Skip to main content

Humans must handle with care in working life.

Humans must handle with care in working life.

The most important resource in the data system are humans, and humans are also the most vulnerable part of the systems, and we must realize, that we must handle people with care because of disappointments might cause that inmate would make the revenge to the company. But otherwise, the system is made for serving humans, and this thing causes that we must notice the benefits and weaknesses of every user group.

When we are making frames, where people must operate we must remember that every user in every data system are not people, who have a Ph.D. in the data systems, and those people can still be highly trained professionals. So when we are meeting those people, who might be excellent lawyers, architects or artists, we must respect their skills and way to act. And at the same time, we must minimize the damages, what would happen in the case, that some user makes an error.

This is the thing what the people, who are acting in the research and developing of the data systems should understand. The people who are operating in data-oriented business must realize, what kind of data is stored in the system, that they can control the delivery of information. And why people are the weakest link in security?

People have feelings, and they might be nervous. In the cases when a person is failed or treated badly, that thing might cause the situation, where data is delivering in the wrong hands. In the worst case the USB-stick or the mobile telephone, where is important data would just be given to some person in the hands of an unknown person. The disappointments are growing people, but nobody likes them.

And if the thing in the private life or workplace would be tight, that can cause the will to revenge. This is one example of cases when everything will go wrong. There are many ways, how to make damages in the computer systems, and one of them is that somebody will give too many authorities and accesses to wrong people.

One of the things, what would have too bad consequences is the case, where another person would not dare to say, that there are maybe over 20 years the last time when the person wrote some SQL databases. In those cases, something might be forgotten, and the database would have quite many errors.

And those cases are problematic. If people come to the workplace, there are skills, what person tells to have. But if the worker doesn't use those skills they are forgotten. That thing is a nice thing to understand before we are given or taken some missions. Also if we would treat other people despicably, that would cause that the wrong names would be leaked to criminals, what might cause problems.

Many people who are working in the ICT sector have social media accounts, but other people would not know their position. If somebody would answer by hurting another person, that inmate would probably deliver those Emails to the entire Internet, and then some gangsters will kidnap the family members of that chief or whatever that person says being.

Comments

Popular posts from this blog

The story of (Northrop?) TR3A "Black Manta"

    Image I The story of (Northrop?) TR3A "Black Manta" Sometimes there have been discussions that the mysterious TR3A "Black Manta" was a study project for the B-2 bomber.  That means that TR3A was used as the flying mockup for testing the aerodynamic and control solutions for the B-2 "Spirit" bomber. The thing that supports this thing is that the manufacturer of both planes is Northrop corporation.  Along with "Aurora" was flying one other mysterious aircraft, TR3A "Black Manta". The system is described as the "Stealth VTOL" (Vertical Take-Off and Landing) aircraft. Unless the mysterious TR3B, the Northrop TR3A is the conventional VTOL-aircraft, what is using regular jet engines, but what has the stealth-body.  Image II The thing is that the stealth-reconnaissance aircraft, which uses a similar technology with the Northrop B-2 bomber would be an interesting part of the weapon arsenal. There is a possibility that the TR3A was...

Who really was Plato, the great philosopher?

When we are thinking about the great philosopher Plato, we are thinking about the man who established the Academy of Athens. And we might remember that this man was a traveler. He traveled in many places in his life and wrote many texts and books, which still is very respected thoughts about the state and other things. When we are looking at the books or series of books, we are facing the thing, that there were lots of texts. If we want to use criticism we must notice that the model of the ideal state is rising the kings in the very high position, and the thing would flatter the kings. And sometimes I have thought that maybe that famous model of the ideal state is written by somebody else. The thing is that the model, where the philosophers rule the state behind the lines of soldiers could be written for the persons like Justinian, who was really flattered. The thing is that this kind of writings was meant for flatter the rulers, who would not persecute philosophers, even they had d...

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...