Wednesday, February 10, 2021

POSITION OF A TEMPORARY WORKER REPLACING THE DECREATED

This possibility falls under the grounds for concluding a fixed-term employment contract provided for in par. 2 part 1 of Article 59 of the Labor Code (LC), according to which "for the duration of the duties of an employee, for whom, in accordance with labor legislation and other regulatory legal acts containing labor law norms, a collective agreement, agreements, local regulations, an employment contract the place of work is saved contingent employee.

In some organizations, the expiration of such a contract is often associated with the onset of a specific date. In fact, fixed-term employment contracts are terminated with the onset of a certain event, namely the release of the main employee to work (part 3 of Article 79 of the Labor Code).

By prescribing such provisions in the contract, the employer thereby creates an extra headache for the future. The temporary worker reasons as follows: "The contract says that it is valid until April 15, 2009. Therefore, if I was not fired after that date, then my contract has become indefinite."

In the current legislation, there is no such thing as maternity leave. As a result, it turns out that the employee can only mean maternity leave by it, and the employer including parental leave.

As a result, a conflict may arise between the employer and the employee hired under a fixed-term employment contract.

Who is right?

According to the first point of view, with the end of the period specified in a fixed-term employment contract, its validity period expires. Indeed, according to Article 58 of the Labor Code, in the case when none of the parties demanded the termination of a fixed-term employment contract due to its expiration and the employee continues to work, the condition of the urgent nature of the employment contract becomes invalid and the employment contract is considered concluded for an indefinite period. And if the period is over, the fixed-term employment contract has ended.

Let's consider the situation.

A fixed-term employment contract was concluded with a woman for the period of maternity leave of another employee. The employer and the employee did not agree on what it was. The woman believed that after the main employee, without leaving work after maternity leave, took parental leave, her employment contract was transformed into an indefinite one. When the main employee returned, her replacement employee was fired.

The court, examining the case and identifying whether there was a transformation of the employment contract, considered that it was necessary to establish what maternity leave was. Maternity leave is a name sometimes used in everyday life for maternity leave. The court recognized the fact of transformation of a fixed-term employment contract into an unlimited one.

This is not an entirely correct solution to the question.

Firstly, part 3 of Article 79 of the Labor Code directly provides that the employment contract concluded for the duration of the performance of the duties of the absent employee terminates with the release of this employee from vacation. The Labor Code itself connects the end of a fixed-term employment contract not with the end of the period specified in the employment contract, but with the exit of the main employee. Moreover, according to the Labor Code, it does not matter whether it came out earlier or later.

Secondly, the current labor legislation, as a general rule, does not provide for the extension of a fixed-term employment contract. Therefore, if one is of the opinion that his term expires with the end of the corresponding period, then the employer must dismiss the temporary employee, and the next day he must be hired again for a new period. Moreover, such periods can last for several days.

Thirdly, the purpose of concluding a fixed-term employment contract with a temporary worker is to replace the main employee; circumstances - absence from work of the main employee, preservation of the place of work for the main employee. If the circumstances and purpose have not changed, then there is no need to talk about the expiration of the employment contract, even if it contains specific dates that have long passed, or periods that smoothly flowed into new ones.

Consequently, the term of an employment contract with a temporary employee does not end with the end of the period specified in the contract, but with the release of the main employee.

If the temporary worker also got pregnant?

If the main employee goes to work while her replacement pregnant employee is still working, then some global problems should not arise. In this case, according to Article 261 of the Labor Code, at the request of the woman and upon presentation of the relevant medical certificate, the employer must extend the term of the employment contract until the end of the pregnancy. At the same time, if the employment contract was concluded for the duration of the duties of the absent employee and it is impossible to transfer the woman before the end of her pregnancy to another job available to the employer, then dismissal is allowed.

And if the main employee did not leave during the pregnancy of another employee, but already during her period of being on parental leave?

Some experts believe that it is possible to fire a temporary replacement employee, despite the fact that she is on parental leave. Firstly, a fact-event has occurred, and secondly, it is prohibited to dismiss an employee during his temporary incapacity for work or while on vacation only if the employment contract is terminated on the initiative of the employer. Accordingly, if the employer did not dismiss the temporary worker while she was on parental leave, then her fixed-term employment contract is transformed into an unlimited one.

Tuesday, February 9, 2021

This is how an FTTH network with GPON technology works

To understand how fiber optic technology further optimizes our connectivity, one has to answer the following question: What is GPON? We explain how it works contingent meaning.

In order to provide us with fast Internet at home, telecommunications operators have various technologies to choose from. The most modern one is based on fiber optic cables and is therefore called Fiber-to-the-Home (FTTH). The FTTH variant more common in Europe is the Gigabit Passive Optical Network, or GPON for short. Here's how GPON works.

The evolution of the internet: faster, better, stronger

The internet has revolutionized our lives since the mid-1990s. The demand for faster, more reliable traffic continues to grow. High definition or 4K streaming, teleworking, and video conferencing are some of the popular Internet services that are skyrocketing the demand for data and bandwidth. The exit restrictions and the lockdown during the Covid-19 crisis have shown how important a good, reliable internet connection is in your own four walls. Thanks to fast internet, we can work efficiently from home, maintain our conversation habits and keep in touch with family and friends via video conference. During this time, the data traffic in all networks has increased significantly.

The first telecommunications networks used copper cables as a medium for signal transmission. For many years these networks were used for basic telephony services, mainly for voice calls and telegrams. With the spread of the Internet since the mid-1990s, voice calls have gradually been replaced by data. And because copper cables quickly reached their limits when transmitting data, a new medium was developed: fiber optic technology.

But why can higher speeds and bandwidths be achieved with fiber optics than with copper technology? Copper cables transmit electrons, while fiber optic cables transmit photons. In other words: glass fibers transmit information using light waves that move much faster than electrons. In addition, light signals do not weaken as much as the electrical signals in copper cables, even over long distances.

The first optical networks emerged in the late 1980s. Initially, fiber optics was used for sea or long-haul cables between large cities such as New York and London or London and Paris. Gradually, copper cables in the entire Internet core network, the backbone, were replaced by optical cables.

As the backbones increased their capacity with the help of fiber, the technology gradually became more widespread - first in large companies and public administrations, and eventually in our homes.

GPON - a flow of light

How is a GPON structured?

The Optical Line Terminal (OLT) is the main element of the network and is located in the switching center of the telecommunications operator, the Central Office. A laser in the OLT feeds the photons from the exchange into an optical fiber made of glass and plastic that ends at a passive optical splitter . The splitter divides the signal received from the exchange into numerous signals, which are ultimately forwarded to up to 64 outputs (customers). The number of customers served by a laser depends on the technical parameters of the operator. The operator often reduces the number of outputs to 32.

In addition, the operator can split the signal twice, for example once into eight and then again into four in the further course of the cable. The maximum distance to the exchange can be 20 kilometers. However, the operators usually limit the distance to 16 kilometers in order to be able to offer a good service.

For Andrés Gavira Etzel, senior engineer at the European Investment Bank, the advantage of fiber optics lies in the lower signal attenuation . In other words, unlike copper cables, the signal strength is largely retained over long distances.

“You can think of the two technologies like a river flowing through a small town,” explains the engineer. “With copper, the channel becomes narrower and narrower, making it more and more difficult for the electrons to flow through. With the glass fiber, the channel does not change, and the photons can continue their way largely unhindered to the end point. In addition, the signal from one copper cable changes the signal from a neighboring cable, which further worsens the signal strength. "

Fast internet is available to all households within a radius of 16 kilometers from an exchange. With ADSL technology, on the other hand, the signal becomes weaker and weaker as the distance increases, with the loss of signal already being considerable after three kilometers.

The fiber optic technology is at least ten times more powerful: While copper-based networks achieve transmission rates of up to 100 megabits per second, optical networks can achieve up to one gigabit per second. The differences are often even greater because the transmission rate for copper cables is usually less than 50 megabits per second.

Monday, February 8, 2021

What is the terms of reference

A technical assignment is where a high-quality functional product begins. At least if TK itself was such. If the document is drawn up unprofessionally and without due care, the result will be appropriate.

Given the nature of the target audience of the blog and the general trends, it probably makes sense to describe the terms of reference specifically for digital products. In many ways it will be so, but we must not forget that the most common, "analog" products also require documentation. They demanded it even before the Internet itself. Therefore, to broaden the horizons and for the benefit of representatives of non-digital industries, it is worth bringing references to offline projects define sow.

Our products help your business optimize marketing costs

TK is part of a multilevel development process

What is the technical task for?

The terms of reference is no less important than a legal act in securing the rights and obligations of the parties - the customer and the contractor.

In fact, these are instructions for developers, designers and other direct creators of the final product. But in fact, the technical task, defining strict requirements for each detail, makes the cooperation between the customer and the contractor safer and more comfortable.

When every little thing is regulated, everything is in its place, everything with its own powers and responsibilities, there is little room for dishonest maneuver and misunderstanding. Ideally, when it does not remain at all.

Moreover, a specific and holistic technical assignment is the first step towards a high-quality result. In order for the product to work accurately, without failures, and simply safely - this is also on the agenda from time to time - all its elements must be thought out. Carefully and meticulously.

The technical task is the basis of both simple monosyllabic products and high-load systems. In each case, scenarios of functioning should be provided. Any user action must be foreseen, and the response to it must be a useful result.

It is in order for the work with the final product to evoke a positive response from the user and solve his problems, it is necessary to work out the idea and details of the project at the earliest stage.

How to draw up a technical task

As a first approximation, the main requirements for the terms of reference are thoughtfulness and completeness. But, since not in all cases the compilers are able to comply with these conditions, generally accepted standards for the development of TK were developed.

In many vacancies for the position of a systems analyst or technical writer, you can meet the requirement: knowledge of GOST 19 and GOST 34. What is it?

From the name it is easy to understand that these standards are adopted at the national level and are a recommended model for the development of technical specifications in Russia.

At the same time, it should be remembered that these two GOSTs are related specifically to software systems. That is, in the modern sense - to sites, applications, automation systems. The terms of reference for the placement of a catering enterprise in a budgetary institution will have to be written according to different rules.

Thursday, February 4, 2021

INTERNET SECURITY FUNDAMENTALS: FIREWALL

WHAT IS A FIREWALL?

Firewall, firewall, firewall or firewall - all these words mean the same thing: a kind of barrier that protects the entire network or parts of it from the transmission of malicious packets and intrusion by hackers. A firewall is installed at the junction of two networks, usually between the world wide web and the corporate network. There are also so-called client firewalls that are installed on the end user's computer and only protect it. Firewalls can be used both as hardware solutions and as software. The firewall scans all incoming and outgoing traffic according to certain previously configured criteria. If the transmitted data meets these criteria, the firewall will let it through. If they do not match, it blocks. The transmitted data is filtered based on the following criteria: what is a firewall

Address filtering: the source and destination (source and destination) addresses and port numbers are checked

Protocol filtering: the type of network traffic is checked, for example, HTTP or FTP

The attributes and status of the data packets being sent are also checked.

However, the firewall does not provide automatic network protection. The effectiveness of its application directly depends on how the firewall is configured.


FIREWALL CONFIGURATION

There is no single answer to the question of how to properly configure your firewall. The required settings depend on many factors and may require changes, for example, when new applications, devices or users are added, when access rights change in connection with the tasks and roles in the business, when cloud technologies and mobile devices begin to apply.

Firewalls are needed not only to protect stationary information technologies. They are also important for controlling applications on the web, in the clouds or on mobile devices. Regular checks and adjustments of firewall settings are necessary not only because the IT landscape is constantly changing, but also due to the constant change and complication of cyber threats. Once established, filtering rules can significantly differ from the actual need for protection without timely checking and adjusting the settings, which allows fraudsters to gain access to confidential information. How often the firewall settings need to be checked depends on the level of risk and changes in the existing IT infrastructure.

Also, remember that it is important to not only keep the configuration up to date, but also to protect the firewall logging. This means that the protocols should be encrypted and verified using a double-check principle, and the logging data should be stored as carefully as possible.


METHODS FOR USING A FIREWALL

Firewalls can be used in a variety of ways. The simplest is a packet filtering router. The router configures various packet filters that control data transmission based on the source and destination addresses and port numbers. Typically, conventional IP routers work with this method. Since this is a fairly simple procedure, the cost of such a firewall will be low. However, using this method alone does not provide sufficient protection. Even a simple spoof of an IP address will be enough to gain unauthorized access.

If you connect a firewall system between two packet filtering routers, this method will be called "bastion node". The outside router is responsible for filtering IP traffic between the bastion host and the Internet, while the inside router only allows IP traffic between the inside network and the bastion host. This method of protection is very effective, but also quite costly, since in addition to two routers, a firewall system is also required. In addition, setting up such a system can be quite complex. A well-managed and effective solution is found by many companies to use a firewall server because it includes the following features:

internal and external firewall,

bastion knot,

web application server.

The Firewall Server is a complete solution that includes everything you need for related Internet services. The more filtering and access control methods you use, the more security you can achieve.


HACKER ATTACKS ON FIREWALL

Hacking is the most common attack scenario: a hacker gets into someone else's computer and thus can track and modify user data, identifiers and files. Hacks often go unnoticed. Attackers manage to get into someone else's computer without leaving a trace.

The second common scenario is to disable certain services so that other users cannot use a particular computer or port. This form of electronic sabotage can corrupt data as well as damage your device. Most attacks of this kind are carried out by overloading: A fraudster overloads the system or network, for example, with a stream of network requests, messages or other processes, as a result of which the user cannot operate efficiently. An attacker could also disable, replace, or redirect some services. Unfortunately, quite often usernames, passwords and IDs are transmitted unencrypted in plain text, so they can be easily eavesdropped on the network. This is also used by scammers to steal information.

Network technologies such as Ethernet or Token Ring can intercept all network traffic on a local network. As in the case of hacking, scammers almost never leave a trace here, so data theft is rarely detected.

Wednesday, February 3, 2021

How Much Does the CompTIA A+ Certification Cost?

It's a simple question, but there can be multiple answers based on your situation and the options you choose. You will need two vouchers to pass two exams to certify.

You may qualify for discounts that can decrease the cost, and you may want to consider additional learning and training that can change the bottom line as well. Read on to find out more.


The Basics: CompTIA A+ Exam Voucher Only

In order to take the certification test, you’ll need to buy an exam voucher. A voucher represents a unique code that you can buy at the CompTIA Store and use to take your test at a Pearson VUE testing center. If a voucher is all you need, then the cost is $232 per exam. Find more details about the exam on the CompTIA A+ product page and information on how to buy a voucher on our testing pages. If you’re ready to buy, head over to the store.

If you don’t pass an exam, you’ll need to purchase another voucher to take another test. We recommend that you go into your exam well-prepared to minimize the chance of not passing the test and having to purchase an additional voucher. Read on to find out about training and test preparation options.

Training and Exam Preparation

Our CompTIA Learning and Training offering is a set of comprehensive learning resources to support our certifications like CompTIA A+. This suite of products includes books, eLearning, labs and exam prep software and is developed in house by CompTIA, based on feedback we hear from learners like you. These resources provide you with a variety of ways to acquire all or some of the knowledge that is outlined in the CompTIA A+ exam objectives.

Self-Study

The self-study guide will teach you the fundamental principles of installing, configuring and troubleshooting PC, mobile, printer and networking device hardware and help you to advance a career in PC support. It will prepare you to take the CompTIA A+ exam by providing 100 percent coverage of the objectives and content examples listed on the syllabus. Browse our store or visit the Official CompTIA A+ Study Guide page to learn more.

Another great way to get an idea of what questions you can expect is to download a set of practice questions. Keep in mind that these practice questions are not the exact questions that will be on the actual test and that there will be different kinds of questions.

Self-Study and Test Preparation

The CompTIA CertMaster suite of products helps candidates learn the skills needed for a career in technology, and to prepare for their exam with confidence.

The following CertMaster products are now available for CompTIA A+: a plus certification jobs

CertMaster Practice for CompTIA A+

CertMaster Labs for CompTIA A+

Tuesday, February 2, 2021

How Much Can I Make with a CompTIA Security+ Certification?

IT security offers countless paths to fulfilling jobs and rewarding pay – you determine the direction and, ultimately, how much money you can earn with CompTIA Security+. Not everyone has the same reason for getting certified. In general, you can apply your CompTIA Security+ certification in the following ways: comptia certification jobs

Attract the attention of employers with an endorsement of your skills that is respected globally and industry wide.

Position yourself as a top candidate for entry-level cybersecurity positions.

Confirm to yourself that you've mastered the latest skills and concepts that act as the foundation of a career in cybersecurity.

In all scenarios, CompTIA Security+ can serve as a springboard for cybersecurity careers, ensuring security professionals are better prepared to solve a wide variety of issues when securing and defending networks in today's complicated business computing landscape.

Jobs That Require or Benefit from a CompTIA Security+ Certification

Planning the entry-level point for your cybersecurity career, as well as your aspirations and how much work you’re willing to put into growing your career, have great impact on how much you can make in any job, and security is no exception. Here are a few common job titles that use CompTIA Security+:

Systems administrator

Security specialist

Security engineer

Network administrator

Junior IT auditor/penetration tester

Security consultant

The job roles covered by CompTIA Security+ are categorized under network and computer systems administrators by the U.S. Bureau of Labor Statistics. The number of jobs in this category is expected to grow by more than six percent by 2026. The median pay in 2017 was $81,100.

The Reality of Mean Salary Percentiles

When researching salaries and aiming your career at specific job titles, remember that you may see a range of salaries for one particular job because some companies and geographies will pay more than others. Companies that pay more may also demand more, in terms of experience or responsibilities. The result is a range of possible salaries for any particular job title and the reality of mean salary percentiles.

Let’s look at the systems administrator as an example. While the above median salary gives you a sense of where the majority of salaries fall, the U.S. Bureau of Labor Statistics also gives percentiles that show the highest and lowest salaries for that job title:

Systems administrator 90th percentile $130,200

Systems administrator 75th percentile $104,460

Systems administrator 50th percentile $81,100

Systems administrator 25th percentile $63,020

5 Ways to Boost Your Pay

The pay you can expect from a particular IT job can vary significantly from the median pay depending on a number of factors that may benefit your role for a certain position. Here are five ways that can help increase your pay:

Prior Experience: Reducing training time and having expertise that goes beyond your job description may increase your value to an employer. Similarly, prior related job experience provides trust and builds expectations on the side of an employer that can benefit the numbers on your paycheck.

Additional Training and Certifications: If CompTIA Security+ isn’t your first certification and if you can showcase additional completed training, you may expand the reach of your certifications and qualify for jobs that you otherwise would not, and subsequently become candidate for a higher-paying position. Review CompTIA’s stackable certifications to find out how you can build your IT career path with CompTIA certifications. CompTIA IT Pro Membership also offers access to training for IT professionals.

Commitment: Becoming certified is your first step to your career. Staying certified is even more important and can show employers that you’re committed to your job and that you’re in-sync with a rapidly evolving industry.

Regional Differences: The pay for a job in one area may be vastly different than what is offered in another area. For example, a systems administrator working in New York City, on average, will make about 15 percent, or $14,650 more than the exact same position in Denver.

Industry Variations: Keep in mind that some industries may have, in their details, different expectations for certain job titles than others and offer different pay as a result.

Monday, February 1, 2021

Cyber ​​Security Officer

 Main job responsibilities: comptia a+ jobs

• Intelligence Research;

• Investigation of APT attacks;

• Cyber ​​Incident Investigation;

• Digital evidence collection;

• OSINT;

• Forensic science and Computer forensics;

• Penetration Testing;

• IT management and management of 5 regional offices;

• SOC Officer;

• Programing;

• Conduction of audit of security;

• Risk Management and Risk Assessment;

• Reverse engineering;

• Conduction of audit of security;

• Vulnerability searching;

• Hacking preventing;

• Eliminate the consequences of hacking;


Information security engineer

"MSB Cybersecurity" Inc., Kiev (Consulting in the sphere of information security)

- Development, implementation and support of information security

systems

- Implementation of security procedures in business and IT process

- Conduction of audit of security

- Management of information security of end-user systems

- Penetration test

- Operational management of the DLP system

- Implementation and configuration of IPS / IDS, SIEM, WAF systems

- Participation in the process of investigation of Informational Security

incidents

- Vulnerability analysis, information risk assessment

- Enterprise preparation for certification ISO 27001

- Setting up Wi-Fi networks security