Skip to main content

Home/ IB ITGS/ Group items tagged IT SYSTEMS

Rss Feed Group items tagged

Eunice Vincent

Nations May Reuse More Electronics Than Thought - 0 views

  • "At least 85 percent of discarded computers imported to Peru are reused, as opposed to going directly to recycling. [... Thus,] the image of the trade in e-waste as mainly being about dumping unusable junk is, at least for Peru, inaccurate."
    • Eunice Vincent
       
      Social: Globalization
  • "highly dynamic flow [that] reuses and recycles almost every part and material found in a computer,"
    • Eunice Vincent
       
      IT SYSTEMS: basics
  • that it is possible to stop the environmentally damaging practices without diluting or eliminating informal dismantling and collection. This informal reuse and recycling sector is valuable for generating employment in the country and in making computing technology more accessible to low-income families and small businesses, the paper contends.
    • Eunice Vincent
       
      AREAS OF IMPACT: business, science&the environment
Maliha Rahman

loosing money through ebay - 0 views

  • But as these businesses have grown and gained popularity, security issues have also surfaced. Fears over identity theft, account theft, phishing (typically sending out fake e-mails that copy the appearance of trustworthy Web sites in order to dupe unsuspecting customers into giving out sensitive information) or buying faulty or broken products have always been a problem for eBay.
    • Maliha Rahman
       
      Fake, old, broken and unworthy products are sold on this site, making it an unreliable source.
    • Maliha Rahman
       
      (SOCIAL, Security) People sell items for twice the price and can also steal money from the credit cards issued on this site, in other words theft of identity and account which highly insecure and can also violate privacy.
  • the online auction site eBay.com is the perfect place to find a treasure trove of hard-to-find products and collectibles.
    • Maliha Rahman
       
      A communication system through which people purchase needed products and collectibles. (internet website)
  • One of a bidder's worst nightmares is spending lots of money on an item, only to receive the wrong product or nothing at all.
    • Maliha Rahman
       
      (Impact, Business) Ebay is mainly a site where people do their social/personal business, for example biding and buying clothes and shoes. This can be a great rip of because no one knows how good their purchasing item is. it causes a big loss in their own business
Shih-Chen Chiu

'Facebook Lite' gets public debut - 0 views

  • aimed at countries where broadband is limited.
  • Facebook Lite appears to be a cut-down version of Facebook and is aimed at countries where broadband is limited.
    • Shih-Chen Chiu
       
      IT systems in a social context-software & applications
  • "Facebook Lite is a fast-loading, simplified version of Facebook that enables people to make comments, accept friend requests, write on people's walls, and look at photos and status updates," the statement continued.
    • Shih-Chen Chiu
       
      social & ethical issues- globalization, equality of acces
  • ...2 more annotations...
  • The site is currently on trial in India and it is thought there are plans to extend this to China and Russia.
    • Shih-Chen Chiu
       
      areas of impact- business
  • In a statement Facebook said the new service would be a "faster, simpler version similar to the Facebook experience you get on a mobile phone".
    • Shih-Chen Chiu
       
      social & ethical issues people and machines
Chalana Perera

The Fonly Institute: Problems with the $100 laptop - 0 views

  • Distribution problems
  • Hardware issues – power generation
  • Hardware issues – mesh networking
  • ...3 more annotations...
  • When they have, connection is too slow to work properly in class-time. Wireless signal it is not strong enough, so they can't connect from home
  • What if each child had a smartphone or a netbook
  • it has not been generally validated as bringing about new paradigms of child learning
Jeff Ratliff

Vancouver's Programmable Lights (PBS ArtBeat) - 0 views

  •  
    Participants can create a light display on the project's Web site, VectorialVancouver.net, where they will also find a virtual model of Vancouver. Users create instructions for a new night-time display by setting the angles and power of the searchlights. The information is then queued in a server that operates the robotically maneuvered lights. The searchlights quietly project a new image every 12 seconds. For those who can't see it in person, the entire show is captured live via four Web cameras set up around Vancouver.
anonymous

TLS (Transport Layer Security) - (Wikipedia) - 0 views

  •  
    An overview of TTS (transport layer security) and it has changed from the orginal one, SSL (Secure Sockets Layer). TLS is the standard track protocol, that was based on the earlier SSL specifications developed by Netscape corporation
Chalana Perera

Cyber-attack Trends in US Corporations - Statistics (Biz Forum) - 1 views

  •  
    This document gives an in-depth analysis into the impacts on US Corporations and non-government businesses/private firms and contractors. It includes many statistics and reviews as well as collected data from a variety of sources.
Chalana Perera

Debate over possible responses to cyber attacks (MSNBC) - 0 views

  • the U.S. military's secret offensive cyber capability
  • counterstrike on an attacker's computer network
  •  
    This article discusses the idea of a cyber-war and promotes tit-for-tat solutions and counter-attack strategies that the US could use in a cyber war. It also discusses some short term solutions for small-scale cyber attacks.
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
Chalana Perera

BBC NEWS | UK | Education | Danish pupils use web in exams - 0 views

  • The teachers also think the nature of the questions make it harder to cheat in exams
  • the internet is so much a part of daily life, it should be included in the classroom and in examinations.
  • they can use the internet to answer any of the four questions.
Chalana Perera

West Africa looses and regains internet connection - 0 views

  • A cable fault that caused a major blackout
  • causing severe problems for its banking sector, government and mobile phone networks.
  • Services were severely disrupted or knocked out in Togo, Niger and Benin.
  • ...4 more annotations...
  • Countries had to either reroute traffic overland or use expensive satellite links to maintain connectivity.
  • Nigeria was particularly badly hit because around 70% of its bandwidth is routed through neighbouring Benin.
  • SAT-3 cable lands in eight West African countries as it winds its way between Europe and South Africa.
  • by Suburban Telecom, was set up to bypass Nigeria's principal telecoms operator Nitel which runs the SAT-3 branch cable which lands in Nigeria.
Maliha Rahman

Background on Phishing Attacks-(The Honeynet Project) - 1 views

  •  
    This is a page of the honeynet project. It discusses the history of phishing and how it has developed since 1990. How it has affected businesses and how it's popularity has increased. It also discusses the technology part behind the phishing attacks.
anonymous

Anti-Spam - (Security Focus) - 2 views

  •  
    Security overview of Spam, how to filter it and how to reduce it.
Maliha Rahman

Prevention from sexting (all business) Criterion B - 0 views

  •  
    This article briefly discusses the idea of Sexting and solutions that many people are trying to come up with to prevent it from happening. It talks about how they have to come up with a solution but also consider the importance of technology that plays in teenagers lives.
Jeff Ratliff

Understanding Computers and the Internet | Harvard Video Course - 0 views

  •  
    This course is all about understanding: understanding what's going on inside your computer when you flip on the switch, why tech support has you constantly rebooting your computer, how everything you do on the Internet can be watched by others, and how your computer can become infected with a worm just by turning it on. In this course we demystify computers and the Internet, along with their jargon, so that students understand not only what they can do with each but also how it all works and why. Students leave this course armed with a new vocabulary and equipped for further exploration of computers and the Internet. Topics include hardware, software, the Internet, multimedia, security, website development, programming, and dotcoms. This course is designed both for those with little, if any, computer experience and for those who use a computer every day.
Jeff Ratliff

Sexting: at least 15 percent of teens take part (The Christian Science Monitor) - 3 views

  •  
    "I tell kids the five P's," Ms. Aftab says. "If you don't want your parents, your principal, a predator, the police, or your potential coach, college recruiter, or boss to see it, don't post it publicly."
Zaheen Ahmad

BBC NEWS | Programmes | Click | Pirates look forward to business - 0 views

  • UK's Federation Against Copyright Theft (Fact).
  • "They have advertising on their sites and, as those sites attract more eyeballs, they are getting more advertising income.
  • Isohunt, Mininova and The Pirate Bay.
  • ...4 more annotations...
  • - links to TV, film and music files held on its users' computers.
  • Peer-to-peer (p2p) software connects users to one another and shares files through means such as so-called bit torrent, which chops up files into manageable bits.
  • No copyright content is hosted on the websites themselves - they simply do the indexing of the available content.
  • damages to entertainment companies such as Columbia Pictures, Warner Brothers, EMI and Sony Music Entertainment.
  •  
    For the Issue analysis
Jeewon Yoon

BBC NEWS | Technology | MySpace to acquire music service - 0 views

  • MySpace will acquire the popular music discovery service iLike that allows users listen to and share music across social networks.
    • Jeewon Yoon
       
      Social Authenticity Impact Art
  • The company has 55 million registered users and has been prominent on most social networks apart from MySpace
    • Jeewon Yoon
       
      IT system Basic
shazad rouf

BBC NEWS | Technology | Video appears in paper magazines - 0 views

  • The video-in-print ads will appear in select copies of the US show business title Entertainment Weekly.
    • shazad rouf
       
      IT systems in a social context: Applications
  • He likened the technology to the Daily Prophet - a newspaper with moving pictures described in the Harry Potter books.
« First ‹ Previous 61 - 80 of 467 Next › Last »
Showing 20 items per page