SlideShare une entreprise Scribd logo
1  sur  12
 As O. Safi, an Islamic scholar at Duke University
mentions in his OnBeing blog , in many Muslim
cultures, when you want to ask them how they’re
doing, you ask: in Arabic, Kayf haal-ik? or, in Persian,
Haal-e shomaa chetoreh? How is your haal? This
refers to the transient state of one’s heart. In reality,
we ask, “How is your heart doing at this very
moment, at this breath?” This questions encourages
one to both examine one’s own heart and explore
one’s own soul in order to get involved in a
conversation, one filled with grace and presence.
 This simple question may also require a reflection of
many of our lifestyles and our busy-ness — that even
our means of relaxation is itself a reflection of that
same world of overstimulation. Our relaxation often
takes the form of action-filled (yet mindless) films
and fast-paced sports. We are losing the ability to
live a truly human life.
 We need a different relationship to work, to
technology. We know what we want: a meaningful
life, a sense of community, a balanced existence. It’s
not just about “leaning in” or faster iPhones. We
want to be truly human.
 W. B. Yeats once wrote, “It takes more courage to
examine the dark corners of your own soul than it
does for a solider to fight on a battlefield.”
 As O. Safi asserts, individuals should insist on a type
of human-to-human connection where when one of
them responds by saying, “I am just so busy,”
another one can follow up by saying, “I know, love.
We all are. But I want to know how your heart is
doing.”
 This reflection of the heart plays a crucial role when
it comes to the professions about technology. Often
times, there is a sense of feeling sorry when the
latest news about data compromise, hacks, or
identity theft are published. Society rightly looks
down on such behavior, especially if the victims are
everyday people.
 As in, property damage and theft are wrong, such
acts include learning how to break into different
types of computer systems to seek information or
modify a system’s behavior, typically for reasons
advantageous to the hacker. Anyone that is
involved with technology knows this path exists.
Luckily, most of individuals are taught to respect
others’ property, even if that property is digital.
Furthermore, this activity undermines the rule of law
and the ability of people to freely create wealth.
 Computer programming is an important craft. It’s simple
to learn a little programming, but as one advances in skill
the tasks become easier to perform. Whether it is
building a website, desktop computer application, or a
small game, many people obtain enjoyment out of
building unique and useful tools and products. However,
the same skills can be used to make an application that
tricks people, steals their information or prevents their
computer from functioning properly. Individuals who
make these keyloggers, trojans and worms typically do so
out of greed or hate.
 People break into computer networks or systems
with malicious intent are called black hat hackers in
comparison to white hat hackers who break into
computer networks and systems too, but instead of
taking advantage of the system’s weakness, they
notify the owner of the system about the
vulnerability so they may fix the problem. Computer
security is a classic case of good versus evil. Some
people might even call it one of those moral issues
that are clearly black and white.
 Most white hats start out as black hats since learning
the craft requires knowledge of breaking into
systems. White hats make a legitimate living
through consulting and by working in organizations
to ensure systems are secure. They (hopefully) have
a strong sense of right, especially if they start out as
a white hat.
 System owners are stewards of activity and
information they manage. They have the same
access that hackers have to information stored in
computers they work with. Their job is to protect
that information as well as ensuring its proper use
within the system.
 Black hats and hackers abuse gaps in security for
their own amusement, personal reasons and
notoriety. They lack basic concepts of morality and
are especially void of respect for any IT professional
or individuals on the receiving end of their attack.

Contenu connexe

Similaire à Programming by Heart

Itethic Reader V.1.1
Itethic Reader V.1.1Itethic Reader V.1.1
Itethic Reader V.1.1Paul Ward
 
Itethic Reader V.1.1
Itethic Reader V.1.1Itethic Reader V.1.1
Itethic Reader V.1.1Paul Ward
 
Media and representation in rec
Media and representation in recMedia and representation in rec
Media and representation in recMary Kearney
 
KS2 Writing Instructions Springboard Stories
KS2 Writing Instructions  Springboard StoriesKS2 Writing Instructions  Springboard Stories
KS2 Writing Instructions Springboard StoriesJulie Pate
 
Prophet Muhammad Saw Essay In Urdu. Online assignment writing service.
Prophet Muhammad Saw Essay In Urdu. Online assignment writing service.Prophet Muhammad Saw Essay In Urdu. Online assignment writing service.
Prophet Muhammad Saw Essay In Urdu. Online assignment writing service.Jill Swenson
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonMateus BahiaRicardo
 
120 9The Language of Internet MemesPat r i c k D
120 9The Language of Internet MemesPat r i c k  D120 9The Language of Internet MemesPat r i c k  D
120 9The Language of Internet MemesPat r i c k DCicelyBourqueju
 
120 9The Language of Internet MemesPat r i c k D
120 9The Language of Internet MemesPat r i c k  D120 9The Language of Internet MemesPat r i c k  D
120 9The Language of Internet MemesPat r i c k DBenitoSumpter862
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Self Assessment Essay Examples T. Online assignment writing service.
Self Assessment Essay Examples  T. Online assignment writing service.Self Assessment Essay Examples  T. Online assignment writing service.
Self Assessment Essay Examples T. Online assignment writing service.Beth Simner
 
Washington Square Essay Topics. Online assignment writing service.
Washington Square Essay Topics. Online assignment writing service.Washington Square Essay Topics. Online assignment writing service.
Washington Square Essay Topics. Online assignment writing service.Samantha Hall
 
Mini Lesson - Writing Introduction To Argumentative Essay - YouTube
Mini Lesson - Writing Introduction To Argumentative Essay - YouTubeMini Lesson - Writing Introduction To Argumentative Essay - YouTube
Mini Lesson - Writing Introduction To Argumentative Essay - YouTubeHannah Carpenter
 
Ol Essays. Online assignment writing service.
Ol Essays. Online assignment writing service.Ol Essays. Online assignment writing service.
Ol Essays. Online assignment writing service.Michelle Franks
 
Printable Blank Paper. Online assignment writing service.
Printable Blank Paper. Online assignment writing service.Printable Blank Paper. Online assignment writing service.
Printable Blank Paper. Online assignment writing service.Kathy Miller
 
7 Steps To Writing A Winning Scholarship Essay - Globa
7 Steps To Writing A Winning Scholarship Essay - Globa7 Steps To Writing A Winning Scholarship Essay - Globa
7 Steps To Writing A Winning Scholarship Essay - GlobaNicolle Dammann
 

Similaire à Programming by Heart (15)

Itethic Reader V.1.1
Itethic Reader V.1.1Itethic Reader V.1.1
Itethic Reader V.1.1
 
Itethic Reader V.1.1
Itethic Reader V.1.1Itethic Reader V.1.1
Itethic Reader V.1.1
 
Media and representation in rec
Media and representation in recMedia and representation in rec
Media and representation in rec
 
KS2 Writing Instructions Springboard Stories
KS2 Writing Instructions  Springboard StoriesKS2 Writing Instructions  Springboard Stories
KS2 Writing Instructions Springboard Stories
 
Prophet Muhammad Saw Essay In Urdu. Online assignment writing service.
Prophet Muhammad Saw Essay In Urdu. Online assignment writing service.Prophet Muhammad Saw Essay In Urdu. Online assignment writing service.
Prophet Muhammad Saw Essay In Urdu. Online assignment writing service.
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of non
 
120 9The Language of Internet MemesPat r i c k D
120 9The Language of Internet MemesPat r i c k  D120 9The Language of Internet MemesPat r i c k  D
120 9The Language of Internet MemesPat r i c k D
 
120 9The Language of Internet MemesPat r i c k D
120 9The Language of Internet MemesPat r i c k  D120 9The Language of Internet MemesPat r i c k  D
120 9The Language of Internet MemesPat r i c k D
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Self Assessment Essay Examples T. Online assignment writing service.
Self Assessment Essay Examples  T. Online assignment writing service.Self Assessment Essay Examples  T. Online assignment writing service.
Self Assessment Essay Examples T. Online assignment writing service.
 
Washington Square Essay Topics. Online assignment writing service.
Washington Square Essay Topics. Online assignment writing service.Washington Square Essay Topics. Online assignment writing service.
Washington Square Essay Topics. Online assignment writing service.
 
Mini Lesson - Writing Introduction To Argumentative Essay - YouTube
Mini Lesson - Writing Introduction To Argumentative Essay - YouTubeMini Lesson - Writing Introduction To Argumentative Essay - YouTube
Mini Lesson - Writing Introduction To Argumentative Essay - YouTube
 
Ol Essays. Online assignment writing service.
Ol Essays. Online assignment writing service.Ol Essays. Online assignment writing service.
Ol Essays. Online assignment writing service.
 
Printable Blank Paper. Online assignment writing service.
Printable Blank Paper. Online assignment writing service.Printable Blank Paper. Online assignment writing service.
Printable Blank Paper. Online assignment writing service.
 
7 Steps To Writing A Winning Scholarship Essay - Globa
7 Steps To Writing A Winning Scholarship Essay - Globa7 Steps To Writing A Winning Scholarship Essay - Globa
7 Steps To Writing A Winning Scholarship Essay - Globa
 

Plus de The Wisdom Daily

Digital Transformation: Best Practices
Digital Transformation: Best PracticesDigital Transformation: Best Practices
Digital Transformation: Best PracticesThe Wisdom Daily
 
How to Design for User Trust?
How to Design for User Trust?How to Design for User Trust?
How to Design for User Trust?The Wisdom Daily
 
Building Trust in the Cyberspace
Building Trust in the CyberspaceBuilding Trust in the Cyberspace
Building Trust in the CyberspaceThe Wisdom Daily
 
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep LearningSecurity and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep LearningThe Wisdom Daily
 
Understanding Intelligence: Ml vs. AI
Understanding Intelligence: Ml vs. AIUnderstanding Intelligence: Ml vs. AI
Understanding Intelligence: Ml vs. AIThe Wisdom Daily
 
Mobile Best Practices for UX
Mobile Best Practices for UXMobile Best Practices for UX
Mobile Best Practices for UXThe Wisdom Daily
 
Principles of UX Engineering
Principles of UX EngineeringPrinciples of UX Engineering
Principles of UX EngineeringThe Wisdom Daily
 
How to Conquer the Field of UX?
How to Conquer the Field of UX?How to Conquer the Field of UX?
How to Conquer the Field of UX?The Wisdom Daily
 
The How, Why and What of Metrics?
The How, Why and What of Metrics?The How, Why and What of Metrics?
The How, Why and What of Metrics?The Wisdom Daily
 
How to Make Your Ideas Stick for UX?
How to Make Your Ideas Stick for UX?How to Make Your Ideas Stick for UX?
How to Make Your Ideas Stick for UX?The Wisdom Daily
 
How to Design in a Multiscreen World ?
How to Design in a Multiscreen World ?How to Design in a Multiscreen World ?
How to Design in a Multiscreen World ?The Wisdom Daily
 
Deep learning & Humanity's Grand Challenges
Deep learning & Humanity's Grand ChallengesDeep learning & Humanity's Grand Challenges
Deep learning & Humanity's Grand ChallengesThe Wisdom Daily
 

Plus de The Wisdom Daily (20)

Engineering UX
Engineering UXEngineering UX
Engineering UX
 
How to Scale for IoT?
How to Scale for IoT?How to Scale for IoT?
How to Scale for IoT?
 
Digital Transformation: Best Practices
Digital Transformation: Best PracticesDigital Transformation: Best Practices
Digital Transformation: Best Practices
 
How to Design for User Trust?
How to Design for User Trust?How to Design for User Trust?
How to Design for User Trust?
 
Building Trust in the Cyberspace
Building Trust in the CyberspaceBuilding Trust in the Cyberspace
Building Trust in the Cyberspace
 
How to Get Started in ML?
How to Get Started in ML?How to Get Started in ML?
How to Get Started in ML?
 
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep LearningSecurity and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep Learning
 
Understanding Intelligence: Ml vs. AI
Understanding Intelligence: Ml vs. AIUnderstanding Intelligence: Ml vs. AI
Understanding Intelligence: Ml vs. AI
 
Comp science
Comp scienceComp science
Comp science
 
Fundamentals of Big Data
Fundamentals of Big DataFundamentals of Big Data
Fundamentals of Big Data
 
Mobile Best Practices for UX
Mobile Best Practices for UXMobile Best Practices for UX
Mobile Best Practices for UX
 
UX for Product Excellence
UX for Product ExcellenceUX for Product Excellence
UX for Product Excellence
 
Principles of UX Engineering
Principles of UX EngineeringPrinciples of UX Engineering
Principles of UX Engineering
 
How to Conquer the Field of UX?
How to Conquer the Field of UX?How to Conquer the Field of UX?
How to Conquer the Field of UX?
 
The How, Why and What of Metrics?
The How, Why and What of Metrics?The How, Why and What of Metrics?
The How, Why and What of Metrics?
 
How to Make Your Ideas Stick for UX?
How to Make Your Ideas Stick for UX?How to Make Your Ideas Stick for UX?
How to Make Your Ideas Stick for UX?
 
Fundamentals of UX Design
Fundamentals of UX DesignFundamentals of UX Design
Fundamentals of UX Design
 
Basics of UX Research
Basics of UX ResearchBasics of UX Research
Basics of UX Research
 
How to Design in a Multiscreen World ?
How to Design in a Multiscreen World ?How to Design in a Multiscreen World ?
How to Design in a Multiscreen World ?
 
Deep learning & Humanity's Grand Challenges
Deep learning & Humanity's Grand ChallengesDeep learning & Humanity's Grand Challenges
Deep learning & Humanity's Grand Challenges
 

Dernier

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Programming by Heart

  • 1.
  • 2.  As O. Safi, an Islamic scholar at Duke University mentions in his OnBeing blog , in many Muslim cultures, when you want to ask them how they’re doing, you ask: in Arabic, Kayf haal-ik? or, in Persian, Haal-e shomaa chetoreh? How is your haal? This refers to the transient state of one’s heart. In reality, we ask, “How is your heart doing at this very moment, at this breath?” This questions encourages one to both examine one’s own heart and explore one’s own soul in order to get involved in a conversation, one filled with grace and presence.
  • 3.  This simple question may also require a reflection of many of our lifestyles and our busy-ness — that even our means of relaxation is itself a reflection of that same world of overstimulation. Our relaxation often takes the form of action-filled (yet mindless) films and fast-paced sports. We are losing the ability to live a truly human life.
  • 4.  We need a different relationship to work, to technology. We know what we want: a meaningful life, a sense of community, a balanced existence. It’s not just about “leaning in” or faster iPhones. We want to be truly human.  W. B. Yeats once wrote, “It takes more courage to examine the dark corners of your own soul than it does for a solider to fight on a battlefield.”
  • 5.  As O. Safi asserts, individuals should insist on a type of human-to-human connection where when one of them responds by saying, “I am just so busy,” another one can follow up by saying, “I know, love. We all are. But I want to know how your heart is doing.”
  • 6.  This reflection of the heart plays a crucial role when it comes to the professions about technology. Often times, there is a sense of feeling sorry when the latest news about data compromise, hacks, or identity theft are published. Society rightly looks down on such behavior, especially if the victims are everyday people.
  • 7.  As in, property damage and theft are wrong, such acts include learning how to break into different types of computer systems to seek information or modify a system’s behavior, typically for reasons advantageous to the hacker. Anyone that is involved with technology knows this path exists. Luckily, most of individuals are taught to respect others’ property, even if that property is digital. Furthermore, this activity undermines the rule of law and the ability of people to freely create wealth.
  • 8.  Computer programming is an important craft. It’s simple to learn a little programming, but as one advances in skill the tasks become easier to perform. Whether it is building a website, desktop computer application, or a small game, many people obtain enjoyment out of building unique and useful tools and products. However, the same skills can be used to make an application that tricks people, steals their information or prevents their computer from functioning properly. Individuals who make these keyloggers, trojans and worms typically do so out of greed or hate.
  • 9.  People break into computer networks or systems with malicious intent are called black hat hackers in comparison to white hat hackers who break into computer networks and systems too, but instead of taking advantage of the system’s weakness, they notify the owner of the system about the vulnerability so they may fix the problem. Computer security is a classic case of good versus evil. Some people might even call it one of those moral issues that are clearly black and white.
  • 10.  Most white hats start out as black hats since learning the craft requires knowledge of breaking into systems. White hats make a legitimate living through consulting and by working in organizations to ensure systems are secure. They (hopefully) have a strong sense of right, especially if they start out as a white hat.
  • 11.  System owners are stewards of activity and information they manage. They have the same access that hackers have to information stored in computers they work with. Their job is to protect that information as well as ensuring its proper use within the system.
  • 12.  Black hats and hackers abuse gaps in security for their own amusement, personal reasons and notoriety. They lack basic concepts of morality and are especially void of respect for any IT professional or individuals on the receiving end of their attack.