Sunday, November 28, 2021

Big Mistakes

Big Mistakes 

Imagine getting preached at an already difficult time in your life. Now what if you didn’t get hacked, but your bank or hospital, and you need them now! These are the deadly repercussions of unsecure networks from a customer’s perspective.

Company was hacked and audits stops everything for weeks, payment dates are missed,  and patients die. Sounds brutal, but this is the machine we live in. Responsible users suffered an insult on their life's endeavor, if they miss some important due dates. If a bank stops for weeks in an audit, people could lose other equity. It is not just bad customer service, but unsympathetic not to use judgement calls. People sold their time for money to do as they wished with it, the bank takes advantage of our time and money for the sake of a glitch or a hacker. Customer’s loved ones will also suffer unnecessary delays. Their children earned good grades by being punctual with assignments, but they are punished when others were less mature as them. So those customer’s children can’t pay for college in time, even though the customer has the money. Patient went through an avoidable human suffering in the form of a glitch. The glitch may seem simply inconvenient, but so is shouting “bomb!” in public. If the bank up-held its end with other people’s money, then that could save them years of heartache. Hospitals should break protocols, but that is probably the main mistake the software engineer made; protocol. Assuming consequences are not so long lasting.

The problem with customers trusting companies with user info, health, and money can crumble in the result of a failure to perform an action by the software engineers. Because an engineer saves some of their time in their project. Many people are held back a lot of their own time. Imagining that protocol is implemented for the engineer to conduct a quality assurance (QA) on software. This practice would be much like how the food industries all these safety procedures prevent food harm. Perhaps if engineers contracted a third-party bug hunter, or pen-testing. Making a point and finding constructive feedback to learn from mistakes. This reminds of modern problems like the branches of the US government running on old cobol computers that use magnetic film for memory. Programmers need to consider the possibility of error, and if they are using the best language and methods for the task. These are important matters and dramatic outcomes.

There is no silver bullet. Taking into account how best to live in terms of software engineer discipline, the alternatives scenarios are more time consuming and expensive. The scenarios of using a QA protocol can involve an ethical failure of the engineer(s) responsible. These safety practices do protect us in the food industry, but all ceremonies lose their importance overtime. The scenarios of using a 3rd party bug hunter can also involve an ethical failure. This idea has its downfalls because the engineers are usually paying someone whom  they have to pay additionally for each mistake the 3rd party finds. This turns ethical engineering into difficult or crafty engineering, finding ways to cover up problems. The end of the day, designers’ have products like automated cars, which can’t just accomplish fairly safe driving.

Friday, November 26, 2021

Let’s talk Karen

 Data is harvested and sold. We are all aware of it, but the roots of selling has been buried under technology, psychology, and undefined legal law. Imagine your life being ruined by an app other than just a social network, this will be elaborate. The people know now how much more toxic smart phones are over TV. Let’s talk Karen. Think people! the solution is simply a more comprehensive user agreement.

Two ways users could potentially be harmed by apps profiling; manipulated, and misled. The ad full apps will mislead a man and redirect his merchandising. People download software to make life more easy and have more time, but at the cost of their data and ads. Often sellers will push a more expensive substitute to a product, I know people with disposable income could be led to a product not on his original list and brought places they at first needed not to go in the first place. This event is the app not fulfilling customer’s goals, but the developer’s alternative purpose. Thus, users is back to a stressful life, but with more consumerism than before. Presuming that a user’s data is not compromised, their data could still be sold to any buyer. Reminding me of Cambridge Analytica, this info can be used to manipulate Karen’s opinion in anything. Strategic nudging in social media can result in Karen’s being galvanized and even hating other people. That would be the action of a third party, Karen could never have agreed to it. The data mining can also dilute the outliers. Per-say Britta is a unique Lawyer, but some software mistakenly categorized her with creepy porn male lawyers. Now, she is bombarded with distasteful advertisements until it changes her, as opposed to Karen changing her demographics for the better.

The developer must always understand how expensive and valued user information is. Designers being flippant with user privacy could lead to a breach, or simply an object of abuse. Developers are not held accountable for things outside of customer service. When in fact people can enjoy the software but it’s duplicity feeds the beast. Designers shouldn’t just have a generic “do you agree to these terms and standards?”, which no one reads, and use heavy legal or networking jorgen anyways. This has buried the root traditional marketing, which wasn’t that transparent to begin with, and uses almost propaganda level persuasion.

Software firms are increasingly transparent and getting customers' consent with their information as a way to earn the customer’s trust for more transactions. Thankfully, clients have the ability to request user information. Designers need to allow requests of customer’s own information, and even track down where it was sold. Engineering with as little needed information as possible.