Vector Search -An Introduction in Oracle Database 23ai.pptx
Programming by Heart
1.
2. As O. Safi, an Islamic scholar at Duke University
mentions in his OnBeing blog , in many Muslim
cultures, when you want to ask them how they’re
doing, you ask: in Arabic, Kayf haal-ik? or, in Persian,
Haal-e shomaa chetoreh? How is your haal? This
refers to the transient state of one’s heart. In reality,
we ask, “How is your heart doing at this very
moment, at this breath?” This questions encourages
one to both examine one’s own heart and explore
one’s own soul in order to get involved in a
conversation, one filled with grace and presence.
3. This simple question may also require a reflection of
many of our lifestyles and our busy-ness — that even
our means of relaxation is itself a reflection of that
same world of overstimulation. Our relaxation often
takes the form of action-filled (yet mindless) films
and fast-paced sports. We are losing the ability to
live a truly human life.
4. We need a different relationship to work, to
technology. We know what we want: a meaningful
life, a sense of community, a balanced existence. It’s
not just about “leaning in” or faster iPhones. We
want to be truly human.
W. B. Yeats once wrote, “It takes more courage to
examine the dark corners of your own soul than it
does for a solider to fight on a battlefield.”
5. As O. Safi asserts, individuals should insist on a type
of human-to-human connection where when one of
them responds by saying, “I am just so busy,”
another one can follow up by saying, “I know, love.
We all are. But I want to know how your heart is
doing.”
6. This reflection of the heart plays a crucial role when
it comes to the professions about technology. Often
times, there is a sense of feeling sorry when the
latest news about data compromise, hacks, or
identity theft are published. Society rightly looks
down on such behavior, especially if the victims are
everyday people.
7. As in, property damage and theft are wrong, such
acts include learning how to break into different
types of computer systems to seek information or
modify a system’s behavior, typically for reasons
advantageous to the hacker. Anyone that is
involved with technology knows this path exists.
Luckily, most of individuals are taught to respect
others’ property, even if that property is digital.
Furthermore, this activity undermines the rule of law
and the ability of people to freely create wealth.
8. Computer programming is an important craft. It’s simple
to learn a little programming, but as one advances in skill
the tasks become easier to perform. Whether it is
building a website, desktop computer application, or a
small game, many people obtain enjoyment out of
building unique and useful tools and products. However,
the same skills can be used to make an application that
tricks people, steals their information or prevents their
computer from functioning properly. Individuals who
make these keyloggers, trojans and worms typically do so
out of greed or hate.
9. People break into computer networks or systems
with malicious intent are called black hat hackers in
comparison to white hat hackers who break into
computer networks and systems too, but instead of
taking advantage of the system’s weakness, they
notify the owner of the system about the
vulnerability so they may fix the problem. Computer
security is a classic case of good versus evil. Some
people might even call it one of those moral issues
that are clearly black and white.
10. Most white hats start out as black hats since learning
the craft requires knowledge of breaking into
systems. White hats make a legitimate living
through consulting and by working in organizations
to ensure systems are secure. They (hopefully) have
a strong sense of right, especially if they start out as
a white hat.
11. System owners are stewards of activity and
information they manage. They have the same
access that hackers have to information stored in
computers they work with. Their job is to protect
that information as well as ensuring its proper use
within the system.
12. Black hats and hackers abuse gaps in security for
their own amusement, personal reasons and
notoriety. They lack basic concepts of morality and
are especially void of respect for any IT professional
or individuals on the receiving end of their attack.