Skip to main content

Home/ IB ITGS/ Group items tagged 2

Rss Feed Group items tagged

anonymous

Facebook, Fake ID, Effects (Info World) - 0 views

  •  
    Talks about the security implications of web 2.0, including identity management and privacy concerns. The legal effects of faking an account in web 2.0 has been adressed as "the dark side," due to the seriousness, and immediate effects if someone is caught doing it.  The Internet is just another form of human expression, so it's subject to human imperfection like any other conduit," said Chris Alden, CEO of blogging company Six Apart, who was on the panel with executives from Facebook and the South Korean Internet giant Daum Communications.
anonymous

US Gov. 2.3 gegapixel camera - 0 views

  • it also means that people can be illuminated without being aware of it.
    • anonymous
       
      What about privacy, of people who are not criminals?
  • The ability to provide real-time surveillance of large areas may be getting closer, as the Army launches a quest for a 2.3 gigapixel camera that could be packaged aboard a drone or a manned aircraft.
    • anonymous
       
      Social > Privacy
  • In terms of specifics, the Army is looking for 2.3 gigapixels running at two frames per second. By my reckoning, this suggests continuous coverage of area of around sixty-two square miles at 0.3m resolution with a single sensor
    • anonymous
       
      It systesms > harware & software
  • ...1 more annotation...
  • Airborne cameras providing a persistent view were a key factor in Task Force ODIN’s success in Iraq; given the new technology, their successors could have even more impact. And those cameras might have some effect on the home front too.
Chalana Perera

BBC NEWS | Technology | Search users 'stop at page three' - 0 views

  • Most people using a search engine expect to find what they are looking for on the first page of results,
  • good results should have "good pages, text rich content, and good links pointing to you".
anonymous

BBC NEWS | Technology | Web tool oversees Afghan election - 0 views

  • Their reports feature alongside those of full-time Afghan journalists to ensure the election and reporting of it is as "free
  • The Alive in Afghanistan project plots the SMS reports on an online map.
  • The text messages are collected via a free-platform known as FrontlineSMS, developed by UK programmer Ken Banks.
  • ...8 more annotations...
  • Any attempt to rig or interfere with Afghanistan's election could be caught out by a system that allows anyone to record incidents via text message.
  • authenticity.
    • Chalana Perera
       
      stakeholder 2
  • Ushahidi
    • Chalana Perera
       
      stakeholder 1
  • National Security Council
    • anonymous
       
      Stakeholder 3
  • "We hope to enable people to report on what is going on in the country
    • anonymous
       
      Stalkholder 4, the people create the impact, and are going to use the SMS technology.
  • of Afghanistan has asked all domestic and international media agencies to "refrain form broadcasting any incidence of violence during the election process".
    • anonymous
       
      Areas of Impact>Politics and Government
  •  
    Any attempt to rig or interfere with Afghanistan's election could be caught out by a system that allows anyone to record incidents via text message.
Ali Parrish

Nokia: New Laptop Offering - 0 views

  • The Booklet also has integrated Bluetooth, GPS, a webcam and an SD card reader. Nokia claims it has a 12-hour battery life.
  • "The presence of this internal wireless modem is why the Booklet 3G is a natural extension to Nokia's traditional phone handset product range."
  • "A growing number of people want the computing power of a PC with the full benefits of mobility," said Kai Oistamo, Nokia's executive vice president for devices.
  • ...3 more annotations...
  • The Booklet has an aluminium case, weighs 1.25 kilograms (2.75 lbs) and its 10-inch screen is HD-ready.
  • Mr Fogg said the Booklet's unique selling point was an "internal mobile broadband card with a SIM slot." "Other netbooks rely on external USB mobile broadband modems for Internet access," he wrote on his blog.
  • The Windows-based device is about 2cm thick and will offer 3G connectivity as well as wi-fi.
samaraad

Two million US PCs recruited to botnets - 0 views

  •  
    Hi-tech criminals use botnets to send out spam . It was found in the US that "More than 2.2 million US PCs were found to be part of botnets, networks of hijacked home computers, in the first six months of 2010"
Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
anonymous

HowStuffWorks "How Credit Cards Work" - 1 views

  •  
    Credit card history, how it has come along since 1999. This is from How Stuff Works, and talks about the size of the credit card: "A credit card is a thin plastic card, usually 3-1/8 inches by 2-1/8 inches in size, that contains identification information such as a signature or picture, and authorizes the person named on it to charge purchases or services to his account -- charges for which he will be billed periodically." he first universal credit card -- one that could be used at a variety of stores and businesses -- was introduced by Diners Club, Inc.
anonymous

Is Spam Here to Stay? - (Information Today, News Bank) - 0 views

  • http://docs.newsbank.com/openurl?ctx_ver=z39.88-2004&rft_id=info:sid/iw.newsbank.com:PPCT&rft_val_format=info:ofi/fmt:kev:mtx:ctx&rft_dat=129EEE11E71D65B0&svc_dat=InfoWeb:newcat&req_dat=B4CD8BC1A80B43D794A5481B6FC40219
  •  
    This article gives a little background information of spam in 2006, and 2008. It talks about the costs, ussage and cases. Spam acounts for nearly 200 billion messages each day, which translates to about 90% of email worldwide. The U.S. is the biggest source at 17.2%.
laila-hass

Smart Dust - Computerworld - 2 views

  • Smart dust" devices are tiny wireless microelectromechanical sensors (MEMS) that can detect everything from light to vibrations. Thanks to recent breakthroughs in silicon and fabrication techniques, these "motes" could eventually be the size of a grain of sand, though each would contain sensors, computing circuits, bidirectional wireless communications technology and a power supply. Motes would gather scads of data, run computations and communicate that information using two-way band radio between motes at distances approaching 1,000 feet.
  • The goal for researchers is to get these chips down to 1mm on a side. Current motes are about 5mm, says Kristofer Pister, professor of electrical engineering at UC Berkeley, who's been working with smart dust since 1997.
  • The cost of motes has been dropping steadily. Prices range from $50 to $100 each today, and Pister anticipates that they will fall to $1 within five years.
  •  
    "Smart dust" devices are tiny wireless microelectromechanical sensors (MEMS) that can detect everything from light to vibrations."
  •  
    This is a great article and the smart dust devices have the potential to impact of so many industries and sectors of society. Thanks for sharing.
Eunice Vincent

BBC News : Two held in global PC fraud probe - 1 views

  • Two held in global PC fraud probe
  • Two held in global PC fraud probe
  • Two held in global PC fraud probe
    • Eunice Vincent
       
      Eunice Trojan- information theft security business, government
  •  
    Two suspected hackers are arrested in an investigation into software designed to steal banking information.
anonymous

BBC NEWS | Technology | Government opens data to public - 7 views

  • Government opens data to public
    • anonymous
       
      Claimed by Iman and Dol.
  •  
    Iman's and Dol's Article
  •  
    Iman's and Dol's Article
Johan Autio

New Sunglasses Let You See Another's Emotions...Really - Forbes - 0 views

  •  
    Image courtesy of 2AI Labs One day soon, you may be standing next to someone wearing sunglasses at a bus stop and notice that they are staring at you, really staring. Look closely at the glasses and you might find a logo with the name "O2Amp", and if you do, you'll [...]
1 - 20 of 196 Next › Last »
Showing 20 items per page