Skip to main content

Home/ Fabroa ICS2O/ Group items tagged Computing

Rss Feed Group items tagged

keno aguiar

The 10 fastest computers in the world | News | TechRadar - 0 views

  •  
    This article is about the ten fastest computers in the world. they tell us about the speed of the computer, where they are, how pricey they are and other interesting facts about them. This is related to our class because we have been using computers during these classes, and this would be cool because we would see how advanced technology is now. 
Jihae Jeon

Networking News, Videos, Reviews and Gossip - Lifehacker - 1 views

  •  
    This article is very important if you have important files in your computer or of you share your wi-fi with someone else. This article tells you how to protect your computers and data when someone else is using your network. Similar things happened to my family when someone hacked into my network. We had to change our password. There are many ways to protect your computer such as creating a difficult password, turning off file sharing and network discovery, hiding your files, creating a separate network for guest network, or by locking down your network. This would be a very useful for my family to ensure that no one else will break into our network again. I think this article would be very helpful to everyone because I think everyone has something they want to hide form anyone else in their computer and this article could help them to hide those files. 
Daniel Le

What If Your Smartphone Could Read Your Mind? Kimera Is Working On It - 0 views

  •  
    We all know that voice recognition software exists having been created by companies like Apple, some of us thought that advanced technology would end at a computer recognizing words and responding to questions. However that is not the case. A company called Kimera Systems is developing a system that figuratively reads your mind. This isn't a software that literally reads what you are thinking and performs an action based on your thought since that would require an implant into your body. Rather, Kimera's system consisting of the Salience Engine and DigitalMe (or DMe) Smart Agents. The Salience Engine collects information from its users and uses this to understand human action better while the Smart Agents perform actions based on the user's preferences and the user's previous actions. For example, if a user sent out party invitations to friends and then went out to buy groceries, Kimera's system would automatically download a shopping app for the user because the system understands the user is going to the grocery store to buy select food items. This system, should it be implemented into future phones and devices could very well change society for the better and for worse. This system could make people's lives better by allowing decisions to be made by the system for the user so they can worry about other things while knowing Kimera's system will take care of tasks for them. This could negatively impact society though because since the system automatically makes decisions for the user, if they begin to rely on this system and lose their sense of judgement rendering them unable to decide without this system. Though automated technology is the dream of many, is an automated life really what we want? From this new technology Kimera is creating, other more advanced automated technologies could arise and eventually we could end up losing our humanity since everything we need to do is done for us by a computer. We would end up like the humans in the movie Wall-E who were
Lynn Bui

Man arrested over bizarre hacking campaign involving cat - 0 views

  •  
    This article is about a man in Tokyo who sent many mass killing threats to a comic book event and many schools. Each threat would be followed by a riddle. The man hacked computers and sent messages to newspapers and broadcasters saying that details of a computer virus used to send the threats were strapped to a cat living on an island near Tokyo. Police found the cat and with it found a message that said that no more messages will be sent. Police analyzed the memory card and footage taken by security cameras and suspect that Katayama -a resident of Tokyo- was responsible for the hacking campaign. This article is a prime example of the dangers of computing and shows that the security of our computers is still not perfect and can be breached. I see this man's act as a childish call for attention and believe that this man should grow up and "get a life" as some would say. I don't understand how a grown man could have the heart to threaten the lives of many innocent children; I hope that there is retribution for such an offense.
Jason Strassler

Best Processor for Gaming - 1 views

  •  
    This article is of interest to me because it explains what the best processor is for gaming. I have always loved playing video games and I am constantly on the computer but now I can do both. Learning about which processor is best for gaming is important and significant for someone who wants to play video games on the computer. Choosing the right processor is key to have the best gaming experience possible. This starts from choosing a processor that is in your price range, has powerful graphic features, but can also fulfill your needs of playing fast, at a high performance, and without it taking too much space on your hard drive. Overall, I have a better understanding about gaming on the computer and I hope to use this information to start to game on the computer in the most efficient and fastest way to play.
Malaika Thompson

Access Your Computer From Afar This Weekend - 0 views

  •  
    This is something everyone can use. You could use this to turn off your computer when you're on the go, access files and much more. This could come in handy for students. If they were to forget to email a file from their computer to their laptop they could access and print the files from their desktop. You would also be able to stream media to your devices from your phone. I know I would be using this frequently. 
Brandon Bare

Perform Nearly Any Windows Task with One Keystroke - 0 views

  •  
    This article represents a tool called the AutoHotkey. This is a downloadable program that will help you create shortcuts for system tasks in Windows. This tool can assign hotkeys such as shutting down or restarting your computer, adjusting volume, and opening/closing the CD drive, etc. I find this very convenient for people who use their computers everyday because it arranges a more faster and easier use for system task. It is also very useful for people who are lazy and don't want press buttons on certain areas of the computer or monitor.
Alyssa Ayade

Biological computer can decode images stored in DNA chips, applications remain unclear ... - 0 views

  •  
    This article is interesting to me because it tells how scientists have discovered a way to decode DNA chips using biological computers. The DNA chips contain images/info that are "hidden" in the chips, so to say, and are not able to be seen unless they are decoded by these computers. I think that this would be helpful for many people (not only scientists) because it can be useful for keeping important information stored for personal use granted that they have the right equipment to decrypt the chips first.
Walter White

Computer Careers Review 2014 | Careers Overview | IT Jobs | Computer Jobs - TopTenREVIEWS - 0 views

  •  
    A helpful article showing a comparison between the top 10 careers involving computing. Shows a comparison between benefits, job availability, advancement potential, salary, and more involving careers in computing. In a world where finding a job straight out of university can be difficult, and choosing where you want to go in life is an issue, a guide like this can be a god send, and very welcome in this day and age.
  •  
    Please see me to clarify how to properly post your bookmarks
Robert Augustynowicz

Early engagement key to getting girls into science careers, Canadian study says - The G... - 0 views

  •  
    Studies are showing that a very small amount woman have or are working towards jobs in the field of computer science. A lot of time and effort is put into seeing how to get girls and woman interested into practises like computer science. Recent work shows that girls must be exposed to these subjects at a young age. A survey of over 600 girls in the Maritime Provinces reviled that girls who had participated in events consisting of science, engineering, or computers were almost 3 times more likely to choose a path in one of those studies. I believe that for girls there should be a larger focus on the sciences and technology so they would have a larger amount of careers to think about.
Daniel Le

"Ransomware" Worm Now Spreading On Skype [Update: Skype Advises Users Upgrade Their Sof... - 1 views

  •  
    With the popularity of social media growing rapidly everyday, so are the number of ways people are trying to steal your information. One such case is the Dorkbot or Ransomware worm that has previously attacked Facebook and Twitter has now began spreading through Skype. Criminals using Dorkbot infect it into computers through sending innocent-looking links to victims. Once a victim clicks the link, the worm blocks all files on the victim's computer from use  and uses these files as ransom for a set amount of money. Should the victim refuse to pay the ransom, all the files will be deleted.  This article shows that as easy as it is for our computer to collect data, it can just as easily have this data stolen, all it takes is a single opened link. It is always stressed to never open links that seem suspicious, yet many people will open links without any regard for their data. I think it's very low how online criminals will stop at nothing to find sneaky ways to steal other people's information and their money. Are they so lazy to make money on their own that they will just leach off of people who worked hard to make money to support themselves? People who don't take precautions while browsing the Internet are just as at fault as the criminals who plague the web. Since people are caring less about the safety of their data as the number of cyber criminals increases, it will be inevitable that web browsers will have to increase security or the government will have to make an effort to track down cyber criminals and set laws to punish cyber criminals more harshly.
Daniel Le

Are you ready for appliances that are smarter than you? - Tech News and Analysis - 0 views

  •  
    LG released its newest refrigerator called the Smart Thing.which as you can guess, is a "smart" fridge. The fridge can communicate and interact with your Android phone to complete or help complete some of its tasks. This fridge can tell you what is in the fridge, scan barcodes of food products, suggest recipes based on the user's preferences and lifestyle, notify expiration dates, and count your calories. All these features can be done on an Android smartphone. Everyday, technology is improving itself to be better than its predecessor and allowing us to live simpler, more automated lives. This fridge is bringing computing into the kitchen by allowing us to do more things with our fridge other than just store food. We can now have our questions like "when will the eggs expire?" answered automatically by this new fridge. It appears as time goes on, the implementation of computers into our daily lives will be more and more prominent. The LG Smart Thinq is an amazing appliance because it is redefining the refrigerator entirely by making it so that modern fridges should soon have built-in computers. Yes this fridge is expensive at about $4500, but over time this price will drop to something more reasonable and also influence other companies to make fridges just like this one. Though this is a cool fridge, I still wonder who would buy a $4500 fridge.
anna karbasi

Ecommerce Sales Topped $1 Trillion Worldwide in 2012 - 0 views

  • Ecommerce Sales Topped $1 Trillion Worldwide in 2012 1.4k Shares
  • Share Tweet What's This? Seth Fiegerman2 hours ago Ecommerce is now a trillion-dollar industry.
  • ales will grow at a slightly lower rate of 12.2% in 2013 to $409 billion. Asia-Pacific sales, on the other hand, will grow by 30% to $433 billion.
  • ...1 more annotation...
  • growth in North America and the Asia-Pacific region, according to a new report from eMarketer. North America sales increased 13.9%
  •  
    this is my first bookmark
  • ...5 more comments...
  •  
    this is my first bookmark
  •  
    this is my first bookmark
  •  
    This is my first bookmark
  •  
    This is my first bookmark 
  •  
    First bookmark.
  •  
    this is my first bookmark
  •  
    my first bookmark
Lynn Bui

Exclusive: Apple, Macs hit by hackers who targeted Facebook | Reuters - 0 views

  •  
    This article is about how Apple was hacked on Tuesday February the 19th, 2013. Basically, unknown hackers infected some Apple workers computers when they visited a website for software developers This website had been infected with malicious software that was designed to target Mac computers. Some people are saying that the malware could have originated from China, but there is no proof. Some of the malware was distributed through a site aimed at iPhone developers. It might still be infecting visitors who haven't disabled Java in their browser. F-Secure a security firm wrote that the hackers might have been trying to get access to codes for apps on smartphones which would allow them to infect millions of app users. Hackers recently found out a sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc's Flash software. What I find very interesting is that the breaches described by Apple mark the highest-profile cyber-attacks to date on businesses running Mac computers. This shows that we should make an effort to protect our information especially since one of the largest technology companies has been breached. With cyber security attacks on the rise, we should all be aware and careful of the sites that we are visiting. Apple workers simply visited a website for software developers and became infected with the virus. The hackers are breaking many laws by hacking Apple, Apple intents to find the hackers with the help of the police.
Justin Hernandez

Cross-site Scripting Attacks Up 69% - 0 views

  •  
    This articles talks about how a computer security attacking program called Cross-site Scripting (XSS) is being more popular among hackers. As we know, ISC2O which is us, spend our classes on the computers each day. This scripting partially relates to what we do since we have already learned basics of HTML and CSS programming languages. Not to mention, we're leading up to learning about Java Script which is one example of a scripting language such as XSS. There are probably a few of us that have had our own computers attacked(hacked) or put our own secretive information has been put onto the web. Many of us use social networks and sometimes, we display some personal information which can be retrieved by others through using this program. In addition, when we buy different products online, we put out some credit card details that can also be stolen and potentially be used. In addition, the number of cyber attacks can still rise as the holidays come by and eCommerce will increase and can cause more attacks. This relates to Privacy and Security this has to do with social networking as information that's displayed can be stolen and any other personal information can be taken.
ecaterina smirnov

South Carolina - State Computer System Is Hacked - NYTimes.com - 0 views

  •  
    This article is about South Carolina which had a hacker break into the state's computer system. It was said that a hacker from another country staged several attacks on the State Department of Revenue since August. This exposed 3.6 million social security numbers and 387,000 credit and debit card numbers and all but 16,000 of the credit card numbers are protected by encryption, but hackers can decrypt them. People that filed tax returns since 1998 are to contact state law enforcement officials to prevent identity theft. They still haven't found the hacker. This article relates to Privacy and Security as well as legal issues because it deals with hacking important information profiles of people such as their credit card numbers and social security numbers. As well as creating a possibility for identity theft.  This could create lots of problems for people and the government because of a hacker. It is times like these where we think how we can tighten security for these things stored on the computer? We also think is it just best to stay away from technology for these matters, because of moments like these where mass information that was stored is now exposed.
Veronica Misko

What's the Worst the Mac Flashback Trojan Could Do? - 0 views

  •  
    Apparently around 650,000 mac computers were infected with Trojan horse virus called "Flashback" This trojan is hijacking people's search engines in result of their web browsers it pretty much damages the inside of the computer, it also steals banking or log in credential.  Cyber criminals could send new malware to their systems that cause bigger problems. This flashback was designed to conduct a click fraud scam.  Apple released a security patch for Java  that prevents Flashback Trojan from infecting your computer/mac.  
Alyssa Ayade

Benefits of Backing up Your Hard Drive | Computer Specialist - 0 views

  •  
    This article gives the reader helpful information and the benefits to backing up your computer/hard drive. Without doing so, in the state of some kind of malfunction on your computer, you could be in a situation where all your files have been deleted and there is no way to get them back because there was no back up. This article appealed to me because I learned the hard way from a while back when my laptop had been infected with a virus which deleted every single program I had (even iTunes). 
Brian Agas

IBM's $43 Million Computer For the World's Largest Radio Telescope - 0 views

  •  
    When it's built, the Square Kilometer Array will be the world's largest radio telescope. Then, when it goes online, it will spit out 1,000,000 terabytes of data each day-and IBM is trying to make a computer which can handle it. The Squarer Kilometer Array-which will be made up of 15,000 small antennas and 77 larger stations-will collect a heap of data that scientists hope will shed light on the origins of the Big Bang. The sheer weight of numbers means it will generate a staggering amount of information. To give some context, it will generate 1,000,000 terabyte a day. That's twice as much information as there is traffic on the internet in the same period. It's an insane amount of data. This relates to the course because we learn about the amount of bytes computers use, and this satellites allows us to use 1,000,000 terrabytes a day.
‹ Previous 21 - 40 of 288 Next › Last »
Showing 20 items per page