Saturday, December 8, 2018

Tabula Roa Systems Post Of 12/8/2018 IT incident management







Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















From whatis.com
IT incident management
IT incident management is an area of IT service management (ITSM) in which the information technology team seeks to return a software application or network service to normal operations as quickly as possible after an unexpected event.
A pro-active IT incident management strategy helps keep an organization prepared for unexpected hardware, software and security failings and reduces the duration and severity of disruption from such events. Help desk and incident management teams rely on a mix of tools to resolve incidents, including monitoring tools to gather operations data for root cause analysis.

Most organizations use a support system, such as a ticketing system, for categorizing, prioritizing and documenting follow-up. Strategies for incident management may follow an established ITSM framework, such as IT infrastructure library (ITIL) or be based on a combination of guidelines and best practices established over time.

ITIL incident management uses this workflow for efficient resolution: incident identification, logging, categorization, prioritization, response, diagnosis, escalation, resolution and recovery, and then closure. An incident manager enforces the proper incident response and management processes across the IT support and service delivery team or teams. The incident manager is also likely to act as a communication bridge between end users and technical specialists during disruptions.

Support Levels
IT incident management is normally separated into three levels of support. Level-one support typically provides basic-level support or assistance, such as password resets or computer troubleshooting. Level-one support involves incident identification, logging, prioritization and categorization, deciding to escalate to level-two support and incident resolution when appropriate.
Level-two support goes through a similar workflow but is for more complex issues that need more skill or security access to complete. Major incidents are level-three support. This category includes incidents that might disrupt a business's operation and require an immediate response.

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Wednesday, December 5, 2018

AI Code Of Ethics & Today is World Soil Day - Healthy Soil For The Future Of Our Planet!


Today is World Soil Day - Healthy Soil For The Future Of Our Planet!





Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















From whatis.com
AI code of ethics
An AI code of ethics, also called an AI value platform, is a policy statement that formally defines the role of artificial intelligence as it applies to the continued development of the human race. The purpose of an AI code of ethics is to provide stakeholders with guidance when faced with an ethical decision regarding the use of artificial intelligence.
Isaac Asimov, the science fiction writer, foresaw the potential dangers of autonomous AI agents long before their development and created The Three Laws of Robotics as a means of limiting those risks. In Asimov's code of ethics, the first law forbids robots from actively harming humans or allowing harm to come to humans by refusing to act. The second law orders robots to obey humans, unless the orders are not in accordance with the first law. The third law orders robots to protect themselves, insofar as doing so is in accordance with the first two laws.
Although developers are still in the early stages of AI adoption, it's important for enterprises to take ethical and responsible approaches when creating AI systems. To that end, a non-profit institute founded by MIT cosmologist Max Tegmark, Skype co-founder Jaan Tallinn and DeepMind research scientist Viktoriya Krakovnahas -- worked with AI researchers and developers to establish a set of guiding principles which are now referred to as the Asilomar AI Principles. This AI code of ethics mandates that:

The goal of AI research should be to create not undirected intelligence, but beneficial intelligence.
 
Investments in AI should be accompanied by funding for research on ensuring its beneficial use.

If an AI system causes harm, it should be possible to ascertain why.

Any involvement by an autonomous system in judicial decision-making should provide a satisfactory explanation auditable by a competent human authority.

There should be a constructive and healthy exchange between AI researchers and policy-makers.

A culture of cooperation, trust, and transparency should be fostered among researchers and developers of AI.
 
Teams developing AI systems should actively cooperate to avoid corner-cutting on safety standards.
 
AI systems should be safe and secure throughout their operational lifetime, and verifiably so where applicable and feasible.

Designers and builders of advanced AI systems are stakeholders in the moral implications of their use, misuse, and actions, with a responsibility and opportunity to shape those implications.

Highly autonomous AI systems should be designed so that their goals and behaviors can be assured to align with human values throughout their operation.

AI systems should be designed and operated so as to be compatible with ideals of human dignity, rights, freedoms, and cultural diversity.

People should have the right to access, manage and control the data they generate, given AI systems' power to analyze and utilize that data.

The application of AI to personal data must not unreasonably curtail people's real or perceived liberty.
 
AI technologies should benefit and empower as many people as possible.
 
The economic prosperity created by AI should be shared broadly, to benefit all of humanity.

Humans should choose how and whether to delegate decisions to AI systems, to accomplish human-chosen objectives.

The power conferred by control of highly advanced AI systems should respect and improve, rather than subvert, the social and civic processes on which the health of society depends.

Risks posed by AI systems, especially catastrophic or existential risks, must be subject to planning and mitigation efforts commensurate with their expected impact.

An arms race in lethal autonomous weapons should be avoided.

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Monday, December 3, 2018

Tabula Rosa System Security Bulletin - SB18-337: Vulnerability Summary for the Week of November 26, 2018











Buy the books at

 www.amazon.com/author/paulbabicki
====================================================
















National Cyber Awareness System:

12/03/2018 06:20 AM EST

Original release date: December 03, 2018
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.
The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
·        High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0
·        Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9
·        Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9
Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.
The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.