Posts

Showing posts from December, 2020

14. Andmeturveː tehnoloogia, koolitus ja reeglid

  "Human is the weakest link in the information security chain" © almost every IT security specialist In the digital age, one of the most important as well as the most difficult task is protecting personal data. M ost often, the first thing you will see as a new user is the advice "do not show your username and password to anyone!".  N evertheless, the personal data is the main purpose of protection, there is, in addition to personal information,  exists other important information. It may be your project / dissertation / archive of the accounting report, which for some reason you have not yet sent to your boss. This information can be targeted by malefactors. They may use malware, that encrypts the contents of the hard drive and then demanding a ransom. This type of malware also known as ransomware. However, although this scenario is terrible, there are a number of procedures that will avoid such a disastrous outcome. 1.Сopy the information to another storage med

13: Teistmoodi IT

 The essence of technology has always been to simplify the life of an ordinary person. This is especially noticeable now, in the age of information technology. But I would like to talk about a technology that allows a person with disabilities to use most of gadgets almost as effectively as an ordinary person. Speech recognition technology Speech recognition technology is a blessing for people who do not have the ability to work normally with a computer / phone / TV, etc. Special software is used to convert received voice commands into text or specific actions. For this reason, no keyboard / mouse / touch screen needed, which allows people with physical disabilities to work with electronics. This technology is complex, because it requires the so-called "units of the phonetic alphabet". For each sound, a complex statistical model is initially built that describes the pronunciation of this sound in speech. The more phonetic units, the more accurate the system can be. Further, a