Centicore Group

Centicore Group

Разработка программного обеспечения

Centicore - компания специализирующаяся на разработке программного обеспечения и системной интеграции

О нас

Centicore Group предоставляет полный портфель ИТ-услуг в области системной интеграции, цифровых, облачных, управляемых B2B-сервисов, консалтинга, блокчейна, искусственного интеллекта, виртуальной и дополненной реальности, интернета вещей, роботизации и технологии Индустрии 4.0.

Веб-сайт
https://centicore.ru
Отрасль
Разработка программного обеспечения
Размер компании
201–500 сотрудников
Штаб-квартира
Москва
Тип
Частное предприятие
Основана
2013
Специализация
Разработка ПО

Местоположения

Сотрудники Centicore Group

Обновления

  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    We've launched an English language course for our employees, which has already welcomed 95 colleagues! Classes are organized into 10 groups across different levels — from Elementary to Advanced. Each group meets twice a week. The course format is designed not only to teach grammar and vocabulary but also to provide plenty of opportunities for speaking practice. We believe that learning a new language opens up new horizons and can benefit you both professionally and personally. Whether it’s connecting with international colleagues, participating in global projects, or even just for travel — knowing English is always useful. If you’d like to join one of the groups, please reach out to your HRBP. They’ll provide you with all the necessary information and help you find the group that’s the best fit for you. Let’s take this step together towards new opportunities and dive into the world of English!

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    A technical blog can be a powerful tool for IT professionals looking to enhance their reputation and career. If you're interested in blogging but don’t know where to begin, here are some key steps to help you create engaging and valuable content. 1. Define your blog’s purpose. Think about why you want a blog. Possible goals include:   - Personal growth: improving knowledge and communication skills.   - Building a personal brand: establishing yourself as an expert in your field.   - Contributing to the community: sharing knowledge with other developers.   - Earning income: potentially monetizing your blog over time through ads or sponsored content. 2. Choose your niche. Instead of covering a wide range of topics, focus on a specific area you know well or want to develop in. Examples of niches include programming languages like Python or JavaScript, frameworks such as React or Kubernetes, database management, or cloud technologies. 3. Select a platform. Common platforms for technical blogs include Habr for a broad Russian-speaking audience, Dev.to for an international developer community, and Telegram channels, popular for instant interaction with readers. 4. Create valuable, unique content. Make sure your articles are practical, relatable, and technically accurate. Tips for effective content include:   - Hands-on approach: provide solutions and real-world examples.   - Simplicity: make complex ideas accessible for a wide audience.   - Authenticity: share your own experiences, including challenges and solutions.   - Visual aids: use diagrams and code snippets to clarify concepts. 5. Start with simple topics. Begin with what you know—such as solving a common bug or reviewing a tool. These seemingly simple topics can be invaluable to others. 6. Focus on consistency over volume. Posting regularly, even brief updates, is more effective for building an audience than sporadic, lengthy articles. Aim for at least one post every week or two. 7. Optimize for SEO. SEO can help attract more readers. Basic practices include using relevant keywords (e.g., “how to set up Docker”), creating clear titles, and adding descriptive tags. 8. Engage with your audience. Encourage interaction by responding to comments, gathering feedback, and sharing posts on social media platforms. 9. Keep improving. Over time, refine your blog by updating old content, experimenting with new formats like videos or podcasts, and analyzing what resonates with your readers. 10. Be patient and persistent. Building an audience takes time. Focus on regular, high-quality content, and remember that steady effort will yield results in the long term. Starting a technical blog is a great way to share knowledge and grow personally. Stick with it, and over time, your blog will become a valuable resource for developers and IT professionals alike.

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    We completed a large-scale project focused on developing two subsystems: employee management accounting and wage fund budgeting. This project was initiated due to the expansion of the holding company and the resulting need for centralized personnel and financial management. Our specialists designed a consolidated system based on *ZUP 3.1*, which unified the local systems into a single network, enhancing management efficiency. Integration with *1C:Document Management* streamlined document flow processes, while the development of the wage fund budgeting subsystem enabled more accurate planning and expense control. One of the key challenges was to unify data from various systems while ensuring data security. Thanks to this project, the client now has a powerful tool for managing personnel and budgeting across the entire holding. This has allowed the company to allocate resources more effectively, reduce costs, and maintain control over financial planning. Integration with *1C:Document Management* simplified document flow and increased transparency of operations within the holding company.

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    AI technology is rapidly advancing, bringing incredible potential to creativity, science, and business. However, it also introduces new risks, one of which is deepfake — artificially created videos and audio that convincingly mimic real people. While initially used for entertainment, deepfake has become a powerful tool for cybercriminals. What is Deepfake? The term "deepfake" combines "deep learning" and "fake." It refers to a technology that uses machine learning algorithms, especially Generative Adversarial Networks (GANs), to produce realistic fake audio and video content. Deepfake can simulate people’s images and voices so believably that even experts sometimes struggle to identify them. How hackers use deepfake in cyber attacks 1. Financial Fraud     In one prominent case, criminals used a synthetic voice to impersonate a CEO, convincing an employee to transfer a large sum. This type of fraud is becoming more common, with attackers faking phone calls, video meetings, or messages to trick employees into financial mistakes. 2. Blackmail and discreditation     Cybercriminals can create videos of public figures engaging in compromising behavior. These fake videos can be used to blackmail individuals or discredit them publicly, which is especially dangerous in political contexts. 3. Manipulating public opinion     In the era of social media, deepfake videos can spread quickly and sway public opinion. They may be used to make figures appear to endorse false statements, incite panic, or influence election outcomes. Challenges in detecting deepfake Earlier deepfake models were recognizable due to unnatural facial movements or lighting inconsistencies. However, recent advancements make some deepfakes nearly indistinguishable from real footage, even to specialists. With vast datasets, AI is increasingly precise in mimicking body movements and voice, making deepfakes hard to detect. How to counter deepfake threats 1. Developing detection tools     Companies like Microsoft and Facebook are creating tools that identify fake media by analyzing subtle inconsistencies. 2. Digital literacy     Training employees to spot potential fakes helps reduce susceptibility to deepfake scams. 3. Digital signature technologies     Using digital signatures on videos and audio files can confirm authenticity, lowering the success rate of deepfake fraud. 4. Legal measures     Countries are beginning to pass laws regulating the malicious use of deepfakes, addressing issues like blackmail and misinformation. Deepfake is a growing cyber threat that endangers the reputation, finances, and security of individuals and organizations. Robust detection tools, critical media literacy, and legal adaptation are essential to combat the harmful potential of deepfake technology.

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    The internet is an integral part of our daily lives, connecting us to information, people, and services. However, few of us stop to consider how much personal data we leave behind and who has access to it. In today’s digital world, online privacy is crucial. So, what information does the internet have on you, and how can you protect it? What data do you share online? Each online action leaves a trace. Here are the main categories of data companies collect: - Personal information: your name, date of birth, email, phone number, and address. - Financial data: bank details, purchase history, and income information. - Browsing history: the websites you visit and your search queries. - Location data: your movements and current location, especially through apps with location tracking. - Social media data: posts, likes, comments, and connections. How companies collect your data 1. Cookies track your online behavior and preferences. 2. Account registrations require personal details like email or phone numbers. 3. Social media tracks every interaction and connection. 4. Apps on smartphones often request access to sensitive data such as location and contacts. How your data is used - Targeted advertising: personalized ads based on your interests. - Data sales: some companies sell user data to third parties for marketing. - Behavioral analysis: companies study user habits to improve products. - Statistics gathering: user data helps identify market trends. Risks - Data breaches: even large companies are vulnerable to cyberattacks. - Privacy violations: unconsented data collection may feel intrusive. - Fraud: leaked financial data can lead to identity theft. - Social manipulation: personalized content can influence decisions in subtle ways. Tips to protect your data 1. Adjust privacy settings: limit third-party access to your profiles. 2. Disable cookies for reduced tracking. 3. Update passwords regularly: strong, unique passwords offer more security. 4. Use a VPN to hide your IP address. 5. Be selective with apps: limit unnecessary access to your data. By being aware of data collection practices and taking steps to limit exposure, you can safeguard your personal information while enjoying the conveniences of the digital age.

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    In today's world, business relies heavily on technology and digital data, increasing the risks of cyberattacks and data leaks. Cyber hygiene is now essential for protecting companies from growing threats. Here are five core rules every business should follow to reduce risks. 1. Software Updates    Regular updates are fundamental for cybersecurity, as vulnerabilities in outdated systems are often exploited. Ensure all software and network devices have up-to-date patches. 2. Strong Passwords and Two-Factor Authentication     Weak or reused passwords are a major security risk. Use unique, strong passwords and implement two-factor authentication for added protection. 3. Data Backup     Backup data frequently to prevent data loss due to ransomware or technical failures. Store copies both locally and in the cloud, and test backups regularly. 4. Employee Training     Employees are the first line of defense. Regular cybersecurity training, phishing simulations, and real-case reviews help staff recognize and respond to threats. 5. Access Control    Limit data access to only what's necessary for each role. Regularly review permissions and monitor for unauthorized access attempts. Following these five rules is a vital step to strengthen business resilience against cyber threats.

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    We spoke with Alexander Sukhodolov, a Senior Java Developer at Centicore Group, to learn how agile methodologies tackle complex IT challenges. Alexander shared insights on agile approaches, Scrum vs. Kanban preferences, and discussed handling technical debt and automated testing. - Can you tell us about a Java project where agile made a difference?   - Most Java projects I've worked on used agile, allowing quick user value delivery. Agile’s iterative process lets us test and adjust. Right now, we're building a digital bank for kids aged 6-14. Since kids' needs differ greatly, we conduct usability tests with employees' children. In today’s world, it’d be odd not to use agile for user-facing products. - What’s your experience with waterfall?   - Years ago, waterfall was the default, with fixed milestones and adjustments at each stage. But even then, frequent adaptations were often needed, especially for fast-changing requirements. - Between Scrum and Kanban, which do you prefer for Java development?   - I don’t have a strict preference; it depends on the project. Personally, I lean toward Kanban. Though we use Scrum sprints, we visualize tasks on a Kanban board. For larger features, Scrum’s sprint cycle can be limiting, so Kanban’s flexibility is useful. - Have there been times when agile didn’t work for complex Java applications?   - Yes, when developing a children’s savings app, we didn’t release updates for two months because there was nothing valuable to deliver yet. Our IT lead suggested slicing the work differently, but forced releases for show didn’t make sense. We resolved this by discussing reasons and finding compromises. - How does your team handle Java code refactoring within continuous development?  - Since our services are new, we have minimal legacy code. If refactoring can wait, we do it thoroughly. For urgent needs, we may apply a temporary fix, agreeing to revisit later. - How do you handle deployments, and does it depend on the methodology? - We deploy as soon as tasks are ready, independent of sprint cycles. Scrum vs. Kanban makes no difference here; once a task is complete, we deploy. - What role do automated tests play in Java development?  - Automated tests are crucial, allowing developers to validate functionality and catch errors immediately. While tests may take longer to write, they speed up future work. - How do you manage technical debt in Java projects?   - We avoid it by allocating 20% of work time to technical tasks. Sometimes, we dedicate a sprint to addressing tech debt, especially when upgrading technology. The key is that our Product Owner understands these tasks' importance and supports the team without pressuring them for new features.

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    Last week, Centicore Group hosted an exciting "Quiz, Please"! 📚    We gathered 50 participants from different departments to test their knowledge, compete, and have a great time. The questions ranged from classic trivia to fun facts and tricky puzzles.  After an intense battle, the well-deserved victory went to the team JiraBarsiki! 🏆 They delivered an outstanding performance, proving that their expertise goes beyond just IT.  Thanks to everyone for the participation and positive vibes! We're already planning the next quiz – who knows, maybe next time the victory will be yours? 😉  

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    We continue getting to know the team. Today, we talked with Darya Golovtsova, a customer experience expert in the chatbot. Darya shared with us her hobbies, lifestyle, and answered a fun quickfire round at the end of our conversation. - How long have you been with Centicore?  - A little over six months. - Why did you choose to pursue a career in customer experience? How did your career start? - I worked in support for one of the services, and I enjoyed finding solutions to unusual and complex cases, putting myself in the customer's shoes, understanding the exact problem they came to support with, and figuring out how I could solve it. Over the course of three years, I progressed from second-line support to a customer experience expert in the department. - What qualities do you think are the most important for a customer experience expert in a chatbot?  - Empathy, strategic thinking, and the ability to find a balance between customer desires and the capabilities of the product and business. - If you hadn’t become a customer experience expert, what profession would you have chosen? - I would have become a perfumer. - Do you work remotely? How do you manage to find balance between work and personal life?   - Yes, I work remotely. Oddly enough, I found balance through discipline: when I set up my workspace (and only worked there) and started strictly sticking to work hours and rest hours, everything became much easier. My advice to my earlier self when starting remote work would be to get more active and make sure to go outside every day :) - What gives you the most satisfaction at work?  - Results. I get really happy when I see that improvements in chatbot scenarios have made a customer’s life simpler or better. - What challenges do you face?  - Not every customer problem can be solved through the chatbot or support in general. - How do you avoid burnout at work?   - Take breaks! Also, it really helps me to disconnect from the internet and spend a day in the woods or a park at least once a month. - What do you like to do in your free time? Any hobbies?   - I play the piano, go to the gym and do stretching, but most of all, I love reading and spending time with my dog, Baton. - What’s the most important thing in life for you?   - To love! Quickfire round: - If you could choose a superpower, what would it be?   - Teleportation. - What food would you want to eat every day if you wouldn’t gain weight from it? - Carrot cake. - If you could talk to animals, what would you ask a cat?   - I’d ask if cats really do despise us. - Imagine you have a time machine, but it only goes in one direction — the future or the past. Where would you go, and why?   - The future, because I’m really curious to see what awaits us in 200-300 years. - Which app on your phone gives you the most guilt because you spend too much time on it?  - Any app with short vertical videos!

    • Альтернативный текст описания для этого изображения отсутствует
  • См. страницу организации участника Centicore Group, графич.

    237 отслеживающих

    Agile is a flexible methodology designed to help teams adapt to changes, improve development processes, and deliver products faster. However, working in an Agile environment can be stressful for both developers and project managers (PMs), due to frequent sprints, iterations, and constant changes. To stay productive and reduce stress, follow these key tips. 1. Clear task planning and distribution   - For developers: Break large tasks into smaller parts and tackle them step by step. This prevents overload and keeps the sprint manageable.   - For PMs: Set clear goals for each sprint and ensure tasks are well-defined to avoid delays due to clarifications. 2. Learn to say "No"   - For developers: Don’t hesitate to reject new tasks during a sprint unless they are critical. Suggest revisiting them in the next planning session.   - For PMs: Protect the team from "scope creep." Weigh the risks of adding tasks and consult the team before making changes. 3. Regular feedback   - For developers: Participate in retrospectives and voice concerns about processes that slow you down.   - For PMs: Regularly check in with developers but avoid overloading them with unnecessary meetings. Keep communication concise. 4. Stress management and prioritization   - For developers: Use time management techniques like Pomodoro to balance work and breaks, keeping focus sharp.   - For PMs: Constantly review task priorities with the team and adjust plans when necessary. 5. Minimize meeting overload   - For developers: Actively participate in meetings, but don’t be afraid to suggest reducing their length if possible.   - For PMs: Keep meetings brief and to the point. Daily stand-ups should last no longer than 10-15 minutes. Agile is all about adaptation, improvement, and teamwork. To thrive, developers and PMs must plan carefully, be flexible, and maintain a healthy work environment.

    • Альтернативный текст описания для этого изображения отсутствует

Похожие страницы