scholarly journals Why and in what sense do conference interpreters need special software?

Author(s):  
Anja Rütten

Information society, digitalisation, software solutions for everybody. Also for conference interpreters? What are the special characteristics of an inter-preter’s workflow that require specialised software? Does this specialised software already exist? After having a look at scientific findings and existing solutions in this field, this article shows the differences between the software requirements of interpreters and those of translators or terminologists. On the basis of these considerations, a model for a special software solution for conference interpreters is presented.


2020 ◽  
Vol 26 ◽  
pp. 00067
Author(s):  
Alexey Ermakov

This paper is devoted to the results of our issues exploration increasing efficiency action in extreme circumstances. Long time we study only combat oriented activities but now it is obvious that work with information torrents has the same features of stress as a fight. Our exploration was based on Oleg Bakhtiyarov ideas who study deconcentration of attention phenomenon. We adapted these ideas and combined traditional for our country approaches to hand-to-hand combat and special software. We used two main ideas for experiments. The first one was searching for hidden threats and stealthy attacks with deconcentration and after that was concentration attention on threats and destroying them. This gave us only part-time at deconcentration. We used “plane deconcentration” for searching and “multidimensional deconcentration” for action. The second idea was about using deconcentration for avoiding dangerous situations. That case was about full-time deconcentration. We discovered two types of usage deconcentration indirect or without direct contact with attackers but not only this feature and we need to explore it in the future. We discovered the same features in combat activities and works with information torrents. In addition, the same features were discovered between our data and the other from e-sports. In addition, the same features were discovered between our data and the other from e-sports. All of that gives us opportunities to use the deconcentration of attention methods for tasks that are needed for operators and common people in the information society (searching, detection, distinguishing, and filtration of information torrent) and, of course, for mental hygiene goals.



Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.



2020 ◽  
Vol 17 (6) ◽  
pp. 76-91
Author(s):  
E. D. Solozhentsev

The scientific problem of economics “Managing the quality of human life” is formulated on the basis of artificial intelligence, algebra of logic and logical-probabilistic calculus. Managing the quality of human life is represented by managing the processes of his treatment, training and decision making. Events in these processes and the corresponding logical variables relate to the behavior of a person, other persons and infrastructure. The processes of the quality of human life are modeled, analyzed and managed with the participation of the person himself. Scenarios and structural, logical and probabilistic models of managing the quality of human life are given. Special software for quality management is described. The relationship of human quality of life and the digital economy is examined. We consider the role of public opinion in the management of the “bottom” based on the synthesis of many studies on the management of the economics and the state. The bottom management is also feedback from the top management.







Sign in / Sign up

Export Citation Format

Share Document