Objave

Rule utilitarianism

 One of the most well-known and popular moral philosophies is utilitarianism. Its central principle, like that of other types of consequentialism, is that whether acts are morally right or wrong is determined by their consequences. The only consequences of behaviors that are important are the positive and negative outcomes that they achieve. Utilitarians claim that the goal of morality is to improve people's lives by increasing the amount of good things (like enjoyment and happiness) and reducing the amount of negative things in the universe (such as pain and unhappiness). They oppose moral codes or structures that are based on rituals, traditions, or instructions issued by kings or divine entities and consist of commands or taboos.

How do blind people use a computer?

 How do blind people use a computer? Despite the fact that blind people can type on ordinary keyboards, they must rely on specific software and hardware to view the information shown on a computer screen. Screen Readers A screen reader is a piece of software that interprets what's on the screen and relays it to the user via a text-to-speech engine or a refreshable braille monitor. It allows blind and visually disabled individuals to read notes, search the internet, submit e-mails, and work through an application's menus and dialogue boxes. Since blind people cannot use a mouse, they must rely solely on keyboard commands to complete tasks that sighted people can complete with a mouse. These keyboard commands include those integrated into the computer's operating system or a specific software program, such as CTRL+C for copying the selected text. A refreshable braille monitor is a computer-connected electronic interface with a USB or Bluetooth link. Its function is to display

Cencorship & Privacy

 In this blog post, I will highlight an example of online censorship and one of online privacy.  Cencorship: China’s biggest viral video hit of the year may have been Under the Dome, a documentary about China’s very serious environmental problems produced by CCTV host Chai Jing. The film was made with the government’s apparent consent, but as its popularity grew and more than 200 million people watched it, authorities apparently became nervous. The film was subsequently removed from many of China’s major video streaming platforms, and discussion of it online – which originally was being permitted – started to get censored. Privacy Zoom gave data to third parties without users’ knowledge. In April 2020 piece from The New York Times alleged that popular video conferencing site Zoom engaged in undisclosed data mining during user conversations. The coverage asserted that when a person signed into a meeting, Zoom transmitted their data to a system that matched individuals with their LinkedI

Mitnick formula

Slovenia implemented its Cyber Security Strategy -  Establishing a system to ensure a high level of cybersecurity in 2016. The strategy covers the following strategic goals in the ENISA self-assessment classification: Cybercrime, security with privacy balance, citizen awareness, critical Information infrastructure protection, international cooperation, incident response capability, institutionalised form of cooperation between public agencies, incident reporting mechanisms, cybersecurity exercises, training and educational programmes Under the 2016 strategy, Slovenia plans to set up central coordination of the national cybersecurity assurance system and provide conditions for its stable operation. This body is tasked with coordinating national cybersecurity assurance capabilities, acting as a single point of contact for international cooperation. At the operational level of cybersecurity assurance, SI-CERT brings its national capabilities while SIGOV-CERT supports public administration

Ai = Good = Bad?

 In this blog post, I will present how AI can save lives and how it can make them worse.   First I will present 3 examples of how it helped people.   1. Preventing Accidents 1.35 million people die from vehicle-related accidents each year. !important app aims to minimize the risks of accidents with all certified connected vehicles. The AI-enabled app creates a virtual protection zone around pedestrians, wheelchair users, cyclists or motorcyclists. If a connected vehicle gets too close to an !important user, its brakes will be triggered automatically. 2. Detecting Medical Conditions Voice-based digital assistant listens in on emergency calls and analyzes what patients say to determine their current medical state. Trials of the system in Copenhagen found that it decreased cases of undetected out-of-hospital cardiac arrest by 43%. The company is already working on ways its solution can be used to diagnose other ailments.   3. Improving Pharmaceutical Solutions Okwin uses m

IT in Slovenia

 In my country (Slovenia) IT is developed, though not on the same level at all as in Estonia. I am in awe of how many things here are done automatic or online. In the past 20 years, changes in IT have been significant. From big companies being formed, to databases being created and added, with so many new jobs being offered in IT, it is indeed a field of the future and has been a great field to be in the past. An IT worker from Slovenia typically has a university degree, knows at least 5 programming languages and Is a master of at least 3 of them, knows how to use Windows and Linux efficiently.  Working in IT is hard, but very rewarding. The field is only getting better and is still evolving.

Respect other people’s privacy

 I will write about one of the most important netiquette rules, which goes by the name of Respect other people’s privacy and is about not reading other people’s messages, emails and etc without there permission, it’s invading their privacy and is illegal. Just imagine you are the one in their shoes and somebody read your private emails and messages, that would not be good. Also if you know of someone's private affairs you shouldn't share them with anyone on the internet or in general. Things like so need to be thought to everyone from a very young age.  My personal examples would be parents checking my phone or pc (which is understandable since I was a trouble child and they had the right to do it). Or when other kids stole my phone and read my messages.  Things happen, but we need to try harder to teach people to not behave like animals. LP