron baharav]]></dc:creator>
		<pubdate>Mon, 01 Mar 2021 12:13:09 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=14271</guid>

					<description><![CDATA[<p>Would you agree to store all your capital in the basements of the most secure bank in the world, in the most advanced safe of its kind, knowing that at the moment of truth, when you need money urgently, there is no guarantee that you will have the key? Guy Hochman - CEO of Genie Computing Services As a business owner, you are aware of the importance of backup, which is why you chose one of the backup systems offered on the market. You make sure to back up your business information [...]</p>
<p>The post <a href="https://www.genie.co.il/en/data-recovery/">גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Would you agree to store all your capital in the basements of the most secure bank in the world, in the most advanced safe of its kind, knowing that at the moment of truth, when you need money urgently, there is no guarantee that you will have the key?</p>
<p><strong>Guy Hochman - CEO </strong><strong>Genie Computing Services</strong></p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-14276" src="https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-600x400.jpg" alt="גיא הוכמן" width="889" height="500" srcset="https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-300x169.jpg 300w, https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-1024x576.jpg 1024w, https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-600x338.jpg 600w" sizes="(max-width: 889px) 100vw, 889px" /></p>
<p>As a business owner, you are aware of the importance of backup, which is why you chose one of the backup systems offered on the market. You make sure to back up your business information in the cloud, with tape backups and a local backup to a physical computer, and you even receive a daily report that proves that the information has indeed been backed up. In return, you enjoy the peace of mind that comes from knowing that at the moment of truth, you can &quot;press a button&quot; and return the situation to normal. All of this was true as long as the threats you faced were physical: fire, flood, theft, natural disasters and war damage. Then came the ransomware.</p>
<h3>Reproducibility - the difference between a &quot;slight hit on the wing&quot; and a crash</h3>
<p>As integrators who support companies in all sectors of the economy, we meet quite a few business owners who have experienced a ransomware virus and find out too late that this backup system is important, but without the ability to recover information efficiently and quickly, they are expected to have long and frustrating days of complete shutdown and severe damage to business income and reputation.</p>
<p>Therefore, as business owners, you must change the dialogue with your backup provider and examine not only the backup capabilities it makes available to you, but also the recovery capabilities. why? Because ransomware attacks in business are more common than you imagine, so it is likely that sooner or later, you will need these capabilities very much. That&#039;s how you do it right.</p>
<h3>10 good tips for managing an optimal backup and recovery setup</h3>
<ol>
<li><strong> Check the log regularly<br />
</strong>In many cases some user adds a folder or information in a location that is not configured for regular backup. This information, which is sometimes critical to the functioning of the organization, is not regularly backed up and this is discovered too late. Therefore, regularly check the log that shows the content of the backed up information and pay attention to whether all the relevant information is backed up.</li>
</ol>
<ol start="2">
<li><strong> Perform recovery tests<br />
</strong>Make data recovery tests a regular procedure, because a successful recovery indicates a full and proper backup. Regularly conduct sample tests, mainly for information that is defined as critical to the organization. In each test, different information was recovered and thus, over time, all the information will receive a test confirming that it can be recovered.</li>
</ol>
<ol start="3">
<li><strong> Create a backup log<br />
</strong>Document in the backup log all the sample recovery tests you have performed, so that you do not repeat, again and again, recovery tests for the same data and you do not miss other data.</li>
</ol>
<ol start="4">
<li><strong> Make a local backup<br />
</strong>Back up your information both in an external backup system and in a physical backup system in the business itself. The local backup will enable faster recovery than a cloud backup and will significantly shorten business downtime.</li>
</ol>
<ol start="5">
<li><strong> Disconnect the local backup system from the network<br />
</strong>A backup system that is connected to the network is exposed to ransomware attacks just like the information on the organization&#039;s servers. Such an &quot;infected&quot; backup cannot be used by you to restore the information.</li>
</ol>
<ol start="6">
<li><strong> We viewed the information in the backup<br />
</strong>Ransom attacks focus on the most significant weak point in the corporate network and in many cases it is the backup system. Therefore, make sure that the information in the backup is also compressed and encrypted at the highest level.</li>
</ol>
<ol start="7">
<li><strong> Custom backup and restore<br />
</strong>Every business has different types of information. Each type of information requires different backup and recovery levels, a unique backup policy, a different backup volume and a definition for the tools with which the backup will be performed. Therefore, be sure to customize the backup and recovery setup for your business.</li>
</ol>
<ol start="8">
<li><strong> backup procedure<br />
</strong>Write a mandatory backup procedure that defines the backup days, backup hours, the number of backups required each day, month or year and the recovery test plan. Appoint a person in charge of backups and make sure that the procedure is continued, even in cases where he leaves his position.</li>
</ol>
<ol start="9">
<li><strong> Define a dedicated budget section<br />
</strong>Backup and restore are not a luxury. They may be your only lifeline during a cyber attack on your business. Therefore, remember that for every shekel you try to save in this area, you may pay compound interest, to restore the circles of destruction.</li>
</ol>
<ol start="10">
<li><strong> don&#039;t wait for tomorrow<br />
</strong>Apply the recommendations today and you will be better prepared for the information crisis that, sooner or later, will affect your business as well.</li>
</ol>
<p>Do you want to be better prepared for information events through an optimal backup and recovery setup that is customized for your business? The Genie team and I are here for you. Together we will create a detailed backup plan, characterize the best backup and recovery solution, define backup procedures and accompany you hand in hand, in case of an information incident.</p><p>The post <a href="https://www.genie.co.il/en/data-recovery/">גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>מיקור חוץ IT – אאוטסורסינג והשמת מנהלי רשתות בארגונים</title>
		<link>https://www.genie.co.il/en/helpdesk-benefits/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Mon, 20 Apr 2020 08:43:36 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[המשרד הממוחשב]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8253</guid>

					<description><![CDATA[<p>Outsourcing as an IT service Information technology services (Information Technology, or in short, IT services) are considered essential in the operation of any business or organization. They can be made much more efficient and simple. A useful recommendation is to entrust the reins to companies that operate in the field and provide services as part of outsourcing. Here is everything you need to know about the service of outsourcing [...]</p>
<p>The post <a href="https://www.genie.co.il/en/helpdesk-benefits/">מיקור חוץ IT – אאוטסורסינג והשמת מנהלי רשתות בארגונים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Outsourcing as an IT service</h2>
<p>Information technology services (Information Technology, or in short, IT services) are considered essential in the operation of any business or organization. They can be made much more efficient and simple. A useful recommendation is to entrust the reins to companies that operate in the field and provide services as part of outsourcing. Here is everything you need to know about the outsourcing service for IT people, from home <strong>genie</strong>.</p>
<h3><strong>All the reasons to give the reins to professional companies</strong></h3>
<p><strong>services</strong> They include operations related to the computer and information systems of the business. Every business needs support for breakdowns, ongoing maintenance of the systems, development of tools and information systems, execution of one-off projects and more. These are diverse actions that require time, knowledge and multiple efforts. Therefore, turning to a company that operates in the form of outsourcing (IT outsourcing) may be a perfectly logical step.<br />
Because the average business or organization does not necessarily have people who possess the significant technical knowledge required to carry out the various operations. Computer outsourcing services or the placement of a network manager in the organization, prevents the need to recruit and train professionals to operate the computer systems.</p>
<p><strong> Steps that require considerable financial expenses from the business. From this it inevitably follows that turning to external companies may save considerable funds.</strong></p>
<p>Relying on companies that provide one-off services as part of outsourcing allows the organization to focus on the issues that make up the core of the business activity. In this way, the business people can focus on their day-to-day management, when they know that when needed there is an address to contact. This, of course, is compared to the scenario in which the business activity is &quot;stuck&quot; due to the difficulty of its people to deal with the computerized systems and their operation.</p>
<h3><strong>The benefits of outsourcing computer technicians and network administrators</strong></h3>
<p>Companies operating in the field of outsourcing often provide around-the-clock assistance. 24 hours a day and seven days a week. Hence, for any malfunction, problem or question there is a professional address to which you can contact and receive a quick response. Moreover, with today&#039;s technology, IT companies can provide Out Sourcing solutions with remote control (Help Desk) or at the customer&#039;s site. Which enables quick to immediate treatment of any malfunction, physically within the organization.</p>
<p>&nbsp;</p>
<p><strong>For details of our IT services - <a href="https://www.genie.co.il/en/it-services/">click here</a></strong></p>
<p><strong>To quickly contact us - <a href="https://www.genie.co.il/en/contact/">click here</a></strong></p><p>The post <a href="https://www.genie.co.il/en/helpdesk-benefits/">מיקור חוץ IT – אאוטסורסינג והשמת מנהלי רשתות בארגונים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>החלפת שרת – לא סיפור פשוט (בעיות נפוצות ודגשים בהחלפת שרתים)</title>
		<link>https://www.genie.co.il/en/replacing-server/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 13:19:50 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<category><![CDATA[שרתים]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8355</guid>

					<description><![CDATA[<p>The server is a main player in everything related to the storage and maintenance of information in various institutions and organizations. Its importance to the organization is critical, if only due to the constant need for quick and smooth access to the databases found in it by various parties. The server is often required to simultaneously deal with a large number of access requests to the same databases. From this it can be concluded that such a server must be […]</p>
<p>The post <a href="https://www.genie.co.il/en/replacing-server/">החלפת שרת – לא סיפור פשוט (בעיות נפוצות ודגשים בהחלפת שרתים)</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The server is a main player in everything related to the storage and maintenance of information in various institutions and organizations. Its importance to the organization is critical, if only due to the constant need for quick and smooth access to the databases found in it by various parties. The server is often required to simultaneously deal with a large number of access requests to the same databases. From this it can be concluded that such a server must be reliable, strong and fast, in order to store the large amount of information, save it, and of course make it available for the benefit of the authorized employees of the organization at any time.</p>
<p class="clearfix">An average server should provide good performance for at least 4 years. After that, it will enter a period where it may experience malfunctions with a higher probability, and its reliability gradually decreases. The server&#039;s age may certainly be one of the considerations for its replacement. Additional reasons why the replacement of the server in the organization should be considered are: a problem of lack of volume for storage (due to the constant increase in the total volume of information of the organization), a problem of availability of the server in relation to the number of employees who need it (of course, as the number of users increases, the availability of the server decreases). The lack of availability is reflected in the fact that the flow of the information requested from him is slow and even tends to get stuck frustratingly.</p>
<p><img decoding="async" title="server" src="https://www.genie.co.il/wp-content/uploads/2019/01/server.jpg" alt="server" /></p>
<p>When you wake up and see her, one of the problems described, but natural, is to consider the possibility of changing the server. At the same time, understandable<br />
For everyone, the change of the server means first and foremost the complete unavailability of all information for all parties in the organization, for a necessary period of time during the change of servers. We try to reduce that time window as much as possible. Beyond the time required to carry out the replacement, during which, as mentioned, there is no access to information in the organization, one must take into account, related faults, which may occur due to the mismatch of the new server, as well as interface problems between the new server and external applications with which it is required to communicate. Often, the malfunctions in the new server arise from the peripheral equipment it needs for its current work. Thus, compatibility problems of the router, switch or modem, to the server, incorrect configuration settings, incompatibility in the software versions, etc., may further delay the continuation of the current work in the organization with the new server.</p>
<p>Due to the likelihood of the existence of those faults arising from the very act of replacing the server, and the difficulty of predicting the length of time that will be required until it is possible to return to work fully with the new server, it is advisable to seriously consider the necessity of its replacement and of course the effect of the replacement on the systems surrounding the server. For example, if the consideration for replacing the server arises due to a lack of storage volume, it is recommended to consider adding disks or replacing the old disks inside the server with disks with a larger storage volume. If the server falters, is slow, and tends to hang, it is recommended to carefully examine the integrity of its operating system and the integrity of the associated software installed on it, and make sure that no unnecessary software has been installed on it that burdens its activity. Sometimes updating a version of the server&#039;s management software or performing a downgrade and returning to the previous version (in case a version update was performed), can return the server to a normal work rate.</p><p>The post <a href="https://www.genie.co.il/en/replacing-server/">החלפת שרת – לא סיפור פשוט (בעיות נפוצות ודגשים בהחלפת שרתים)</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>חשמל סטטי &#8211; גם זה יכול להזיק למחשב שלי?</title>
		<link>https://www.genie.co.il/en/static-electricity/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 13:15:02 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8352</guid>

					<description><![CDATA[<p>Static electricity discharges are a very common thing in our daily life. The human body transmits static electricity when we walk to our car, when we blow up a balloon or even when we open a door. These are few types that do not affect us much. Maybe we get a little scared, but we forget about it after a moment. If a static flash at this level that does not affect our body, what happens […]</p>
<p>The post <a href="https://www.genie.co.il/en/static-electricity/">חשמל סטטי &#8211; גם זה יכול להזיק למחשב שלי?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Static electricity discharges are a very common thing in our daily life. The human body transmits static electricity when we walk to our car, when we blow up a balloon or even when we open a door. These are few types that do not affect us much. Maybe we get a little scared, but we forget about it after a moment. If a static flash at this level does not affect our body, what happens inside our computer is a completely different story.</p>
<p>Every time we open the outer packaging of the computer, we must be aware of the static dangers that await us. As everywhere that creates friction, even inside our computer there are many particles that create friction, which in many cases are not even visible to the eye, and even they may cause a static market.</p>
<p><strong>How can we prevent this? Here are some steps that will help us:   </strong></p>
<p>First it was said that it is not a bad idea to purchase an anti-static strap. We place such a strap on our wrist and what it actually does is isolate the electric current from our body. Because the human body is also an electrical conductor. It is recommended that you follow the instructions for use before using any of these strips, but they can definitely help. The strips can be purchased at electrical and construction stores. If you know that you have a lot of work ahead of you in front of the open computer, even a small rug under the work area can help.</p>
<p>Of course, we know that these strips are not a very common thing, so even if you don&#039;t have them, it&#039;s not the end of the world. Let&#039;s assume your computer is grounded. You can also ground your personal body by keeping only one hand in contact with the iron frame that surrounds the computer from the inside. This frame obviously conducts electricity and placing both hands on it may cause the static shock to accelerate, so it is better to avoid it. Another important thing is to disconnect the power cable from the power source. It is even recommended to check if there is a small switch on the power supply and change it from active mode to inactive mode, but in any case it is recommended to remove the cable from the power source.<br />
Never work on an open computer while the computer is running!</p>
<p>If your computer is connected to a splitter to which other electrical devices are connected, it is highly recommended to disconnect it as well. If there is an on and off switch on the splitter, you can also change the switch to the off position. Another thing that will help your computer stay grounded is some kind of conductive connection from your computer to the ground, just like you do with cars, and even with the human body. Again, it is recommended that under this there be a rug or some object that is isolated from the floor.</p>
<p>The average person&#039;s body can absorb about 25,000 volts of static discharge. It sounds like a lot, but don&#039;t check yourself. It is very important to follow the rules when dealing with an open computer. This does not mean that a computer can absorb 25,000 volts. Such damage can significantly damage your computer! Your memory cards are the most sensitive parts to static discharges and can be significantly damaged resulting in many error messages and blue screens. Therefore, you must invest in preventive measures, your computer will thank you. If your computer is cold, try to bring it to room temperature. Static emissions are much more common in cold and dry weather. And the most important thing, do everything with moderate judgment and logic.</p>
<p>Successfully.</p><p>The post <a href="https://www.genie.co.il/en/static-electricity/">חשמל סטטי &#8211; גם זה יכול להזיק למחשב שלי?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google יוצאת נגד שגיאות כתיב (ומנצחת)</title>
		<link>https://www.genie.co.il/en/google-spelling/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 13:08:15 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8349</guid>

					<description><![CDATA[<p>Google turned to an arbitration forum that serves as an alternative to a court and won - a body called &quot;The National Arbitration Forum&quot;, which serves as a legal alternative to courts, ruled in Google&#039;s favor after it was claimed that Sergey Gridsov, a resident of St. Petersburg, Russia, illegally established Laws of websites that take advantage of typing mistakes of surfers who want to reach the Google website. The web addresses of […]</p>
<p>The post <a href="https://www.genie.co.il/en/google-spelling/">Google יוצאת נגד שגיאות כתיב (ומנצחת)</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Google appealed to an arbitration forum that serves as an alternative to a court and won - a body called &quot;The National Arbitration Forum&quot; (The National Arbitration Forum), which serves as a legal alternative to courts, ruled in Google&#039;s favor after it was claimed that Sergey Gridsov, a resident of St. Petersburg, Russia, illegally established Laws of websites that take advantage of typing mistakes of surfers who want to reach the Google website. The web addresses of the sites are: googkle.com, ghoogle.com.</p>
<p><strong><br />
Google Goes Against Spelling Errors (And Wins)</strong></p>
<p>A body called &quot;The National Arbitration Forum&quot;, which serves as a legal alternative to the courts, ruled in favor of Google after it claimed that Sergey Gridsov, a resident of St. to the Google website. The websites&#039; web addresses are googkle.com, ghoogle.com and gooigle.com.</p>
<p>Google was founded in September 1998 by two Stanford University graduates, and registered its domain name on the Internet about a year later. Gridsov, according to the claim, registered the names of his sites in December 2000 and January 2001.</p>
<p>The decision of the arbitrator, Paul Dorf, supports Google&#039;s claim that the incorrect addresses are part of a plan to infect surfers&#039; computers with hostile software that may cause the operating system to crash, delete important information and files, or open access routes into systems containing sensitive and important information.</p>
<p>Google&#039;s claim was submitted on May 11, and until the day the decision was made, Gridsov had not responded to the accusations, which allows the arbitrator to accept any unproven accusation by Google as true.</p>
<p>The AP News Agency contacted Gridsov last Friday, using the email address he registered when he purchased the URLs. In the response, which was not signed by Gridsov himself, the writer confirmed the claim that the URLs were intended to take advantage of surfers&#039; mistakes and thus gain great exposure more, but claimed in addition that there have never been any complaints about the functioning of the sites - and it is possible that new software that was installed on the sites, and which was supposed to be safe, is the cause of the complaints.</p>
<p>F-Secure, a Finnish company specializing in the detection and identification of hostile software, identified googkle.com as a problematic site in a message it published on April 26, more than two weeks before Google filed its complaint.</p>
<p>The attempt to &quot;ride on the success&quot; of popular websites is nothing new. One of the famous examples is the website whitehouse.com which published pornographic websites and products and was, of course, intended to take advantage of the mistakes of surfers who sought to reach the website Whitehouse.gov - the official website of the President of the USA.</p>
<p><strong>Typosquatting</strong><br />
The common name for the attempt to enjoy typing mistakes of surfers trying to reach popular sites is &quot;typosquatting&quot;. The exact definition, according to the website webopedia.com, is: &quot;Purchasing a domain name that is a variation of a popular domain name in the expectation that the site will gain exposure as a result of typing mistakes by surfers.&quot;</p>
<p>Being a site rated as one of the safest on the entire Internet, and considering the huge number of surfers the site attracts (about 66 million different surfers per month), Google has been a favorite target for typosquatting for a long time.</p>
<p>Needless to say, the Internet community is quite clearly divided into two - the owners of the websites that engage in typosquatting and see it as a legitimate business, and the owners of the original popular websites that oppose the phenomenon with all their might. The website www.tipz.net summarizes an article on the subject with the words: &quot;Those who engage in typosquatting are scavengers who feed on the crumbs that fall from the mouths of other animals. It may not be illegal, but it is certainly unacceptable.&quot;</p><p>The post <a href="https://www.genie.co.il/en/google-spelling/">Google יוצאת נגד שגיאות כתיב (ומנצחת)</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple Macbook &#8211; חוות דעת וסקירה</title>
		<link>https://www.genie.co.il/en/apple-macbook/</link>
					<comments>https://www.genie.co.il/en/apple-macbook/#comments</comments>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 12:40:51 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8346</guid>

					<description><![CDATA[<p>Apple Macbook opinion and review &quot;Apple&quot; announced the heartbreaking departure. Macbook laptop computer. Only a year later, Apple announced the updated version of the mobile, which can operate with the core2duo processor, developed by Intel. Let&#039;s start by looking at its design. Small, comes in two colors, black or white and once you look at it, your pupils will probably dilate. […]</p>
<p>The post <a href="https://www.genie.co.il/en/apple-macbook/">Apple Macbook &#8211; חוות דעת וסקירה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Apple Macbook opinion and review</strong><br />
&quot;Apple&quot; announced the heartbreaking departure. Macbook laptop computer. Only a year later, Apple announced the updated version of the mobile, which can operate with the core2duo processor, developed by Intel. Let&#039;s start by looking at its design. Small, comes in two colors, black or white and once you look at it, your pupils will likely dilate. He is undoubtedly extremely impressive. The thickness of the body of the Macbook is only 3.2 cm while its weight is one of the lowest on the market, only 2.7 kg.</p>
<p>Not long ago, &quot;Apple&quot; was injured with the heartbreaking exit. APPLE Macbook laptop computer. Only a year after its release, Apple brought the updated version of the mobile, which can operate with the core2duo processor, developed by Intel.</p>
<p>So let&#039;s start by exploring its design. Small, comes in two colors, black or white and once you look at it, your pupils will probably dilate. He is undoubtedly extremely impressive. The thickness of the body of the Macbook is only 3.2 cm, while its weight is only 2.7 kg. These features easily win the eyes of any user. After all, most of us are looking for a laptop as light as possible and as close and similar to a notebook as possible. The texture and the external case of the computer allows it to be kept from different temperature and pressure conditions which could allow a longer life of the computer.</p>
<p>The body of the mobile comes with refined silver finishes that make its design so elegant that you can&#039;t take your eyes off it. The weight factor comes thanks to the aluminum pad that wraps the computer.</p>
<p>We will open the Macbook and discover what many in the company describe - the scientific miracle of the Macbook. The keyboard, like the entire computer, is elegantly and quite simply designed. In addition to the standard and essential keyboard buttons, you can find only one more button on the keyboard, which is the computer&#039;s power button. Unlike most laptops on which you will find many other buttons with different functions. Depending on how you look at it, you can judge the Macbook as a fairly simple model or rather the opposite, inside a special model unlike any other.</p>
<p>On the upper side of the open computer we will see the 13.3 inch wide LCD screen, which allows us to see every picture perfectly and refined whenever we want. Visibility is extremely sharp and crystal clear. There is no doubt that the LCD screen takes a significant part in the sharp and clear image output, this is not surprising at all, when working through an LCD screen with a resolution of 1280 x 800 pixels. Regarding the design of the keyboard, you can look at it in two ways. Despite its simplicity, there is something very special about its appearance, something that simply inspires enthusiasm. The keyboard in appearance as well as in feeling gives the reaction feeling while pressing each of its keys, this factor can add to the special convenience of the computer. It might sound like we&#039;re praising the MacBook a little too much and we&#039;ve only just started the review, but that&#039;s just the way it is. The keyboard is exceptionally comfortable, and the mouse pad also responds in a balanced and fast way, but not special compared to other laptops.</p>
<p>From the exterior we will move a little to the interior parts. Even inside, the computer is not particularly disappointing. Let&#039;s start with the hard disk. In this computer we can find something that we may not be able to find in many other computers, a hard disk capable of holding over 250 GB. In most laptops today we can get them with 70-150GB of storage space, so there is no doubt that the hard disk of the MacBook is particularly impressive. So don&#039;t worry about the amount of material you want to store, the computer will do it for you. From the very beginning of the review, the savvy among us will be able to tell how powerful the new updated processor is in the updated model of the computer. The new processor from Intel, core2duo, with a size of 3MG, makes the Macbook one of the most powerful computers among all competitors.</p>
<p>The Macbook does not disappoint in the external connections either, it comes with a USB 2.0 input, and on top of that it also has a FireWire 400 input, which is a particularly convenient solution for many devices, especially in the field of music recording and connecting musical instruments to computer recording. Even the burner of the Macbook, we can say that it is one level above all competitors. The form burns at a speed of -24x, or when burning a double layer at a speed of 8x, which ensures the stability and safety of the disc burning. The computer has no moving parts, which results in a significant reduction in internal hardware failures. Another thing is the way to insert the CD. In most portable computers today, we will have to press a button that will take out the CD tray, we will have to pull it out a little, put the CD we want to play and then push the entire tray into the computer to start playing. The Macbook does not have the aforementioned CD tray at all. In the place where the CD tray is usually found, we can find a certain thin strip with a mark for inserting the CD. What we will have to do is simply push the CD into the aforementioned strip that will be sucked into the computer. When we want to take it out, we will press a button that will eject it.</p>
<p>This topic can be a particular problem. What to do? Not everything is rosy. In many cases, we encounter situations where our CD drive is stuck, and inside is a CD that is very important to us. All we have to do is simply take a small pin, and insert it into a small hole located under the CD tray (it was specially invented for such situations). Once we insert the pin, the pin pushes an internal button that pushes the CD tray out manually and then we can take out the CD easily. On the other hand, due to the fact that the Macbook does not have a CD tray, it also does not have the aforementioned hole. But many Apple fans believe that the computer and Apple products in general are reliable enough that there is nothing to worry about.</p>
<p>The standard MacBook computer comes with a 2.1 GHz processor or the slightly improved 2.4 GHz, and these figures are also particularly impressive for a laptop. The Macbook also comes with a Bluetooth 2.0 card, which is present in many new laptops today, but which, in addition to all the other options on the computer, adds a lot to the convenience.</p>
<p>Comparisons are a part of life, and the Mac operating system will have to stand up to comparison with Microsoft&#039;s leading operating systems, Windows Vista, Windows XP. Many Mac users claim that once you start using and getting used to the system you become addicted to it and it is difficult to go back to the previous systems.</p>
<p>The Mac operating system offers many customization options that will help you adapt your work and the system to your personal needs at a particularly high level, by offering many and varied features that leave Microsoft&#039;s operating systems far behind. Many of the Mac users explain how particularly comfortable the work interface is, and the whole point is to make the transition from the various Windows systems to the Mac system without being afraid of adapting to the changes.</p>
<p>The taskbar in the system is a taskbar that disappears regularly. Of course, we can also add the disappearing option in the Windows systems, but together with the various additions and changes in Mac, this is simply another factor to make everything &quot;cooler&quot;. Surfing the Internet was also noted as more successful than various Microsoft systems. Browsing is usually done faster and the sites look better and without problems.</p>
<p>Even in the fields of multimedia, the Mac system beats the various window systems. In a survey conducted among music editors and graphic designers in the United States, a majority was found who prefer to work with the Mac computers in this field, than with Microsoft&#039;s systems. The users explained that Apple&#039;s systems are simply more reliable and more stable than Microsoft&#039;s and also offer a wider range of options. And even for the normal user, Apple&#039;s computer proved to be more successful. The iTunes software has proven to be a new hit in the field of audio playback. In doing so, Mac meets the needs of each and every one of us.</p>
<p>In conclusion, Apple&#039;s Macbook computers have proven themselves on most levels and have also proven that they simply do not fall short in anything from Microsoft&#039;s various systems. Today, Apple&#039;s computers are still not distributed in the same way as other computers are distributed in Israel. Apple computers can be purchased in several networks in Israel, but their prices are very high, and the support offered by Apple in Israel is also not satisfactory. Compared to the United States where Apple broke the box office a long time ago and are able to offer the maximum support to their customers. But who knows? Maybe one day it will be like that in Israel too.</p><p>The post <a href="https://www.genie.co.il/en/apple-macbook/">Apple Macbook &#8211; חוות דעת וסקירה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
					<wfw:commentrss>https://www.genie.co.il/en/apple-macbook/feed/</wfw:commentrss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>כך משתמשים באינטרנט כאמצעי אכיפה</title>
		<link>https://www.genie.co.il/en/internet-laws/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 12:35:55 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8343</guid>

					<description><![CDATA[<p>Today in the USA they are learning and understanding how to utilize computerized technology also for use in traffic enforcement. A 20-year-old man living in the state of Rhode Island in the USA, drove under the influence of alcohol and ran over a woman who was seriously injured and hospitalized. The young man entered court proceedings, but was not in custody. A few weeks later, the young man went out with friends on Halloween disguised [...]</p>
<p>The post <a href="https://www.genie.co.il/en/internet-laws/">כך משתמשים באינטרנט כאמצעי אכיפה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today in the USA they are learning and understanding how to utilize computerized technology also for use in traffic enforcement. A 20-year-old man living in the state of Rhode Island in the USA, drove under the influence of alcohol and ran over a woman who was seriously injured and hospitalized. The young man entered court proceedings, but was not in custody. Several weeks later, the young man went out with friends on Halloween disguised as a prisoner. Ironically, the young man did not think about the future results.</p>
<p><strong>Internet as a means of enforcement<br />
</strong>In the United States of the 21st century, they are learning how to use computer technology to enforce traffic laws. A young man was caught in Rhode Island in the United States by photos he posted online and brought to trial.</p>
<p>Joshua Lipton, a 20-year-old man who lives in the state of Rhode Island in the United States, drove under the influence of alcohol and ran over a woman. The woman was seriously injured and hospitalized. The young man entered court proceedings, but was not in custody. A few weeks later, the young man went to a party with friends on Halloween disguised as a prisoner. The young man with the ironic joke did not think about the future results.</p>
<p>Almost every child nowadays carries a camera with him to document moments in life and also just for fun. One of Joshua&#039;s friends took photos at the party completely spontaneously and published the photos on the social network Facebook. The site is used as a popular means of communication among teenagers and among a few adults. The photographer friend decided that he publishes the photos from the party on his Facebook page, when in fact all his friends on the network will be able to see the photos from the party.</p>
<p>The prosecutors in the young man&#039;s trial did their job properly, found the above-mentioned photos, and decided to use them as evidence that the boy is completely irresponsible and without conscience. The legal prosecutor presented the photos in court while explaining that the boy is a completely emotionless and conscientious person, capable of Going out to hang out after an injury as he did, while the victim, the victim of the accident, is lying injured in the hospital trying to recover and restore her life.</p>
<p>The judge in court accepted the testimony, and Lipton was sent to prison for two years. Social networks like Facebook and more are, as I mentioned, an excellent means of communication. There is no doubt that they also have many negative features, and you should always remember that the net is not a secure place and unfortunately there are many who use the net for bad purposes.</p>
<p>Many detectives and police agents today use these networks to solve crimes and mysteries by searching for information about a person. Even in the field of daily work, many employers will search social networks of one kind or another for information about an employee, in order to learn about their employees and find out things that they would not be able to find out on a daily basis, thus in many cases even deciding whether he is suitable for the job or not. Photos as published, are without a doubt unequivocal evidence for Judge Lipton that he could not escape from. This is a classic example of how much the web can surprise us. Obviously Lipton didn&#039;t want them to know about the aforementioned party at all, but in today&#039;s computerized world, where half of our lives are run according to his will, there are things that are a little difficult to prevent.</p>
<p>This case is not the only case in which pictures published on the Internet were used in order to reach a conviction in court. In other cases, the guilty were caught even after receiving the punishment when they break their promise and their punishment. So no doubt…<br />
Someone is always following us. This entire article is another point for thought, the Internet is a daily friend that in many cases we cannot live without, think carefully before you volunteer personal details to the network.</p><p>The post <a href="https://www.genie.co.il/en/internet-laws/">כך משתמשים באינטרנט כאמצעי אכיפה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>שאלה גדולה &#8211; אפל או מיקרוסופט?</title>
		<link>https://www.genie.co.il/en/apple-or-microsoft/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 12:14:39 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8340</guid>

					<description><![CDATA[<p>Even today, the competition between the two largest computer powers in the world continues! It never really stopped, starting in the late 70s. Even if each of the companies had ups and downs, there was always tension in the air between them. The &quot;battle&quot; between Apple and Microsoft was and will continue to be a perfect subject for learning about the battle of minds and innovative inventions between businesses and even for writing books at the best universities [...]</p>
<p>The post <a href="https://www.genie.co.il/en/apple-or-microsoft/">שאלה גדולה &#8211; אפל או מיקרוסופט?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Even today, the competition between the two largest computer powers in the world continues! It never really stopped, starting in the late 70s. Even if each of the companies had ups and downs, there was always tension in the air between them. The &quot;battle&quot; between Apple and Microsoft was and will continue to be a perfect subject for learning about the battle of minds and innovative inventions between businesses and even for writing books at the best universities in the world/</p>
<p><strong>Let&#039;s start with Apple:<br />
</strong>The real beginning of Apple was when CEO Steve Jobs took office and basically raised the company to great heights. Along with him, Steve Wozniak also entered. The two thought together how they could get customers interested in private personal computers. Something that was not common then and today we can find a computer in everyone&#039;s home. Boy. The two began selling PCs out of their garage in Southern California after Jobs was kicked out of the university he attended.</p>
<p>In the 1980s, Apple&#039;s growth increased rapidly, which attracted the attention of many in the industry, including Bill Gates, who is now known as the largest owner of Microsoft. Bill Gates, who studied at one of the best universities in the world, Harvard, also did not continue there too long, and decided to go out and try to fulfill his dream. Development of a computer system that will facilitate the use of computers and be distributed throughout the world. However, it was necessary to succeed in developing something good, accessible and easier than Apple&#039;s. We all know that today Gates succeeded in his vision.</p>
<p>There are endless debates, whether Gates and his friends stole different designs from Apple, but that is another matter. But nevertheless, Jobs was still dominating at that time in the field of development, and especially with the great growth of Apple. Towards the end of the 80s, Jobs, who was one of the founders of the company, was removed from his position due to his perfectionist and unpredictable nature. With the departure of Jobs, the company began to lose value. Many of its customers left, and the company began to lose a lot of money, the company lost its magic until the return of Jobs in 1977, at a time when Apple was already at the bottom of the industry, and in slower development than usual.</p>
<p>Jobs&#039; return to the company also brought back with it the great success and great revenues of the company that continue to this day. Apple is not just a computer manufacturer. One of the things that increased Apple&#039;s income significantly was the media player - iPod, which conquered the world. Apple is very specialized in the design of its devices, and in the production of the user-friendly interface in them..</p>
<p><strong>Microsoft:<br />
</strong>Bill Gates was probably more obsessed with the business and profitable development of his product, than maintaining his production code, and rapid development. Unlike Apple who at the same time wanted to maintain the business development but not give up the development of their products. Gates&#039; action does not sound so logical, but in fact it is what made his company the largest computer manufacturer in the universe, and himself the richest man in the world. Gates and his company began a campaign of persuading large companies like IBM to sell their software along with their products. In this act, the new &quot;clone&quot; of IBM became a resounding success in the sales of IBM and other manufacturers due to the fact that the new software from Microsoft integrated into their computers makes their use much easier.</p>
<p>In the late 1980s and early 1990s, Microsoft grew and developed rapidly compared to Apple, which was then without Jobs, and began with resentment. It wasn&#039;t even a matter of debate, while Microsoft&#039;s new strategy is rising and succeeding, Apple is busy testing its own strategy and seeing what&#039;s wrong.</p>
<p>There are many disagreements, that Gates and his company made many illegal deals with computer manufacturers, which greatly contributed to the development of Microsoft. In any case, Gates managed to reach a situation where his software will be the only one that will be sold on all the PCs produced by the manufacturers. which is still happening today. Gates developed Microsoft&#039;s famous operating system - Windows, and implanted it in all PCs produced in the world today.</p>
<p>However, starting in the late 1990s, when Jobs returned to Apple, the never-ending competition between the two was back in full swing.<br />
Today, according to speculations, Apple even overtakes Microsoft in its revenues.</p>
<p>So who wins here? This is a very difficult decision to make (as always). There are countless fans of both Apple and Microsoft. Today it seems that the development of Apple is increasing perhaps more than that of Microsoft, both in the company itself and in the sales market as I mentioned before. Apple is becoming more and more popular.</p>
<p>We may know the answer to the first question in a decade. And that&#039;s not safe either.</p><p>The post <a href="https://www.genie.co.il/en/apple-or-microsoft/">שאלה גדולה &#8211; אפל או מיקרוסופט?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>חטאים ברשת: דואר זבל</title>
		<link>https://www.genie.co.il/en/junk-mail/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 11:33:31 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[דואר זבל]]></category>
		<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8334</guid>

					<description><![CDATA[<p>הגעתם בבוקר למשרד, מוקדם מהרגיל, כי אתם יודעים שבתיבת הדואר שלכם אמור לחכות אימייל חשוב לו אתם מחכים מספר ימים &#8211; המשך הפרויקט עליו אתם עובדים תלוי באימייל הזה. אתם פותחים את תיבת האימייל וכמה עשרות הודעות חדשות נשפכות על הרצפה. אחרי שאתם עושים קצת סדר בהררי ההודעות, מפנים אל סל המחזור כמה פרסומות, הצעות [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/junk-mail/">חטאים ברשת: דואר זבל</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You arrived at the office in the morning, earlier than usual, because you know that an important email should be waiting in your mailbox for which you have been waiting for several days - the continuation of the project you are working on depends on this email. You open your email inbox and several dozen new messages spill out onto the floor. After you sort out the mountains of messages, send to the recycle bin some advertisements, tempting offers, promotions, reports on websites for adults only and a number of miraculous ways to get rich overnight - you actually realize that the message you were waiting for is not in the mailbox at all. When you check the messages on the answering machine you will find an annoying message that the sender of the email could not send it because the box was blocked due to overload. Good Morning.</p>
<p>&quot;Spam&quot;, junk mail, is sending identical email messages to thousands (or millions) of recipients at the same time. The contents of the messages range from marketing or pornographic content to job offers, get-rich-quick methods, chain letters, and more. What all spam messages have in common is that the recipient of the message does not know the sender and never asked to receive the message.</p>
<p>Internet providers around the world as well as email service providers are fighting an uphill battle against spammers, and yet - the junk keeps coming. Why do spammers work so hard to send their messages? Why are they sabotaging, day after day, the effectiveness of one of the most common methods of communication in the world today? The reason is simple and not surprising - money. greed. Many believe that advertising by harassing email users works, and they are willing to pay a lot of money to get it.</p>
<p>Internet surfers are under a constant attack of spam - millions of spam messages are sent over the Internet every year. According to data from SpamCop.net, a site that deals with the fight against spam, in the last 12 months (September 2004 to September 2005) an average of 4.7 spam messages were reported every second, up to a peak of almost 29 messages per second in January. A total of 146,647,251 spam messages were reported to the site in the last year.</p>
<p>AOL data is much more serious and indicates 10 million spam messages each day (30% of total messages), all to people who never asked to receive them.</p>
<p>Where does all this junk come to our computers? From third world countries where enforcement and supervision are low? Not necessarily. 42.1% of the junk mail in 2004 actually came from the USA, while South Korea is in second place on the list of defendants with 13.4 percent, and the top five are completed by China, Canada and Brazil.</p>
<p>What can be done to eliminate spam? The answer is divided into two - the prevention phase, and the fight phase. The prevention step is short and simple - prevent at all costs from entering your email address on all kinds of websites that ask for it in order to register for free for any service. Create a new, free e-mail address for yourself on a site such as Hotmail or Gmail - and use it to register on the sites - you will be surprised to find out how quickly the spam messages will start to flood the new box. When the spam messages become unbearable - cancel the box and create a new one.</p>
<p>The struggle phase is more complex and requires more complex technological means. Most of the defensive work should be done by network administrators and ISPs using anti-spam software (<a title="Anti Spam" href="https://www.genie.co.il/en/anti-spam-cloud/">Anti Spam</a>) and mail-filters. New mail programs such as Outlook xp or 2003 provide convenient tools for organizing a list of spam senders and automatic identification of mail suspected as spam. But this is only passive defense.</p>
<p>Instead of fortifying yourself behind the walls and waiting for spam bombardments, there is also an active side to the war - reporting the spammers. By means of surfers&#039; reports on received spam messages, entities that fight against criminals can locate the source of the messages and report it to the Internet providers so that they block the mail senders. Certain entities even create &quot;blacklists&quot; of spammers so that mail server owners can help them in order to defend against spam attacks.</p>
<p>Undoubtedly the easiest way is to ignore the messages and hope that the flood of spam messages does not reach our mailbox.<br />
But, in order to fight the phenomenon, make it unprofitable for spam criminals and eliminate them once and for all - we must<br />
Surfers to join the fight for the future of e-mail and free communication.</p><p>The post <a href="https://www.genie.co.il/en/junk-mail/">חטאים ברשת: דואר זבל</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>