Posts

14. Andmeturveː tehnoloogia, koolitus ja reeglid

  "Human is the weakest link in the information security chain" © almost every IT security specialist In the digital age, one of the most important as well as the most difficult task is protecting personal data. M ost often, the first thing you will see as a new user is the advice "do not show your username and password to anyone!".  N evertheless, the personal data is the main purpose of protection, there is, in addition to personal information,  exists other important information. It may be your project / dissertation / archive of the accounting report, which for some reason you have not yet sent to your boss. This information can be targeted by malefactors. They may use malware, that encrypts the contents of the hard drive and then demanding a ransom. This type of malware also known as ransomware. However, although this scenario is terrible, there are a number of procedures that will avoid such a disastrous outcome. 1.Сopy the information to another storage med

13: Teistmoodi IT

 The essence of technology has always been to simplify the life of an ordinary person. This is especially noticeable now, in the age of information technology. But I would like to talk about a technology that allows a person with disabilities to use most of gadgets almost as effectively as an ordinary person. Speech recognition technology Speech recognition technology is a blessing for people who do not have the ability to work normally with a computer / phone / TV, etc. Special software is used to convert received voice commands into text or specific actions. For this reason, no keyboard / mouse / touch screen needed, which allows people with physical disabilities to work with electronics. This technology is complex, because it requires the so-called "units of the phonetic alphabet". For each sound, a complex statistical model is initially built that describes the pronunciation of this sound in speech. The more phonetic units, the more accurate the system can be. Further, a

12. Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus

Image
In 2000-s only functionality of product was important. But today design is no less important aspect of any IT product. Today's rule of good design is "A product should be so easy to learn that even children can use it without problems" . Therefore, we can say that a product is good if it is intuitive and easy to use, and the design does not obstacles its use. Today, by these criteria, I will evaluate two different sites. Positive exmaple - YouTube The design of YouTube is very "wide", it occupies the entire screen of a computer (or any other device), which is a significant plus, since every centimeter of the page tries to provide maximum information. although the text is small and poorly readable on the sidebar, the icons responsible for the functionality carry all the necessary information. A huge plus is that neither the logo nor third-party features take up unnecessary visual space. The interface is small enough not to distract the user, but large enough to

11.loeng Arendus- ja ärimudel

Image
 Kenshi: the cowboy coding. Kenshi is a survival-sandbox-RPG game in a post-apocalyptic,  "sword-punk"  setting. This game has a large community due to its well-developed world, interesting mechanics, and also because of charismatic characters like "Beep".  First five-six years it was developed by one person. To get by , he had to work minimum wage security guard job in the nights. However, then, when the game gained its first fans, the development group grew significantly. The developers do not have a specific plan of action, they are just trying to bring the game to the state of " the dream game ". For this reason, we can say that due to the lack of almost any plans, Kenshi is an example of cowboy coding. Youtube - Advertising model + freemium  YouTube is one example of a collection of several business models. This company uses the "carrot and stick" trick. Before the video, the user must watch one (or several, damn you YouTube) commercials. Fo

10. Hacker-HOWTO

 I found the description of the "hacker" community very interesting. It looks not like a group of people with a same interest, but with same lifestyle. I confess that I have never heard of such a name as "cracker" before. However (most likely) I will think about the differences and similarities between hackers and crackers for a long time.  However, it is not entirely clear where that fine line begins when a hacker becomes a cracker and a cracker becomes a hacker. Is a person a cracker if (or a group of people, for example "CODEX" or "P2P GROUPS") hacks into games and distributes them for free? it would be interesting to clarify such "subtle" moments, since although their actions can be censured, however, people's intentions can be more noble than it seems at first glance I was glad to know that most "hackers" are the type of people I imagined. All tips from the " Points For Style " section. They seem very geeky

9. IT management and Risks control

Image
 Every large company has its own "leader", who moves the company forward, allowing it to achieve more and more success. Today I would like to consider two famous people whom, and also try to analyze their personality on the example of such a large company as "Apple " . Steve Jobs Steve Jobs is the man who founded Apple, he introduced many innovations and unique technical solutions into our life. He popularized personal computers, music streaming services, and smartphones. However, it cannot be said that everything was smooth. Employees said that Steve Jobs had a strict disposition, and forced employees to work hard. People could have lost their jobs even because of one mistake. That was the price for progress For these reasons I can say that Steve jobs had the qualities of "leader" and "change agent". Steve Jobs knew exactly what he wanted to see from the product, thanks to this skill, progress did not just "moved with the times", he pu

8.IT proffesional... ?

 Estonia is a small country with a well-developed IT industry, which means that competition in this area is also very tough. Nowadays, you will not surprise anyone with a higher education and knowledge of Python (or JavaScript), so programmers, in order to be able to break into high positions, often try to know the widest possible range of languages. Now you can often see a programmer who knows at least 3-4 languages ​​besides Python well. The the requirements  all over the world    for programmers are the same everywhere, but due to the fact that Estonia is a relatively small country, programmers are in constant competition. On the one hand, this limits the total number of "workforce", but it also means that the skills and competence of programmers in Estonia can be significantly higher than in other countries, where the population can be significantly larger. The most important skills for a programmer right now is adaptability. The ability to work in pairs / small groups /