Friday, 19 May 2017

IT ethics.(14 nädal)

In the most general sense, computer ethics is engaged in researching the behavior of people using a computer, on the basis of which appropriate moral prescriptions and a kind of etiquette norms are developed. The very use of the expression "computer ethics" is very conditional, this discipline is very young, it appeared in the 70-80s of the XX century, and along with it such terms as "information ethics", "cyberethics" are used.The most vivid embodiment of computer ethics was in the development of moral codes. The adoption of the code was dictated by the understanding that engineers, scientists and technologists, by the results of their activities, determine the quality and conditions of life of all people in the information society.The content of individual codes differs from each other, but they are based on some invariant set of moral guidelines that can be conditionally reduced to the following:
  1. Do not use the computer to harm others;
  2. Do not interfere with and interfere with the work of other users of computer networks;
  3. Do not use files that are not intended for free use;
  4. Do not use the computer for theft;
  5. Do not use the computer to spread false information; 
  6. Do not use stolen software;
  7. Not to assign someone else's intellectual property;
  8. Do not use computer equipment or network resources without permission or appropriate      compensation;
  9. Think about the possible social consequences of the programs you write, or the systems that you develop;
  10. Use a computer with self-restraints that show your courtesy and respect for other people.
In the framework of computer ethics, a special area is designated, called "hacker ethics", the foundation of which was laid by hackers, pioneers, who were at the source of modern information technologies. And with the development of the Internet, the notion of "network ethics" or "netiquette" (derived from net-network and etiquette-etiquette), which denotes the set of rules that have developed among users of the global network, also comes into use.It's no secret that spending most of your life in front of the monitor - both leisure and working hours - has long become the norm for many. Computerization of society has acquired a grandiose scale. IT professionals - as people who create software and hardware that support the operation of the entire computer infrastructure of society - must be aware of the importance of their activities and their responsibilities. Many people neglect this, not reflecting on the fact that sometimes the welfare of tens, hundreds of thousands of people depends on them.
When you master a new culture - and cyberspace, of course, has its own culture - you can make some mistakes. On the Internet, as in normal life, certain rules of communication are adopted, and very specific. Internet - there is a system, and there is no single unified code of rules (laws) for using the network for it. There are, however, generally accepted standards of work on the Internet, aimed at ensuring that the activities of each user of the network does not interfere with the work of other users.
Remember the main! Do not forget that even through the dead network and computer-stuffed computer you communicate with a living person. And often - with many people at the same time ...
Most of all, the rules of virtual etiquette apply to e-mail. For this you need:
  • Regularly check the contents of your mailbox;
  • Respond immediately to every letter addressed directly to you. Observe brevity, sometimes quite a few words are enough. Lack of response is equivalent to saying that if you ignored the greeting, you would refuse to shake the outstretched hand or turn your back to your interlocutor;
  • In the electronic message always it is necessary to specify its basic theme. This rule did not appear immediately, it was developed gradually, being the result of certain practical requirements. It is necessary to take into account that letters that do not have a clearly formulated theme can be ignored;
  • By sending a letter to an unknown addressee, use the usual text code, otherwise it is possible that he simply can not receive it, and communication services will cost less;
  • at the end of each electronic message, you must indicate your name, surname, position and place of work, your email number, as well as your phone number and usual mail address, this information should not exceed four lines;
  • Do not overload the electronic message with additional materials (photographs, drawings, etc.); Correctly choose the format of the text (the text format will take a hundred times less space than the document of any application); A large number of supplements should be sent only with the consent or at the request of the addressee. Specify whether his mailbox has restrictions on the information received;
  • Messages with attached executable files, as well as Microsoft Office documents can carry computer viruses, usually destroying the contents of the destination computer; For a quick response to an e-mail, you just need to use the "Answer" button to get a letter ready for dispatch;
  • Answering the letter, you should not repeat all the correspondence entirely, it is enough to reproduce only those fragments that you want to refer to (such citation is not necessary, but it is a certain gesture of politeness to your virtual correspondent who could forget the essence of his Messages or individual arguments in the discussion); Every electronic message from one correspondent to the other is private, that's why each user must follow the rule on the privacy of correspondence, (ie before transferring its contents to other persons, it is necessary to obtain permission from the author); 
  • For correspondence not addressed personally to you and not from the author of the message, you should not answer, most often you are being imposed unnecessary commercial information.
Unfortunately, we have to state that in our country there is practically no special research on the problems of computer ethics. Almost all problems of computer ethics are of an "open" nature. The most acute and urgent problems can be regarded as those related to the evaluation of hackers' activities, the protection of copyright and the rights of the individual in the information space. But even in those areas of computer ethics, where a theoretical foundation for the analysis of moral problems has been developed and specific norms, principles and recommendations have been worked out, such as in computer codes, such dilemmas arise that do not have an obvious correct solution.

Wednesday, 10 May 2017

Andmeturveː tehnoloogia, koolitus ja reeglid. Nädal 13

In today's article, it's about IT risks.

Throughout the world, there is a tendency to underestimate IT risks (only 1% of the surveyed experts estimate this area as the most exposed to risks). In reality, a violation of the functioning of IT systems - caused by hacker attacks or imperfection of internal processes - immediately entails multi-million losses.
Ensuring information security is one of the main tasks of a modern enterprise. The threat can be presented not only by technical failures, but also by the inconsistency of data in various accounting systems that almost every second company meets, as well as unlimited access of employees to information.
IT-risks can be divided into two categories:
  • Risks caused by information leakage and use by competitors or employees for purposes that could  damage business;
  • Risks of technical failures in the operation of information transmission channels, which can lead to losses.
Work to minimize IT risks is to prevent unauthorized access to data, as well as accidents and equipment failures. The process of minimizing IT-risks should be considered in a complex way: first possible problems are identified, and then it is determined by what methods they can be solved.
So how to minimize IT risks?
As the experience of many companies shows, the most successful strategies for preventing IT-risks are based on three basic rules.
  1. The access of employees to the information systems and documents of the company should be different, depending on the importance and confidentiality of the contents of the document.
  2. The company must control access to information and protect the vulnerabilities of information systems.
  3. Information systems, on which the company's activity directly depends (strategically important communication channels, document archives, computer network), should work smoothly even in case of a crisis situation.
In conclusion, I add that these rules will not do any good if the company's staff is not trained in the basic rules for using the system and do not understand the importance of their work.
The principle and logic of work should be clear to everyone. Every employee must understand their responsibilities and fulfill the basic requirements for the preservation of personal data and data of the organization. If these requirements are not met, then sooner or later an attacker will be able to find a loophole and take advantage of the employee's incompetence.
Peace to all and a minimum of IT risks :)

Thursday, 4 May 2017

Suport solution. 3D technology. 12 nädal.

Hello again, my dear friends. This week, let's talk probably on my most favorite topic, the topic of technologies that make life easier for a each person. Although many of us afraid of everything new,but  I of myself an ardent fan of all new technologies. I try to try all possible new things that come to light, for me it's like a drug :)Today I want to talk about a solution like 3d printers and 3d pens. For me, this is truly a unique and unusual technology  of which it is possible to recreate the shape of any objects that exists and which the human imagination can come up with. A 3D printer is a peripheral device that uses the method of layer-by-layer creation of a physical object on a digital 3D model. As a material for creating 3D objects, printers and pens can use different materials, such as metal powder, thermoplastic, photopolymer and other similar materials. Dense ceramic mixtures are also used as a self-curing material for 3D printing of large architectural models. Ie with the help of such printers it is possible to build a house.
By the way, in Moscow this technology of building houses is already being applied. The local craftsman came up with a 3D printer and suggested not to build houses, but to print it. This allows you to erect a concrete box under a small house on a plot with any relief in just a day. You can save money on the brigade with a foreman. Only 2 people work at the site. One watches the computer, the second - for the supply of building materials. Ie, the printed blocks are not brought to the site but are erected directly on the desired plot of land.Along with printers printing physical objects, biological printers have also developed. These are experimental installations in which the 3D structure of the future object (organ for transplantation) is printed with droplets containing living cells. Further division, growth and modification of cells ensures the final formation of the object.Along with serious, complex and large 3D printers ordinary people are also available with 3d handles. These handles also work with different materials, both with thermoplastic and photopolymer curing under ultraviolet light. Incidentally, photopolymers have often been used to glue two transparent surfaces, for example glass (used this technology when replacing the glass on my phone). Back to the pens .. For someone it will be a toy, and for someone a tool for creating real three-dimensional objects with your own hands and not with the help of a machine.
For example, the child who possessed this device can create a toy for himself, which he can only come up with (of course if it's not a mechanized robot, although who knows :)). The adult person will be able to realize his idea not on paper or 3d programs on the computer, but in a real three-dimensional object.
I think that 3d printers have a very promising future: as in the military industry (for example, Defense Distributed company already created a gun and made the drawings public, but the US State Department demanded to remove instructions from the website), both in medicine and the general commodity market. Perhaps in the near future many necessary works will be replaced by this technology, so it will perform the work more accurately than human hands.
I want to believe that this technology will serve the benefit of humanity, I want to believe that it will help people to stand on their feet, but as the saying goes, time will show who is who and what it is =)

Thursday, 27 April 2017

Positive and negative examples from the Internet

This week we will talk about the positive and negative usability of various applications on the network.I will not fantasize, think out non-existent things and, as examples, bring the projects that I use daily and I can put my opinion back on my own experience. To begin with, let's start with a negative experience.

It's no secret that at the present time fewer and fewer peoples goes to stores and more and more people buying things onlain. I am such one of those people who make purchases in the Internet. At the moment I have tried out such systems as aliexpress, ebay, amazon and alibaba. Now I want to talk about the latter one. Horrible system :) It is so unfriendly to the user that I did not have a desire to make any orders using the website http://alibaba.com/. Honestly, I repeatedly returned, hoping to discover innovations, but each time left disappointed. This resource does not allow you to make a purchase without the consent of the seller, almost all the goods are sold in batches of several pieces, ie excludes the possibility of buying trial versions of the goods, delay of response from the seller can reach several days. I tried to deal with this system, but the more I used it, the more it disgusted me. Perhaps the most inconvenient global online store.

From the bad to the good, to smooth out all the negative. To the positive aspects of the Internet, I can include an application like WAZE. This application is not only available on the web, but also supported by mobile systems such as android and iOS. This application is a navigator program, the architects of which are the users themselves. The program / site is very simple to use and contains the most necessary information that may be needed on the road. In addition to all the basic functions of the navigator and informer, the system includes game elements. By adding to the map "dangers" or missing roads, passing a certain distance or reporting accidents, the user receives bonus points with which they can change their appearance on the map for other users. This program is so much pleased me and it turned out to be so necessary that I use it constantly ... if not every day, then every other day.
I highly recommend to use "waze" if you have not done so yet. 
 Perhaps on this we will finish. From myself I want to wish you more and more positive and less negative emotions from using different kinds of systems and applications in the network.

Monday, 17 April 2017

Software development and business models

In today's article, I want to talk about software development and business models. For the analysis, I chose the Scrum development methodology and the co-financing model.Quite a few companies use the methodology of developing Scrum, one of such companies is Skype, which partly uses this flexible methodology of software development. This methodology focuses on the quality control of the development process.

The term Scrum itself is defined as the methodology of project management, which is built on the principles of time management. Its main feature is involvement in the process of all participants, and each participant has a certain role. The bottom line is that not only the team is working on the solution of the problem, but all those who are interested in the solution of the problem, not just put it and relaxed, but constantly "work" with the team, and this work does not mean only constant monitoring. In addition to managing software development projects, Scrum can also be used in the work of software support teams, or as an approach to managing the development and maintenance of programs.Thus, the development methodology of Scrum is unique in its way, allowing to look at the problem through the eyes of different people and find the golden mean for the project.The second business model for consideration, I chose the model of co-investment in ideas. Fans collect money for what they like. Sharing and sharing technology unites the impulse of one user who wants to donate a particular artist or writer money to create a work, with hundreds of other fans with a similar desire (and it does not take much effort to do this), as a result of which you can collect a considerable amount.
For example, the company ZTE began raising funds by crowdsourcing to the Hawkeye smartphone. Its concept is created by the users themselves and implies, in particular, the ability to control the device with the eyes, which will be very useful for people with disabilities or injured with limbs. The main innovation of the device will be technology i-tracking, which will track the movements of the eyes of users. This will allow, for example, to scroll web pages with the help of moving pupils.On this I will probably finish the article, but in conclusion I want to say, I do not think there are any bad software development or business models, there is not the correct application of them where the model does not work and vice versa, for any model there is always a place, the main thing is to understand how it Works and what to expect of it.

Thursday, 13 April 2017

Hackers (9.nädal)

 Hackers. For many, these people are mystical personalities, hacking the system and going against the law. In the majority this opinion has developed due to the many films shot on this topic. Eric S. Raymond is trying to refute this opinion. In his article, Eric S. Raymondi tries to explain to people who actually are hackers in their own opinion and how they differ from crackers (burglars).
Initially, hackers called programmers, who corrected errors in software in any fast or elegant way. According to Raymond, hackers live according to a certain ideology and rules. These are people who can appreciate and understand hacker values. Crackers in his opinion is a completely different group of people having nothing to do with real hackers. Raymond says: hackers - build, crackers - break.Despite all the words of Raymond, I believe that it does not matter who you think yourself and call hackers in their understanding. It so happened that the name of things is given by society and not by a small group of people. If the majority decided that the grass is green, then it will be green, if the majority decided that a person capable of hacking a defense and stealing data - a hacker, then so be it. People do not like to think and analyze much that they do not understand, and therefore it's easiest to call things by the names that most people used to call them.
 I myself, am not a hacker or cracker, but sometimes I use programs to crack any other programs. In my understanding, hackers are people able to bypass the system, look for errors or vice versa to correct them. In turn, hackers are divided into "White Hat", "Black Hat" and "Gray hat". Black hats are called cyber-criminals, while white hats are used by other information security specialists (in particular specialists working in large IT companies) or researchers of IT systems that do not violate the law. In cases, for example, minor violations of the law or absence of violations of the law, but the violation of the internal rules of an Internet service can be used the term Gray Hat. For me, a hacker is a person with certain skills in the IT field, able to find loopholes in the code and can use them to obtain either personal or public benefits.Proceeding from the above, I can say with confidence that hackers are also engines of progress that make information technology develop at an accelerated pace. Hackers do not allow to monopolize various kinds of projects, crack security and transfer materials to society, forcing companies to come up with new product and protection options. Also, I do not consider hackers to be bad people, perhaps because I have never encountered the consequences of their work and have received no moral, physical or financial harm on their part.Maybe someday my opinion will change, or maybe I will become a hacker ... who knows ...

Thursday, 6 April 2017

IT juhtimine ja riskihaldus

In this article we will talk about the leaders in the IT field. We know a lot about great people like Bill Gates or Mark Zuckerberg, we'll talk about less known but no less significant people.
I would like to talk about people with whom I am personally acquainted and directly related to the project that has received a life in Estonia and is flourishing and for today thanks to these leaders. The names of these people are Hannes Plinte and Madis Sassiad. The name of the company that they created GoSwift OÜ. The company is engaged in queue management services internationally at border checkpoints what was born in starting in 2011.
That types of managers can easily be attributed to leaders, to people who know exactly what their goals are. Know the scope of these goals and how to lead the team to the task. If this were not so, then would success come so soon? Already in the first year the project fully paid for itself, earned a lot of awards in the IT field and entered the international market. Knowing these people personally, I can say that in life they are ordinary cheerful people, able to joke and communicate on any topic, in the working environment they are also friendly and socially developed. When it comes to dealing with work, they are demanding and serious, they understand exactly, the fulfillment of what tasks to demand from their subordinates and at the same time remain "people." Perhaps these qualities in the right balance and brought these, in my eyes great, people to success.
Since by nature from childhood I really like to play games. Then our second candidate for consideration will be Ken Kutaragi, the head of Sony Interactive Entertainment. This manager can be attributed to the type coach. Without his skills, the company would not have achieved such a huge profit in the market. Kutaragi closely followed the financial analytics, tracked the losses and profits of Sony Corporation. This explains the high profit of the PlayStation franchise in Sony reports, it was the main source of profit for the company.
What are the qualities that a given person has and his perception of the world speaks. For example: In the 1980s, he watched his daughter play in Famicom and saw the huge potential of electronic entertainment. At that time, Sony executives showed little interest in video games. When Nintendo announced the need to create an audio chip for the new 16-bit system, Kutaragi's help was accepted.

In conclusion, I would like to express my opinion, it does not matter to which leader the director belongs, most importantly, in order to remain a man in his position, do not lose his skills and grasp, and his case would be of interest to him