Data Processing Skills

With all the new revamp and improvement in relation to data privacy, and how personal information can affect your well being and that of others in a fair society whose relation with others should be not only as equal as possible, but rather, equal enough to keep the equality fair enough, what skills do you have which can improve those policies, and what other parts than security of data are important to make the data gathering and data processing efficient enough to keep us safe from trouble.
?
??

Who are you asking here? CCP or other players?

Can you try to say what’s bothering you in one simple sentence?

I would say, in one sentence, Who are you asking here, CCP or other players, if you are not asking here, although you are asking here, simply put.

Thank you for letting me analyze you data processing skills.

The best thing to do is to draw a DFD and ERD to explain those who don’t understand to those who don’t understand why.

You’re just being rude now, mate.

I was asking you, not CCP. You created the thread and not CCP.

Yeah it was written you were doing it and tried to hold me liable for what you did after you did it to hold me liable to do it when you did .

War is bothering, however, it doesn’t have to be me, unless my data gathering skills proves to the contrary beyond any doubt or any other scientific possibility.

I just spend a lot of resources and efforts on this, and do get worst than bothered.
Windows is also not designed to work in war.

The thread is about data processing skills.
It not about inability to process data and lack of skills caused by attacks.

Sí fue escrito tu estabas haciendolo e intentaste hacerme responsable por lo que tú hiciste después de que lo hiciste para hacerme responsable de hacerlo cuando lo hiciste.

La guerra es preocupante, sin embargo, no tengo que ser yo, a no ser que mis habilidades de recolección de datos prueben lo contrario más allá de toda duda u otra posibilidad científica.

Hmm… no, it doesn’t makes sense neither after translating it to my language. :thinking:

Maybe you need a better translator.
I’m sure I can translate that without any problems.
Natural languages are easy and military police can detect conflicts from social groups they protect and are paid to do so.

It also goes when all they communicate are problems, and they lose opportunity to function properly.

Anyways, I got to go. 2 more incursions sites and I get 2 billion liquid ISK besides the other assets and potential assets, like Loyalty Points.

Scientific proof is related technical feasibility, as legal feasibility may or may not include science, or to varying degree.
The same goes for operational feasibility.
Just because a system is operational because “people like it” without any valid scientific ground or legal support, surely won’t mean the data would be safe, and procedures in place would be ethical, or even more so that those procedures ethics would be valid for the goals mentioned and objectives, since, if the ethics are no good, then the same problem would occur.

Sure, the parties related to those ethical matter would still claim benefit for the work, despite of if they actively create conflicts rather than creating data to be stolen and so on (such as creating conflict to try to solve conflicts).

One thing is for certain, I have review the details of these new policies and rules in regards to data privacy, and personal data (by the way, personal data, means government related data and information, which, they in fact, provide), and the protection thereof and how the processing of those has to be done safely enough to make sure that abuse do not occur.

Like for instance, suppose I was to use data to process it to make it appear as rude when it is not, so to gain an unfair advantage by creating a false sense of competition, and an illegal system of competition.
Suppose I did not.

image

/thread

7 Likes

This has to be the most utterly incoherent SJW thread I’ve ever seen on this forum…

4 Likes

I think he’s performing some kind of experiment on us, but fails to see that it has turned him into a troll at the same time.

2 Likes

Don’t do drugs

5 Likes

da·ta proc·ess·ing
noun
a series of operations on data, especially by a computer, to retrieve, transform, or classify information.

http://sutlib2.sut.ac.th/sut_contents/60760.pdf
CHAPTER 2

**Information Systems Building **
Blocks - p.36

DATA Building Blocks - p.52
PROCESS Building Blocks - p.56

CHAPTER 7

Data Modeling and Analysis p.254

CHAPTER 8

Process Modeling p.304

System Concepts for Process
Modeling - p.310

    • Process Concepts - p.310
    • Data Flows - p.321
    • Data Stores - p.330

The Process of Logical Process
Modeling - p.331

    • Process Modeling for Business
      . . Process Redesign - p.332
    • Fact-Finding and Information
      . . Gathering for Process
      . . Modeling - p.334

      How to Construct Process
      Models - p.336
    • The Context Data Flow
      . . Diagram - p.336

      Synchronizing of System
      Models - p. 351
    • Data and Process Model
      . . Synchronization - p.351

CHAPTER 10

System Design - p.392
Systems Dsign for In-house
Development – The “Build”
Solution - p.401

    • Task 5.2 – Design the System
      . . Database(s) - p.405

CHAPTER 11

**Application Architecture **
and Modeling - p.420
Physical Data Flow Diagrams - p.424

    • Physical Data Flows - p.428
    • Physical Data Stores - p.430
      Information Technology
      Architecture - p.430
    • DATA Architectures –
      . . Distributed Relational
      . . Databases - p.443

      Modeling the Application
      Architecture of an Information
      System - p.453
    • Drawing Physical Data Flow
      . . Diagrams - p.453
    • DATA Distribution and
      . . Technology Assignments - p.456
    • Process Distribution and
      . . Technology Assignments - p.456

CHAPTER 12

Database Design - p.466
Conventional Files versus the
Database - p.470

    • The Pros and Cons of
      . . Conventional Files - p.470
    • The Pros and Cons of Database - p.472
      Database Concepts for the
      Systems Analyst - p.473
    • Fields - p.473
    • Records - p.473
    • Files and Tables - p.474
    • Databases - p.475
      Prequisite for Database
      Design – Normalization - p.481
    • What is a Good Data Model? - p.481

      Modern Database Design - p.482
    • Data and Referential Integrity - p.488
    • Database Distribution and
      . . Replication - p.491
    • Database Prototypes - p.492
    • Database Capacity Planning - p.492
    • Database Structure Generation - p.492
      The Next Generation of
      Database Design - p.493

CHAPTER 14

**Input Design and **
Prototyping - p.534
Input Design Concepts and
Guidelines - p.537

    • Data Capture, Data Entry,
      . . and Data Processing - p.537

hence,
Data Processing Skills
and what are your data processing skills in relation to data privacy, and the new design for data processing and storage.

    • Internal Controls – Data
      . . Editing for Inputs - p.544

PART FOUR - - BEYOND SYSTEMS ANALYSIS AND DESIGN

CHAPTER 16
Systems Contruction and
Implementation - p.604
*

The Construction Phase - p.607

    • Task 6.2 – Build and Test
      . . Databases - p.609
      The Implementation Phase - p.611
    • Task 7.3 – Install Databases - p.615

For in case you wonder if those systems work with military application, maybe you should not worry so much…

https://www.ibm.com/support/knowledgecenter/en/SS6RBX_11.4.2/com.ibm.sa.process.doc/topics/c_Process_Modeling.html

Here is an article on processing of natural languages and
https://dl.acm.org/citation.cfm?id=1200604
by one of the same authors as above…

Systems Analysis and Design Methods - ACM Digital Library
https://dl.acm.org/citation.cfm?id=1200604
by JL Whitten - ‎2005 - ‎Cited by 2297 - ‎Related articles
1 The Context of Systems Analysis and Design Methods … Part Two Systems Analysis Methods … 8 Data Modeling and Analysis … requirements using the natural language processing system LOLITA, Natural Language Engineering, v.2 n.2, …


DATA PROCESSING SYSTEMS ANALYST I (SR-20) | Government Jobs

Assists in the design and development of electronic data processing systems and … One year of experience in the analysis of operating practices, methods, and …

I hope you can find a book on “how to make a point”, because this book isn’t teaching you it.

3 Likes

It would be easier for me to make one book called “how to make a point”
and to make it and write it on “how to make a point”.
Because this book ain’t teaching you it.
I would put a clause at the beginning of the book to write in your honor , which , sadly would go on to show the merit of the book, in relation to the merit you have in regards to this.
I do so happen to work on this for 25 years and I’m offered a master’s degree there.
Are you in the same university?
They offer government work in Hawaii with the same skill set.

I don’t think I ever had you as teacher.
You seem more like a saboteur to me.

I have 2 cases against the copyright office during a court case.
They argued I didn’t include a program in my content for registration and also that I didn’t include arts when I did .
I should record the actual video of the creation of the art images.
I now have to register copyright about that copyright registration interference in another country before I can deal with them again, because they attacked my case and it’s with the US Army.

Start with making a point, not an entire book.

1 Like

The point is not the entire book.
It’s about how data processing skills are related to the changes for security on how companies stores data on customers.

If you read between the lines, you will also find that lack of those skills can lead to fines, in regards to mischief endangering military bases.

And how are they related?

They are related in more than one way.
For instance, one case with billions of dollars which the plaintiff seek in regards to the moral and ethics of those systems, their design, goals, and other research.

I was going to say something else about Natural Language, and how they are processed even though it was not the main point .
It was something either you or someone else brought up.
I however read it is also used for security and a more important part of business.

It is also related to the same system about data privacy, and how user data are being used to be sold to those professionals.

Go on, I’m listening.