Tuesday, 10 December 2013

UNEMPLOYED and from INFORMATION TECHNOLOGY? Here! Here! Here!




If you want to get more certificates but you cannot afford those, perhaps you could try Udemy. Once in a while they offer some free courses and they all will give you a certificate.

There are also very cheap certificates (AU$ 20), such as the one we offer through their interface, which actually has got a very meaningful name, a name that causes a lot of impact: Advanced Tools for the Experienced Systems Analyst (https://www.udemy.com/u/marciarpinheiro/).

If you want to prove you know something without having a certificate, you can try some sites that specialize in that and provide you with a key that you can make available to others.

In this case, you can try Smarterer (it is free. The own questions and time for those, also technical side, IT, might be a problem, but you may be lucky and get a test that is worth it. The truth is that nobody will know of whatever problem you found there and the names plus what is offered look OK). They have tests for C++ and C#, for instance.

Their address is http://www.smarterer.com/.


This second option brings more technical questions. The same remarks apply. It is also free.

If you want to prove that you can enter data, say you are applying for a data entry position, and even if you want to practice or learn, you have at least two good options, and they are both free:





If you want a source of black and white symbols that you can change into colored through, for instance, Microsoft Word, so that you improve the looks of your website, for instance, you can try the following websites (all free):





If you want to acquire contacts in the metier and you do not have money or you do not know how to start, join LinkedIn (it is free too):


This is for you to do social networking and acquire contacts in any branch of IT. We are in this one too and you can find us through the e-mail

People like us may be officially out of the IT circuit but because they are always working with IT in their normal lives and in their jobs, are always involved with something that is dense and related, they will be at least a good connector for you, if nothing else (the book Tipping Point, which is a horrible book in our opinion, brings a set of names that seems to be quite useful here. We would classify ourselves as a maven, but at least sometimes we play the role of the connectors).

_____________________________________________________




Please help us keep on inspiring you by acquiring one of our online courses: 


A Few Really Refined Hints, IT 

_____________________________________________________

 



Thursday, 31 October 2013

Computers World x Brazilian Portuguese


This IT glossary is provided to you by the SPTIA (Syndicate of Professional Translators and Interpreters of Australia) as a courtesy. Please give back to this institution: You may, for instance, attend one of their courses (http://www.udemy.com/ethical-codes-for-translators-and-interpreters/ seems to be an excellent choice).


Original expression - English
Brazilian Portuguese – best match


Address bar
Barra de endereco (virtual)
Anti-virus
Mata-virus
Boot
Desligar e ligar
Browser
Navegador
Click on the link
Aperta no atalho
Connection
Conexao
Delete
Apagar
Desktop
Computador de mesa
Directory
Fichario (conjunto de pastas/set of folders)
E-mail
Carta eletronica
Enter
Inserir
E-post
Correio eletronico
Error message
Mensagem de erro
File
Arquivo
Filter
Filtro
Firewall
Muralha virtual (1)
Folder
Pasta (conjunto de arquivos/set of files)
Hardware
Pecas solidas (2)
Internet
Rede Mundial de Computadores (3)
Junk mail
Carta indesejada
Junk mail folder
Pasta de cartas indesejadas
Key in
Teclar
Keyboard
Teclado
Laptop
Computador de colo
Line filter
Filtro de linha
Link
Atalho (Virtual)
Liquid crystal
Cristal liquido
Login/username
Nome de usuario
Malware
Programas malvados
Modem
Modulador
Mouse
Ponteiro (4)
Notebook
Computador de notas
Online
Na Rede/Na Internet
Operational System
Sistema operacional
Package
Pacote
Password
Senha
Peer-to-peer
Entre-colegas
Peer-to-peer Network
Rede entre-colegas
Pin
Combinacao
Reset
Reiniciar (parametros, (5))
Restart
Reiniciar (computador)
Run a scan
Roda o escaneador
Scan
Escanear
Screen
Tela
Screen saver
Economizador de tela
Software
Pecas nao-solidas (virtuais) (6)
Spam
Oportunismo (7)
Trojan
Troiano (do tipo ‘cavalo de Troia’) (8)
Virus
Virus
Worm
Verme (virtual)

Remarks:
(1)    Firewall is a wall of fire, but that does not make sense in Brazilian Portuguese or it does not make more sense than saying ‘muralha’, which is like a ‘wall-type of thing’, huge one (‘muralha da China’, for instance. See http://www.dicionariodoaurelio.com/Muralha.html)
(2)    Hardware is formed from ‘hard’ and ‘ware’. We use ‘ware’ in English to mean, basically, ‘stuff’. Hardware, in the case of Computer Science, is used as the extreme opposite to software: One is soft, the other is hard. In terms of computers, it means solid parts of the computer, whilst software would point at the virtual parts, what cannot be touched by us.
(3)    The ethical organ for Translators and Interpreters in Brazil, SINTRA, suggested publicly, as I say in my course on ethics with Udemy, that we used this expression in place of Internet. This could be called ‘Brazilianism’, a trial to preserve the national language.
(4)    Mouse is a very tricky case. We are definitely used to mixing Portuguese with English when speaking Portuguese. We frequently say ‘mouse’, ‘Internet’, and ‘modem’. The purists, however, condemn this choice of action, therefore the ethical organ for Translation and Interpretation of Brazil also does (Rede Mundial). I am ‘with them’ on this one. We should try to make it all ‘sound Brazilian’ or make it all ‘sound like Brazilian Portuguese’, therefore we should force ourselves to say ‘ponteiro’, ‘Rede Mundial de Computadores’ or simply ‘Rede Mundial’, and ‘modulador’. A good reason not to say ‘ratinho’(little rat or mouse, the animal) is because that is repulsive in the Portuguese language (Brazil, culture) and naturally creates aversion for the computer accessory. 'Ponteiro' is because it is a pointer. When we say ‘click with the mouse there’, we must actually also say ‘aperta o ponteiro la’.
(5)    Reset is also a tricky case. We are definitely used to seeing people saying ‘resetar’ in Brazilian Portuguese. The word could have been included in the best dictionary for the Brazilian Portuguese ever, Aurelio, but it is not part of the dictionary yet (http://www.dicionariodoaurelio.com/). We do acknowledge that there was a modification of the word when it went from English to Brazilian Portuguese (informal language), so that the purists, as I myself must be, could be accepting this one.  The idea is setting the parameters again, that is, clearing all their contents and inserting new contents or the same contents, but deleting all the original contents first. This is something that is done in programming and, in Brazil, we have called this process ‘reiniciar parametros’, therefore ‘reiniciar’ sounds just right here.
(6)    One could wonder why ‘pecas nao-solidas’ instead of, for instance, ‘pecas macias’. This is because 'macia', which would be the Brazilian Portuguese equivalent to soft, points at ‘soft when we touch’, but what we mean here is virtual, therefore simply ‘non-solid’ or ‘nao-solidas’.
(7)    We call spam the unwanted postal items, like those we have never requested or accepted. In this case, it is the opportunism of those who send those items that has made that all possible, so why not call that ‘opportunism’? We notice that we see the term in sentences of the type ‘This is spam!’. All we mean, with this one, is 'this is opportunism'.
(8)    The term Trojan definitely relates to the expression ‘Trojan Horse’. We do have a Brazilian Portuguese term for that (troiano, see http://www.dicionariodoaurelio.com/Troiano.html).

Once more, we notice that context makes all difference in this world and, even in technical language (all we printed here), there is a huge difference 'in-between' senses that will appear at least sometimes in a proportional way to the difference 'in-between' contexts.
Notice, for instance, that hardware may be used in the sense 'useful gadgets/accessories', as in 'hardware store'. In the World of the Computers, however, it can only be 'solid parts'.
From here we see that Google Translate cannot really survive close scrutiny not even in terms of technical lingo.
Yesterday I tried ‘Quinta do Conde’, which is a place in Portugal. Google Translate returned Fifth Earl.
Quinta, however, in this sense, means Land, not Fifth.
In Brazilian Portuguese, we say ‘Estava nas quintas do inferno’ and we mean ‘I was in the lands that are part of hell’.
I am not yet convinced that we cannot automate technical translation ( I have discussed this topic in my article with Semiotica on automation of the Translation processes).
I am thinking that if we insert an option for context, then Google Translate will be able to give a good translation of ‘Quinta do Conde’. We could, for instance, have an option there to say it is a location.
Notice however that that means that ‘we are there’ and ‘we know it is a location’, therefore ‘we must be professional translators’ (!).


Sunday, 6 October 2013

X or Y cartridge? - We wish we could ask ourselves this sort of question... .

On the 2nd of October of 2013, we were after a certain cartridge for a certain printer for the second time. The printer is called HPDESKJET 930c, but the cartridges that we should buy for it are HP 45 and HP 78 (black and other colours). 

The questions that occurred to us, as we went through all the other brands of cartridges, were:

1) Why do they not have an Epson 45 cartridge? Is it possible that they do?
2) This 45 has to do with shape, right? Why so many shapes? 
3) Why do they have to have one cartridge for color and another for black? That makes it all be so expensive!


These cartridges should cost at most AU$ 20 each, not mattering whether they are black or color. If there were competition, as with all other items of consumption, and Epson, for instance, also produced a 45 cartridge, then we would be paying what they deserve, that is, at most AU$ 20 per each, so that we should have competition in that area.

We asked the seller and the seller had only one possible answer: You have to buy the number that they say is the number for your printer and only that number will be suitable. We only have one brand for that number, which is the brand of your printer.

Looking for information on the Internet helped with nothing, since the websites look as if they have been written by people on high heights, basically: We were wondering about the numbers, the title refers to the numbers, yet their writing refers to letters!

In a rational world, the number would mean shape and dimensions, like each different number would give us a different geometric shape for the cartridge, and a geometric shape that has precisely certain dimensions. In a rational world, all ink cartridges manufacturers would sell all numbers, so that we would have the so healthy (for the consumers) competition. In a rational world, the government would not let the printer manufacturer change the shape of the cartridge without presenting a scientific reason to do that, since that would imply problems for the consumers in terms of supply and the appearance of what could be seen as illicit profit for the manufacturers. 

We check on the company Epson, for instance, and Epson does not have a 45. 

We check on the company Canon, and Canon does not have a 45.

However, for our shock, all three companies have a 45 in what comes to printers… . 

Epson has got an Epson Stylus c45, for instance (https://www.epson.com.au/products/inkjet/c45.asp). The cartridge used with this one is called T038 (https://www.epson.com.au/products/inkjet/c45_specs.asp) however and is very different from the HP 45 in shape.

HP has got an R45 (http://www.hottoner.com.au/HP-Officejet-R45-Ink-Cartridges-c7474.html). Interesting that, according to the same website, we could be using the HP 45 with this one.

Canon has got a Canon mp45 according to the website http://www.fixya.com/support/t2374764-canon_mp45_printer_refuses_print_using. However, the website of the company refuses to believe such a model exists, … (http://www.canon.com.au/).

Oh, well, all in all, we should fight for our rights also in this area.

Let the knights assemble, and, please, to fight!

 Obs.: All the links have been visited on the 2nd of October of 2013.

_____________________________________________________





Please help us keep on inspiring you by acquiring one of our online courses: 


A Few Really Refined Hints, IT 

_____________________________________________________

 

Sunday, 16 June 2013

When your computer is sick, what do you do?




Humans tend to extend their allowances, especially in terms of things that could inspire pity of others, to the things that they most connect with, so that they decided that their machines could also get sick.



When their machines are sick, they may, for instance, just like their owners, have a virus inside of their system.



As we know, viruses come in the least expected way as possible, like we are calmly walking on the street, a very fine street, when a  stranger accidentally bumps into us and sneezes. A drop of his sneeze reaches our mouth, for instance, and, there we go: Sick we are and we still have the same disease that they had when they bumped into us accidentally.



Computer infections work in a very similar manner. 



Any USB stick may carry viruses, so that the sticks are very much like a potential HIV bearer with no condom if we do not have a good anti-virus program installed in the computer we use by the time we plug them in.



Other obvious vehicles are, trivially, external hard disks, CDs, and mobiles with blue tooth communication capability. 



The most dangerous viruses, the ones that most matter nowadays, the most elaborated, seem to be reaching us via electronic post,  Internet downloads to our machines, and websites.



A simple electronic letter from an acquaintance that we love may bring us a virus that is as nasty as to make our access to our own files impossible.



Everyone warns us about attachments, however, so that this is what we expect when we receive electronic letters with attachments, right?



Wrong.



We usually get used to receiving electronic letters from our acquaintances and the expectation of the nice sensation, or the need, of going through their lines will usually overcome any possible fear of acquiring infections that way.



Unfortunately, most of the time, our acquaintances do not protect themselves adequately against computer infections either, things being all very similar to the HIV phenomenon in its first few years in those regards.



The latest gods of transmission, that is, the latest vehicles for infection, are probably the interactive Excel and Adobe attachments.



For those who do not know, Excel sheets and Adobe files (the so famous .pdf (s)) are perfect vehicles to spread infections that are really nasty.



The more those files allow for interaction (some .pdfs let you edit pieces through balloons, for instance), the more dangerous they are in those regards.



A really nasty virus will mess up with our OS basic files (operational system, that is, Windows 7, Windows Vista, or others), those that tell the computer what to do when it starts activities, or will allow for other people to perform actions inside of our computers without our awareness in real time.



We may do several things trying to prevent criminal activity in our computers, but almost all of them will not stop the really nasty attacks.



One of the most common things that common people try is using the Windows Firewall and the Windows Anti-Virus Program (Defender).



Those obviously come for free with our system. 



Unfortunately, however, in this particular case, the logic involved in those pieces of software will not be enough to protect our computers from anything.



The second most common thing that common people could be trying to do is to turn off their Wi-Fi capabilities, what should work, but normally is useless action.



Actually, even if you try to go to the lowest levels of communication with the machine from your computer, say go and use Control Panel in your Windows 7 machine, then go to boards and turn off network capabilities, you will not be safe.



There are very good trials to make software equate physical action, but none of them seem to be really effective.



If you went physically and took out the Wi-Fi component from your computer, then you would definitely have stopped the possibility of someone entering your computer through the Wi-Fi system and sharing your Internet, for instance.



In those regards, computers that come with a physical button for you to turn Wi-Fi on and off would be more likely to get the job done than those that use only logic. 



One thing that is easy to understand is that if with code you turn off, then with code you may turn on, so that an electronic letter from that best friend of yours, who perhaps you believe knows a lot about IT, may carry the harmful code. Because you trust him, or her, you will read their letter, you will download their attachment, you will look at their file, and perhaps even interact with it, or you will visit their link, and etc.



You may also be curious about a free piece of software that everyone seems to be loving, as for Internet reports, or be after solving a problem quickly, say converting  a .doc file into a .pdf. You then google free online conversion and .doc into .pdf, and you find this program online, which you use, and through which you get the harmful code.



It may sound ridiculous, but the first solution that an IT person will suggest to you, if you complain about infections, is reinstall everything in your computer and, if possible, format it.



If you have original software, coming straight from the manufacturer, therefore licensed, then you can easily do it.



We usually do not want to do it because we do not have backup of our work or because the own backup has a chance of having an infection and would therefore make of that reinstallation solution a joke.



That is obviously, however, a solution that will always work, like for any computer infection.



One of the main problems with adopting it these days is, however, that there are no local laws obliging the manufacturers and the sellers of computers to give us the original CDs with the OSs in several countries, and Australia, a first world nation, is one of those.



Trivially, if we buy a license, paying for it when we buy our computer, we should be entitled to a CD copy, made by the manufacturer of the OS, of our OS.



Trivially, we should receive a CD made by the manufacturer each time we buy a license, since that is the only way to guarantee integrity.



You see, if you have an OS copy inside of your computer and you get an infection inside of it, how can you guarantee the integrity of that OS even if you can start/boot your machine and access it?



The really nasty viruses, however, will not let you not even boot the computer.



Third world nations have created rules of trade that state that the licenses should come accompanied with manufacturer’s CDs. 



That is easy to do and logical.



If you download the OS from the Internet, as MS in Australia has been telling its clients to do, there is always the risk that someone interferes with your process and inserts a virus on the way, for instance, since there are lots of people and things between MS and you, even if we can guarantee that the software piece that we are getting is made by them and is 100% what they have intended.



A few signs of criminal activity are easy to notice. For instance, if your download is happening at a certain speed and all of a sudden it starts going slowly, then there is a high chance that you are the victim of criminal activity. 



Several Internet providers will justify that saying that more people are hooked at that time or whatever, but the truth is that the speed does not usually change in a good connection, especially by too much, since good providers would have thought about all that in advance and would have made provisions for the situation of increase of the load of access at that time and date.



All in all, we seem not to be doing well at all in terms of rights in general in human kind, and this is also happening in the IT sector.



Basically, we do need to rule the industry more in our favor, in favor of the consumers. 



Producing CDs and giving one to each buyer of a computer with MS Windows 7 may cost Microsoft, but, with the money that they make in the market every month, even every second, we are sure that they will have no problems with that.



In capitalism with democracy, we should not be here to support profit for profit, but to care about people first, and first about the majority of the people, and about the majority of only the good people, if possible, since all our systems and rules, in principle chosen by the vast majority, decided to favour those: the good citizens, the good employees, and etc.



It is not fair if we do not get our CDs, sealed at the manufacturer’s end, containing the pieces of software for which we have purchased licenses. 



One of the best reasons for that is absolute necessity: To keep our computers healthy.



_______________________________________________




Please help us keep on inspiring you by acquiring one of our online courses: 


A Few Really Refined Hints, IT 

_____________________________________________________