Posts

Showing posts from December, 2023

Academic Analysis: Exploring the Future of AI Through Academic Papers and Current Articles

The published paper AI and the Future of Operating Systems describes “the key advancements in technology that define a next-generation OS as Contextual cards and disappearing apps, Extensible semantic framework, User modeling, and Artificial Intelligence grammar” (2016). Published papers often take many years to publish in an academic, peer-reviewed setting. While many of these advancements were explored in modern operating systems, AI advancements in operating systems continue to evolve at a growing rate. For example, a current article The AI Future of Windows is here discusses how the Windows 11 operating system integrates numerous AI features that help users gain a productivity boost in day-to-day tasks through an operating system bot: “Windows Copilot operates similarly to Bing Chat, allowing users to perform Operating System tasks, such as changing Windows to dark mode, rearranging windows with Snap, or asking the Spotify app to play music by placing the requests for the user”(H...

CompTIA Cybersecurity Analyst Exam: Demonstrating Entry-level Security Knowledge to Potential Employers Through Certification

Certifications allow IT professionals to demonstrate their skills to potential employers. Comptia.org reveals that organizations like the Department of Defense, the United States Navy, John Hopkins, AWS, and VISA contributed to the development of the CompTIA Cybersecurity Analyst (CySA+)  exam. By listing certifications on a job resume, potential employers gain insight into a security professional’s skill level. Comptia.org lists four skills demonstrated in the CompTIA Cybersecurity Analyst (CySA+) exam: Security Operations, Vulnerability Management, Incident Response and Management, and Reporting and Communication. This course allows students to prepare for the Reporting and Communication CompTIA Cybersecurity Analyst (CySA+) exam by familiarizing students with these concepts with high level overviews of the concepts. Careers in cybersecurity and related technology fields can benefit from CySA+ due to a developed common vernacular for professionals to communicate concepts. CySA+ a...

Prioritizing Ethical Integrity: Balancing Data Privacy, Non-Intrusive Monitoring, and Responsible Vendor Integration in Contemporary Operating Systems

Ethical considerations for safeguarding user privacy have become a hot topic due to the harmful effects of data breaches and the recent increase in data privacy laws across the globe. While data collection and analysis undeniably provide a vital resource in empowering operating systems to optimize system performance and improve the user experience, operating systems must intentionally approach data collection and monitoring with ethical integrity. Because of the harmful risks associated with data breaches, unauthorized access, and fraud, user monitoring should minimize data collection to only what is necessary. Operating systems should inform users of the information collected, and users should retain the right to opt out of monitoring.  These ethical considerations perpetuate far-reaching implications that impact user privacy, influence technology choice, and foster equitable competition. Modern data privacy discussions highlight a need to allow users to safeguard their sensitive ...

Enhancing Enterprise Network Monitoring: The Power of Splunk and Centralized Data Analysis

Organizations often benefit from higher-level visibility and analysis of enterprise networks for compliance monitoring, setting goals for improving network performance and managing security. Splunk provides a centralized approach to collecting logs and data from an enterprise network with helpful, customizable dashboards that empower security professionals to quickly present and review network visibility to stakeholders and non-security professionals. By adopting a centralized approach when addressing large volumes of enterprise data, security professionals can effectively monitor routers, switches, firewalls, servers, and applications easily in one location to identify patterns and address unexpected behavior in network devices, logs, and events. Because Splunk offers centralized analysis, users can perform real-time monitoring that allows them to identify and address issues as they happen as opposed to later when the logs are reviewed separately. This centralized management empowers ...