The Department of Information Technologies is once again organizing a separate cycle of professional lectures on current topics in the field of Information and Communication Technologies in the 2018/2019 WS. Out of a total of ten lectures offered, two are in English (for students of English majors and other interested parties). The next cycle of lectures takes place in LS (period February to May).
The main goal is to enrich and supplement the standard teaching, support the competitiveness of graduates on the labor market and further deepen the department's cooperation with practice.
In addition to the lecture's own thematic content, participating companies can also offer students cooperation in the form of professional internships, BP or DP topics, participation in projects, etc.
The selected target group are 3rd-5th year students of the field of Informatics (subjects: Web design, Computer networks, Internet technologies - client side), and then students of the 4th year of the fields of Business and Administration and Operations and Economics as part of the optional subject ICT for managers, including equivalent subjects in English (Web design, Computer networks, Internet technologies – client side, ICT for managers).
For details, see the credit rules of the relevant subject.
Students are required to attend at least one professional lecture of their own choice from the given cycle (credit condition). Login takes place through the forms on the wp website (see below). The cycle of lectures will run from October 22, 2018 always in Monday from 15:45 until December 2018, capacity is limited by the size of the available auditorium, which is the auditorium in ZS E IV (65 places).
Registration of students for lectures takes place from 4. October 2018 see below:
Registered participants will receive any changes regarding the change of room by email.
Date | Topic of the lecture | Lecturer | Company, position | Room | |
22. 10. 2018 | Cyber security | Ondřej Smíšek | Assist spol. s.r.o | IV | |
A certain safety minimum should be mastered by every person using modern technologies. Unfortunately, the dangers arising from the use of smart devices, wireless networks or the Internet of Things are an integral part of an otherwise extremely useful technological advance. This lecture wants to clarify the basic principles and possibilities of cyber security for ordinary users so that their stay in cyberspace is safer, safer and at the same time limits them as little as possible. | |||||
29. 10. 2018 | How to optimize snippets | Martin Velička, Richard Klacko |
Sun Marketing, s.r.o | IV | RECORD |
The lecture will focus on how to get the most out of already good search engine positions. Practically, it will be shown how to identify the pages with the greatest potential and we will show the basic methods of increasing the click-through rate. For a better idea, you can look at: http://www.sunitka.cz/c/1121-case-study-optimalizace-snippetu-ctr/. | |||||
5. 11. 2018 | The MUNIS information system as an example of an information system for cities and municipalities | Tomas Lechner | Triada spol. s.r.o | IV | RECORD |
The lecture will deal mainly with the level of municipalities, i.e. municipal, city and regional authorities. It is here that the company Triada is an important supplier of the internal information system of these organizations. Its main product is IS Munis, which is a modular system that covers most of the operational and agenda needs of these public authorities. The lecture will not only introduce this information system and its functions, concept and use, but will also mention links to central e-Government tools, such as basic registers, data boxes and CzechPOINT. | |||||
12. 11. 2018 | IoT with IQRF technology | Ivona Spurná | IQRF Alliance, s.r.o | IV | RECORD |
The lecture will focus on IQRF technologies, which is a wireless technology for data transmission in mesh networks with extremely low consumption and high reliability. The transmission is two-way and fast enough for both data collection and control of electronic devices. Network transmission is protected by security standards at several levels. Over the past two years, technology has seen another significant advance in device interoperability. Newly emerging devices that are certified for interoperability are automatically recognized in the network, and management takes place according to standardized commands defined in the IQRF Repository. The presentation includes a demonstration of a functional IQRF network connected to an IQRF Gateway, including visualization of values. | |||||
19. 11. 2018 | Audit of information systems / IT audit in a corporate environment | Václav Zycháček, Markéta Hruboňová | Česká pojišťovna, as Generali Group | IV | RECORD |
The lecture will deal with a field that is just beginning on the Czech market / the application of graduates in the field of information systems auditing. In an interactive way, we will introduce you to this profession and dispel myths about boring auditors without a bit of humor and perspective. Using specific examples, we will show you what an IT auditor can achieve and how to use his technical knowledge to evaluate risk areas in the company. Plus, what are the necessary personality prerequisites for publishing the results in front of the top management of the given company. | |||||
26. 11. 2018 | Software Development Life Cycle | Jakub Valenta | Accenture Services, s.r.o | And II |
RECORD |
Currently the traditional software delivery approach based on waterfall while being still widely used is beginning to complement and often replaced by competing approaches. To provide better understanding of the current state we will share In the lesson overview of traditional delivery lifecycle and further we will focus on the changes that are occurring with the rise of new approaches like Design thinking, Agile development and DevOps and how those methods complement and compete with each other in the software delivery.During the lesson also real life experiences will be shared covering all: the good, the bad and the ugly examples. | |||||
3. 12. 2018 | Personnel information systems in use by corporations | Martin Matuna |
UPS SCS Czech Republic s.r.o |
IV | RECORD |
In the era of globalization, processes are being streamlined and many cost-saving measures are being implemented, which lead to the introduction of new personnel systems that monitor not only the payroll, but also personal development, for example, and in some cases focus on online employee support through shared service centers. As part of the lecture, the advantages and disadvantages of such solutions will be presented, as well as the protection of personal data and limitations regarding data processing and storage. Last but not least, sensitive areas will be pointed out in the case of the implementation of Personal Information Systems on a cloud solution and the setting of approaches and data matrices in the systems being processed. In the rest of the lecture, general trends and possible predictions of the development of systems and HR processes will be presented.
|
|||||
10. 12. 2018 | Come and see Azure Cloud in action | Tomáš Kubica | Microsoft s.r.o |
And II | RECORD |
What is Microsoft Azure and why I love it? Let's see it for real with a session full of demos. Start 100 application instances in less than 1 minute with Linux containers in Azure Kubernetes Service. See how Azure can recognize faces and people's emotions in real time. Train Azure to search for your favorite stuffed toy in pictures. Securely connect and manage your Raspberry Pi and deploy your logic and data analytics from the cloud with Azure IoT Hub. Have some data you need to replicate across Earth? See how you can do this with Azure Cosmos DB with a few clicks on the world map. Create your free student account and get started now. | |||||
17. 12 .2018 | Case study – application change management process from the point of view of an IT auditor | Václav Zycháček, Markéta Hruboňová | Česká pojišťovna, as Generali Group | IV | RECORD |
Lecture or the case study guides you through a specific case of an application development audit in a corporate environment. Part of the case study will be the mapping of the application development process, determination of critical points and subsequent treatment with control mechanisms (including testing of their effectiveness). The purpose of the lecture is to acquaint the audience with the specific activities of an IT auditor and the possible employment of graduates in this field. |
Contact: Ing. Eva Kánská (kanska@pef.czu.cz)