At the MAX-2019 presented the latest Russian computer "BINOM-KA"

100
The International Aviation and Space Salon in Zhukovsky offers to get acquainted not only with aircraft and space technologies. Among other things, the MAX-2019 also presents modern digital devices, including communications and computers.

At the MAX-2019 presented the latest Russian computer "BINOM-KA"




So, the Rostec Corporation presents a modern computer, executed in the form of a monoblock. The working name of the computer created by Avtomatika concern is BINOM-KA. In fact, these two independent computers are combined in one case. The manufacturer claims that the protection of data and information systems in BINOM-KA is guaranteed.

From the press service:

A high level of information security in BINOM-KA is achieved by a strict separation (galvanic isolation) of two computing systems: an “open” system has Internet access, a “closed” system provides access to a secure local area network of the organization. Information is transferred from the “open” system to the “closed” system through the clipboard; copying data from the “closed” system is impossible. Such restrictions guarantee protection against information leaks, hacker attacks and against the penetration of computer viruses into the corporate network.

In fact, we are talking about the possibility of independent use of two networks with blocking unauthorized access in hardware.


It is noted that the latest computer from Avtomatika can be used by government agencies, strategic enterprises, and the banking sector, where data protection plays a critical role.

The specific characteristics of BINOM-KA are not reported.
  • depositphotos.com, Rostec / Alexander Utkin
Our news channels

Subscribe and stay up to date with the latest news and the most important events of the day.

100 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +3
    28 August 2019 14: 20
    A high level of information security in BINOM-KA is achieved by a strict separation (galvanic isolation) of two computing systems: an “open” system has Internet access, a “closed” system provides access to a secure local area network of the organization. Information is transferred from the “open” system to the “closed” system through the clipboard; copying data from the “closed” system is impossible. Such restrictions guarantee protection against information leaks, hacker attacks and against the penetration of computer viruses into the corporate network.

    It’s okay from information leakage (although there are a lot of ways), but how does it guarantee that viruses do not get into the corporate network if viruses from the Internet are copied to a closed system that provides access to the organization’s secure local network? )
    1. +5
      28 August 2019 14: 25
      Well, what kind of viruses are there, most likely there is an assembly on Linux, with the maximum restriction of rights, purely for work. And nobody canceled the "sandbox".
      1. +3
        28 August 2019 14: 38
        I'm pretty sure Centos-based OSes.
        1. +5
          28 August 2019 14: 46
          We have been working on Centos with Linux for 15 years now. No problem.
          This thing has long been known to everyone ...
          1. +3
            28 August 2019 15: 11
            He also worked in the civil service while implementing a "domestic" system based on Centos. I ran into problems in the operation of office equipment (a banal lack of drivers), which is why I often had to keep a Windows machine in the department.
            1. +2
              28 August 2019 15: 15
              The same garbage. But you must admit that problems with balances are removed at a time. And I, unfortunately, not in the civil service, but quite the opposite, and even from the other side of the ocean. And the company’s money is not normal. Software was chosen precisely because of its resistance to viruses and all sorts of other problems.
              1. -5
                28 August 2019 15: 42
                copying data from a “closed” system is not possible.

                I'll take it from you, but I won’t give it to you?
                And how does the network work? How is the exchange of data between computers if the computer does not give anything?
                Such restrictions guarantee protection against information leaks, hacker attacks and against the penetration of computer viruses into corporate network.


                If there is a network, that is, a stream of information. It turns out the computer still gives information.

                Something is wrong here ....
              2. +2
                29 August 2019 03: 47
                Quote: tracer
                And the company’s money is not normal.

                Oh well ... Companies with money work for Red Hat. For the product is certified to work with all sorts of licenses and keys.
            2. +1
              28 August 2019 16: 13
              Which, by the way, is the domestic one based on CentOS? Astra, kind of like, on Debian, Rosa on Mandriva.
              1. +2
                29 August 2019 03: 03
                Quote: AS Ivanov.
                Which, incidentally, is domestic based on CentOS?

                Yanuks and mountains Linux.
              2. +2
                29 August 2019 08: 54
                Quote: AS Ivanov.
                Which, incidentally, is domestic based on CentOS?
                Goslinux for example. On the basis of assembly 6.4 was, then moved to CentOS 7.
            3. +4
              29 August 2019 02: 59
              Quote: Greenwood
              Faced problems in office equipment

              The fact is that Centos is a free version of Red Hat, firewood updates are posted later than in the commercial version. Problems with drivers for new equipment exist in all versions of free software, to one degree or another.
              1. +1
                29 August 2019 08: 56
                Quote: Timeout
                firewood updates spread
                I had a situation where the Kyocera MFP basically lacked drivers in nature (for the scanner part), and the manufacturer recommended installing Windows in correspondence. Hand face. fool
                1. 0
                  29 August 2019 09: 25
                  Quote: Greenwood
                  MFP Kyocera

                  Well, with Kyocera on any Linux problem. Only Windows and MacOs are stably supported
          2. +2
            29 August 2019 03: 37
            Quote: tracer
            This thing has long been known to everyone ..

            Because it’s free.
            Quote: tracer
            We are working on Centos with Linux for 15 years

            And this means that the company is small and poor, it does not work with state orders ... There is simply not enough for the "cap".
        2. -1
          28 August 2019 15: 05
          I'm pretty sure Centos-based OSes.


          I don’t think so. Most likely its own axis on Linux.
          1. +4
            28 August 2019 15: 08
            Quote: Lord of the Sith
            Most likely its axis on Linux
            What else is its axis. Who needs it? You can always take a fresh assembly of Tsentos and cut a "domestic operating system" based on it.
            1. -1
              28 August 2019 17: 53
              This is not some kind of office to take ready-made solutions.

              If they talk about security, then there will be its own axis.
    2. +11
      28 August 2019 14: 27
      Memories come to mind of the Chubais gadgets and the etaphone, it remains to hope that with BINOM-KA it will be different .. The name of course ...
      1. +9
        28 August 2019 15: 05
        The specific characteristics of BINOM-KA are not reported.

        They said it was the beginning of "KU ....", and then "guess it yourself."
        Though they would say for whose element base is assembled! recourse
        1. Alf
          +3
          28 August 2019 22: 14
          Quote: Starover_Z
          Though they would say for whose element base is assembled!

          If the Elbases were proudly silent about their nationality, then it is not difficult to guess ...
        2. The comment was deleted.
    3. +7
      28 August 2019 15: 25
      The trouble is not in viruses. Need protection from idiots. As practice shows, there are a lot of such even among military officials who, as soon as they can’t download something through a torrent, immediately call the network managers and a howl rises. And nobody cares .... it’s said to do is to do.
    4. 0
      30 August 2019 12: 16
      but how does it guarantee against viruses

      Obviously a limitation on the formats of the information to be copied (only that which cannot contain viruses will be copied). 100 years as an implemented solution.
  2. +2
    28 August 2019 14: 22
    It would be nice if the filling and our axis.
    1. +2
      28 August 2019 19: 05
      called a binomial - romance
    2. 0
      29 August 2019 03: 15
      Quote: Lord of the Sith
      It would be nice if the filling and our axis.

      The processor is "Elbrus 8SV". OS - "Elbrus"
  3. -3
    28 August 2019 14: 24
    Normal cut. I wonder when they will be able to create at least something for domestic use or engineering work? Why is everything foreign at our institute and everything from torrents, including the one and only compass? For what kind of merchant and their secrets is this all done? For arashukovs?
    1. +1
      28 August 2019 14: 34
      hi I remember a few years ago, Mobile 2 was shown to Putin in one, pathetically declaring a numbing analogous world, and other blah blah blah. And where is she, this cell phone ?? Campaign this computer from the same series .... In the Berendey kingdom, everything is stable.
      So, the Rostec Corporation presents a modern computer, executed in the form of a monoblock. The working name of the computer created by Avtomatika concern is BINOM-KA. In fact, these two independent computers are combined in one case.
      1. +13
        28 August 2019 14: 39
        If you are talking about YotaPhone, then after the ridiculous attempts to sell it on the market at a 5 times higher price, it was sold to the Chinese, now it is their whole brand.
        1. +9
          28 August 2019 14: 45
          Quote: Greenwood
          If you are talking about YotaPhone, then after the ridiculous attempts to sell it on the market at a 5 times higher price, it was sold to the Chinese, now it is their whole brand.

          Avon like, this is a type of Chubais electricopedic for the price of a car. wassat Well cho, normal, stable)) winked
      2. +6
        28 August 2019 14: 43
        And where is she, this cell phone ??

        For me, 2 years after the start of sales, I sold unsold leftovers for 9 thousand, a good phone, I would have made a sane price tag, torn off my hands
      3. +10
        28 August 2019 15: 50
        Quote: DEPHIHTO
        And where is she, this cell phone ??

        There, where the domestic automatic transmission for Grants. laughing
        1. +3
          28 August 2019 15: 58
          Quote: Ingvar 72
          Quote: DEPHIHTO
          And where is she, this cell phone ??

          There, where the domestic automatic transmission for Grants. laughing

          From this same comedy, domestic engine building is Volkswagen diesel for gazelnext, and diesel, cummins, for sables and gazelles of the old version. Yes
    2. -2
      28 August 2019 15: 07
      When did thieving ram sheep program? It’s not funny for yourself?
    3. +1
      28 August 2019 15: 09
      Normal cut. I wonder when they will be able to create at least something for domestic use or engineering work? Why is everything foreign at our institute and everything from torrents, including the one and only compass? For what kind of merchant and their secrets is this all done? For arashukovs?

      And what has been done? On the set "bukavak" to build guesses?
    4. 0
      30 August 2019 12: 14
      For what kind of merchant and their secrets is this all done?

      Antokha do not disgrace the brain turn on. This is max
      Well, for what other needs will be exhibited at the MAX, for the military, of course.
  4. +12
    28 August 2019 14: 27
    Galvanic isolation - the transfer of energy or an information signal between electrical circuits that do not have direct electrical contact between them.
    What kind of nonsense? They installed the Elbrus OS, pushed a virtual machine with access to the Internet into it and prohibited copying data from the virtual machine to the mother OS. Fuck Howe ...
    1. The comment was deleted.
    2. 0
      28 August 2019 14: 34
      This is a typical cut. A lot of money was allocated from the budget for this ingenious development, which they stuffed into the pockets and rolled back to the ministries, and prototypes and reports were made on the remaining team of ear-students. You still do not know how our science is organized ?!))))
    3. +9
      28 August 2019 14: 35
      not having direct electrical contact between them.
      What kind of nonsense?

      Optocoupler called. It costs three pennies on market day
      1. +8
        28 August 2019 14: 41
        So far, the processors and motherboards for Elbrus are produced abroad. I have big doubts that this is realized with the help of optocouplers, and not a banal virtual machine, especially since the costs are minimal, but the effect is the same.
        1. -1
          28 August 2019 17: 06
          Quote: Military77
          So far, the processors and motherboards for Elbrus are produced abroad.
          Correct: the Elbrus-2CM processor is produced at Zelenogradsky Micron.
          1. 0
            28 August 2019 17: 18
            It operates at a clock frequency of 300 MHz. It is produced according to technological standards of 90 nm.

            And why is this needed? To play tetris? Yes, and do not produce it anymore
          2. +4
            28 August 2019 17: 24
            No, at Mikron they only stick labels that "made at Mikron". In fact, we do not have such equipment to produce processors.
            1. -1
              28 August 2019 18: 02
              Your words diverge from the official Mikron website: https://mikron.ru/capabilities/technology/.
              Look at the technological capabilities of Mikronovsky FAB-200 (250 nm - 65 nm).
              1. +2
                29 August 2019 12: 06
                The demonstration was able, nothing is produced in series. Unless tickets for the subway.
        2. -3
          30 August 2019 12: 22
          I have big doubts

          What are the doubts based on?
          The term galvanic isolation implies the PHYSICAL independence of systems. Actually, here we are not even talking about an optocoupler. Because strictly opropar does not provide this.
          Of course, I can explain everything to you, but you don’t need it. Well, you don’t understand anything about this, judging by the fact that you wrote about the Elbrus processes, the main thing for you to sketch ...
          1. +1
            30 August 2019 21: 46
            Sorry, galvanic isolation in electronics implies only the electrical independence of the modules, i.e. the electric pulse can not get from one system to another, therefore it is actively used in various transformers in order not to burn out the consumer circuit. In this connection, one big question arises: how did they get the information to be copied from an open system, through a buffer, to another, closed system, if they are independent of each other?
            About the outline: The central processor "Elbrus-2SM" (TVGI.431281.018) on the site http://www.mcst.ru, which is the developer of this process, was taken by them to the archive, i.e. not produced, or produced in limited quantities to ensure the warranty period of the equipment. And at the time of writing a comment on the article, not a single prototype being produced in the Russian Federation was found on their website ... Draw conclusions yourself.
            1. -1
              30 August 2019 22: 10
              In this connection, one big question arises: how did they get the information to be copied from an open system, through a buffer, to another, closed system, if they are independent of each other?

              I repeat.
              If we consider the term "galvanic isolation" in the original understanding that you have copied THEN NO PROBLEMS AT ALL. Try to understand what you yourself wrote. Optical channels, radio channels, IR channels - they all decouple the receiver and transmitter galvanically.
              If we consider the term "galvanic isolation" in my modern interpretation, then
              This is done according to the switching buffer scheme. A classic version of a switchable buffer is a flash drive: put it in the USB port on the source computer, write it down, remove it, insert the receiver into the computer, read it. There was no physical connection between computers at any point in time.

              So see?
              1. +1
                30 August 2019 22: 16
                This is understandable, the whole point is in terminology, but it is not clear how the infa copied from an open circuit to a closed one will be checked for the presence of "bookmarks", and these are not only viruses. Suppose that the buffer is a kind of flash, which can be written only from the open part, but where are the guarantees that some "bookmark" will not be written from the open part without the knowledge of the operator and the OS and transferred to the closed part? You can guess for a long time, there is still no description)))
                1. 0
                  2 September 2019 14: 32
                  This is understandable, the whole point is in terminology,

                  That's it, in fact, I wrote about this.
                  And how the protection will be implemented under the article does not understand.
                  I can make an assumption, but I must understand that you can’t protect yourself from bookmarks, for example bookmarks in regular updates.
                  Such systems are used to protect against 2 things:
                  - from stupid users who rummage through the Internet (but it is easier to prohibit proxies)
                  - from smart viruses that spread across networks using vulnerabilities (this is the best time for this)
              2. 0
                31 August 2019 10: 26
                Quote: bk316
                If we consider the term "galvanic isolation" in my modern interpretation, then
                This is done according to the switching buffer scheme. A classic version of a switchable buffer is a flash drive: put it in the USB port on the source computer, write it down, remove it, insert the receiver into the computer, read it

                including considered malicious code. Because he got to the USB flash drive from the first system, and from it to the second circuit. There is no physical connection, just like when using a radio channel or an optical channel, but this does not mean that the exchange of information is only one-way, and there are some kind of gateways.
          2. +1
            31 August 2019 10: 23
            Quote: bk316
            Actually, here we are not even talking about an optocoupler. Because strictly opropar does not provide this.

            the optocoupler just provides galvanic isolation. Just like a transformer. And capacitor isolation.
            You contradict yourself, because you don’t understand the essence
            Quote: bk316
            The term galvanic isolation implies the PHYSICAL independence of systems. .. steaming does not provide this.

            Quote: bk316
            Optical channels, radio channels, IR channels - they all decouple the receiver and transmitter galvanically

            those. The optocoupler, in your opinion, is not an optical data channel? and has no galvanic isolation?
            An optocoupler or optocoupler is an electronic device consisting of a light emitter (usually an LED) and a photodetector (bipolar and field phototransistors, photodiodes, photo thyristors, photoresistors) connected by an optical channel and, as a rule, combined in a common housing. The principle of operation of the optocoupler is to convert an electrical signal into light, transmit it through an optical channel and then convert it back to an electrical signal
            Those. galvanic isolation is present, as expected.
            1. 0
              2 September 2019 14: 41
              the optocoupler just provides galvanic isolation.

              Grigory You wrote that you are a constructor. Not AVIA, so in what area? laughing
              Read carefully, this is useful for any constructor.
              If we consider the term "galvanic isolation" in original understanding which you have stored THAT AT ALL NO PROBLEMS. .... Optical channels, radio channels, IR channels - they all decouple the receiver and transmitter galvanically.
              If we consider the term "galvanic isolation" in my modern interpretation that
              This is done according to the switching buffer scheme.


              An article on information protection no change in the physical medium of data transfer (galvanic isolation in the classical sense) provides protection against any modern viruses, port scanners, DDOS attacks because they operate at higher OSI levels, but isolation, in my understanding, does not about all but from the majority.
              1. 0
                3 September 2019 20: 30
                Quote: bk316
                If we consider the term "galvanic isolation"

                Quote: bk316
                in ... my interpretation

                it's not about your understanding, but about what is written in the article.

                Quote: bk316
                no change in the physical medium of data transfer (galvanic isolation in the classical sense) provides protection against any modern viruses, port scanners, DDOS

                Well, that was what was required to convey. It is possible to decouple the circuits galvanically, but there is no channel for receiving information — because the reception / transmission of information does not depend directly on whether the circuits are decoupled galvanically or neti.

                Quote: bk316
                but the denouement in my understanding

                In this case, the authors of the article should ask you for help so that you can consult or write the technical part of the article, with your own opinion expressed as an option for implementing the method.

                Total, what do we have? The article is ugly, from all angles. Why write, let alone publish, especially on an allegedly thematic resource? The article leaves more questions than answers. And you need to call the method in some other way, so as not to be misleading.
                Journalists either did not understand what they were talking about, or wrote a gag (and most likely, a compilation from both reasons)
    4. +3
      28 August 2019 15: 11
      Apparently there used to be a man at the switch, now there is a galvanic isolation. "Nanatichnology" adnak ... laughing
    5. 0
      29 August 2019 02: 44
      Quote: Military77
      Galvanic isolation - the transfer of energy or an information signal between electrical circuits that do not have direct electrical contact between them.

      Rather, there are two separate computers on the same motherboard ... That's the denouement ... the truth is not galvanic.
      1. -1
        30 August 2019 12: 25
        Here is the denouement ...

        It's not that they are on one mom or two. The bottom line is that the interface for exchanging information between parts does not imply an electrical connection. In the extended interpretation does not imply ANY DIRECT CONNECTION. Well, you sort of understand VT, have you really never encountered one before?
        1. 0
          30 August 2019 12: 27
          Quote: bk316
          have never encountered?

          At the moment, several devices with galvanic isolation are in operation, in view of interference and electrical safety. But what in the article is called "galvanic isolation" and I am trying to decipher))
          1. +2
            30 August 2019 22: 37
            I think that the terminology should have been: "On principles similar to galvanic isolation"
            1. 0
              2 September 2019 14: 43
              I think that the terminology should have been: "On principles similar to galvanic isolation"

              And again you are right. I apologize if I was harsh, now I see that you are quite in the subject.
              1. 0
                2 September 2019 22: 43
                Thank you Vladimir. I connected interesting people here, IT paranoid, one might say. So, the conclusion is the following: "In a monoblock, full IT security cannot be done, even without a buffer."
                Suppose that this is a model with two sets that are independent of each other, and between them a kind of flash with switching between sets. So: sets must be fenced off from each other by a random jamming system at frequencies from 50 Hz to the upper frequency of the high-frequency component itself. Next: the power of these 3 systems (2 sets of VT + interference) should be made from different power circuits, and the LAN should be done on an FTP cable with separate grounding, or spaced at least 1 meter apart. The same thing about the video cable that transmits a signal to the monoblock monitor. In general - well, just unrealistic.
        2. -2
          31 August 2019 10: 29
          Quote: bk316
          The bottom line is that the interface for exchanging information between parts does not imply an electrical connection.

          Well? Is there an exchange of information? There is. It doesn’t matter if there is a denouement or not, how does this block the exchange of information? Galvanic isolation is for interference and electrical safety. How to apply it in the field of information security? (i.e. written zeros and ones)
          1. 0
            2 September 2019 14: 46
            How to apply it in the field of information security?

            Gregory, I chewed as I could. Reread carefully my comments, I tried not to use special terms at all. Dmitry Petrovich understood everything and made the correct clarification:
            I think that the terminology should have been: "On principles similar to galvanic isolation"

            You can also add, "implemented not only on the physical, but at all up to the ISO OSI application level"
  5. -3
    28 August 2019 14: 33
    Wouldn’t it be easier to stir up a virtual machine for exchanging data on an open type of Internet ??? The main hardware starts with the main software with the user ... raises a virtual machine that is beautiful for him and even if he is standing there even on his head in this sandbox ... it would be easier and faster in terms of work by an order of magnitude ... oil is oil. I’m breaking off horns with especially cunning and dirty server-users so they work not on live hardware, but INFERNO wassat Groundhog Day Every Time hi
    1. -1
      30 August 2019 12: 26
      Wouldn’t it be easier to stir up a virtual machine for exchanging data on an open type of Internet ???

      Simpler but not reliable.
      1. -1
        30 August 2019 15: 08
        Well, yes, like ala-raid, two parallel laptops in the same corpus were muddied at the iron level. For me, that coat is not a personal opinion and based on experience. I wonder how they solved the problem of heat dissipation from two pieces of iron at once working ??? There will be an opportunity to drive it like that live in the tail and mane and see the faq finally pile up ... there will be a real conclusion, as well as some speculation.
        1. 0
          2 September 2019 14: 53
          For me, that coat is not a personal opinion and based on experience.

          Think a little bit
          You have two exploits of zero day in the system.
          The first type of control interception on a network packet.
          The second type of host control interception from a compromised virtual machine.
          For the military, a very real risk.
          Your decision is hacked, described in the article - no.
          1. 0
            3 September 2019 07: 59
            No, the core of the base server and its client part have not been hacked ... you will return to the starting point of the startup image specified and created by the server for a specific user. That shadow on the drum that you were able to make up during your surfing, that according to the allowed network resources allocated specifically for you, that is on the Internet. ... and the firewall Mikrotik resource management network will lead your personal tracer where, why, and why you are breaking. I repeat, such a crap is used specifically for dirty customers with the identification of their location. All this is not from a good life ... but you yourself understand why.
  6. Kaw
    +5
    28 August 2019 14: 35
    I wonder where they ordered in Taiwan or in China? And they just didn’t build anything in there? Americans, it seems, found some bookmarks in Chinese schemes.
    1. +3
      28 August 2019 14: 42
      So the Chinese said that in the event of a global war of any state with China, the GPS system will stop working)))
      1. +1
        28 August 2019 17: 06
        In the event of a global nuclear war, all radio systems will stop working. And not just the radio ...
  7. 0
    28 August 2019 14: 37
    And what about the Cryptoserver PAK with theirs as a BINOM-KA client, or maybe it’s imprisoned for it
  8. +4
    28 August 2019 14: 37
    Your Beanom is good with wine!
    O. Khayyam drinks
  9. +1
    28 August 2019 14: 50
    On the Samsung smartphones there is a "secure folder" and it is stated that malefactors will not penetrate. This is a simpler and cheaper software solution to the problem of access to information. In general, I do not understand why there are two computers in one. In any serious organization, the Internet to employees goes through a separate secure server. Also, organizations can use ransomware and descramblers. And also a significant information leak is associated with employees who actively use flash drives and phones.
    1. +8
      28 August 2019 14: 55
      Everything is easier. USB ports break out, phones at the input are removed. Access to the Internet only on 80 and 443 ports on the sites authorized for work.
      1. +1
        28 August 2019 15: 05
        Quote: Military77
        Everything is easier. USB ports break out, phones at the input are removed. Access to the Internet only on 80 and 443 ports on the sites authorized for work.

        And every night (as an option every morning) public flogging every 10th employee with rods before the formation. Not for violations, but for prevention.
        1. +3
          28 August 2019 15: 09
          Right! You must enter. And, I forgot to add, turning on the computer after scanning the retina and alcohol test)))
          1. +1
            28 August 2019 17: 13
            Yeah, if less than 100 ppm - it’s just like an enemy shpien! :)
          2. Alf
            0
            28 August 2019 22: 18
            Quote: Military77
            alcohol test

            Want to paralyze the organization, especially on Monday? laughing
  10. +2
    28 August 2019 14: 51
    Nda. Looks like the creators of this miracle did not hear about the possibility of collecting information on a conventional power grid. And it makes sense to fence the garden in such a way, if it is really easier to put two independent computers that are in no way connected. It will be cheaper and more secure!
    1. Alf
      +1
      28 August 2019 22: 19
      Quote: dgonni
      It will be cheaper

      That's exactly what is "cheaper". In modern Russia, this approach is not acceptable. As one figure in the TV series said, the costs are penny and the profit is penny.
  11. The comment was deleted.
  12. 0
    28 August 2019 15: 07
    And for whom is he? It is expensive for industry to switch to new technology when there is well-established technology. Moreover, it is expensive both in terms of reorienting to new equipment, and hemorrhoids in terms of accompaniment. It is very difficult sometimes to get domestic developers to provide quality support services for their product (at one enterprise, the senior management openly told us not to get a supplier, since everything works fine for him, and all that we dug up are isolated cases).
    Plus, the whole guide got hooked on Windows and Microsoft with x86 architecture (in some article they wrote that even Putin has WinXP).
    1. +2
      28 August 2019 15: 16
      Ivanov in the 98th definitely win95 stood. And XP is not the worst OS, especially since it has already been laid out for bits and shook up all the rubbish. Only old, 256 bit hardware encryption does not support (((
      1. 0
        28 August 2019 17: 12
        Even for the functions of the hardware RNG, separate boards have long been used, in extreme cases - "key chains"
    2. -1
      28 August 2019 16: 29
      "Some article wrote that even Putin has WinXP"
      Really still, and who provides support to him!? smile
      1. 0
        28 August 2019 17: 09
        If XP embedded - then Microsoft. Updates are still coming to me. :)
  13. +2
    28 August 2019 15: 19
    No one here in the discussion this computer personally saw, knows nothing about it.
    But the mud has already poured a ton, in chorus.
    Significantly.
    1. +4
      28 August 2019 15: 39
      Unfortunately, in Russia there is no technology for the production of element base technology less than 65 nm. Hence logical conclusions ... If strategic satellites of geo-positioning consist of 40-70% of foreign components and there is no way out of this situation in the near future, then they don’t know where to get money from the NAB fund (((
      1. -1
        28 August 2019 17: 24
        Quote: Military77
        Unfortunately, in Russia there is no technology for the production of element base technology less than 65 nm.
        Perhaps the following information will please you a little:
        The site https://mikron.ru/capabilities/technology/ describes the technological capabilities of the FAB-200, among them there is technology HCMOS065_LP_8M_1.2V - those same 65 nm.
        1. +3
          28 August 2019 17: 28
          Unfortunately, 65 nm technology is the achievement of 2004. Those. In this regard, we are at least 15 years behind, and at the current pace of technological development, this is the century before last.
          1. -1
            28 August 2019 17: 37
            Quote: Military77
            Unfortunately, 65 nm technology is the achievement of 2004.

            On the one hand, somewhere it is so, .. and if you look carefully from the other side, it looks somehow different:

            The effective channel length in technology is 90 nm and 32 nm. The transistors are shot on the same scale. The semicircles in the figures are a form of additional weak matching of drains (LDD, lightly doped drain), made to reduce the width of pn junctions.
            1. +1
              30 August 2019 09: 03
              But what to discuss 65 nm if the processor of a home computer is 14 nm and a smartphone is 8 nm.
              1. -1
                30 August 2019 10: 40
                So we are discussing domestic industry, and it doesn’t work for household use, but for aerospace и then already on the rest of the military. Aerospace requires radiation resistance, which leaves a hard impression on the topology of cells in microcircuits. Even in the USA, a number of modern (by the standards of the aerospace) microcircuits are manufactured using 90 nm technologies. In this sense, the development of 65 nm technology is very useful for our defense industry.

                And small "nm" are now "considered" by different manufacturers in different ways:
                it is worth remembering that 7 nm TSMC and 10 nm Intel are actually the same design standards in terms of package density and the size of individual transistors.
          2. +1
            29 August 2019 07: 45
            Apparently, they decided not to invest too much, but to wait for what will happen with overcoming the limitations that have already arisen. Flops have long been squeezed out not only by lowering the process technology on crystals.
  14. -3
    28 August 2019 15: 52
    This is an achievement! The Bloody Scoop with all sorts of Gagarins is resting! I am proud of my country!
  15. +3
    28 August 2019 16: 10
    Quote: Cresta999
    This is an achievement! The Bloody Scoop with all sorts of Gagarins is resting! I am proud of my country!

    No, but why - Gagarin even flew without an iPhone. Finally, in no framework!
  16. 0
    28 August 2019 17: 07
    "In fact, these are two independent computers, united in one case. The manufacturer claims that the protection of data and information systems in BINOM-KA is guaranteed." And what do the comrades from FSTEC think about this?
  17. 0
    29 August 2019 00: 34
    A high level of information security in BINOM-KA is achieved by a strict separation (galvanic isolation) of two computing systems

    I wonder who wrote this?
    For the transmission of information, the presence or absence of galvanic isolation does not matter, and information through an optocoupler is transmitted easily and freely in the presence of this same galvanic isolation.
  18. 0
    29 August 2019 02: 13
    The specific characteristics of BINOM-KA are not reported.

    Which is quite understandable!
  19. +3
    29 August 2019 11: 07
    Russian development directors are incapable of developing at least something world-class. For 20 years of party and government rule there are no such developments. Therefore, they do not tell anything interesting about this "hardware", because there is nothing to tell. The elemental base is china, taiwan, imported programs, but our plastic buttons, and that is not certain. Why crowing, bending over in front of the owner? Like "we can"!

"Right Sector" (banned in Russia), "Ukrainian Insurgent Army" (UPA) (banned in Russia), ISIS (banned in Russia), "Jabhat Fatah al-Sham" formerly "Jabhat al-Nusra" (banned in Russia) , Taliban (banned in Russia), Al-Qaeda (banned in Russia), Anti-Corruption Foundation (banned in Russia), Navalny Headquarters (banned in Russia), Facebook (banned in Russia), Instagram (banned in Russia), Meta (banned in Russia), Misanthropic Division (banned in Russia), Azov (banned in Russia), Muslim Brotherhood (banned in Russia), Aum Shinrikyo (banned in Russia), AUE (banned in Russia), UNA-UNSO (banned in Russia), Mejlis of the Crimean Tatar people (banned in Russia), Legion “Freedom of Russia” (armed formation, recognized as terrorist in the Russian Federation and banned), Kirill Budanov (included to the Rosfinmonitoring list of terrorists and extremists)

“Non-profit organizations, unregistered public associations or individuals performing the functions of a foreign agent,” as well as media outlets performing the functions of a foreign agent: “Medusa”; "Voice of America"; "Realities"; "Present time"; "Radio Freedom"; Ponomarev Lev; Ponomarev Ilya; Savitskaya; Markelov; Kamalyagin; Apakhonchich; Makarevich; Dud; Gordon; Zhdanov; Medvedev; Fedorov; Mikhail Kasyanov; "Owl"; "Alliance of Doctors"; "RKK" "Levada Center"; "Memorial"; "Voice"; "Person and law"; "Rain"; "Mediazone"; "Deutsche Welle"; QMS "Caucasian Knot"; "Insider"; "New Newspaper"