Messages - IainB [ switch to compact view ]

Pages: prev1 ... 65 66 67 68 69 [70] 71 72 73 74 75 ... 1318next
346
Having worked in Defence and marketing and having managed the design, development and delivery of smart nationwide credit-card driven EFT-POS systems which collect, curate, manipulate and use user data for marketing advantage, I have learned some very good reasons why the individual needs to understand:
  • (a) the value and fragility of personal data-privacy and
  • (b) its relevance to freedom/liberty.

I generally try to think for myself and prefer to take a healthily skeptical and politically agnostic outlook on life. I am personally fed up to the back teeth with the incessant incitement to outrage and the bombardment of absurd political bias and being told how to behave or encouraged to moronically right-think all the time, as pushed by a majority media cohort apparently funded by vested interests (i.e., propaganda, AKA "fake news") seemingly hell-bent on manipulating us (e.g., including the Facebook - Cambridge Analytica fiasco and SnowdenGate.).

Though it inevitably seems/tends to push its own peculiar political bias a lot of the time (like many websites), the website innov8tiv.com occasionally publishes what seem to be relatively well-balanced posts on topics that could be of interest. I therefore keep it in my BazQux feed-reader and periodically check it out.
IMHO, the item copied below from innov8tiv.com is potentially informative and thus worth a read:
(Copied below sans embedded hyperlinks/images, with my emphasis.)
People browsing using Chrome were quietly logged into their Google accounts without their consents | So much for users’ Privacy
 Felix Omondi  September 24, 2018  Apps and Software

A professor at Johns Hopkins and a cryptography expert, Matthew Green, called out Google for making changes to Chrome, making the browser log in users into their Google account without the consent or even notifying them. A move security experts say puts the users’ privacy into jeopardy.

Historically, Chrome users have had the option of using the browser without logging in to their Google accounts. Although logging in does come with some obvious benefits such as having your bookmarks, passwords, and browsing history synced in the cloud and available across any device you are browsing on using the Chrome browser.

However, for security-conscious users who do not have Google – the most prominent advertising entity in the world – have their browsing data for purposes of sending them targeted Ads. Now that Google has made changes to the new Chrome to make the browser log users secretly into their Google Accounts means Google will get the data of users who would otherwise not have logged into their accounts.

Google has come out addressing these concerns raised by security experts stressing that users must have consented to the sync feature thus allowing the browser to transfer their data. Buried in the sync feature, is the revelation that for the sync feature as it works out will automatically also log you into your Google account.

So when a user logs in to their Gmail account on the browser, Chrome also automatically logs into their Google account. All that happens without the consent of the user or the user getting notifications.

“Now that I’m forced to log into Chrome,” wrote Green, “I’m faced with a brand new (sync consent) menu I’ve never seen before.”

Copied from: People browsing using Chrome were quietly logged into their Google accounts without their consents | So much for users’ Privacy | Innov8tiv - <http://innov8tiv.com/people-browsing-using-chrome-were-quietly-logged-into-their-google-accounts-without-their-consents-so-much-for-users-privacy/>
Interestingly enough, this would seem to be exactly the sort of thing that HAT (Hub of All Things) - referred to above per Armando (2016-07-29, 14:49:38) - is apparently designed to protect us from, whilst at the same time increasing our privacy and freedom of choice:

What is the Hub of all Things?


The Hub of All Things


Happy days.

347
@kalos:
...I want to model the processing of some cases, so I know the process time of each case and the number of employees, so I can find the end date. ...
Off the top of my head...hope it makes sense and helps or is somehow useful:

Suggestion #1 - Project Plan:
If you are wanting to treat this as a time-and-resource dependent process plan, then a good project management tool (e.g., MS Project) using Gantt or Network/PERT diagramming might be the most useful. It will help you plan it out over a projected calendar period, to a planned/estimated $Cost and with planned/estimated resource utilisation (and output). Any changes to those factors (time, $Cost, resources) can be adjusted for in the plan, as reality may (it usually does) necessitate from time to time as the plan is executed.

Suggestion #2 - Process Model:
If you wanted to model the process steps for each of several case types, then, from experience, a functional process modelling tool using the *IDEF0/3  **FIPS would probably be the most useful - i.e., one that has DFD (Data Flow Diagramming) and ABC (Activity-Based Costing) built-in.
NB:
*   IDEF0/3 - Integration Definition [for Function Modelling] /[for DFD].
** FIPS - Federal Information Processing Standards.
Avoid using BPMN (Business Process Modelling Notation) modelling tools unless all you need is a diagramming tool (i.e., not a FIPS candidate).
An IDEF0 model shows the process ICOMs:
  • Inputs: to each process step.
  • Controls - e.g., including SOPs (Standard Operating Procedures), Rules/Regulations, applicable to each process step.
  • Outputs from each process step.
  • Mechanisms: Physical systems and human resources used in the operation of each process step.

Modelling with this would be more about process analysis and/or re-engineering and would only be relevant/useful where your processes were already at *CMM Level 3 or higher - i.e., stable/consistent (not in a dynamic state of change), well-defined and documented and with defined process owners. Such processes would be well-understood and generally more or less in statistical control and thus have relatively predictable performance. Thus each case type will have typical process step performance characteristics (step-time/duration) in computed best/middle/worst case scenarios.
NB: *CMM - Capability Maturity Model.

Using such a modelling tool on CMM Level 3 (or above) processes, you will be able to model the processes to establish overall performance (e.g., including output results and throughput times) and $Costs. To do this, you will need to have established (from sampling and observation) average times for each process step and allocated a notional $Cost for each process step. The model will thus be able to tell you the incidental and accumulated process duration and the incidental and accumulated process $Cost at any point along the process, right up to the end-point.

NB: Use of spreadsheets: You could do most of the number-crunching aspects of this in a spreadsheet, if you did not have an appropriate modelling tool. The use of pivot tables could speed things up and a proficient Excel user could also produce static model diagrams in Excel, alongside the numbers (which could be useful).
You could also easily add Gantt-chart calculation/function to a spreadsheet model.
___________________________________

348
Finished Programs / Re: DONE: Tally folder contents by file date
« on: September 24, 2018, 07:14 AM »
From here: Powershell version ...
Ohh...nice find.   :Thmbsup:

349
Another potentially helpful privacy sanitisation list from abine.com (too long to post here, so just the link): 8 Steps to Secure Your Facebook Privacy Settings

350
A salutary tale with a recommended privacy sanitisation list, from Samizdata.net:
(Copied below.)
The Shadow Education Secretary wants to make teachers more vulnerable
tags: Civil liberty & Regulation, Education & Academia, Internet, Privacy & Panopticon, UK affairs
Natalie Solent (Essex) - September 23rd, 2018

The Shadow Education Secretary, Angela Rayner MP (Lab), has called for a ban on anonymous online accounts.

The education spokesperson also called for social media companies to ban anonymous accounts, complaining at a fringe event organised by the Guardian in Liverpool that most of the people that abused her online did so without using their real names.

Rayner said that social media firms should take greater responsibility for their users and complained in particular that Facebook seemed to have indicated that politicians should accept a higher level of abuse.

When asked what she thought about social media, Rayner said: “One of the first things they should do is stop anonymous accounts. Most people who send me abuse me do so from anonymous accounts and wouldn’t dream of doing it in their own name.”

Rayner conceded that using real names would not stop abuse but “it would certainly help a little bit. I think they should do more, they do have a responsibility for online”.
___________________________________

As I mentioned earlier, Angela Rayner is the Shadow Education Secretary. That ought to mean that she is aware that teachers, like MPs, are often subject to harassment. The Times Educational Supplement had an article on that very subject just a few days ago: “Why your social account is not as private as you think”. It began:

The teacher’s Facebook account was set to private. She was certain of that. Yet, in the past week, she had received four friend requests from former pupils. She could not work out how they had found her.

So, as I am a researcher at the Greater Manchester Police – and her friend – she asked me to take a look. Within 10 minutes, I had not just found her, but I also had her full name, her partner’s name, the school she worked at, the name of one of her children and multiple images of the street she lives on.
___________________________________

The writer, Chris Glover, proceeded to give ten tips that teachers should employ to protect themselves:
  • 1. Keep accounts separate.
  • 2. Vary usernames.
  • 3. Check posts about you.
  • 4. Beware of public posts.
  • 5. Review privacy settings.\
  • 6. Don’t follow your school account.
  • 7. Avoid using your real name.
  • 8. Change the friends-list setting.
  • 9. Switch off location.
  • 10. Delete dormant accounts.

Following the above advice should help ensure that teachers can enjoy participating in life online while minimising the very real risk of being tracked down by former or current pupils bearing a grudge, or simply by people whom it is best to keep at arms length for professional or safeguarding reasons.

Until a Labour government gets in and makes Nos. (2) and (7) illegal outright, and demands that all of your personal details are held in one place by a social media company so as to be conveniently available for hackers and identity thieves.

The context here (for the benefit of non-British readers) is that the UK currently has a Conservative-led government, so the Labour party is the party "in opposition", as it were, and has "shadow ministers" for each of the main ministerial departments, of which Education is one.
There are 2 rather depressing things about this:
  • 1. Rayner - who is in the important role of Shadow Education Secretary  - would need to know about current issues in Education and would be expected to have her fingers on the Education pulse, as it were, yet she was apparently recommending a ban on anonymous online accounts, and she would have presumably been stating that as a Labour policy approach.

  • 2. However, despite being Shadow Education Secretary, Rayner seemed to have been unaware of the article in The Times Educational Supplement on this rather important matter, published a few days prior. This looks to be a classic clueless and foot-in-mouth response by the Shadow Education Secretary and it could have adverse consequences - e.g., tend to make floating voters (and possibly others) think twice before voting Labour in the next general election.

Though it is rather telling - and Labour voters could be forgiven for weeping or doing a face-palm over this, just as the other voters could be forgiven for having a LOL moment - if we look on the bright side, then the article  in The Times Educational Supplement gave us 10 very good points for improving privacy. These are points that we could extract and all follow to our advantage - i.e., not just teachers - and if Rayner had not made the gaff that she did, then we might never have heard of the 10 points and they would have remained buried in the article in The Times Educational Supplement.

Pages: prev1 ... 65 66 67 68 69 [70] 71 72 73 74 75 ... 1318next
Go to full version