Skip to main content

Home/ Groups/ 91.113 Exploring the Internet
michaelpenta

Amanda Palmer uses technology to promote her music - 3 views

Here is a email about making money using twitter http://www.hypebot.com/hypebot/2009/06/amanda-palmer.html and a video about using email and twitter to connect to her fans http://www.wired.com/und...

twitter socialnetwork SocialMedia 91.113 internet

started by michaelpenta on 02 Sep 11 no follow-up yet
Beibei Yang

Nowhere To Run Know Where To Hide - 1 views

  •  
    "What is WikiLeaks? Who is Julian Assange? What's happening and how does one access WikiLeaks? Find all answers here! "
  •  
    Found this on slideshare.net. Personally, I think the slides are good enough for the class.
P Krolak

Google Art Project -- A Visitor Guide - 1 views

  •  
    Google has put online some of the great art museums of the world. It has copied these museum's art collections. It also use it Street View approach use to create video tours of the associated museums. The site is located at -- http://www.googleartproject.com/
P Krolak

List of Google products - 1 views

  •  
    This list of Google products includes all major desktop, mobile and online products released or acquired by Google Inc. They are either a gold release, or in beta development. This list also includes prior products, that have been merged, discarded or renamed. Features within products, such as web search features, are not listed.
P Krolak

Dead Sea Scrolls available online - 1 views

  •  
    Ultra-high resolution images of several Dead Sea Scrolls are now available on the web, after Google helped digitise the ancient texts. The search firm lent its expertise in scanning documents to the Israel Museum in Jerusalem. Both amateur and professional scholars will now have access to 1,200 megapixel images.
  •  
    Ultra-high resolution images of several Dead Sea Scrolls are now available on the web, after Google helped digitise the ancient texts. The search firm lent its expertise in scanning documents to the Israel Museum in Jerusalem. Both amateur and professional scholars will now have access to 1,200 megapixel images.
Beibei Yang

This Super Mario Bros. Mashup Gives Mario A Portal Gun - 1 views

  •  
    gaming mashup
P Krolak

Exploring The Internet: 91- 113 Week 3 The Electronic Library and Advanced Searching th... - 1 views

  •  
    Week3  Using the Electronic Library and Finding Information on the Web The First Step, Readings: Read the 3rd Week of 91-113 Using the Electronic Library Searching for Material on the Web Hacking Google Searchs The Second Step Advanced Google Hacking Readings: The concept of Google hacking is to use Google's advanced search tools and data to find data in the "deep web".
P Krolak

7 Clever Google Tricks Worth Knowing - 0 views

  •  
    Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of. Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks and hacks. Although there are many others out there, these 7 tricks are my all-time favorite.
P Krolak

Google 70 20 10 - 0 views

  •  
    A great Google portal overview that will satisfy all your needs for a class presentation. Covers all the basic tools and products.
P Krolak

SAIC: Medical records for 4.9 million TRICARE beneficiaries were stolen - Nextgov - 0 views

  •  
    Science Applications International Corp. said backup computer tapes containing sensitive health information of 4.9 million Military Health Care System TRICARE beneficiaries treated in the San Antonio, Texas, area since 1992 were stolen from an employee's car Sept. 14.
P Krolak

Google hacking exposes large caches of personal data - 0 views

  •  
    Google hacking, which has been on the rise this summer, is a bit of a misnomer. Also known as Google dorking, Google hacking refers to cybercriminals' enterprising use of Google's advanced search functions to find caches of valuable data ripe for the taking.
P Krolak

Summary of how a hacker creates and attack and tools to prevent or detect - 0 views

  •  
    This is more for reference and is a little dated. However, the basic approaches and techniques are still relevant and the diagrams are also useful. The approach is mostly UNIX,
P Krolak

Google 301 -- Uber Google - 0 views

  •  
    This covers some of the tools and services under development and how to use them. While it is a little bit behind the curve, it covers search blogger, newsgroups, and other tools. It also list sites for Google employee blogging and sites that speculate what Google's next big thing will be.
P Krolak

Surveillence Society -- security and privacy in the Internet Age - 0 views

  •  
    The advance of wireless technology, smart sensors, and cloud computing have changed the government's approach to security in the face of 9-11 and global terrorism. The Internet is being used in ways we could not have imaged a decade ago. This powerpoint explores issues of surveillence, privacy, and evovling law in the context of world events.
P Krolak

Facebook sorry over tags launch - 0 views

  •  
    Facebook has apologised for the way it rolled-out a new system that recognises users' faces. The social network said that it should have done more to notify members about the global launch. Its Tag Suggestions feature scans photos and automatically picks out existing friends.
P Krolak

BBC NEWS | UK | New face scanners at airport - 0 views

  •  
    Ideas for 91 113 apps
P Krolak

Facial scanner breach at airport - 0 views

  •  
    Facial recognition gates at Manchester Airport were temporarily taken out of use after a couple walked through the scanners after swapping passports. It is believed the pair passed through the gates in Terminal One on the morning of 8 February. The UK Border Agency said they were stopped by the immigration officer supervising the gates afterwards.
P Krolak

Emotion sensor catches out liars - 0 views

  •  
    A sophisticated new camera system can detect lies just by watching our faces as we talk, experts say. The computerised system uses a simple video camera, a high-resolution thermal imaging sensor and a suite of algorithms. Researchers say the system could be a powerful aid to security services.
P Krolak

Online photos can expose identity - 0 views

  •  
    Face recognition technology can be used to gain access to a person's private data, according to a new study. Researchers at Carnegie Mellon University combined image scanning, cloud computing and public profiles from social network sites to identify individuals in the offline world. Data captured even included a user's social security number.
Beibei Yang

Teaching App Inventor - AppInventor.org: Building Apps with App Inventor For Android - 0 views

  •  
    Thanks to Michael
1 - 20 Next › Last »
Showing 20 items per page