Skip to main content

Home/ CSIA 459/ Group items tagged 1

Rss Feed Group items tagged

Kassidy Gordon

The Intellectual Property Implications of Low-Cost 3D Printing - 2 views

  •  
    "S Bradshaw, A Bowyer and P Haufe, "The Intellectual Property Implications of Low-Cost 3D Printing", (2010) 7:1 SCRIPTed 5, http://www.law.ed.ac.uk/ahrc/script-ed/vol7-1/bradshaw.asp"
  •  
    on behalf of Kassidy Gordon Annoated Bibliography
Dan Schulman

DoD posts 1 millionth user to email system - 0 views

  •  
    I wonder if they had cake... DoD/DISA's email system signed-up its 1 millionth user last week. Now that's a lot of Exchange mailboxes. This article has it listed as a cloud service... is it? It's true that DISA doesn't keep it's cloud presence a secret, a quick google search will tell you the URL is https://web.disa.mil - but since you can't get very far without a CAC.. is this truly cloud? What is the definition of cloud?
Amy Harding

Blueprint for a Secure Cyber Future - 30 views

  •  
    This document is used for your Week 1 discussion questions.
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
samuelrios

HowStuffWorks "How the Predator UAV Works" - 0 views

  •  
    Military commanders use tactics and strategy in combat to inflict as much damage on the enemy while trying to risk as few personnel and resources as possible. This principle was at the heart of the development of the RQ-1 and MQ-1 Predator Unmanned Aerial Vehicle.
  •  
    This was a really cool read, before I read your article I did not even know what the predator UAV was. Thanks for this great information.
  •  
    I always use HowStuffWorks if I read an article about a new technology and don't understand how it works. UAVs is an area where most people don't understand how it works. Nice article.
Michael Austin

A Comprehensive Study of Google Wallet as an NFC Application - 0 views

  •  
    As the title suggests, this is a detailed paper on the implementation and security concerns associated with Google Wallet and NFC.
Alvin Thomas

1 of 4 - 0 views

shared by Alvin Thomas on 01 Apr 13 - No Cached
  •  
    This is 1 of 4 of my sources for annotated bibliography.
Brandon Kennedy

Web Resource - 0 views

  •  
    I don't know how fancy we are supposed to be with sharing these web resources, but I enjoy twitter because of how fast and easy current events are presented.
Phil Kemp

[Short Paper] Understanding the user experience of secure - 1 views

  •  
    Source 1 of 5 for my Annotated bibliography. I know we don't have to post anymore, but figured I would incase someone else may want to read, or gather information.
Seth Molin

Hospital uses telemedicine as bridge to mainland - 1 views

  •  
    Article 1 for annotate Bibliography
Vickye F

Declaratively programming the mobile web with Mobl - 1 views

  •  
    annotated bibliography
Trevor Pyle

Big Data, Trying to Build Better Workers - 2 views

  •  
    Interesting article from the NY Times on how some companies are utilizing big data in the work environment.
Lee Seranni

Corning A Day made of Glass - 1 views

  •  
    I saw this commercial a few months ago and was fascinated that this was possible. I was also concerned where they show a person walking into a store and the store sensors recognized them. This seems to be going a little too far for me. I know its long but enjoy. Lee
  •  
    Love it, want it all!! Ben
1 - 20 of 24 Next ›
Showing 20 items per page