Skip to main content

Home/ IB ITGS/ Group items tagged A

Rss Feed Group items tagged

Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
Luay Kanaan

The Secret Of Google's Book Scanning Machine Revealed - As A Matter Of Fact Blog : NPR - 28 views

  • The software used to scan books, called Optical Character Recognition software or OCR for short
    • dana engineer
       
      how can you destroy a book when u scan it?
    • dana engineer
       
      Google created a nifty infared camera technology that detects the three-dimensional shape and angle of book pages when it is placed in the scanner. It allows the OCR software to read text more accurately.
    • Bassel Kanj
       
      Yeah.
    • Luay Kanaan
       
      Google actually created a camera technology that detects the three-dimensional shape and angle of book pages when it is placed in the scanner. It allows the OCR software to read text more accurately.
  • ...12 more annotations...
  • How was one to go about scanning a book quickly and efficiently without destroying it?
  • book scanning was a tedious process that sometimes resulted in the death of a book.
  • The software used to scan books, called Optical Character Recognition software or OCR for short
    • Dalal Najibi
       
      How is the process? Do they have to open every book and scan each page?
  • Google created some seriously nifty infrared camera technology that detects the three-dimensional shape and angle of book pages when the book is placed in the scanner
  • a way to digitize books en masse
  • The Secret Of Google's Book Scanning Machine Revealed
  • The Secret Of Google's Book Scanning Machine Revealed
  • Now anyone who's ever opened a book knows it's next to impossible for a book to lie flat without some sort of device. One solution to the problem was to use glass plates that individually flattened each page, but this method wasn't very efficient. The other solution was to chop off the book's binding, but that method destroyed the book.
  • It was a problem that vexed book scanners for years until Google came up with this solution
  • OCR for short
  • was a tedious process that sometimes resulted in the death of a book
  •  
    Message board assignment
  • ...1 more comment...
  •  
    Message Board Assignment
  •  
    Message board assignment
  •  
    Message board assignment
Maliha Rahman

Rogue pharmacies still a problem for search engines | Health Tech - CNET News - 1 views

  • The study, conducted by LegitScript, an online pharmacy verification service, and KnujOn, an Internet compliance company, found that 90 percent of the reviewed Internet pharmacy advertisements were from fake or illegal Internet pharmacies.
    • Maliha Rahman
       
      (IT systems: communication system): the idea that 90% of the pharmacies advertising online through the internet are fake and illegal , and is providing people with a unreliable communication system.
  • "We were able to purchase potentially addictive drugs without a prescription or any age verification via Bing.com ads," LegitScript President John Horton told CNET News. "We also received counterfeit medication. Microsoft profits from these illegal ads, which put Internet users at risk."
    • Maliha Rahman
       
      fake unreliable advertisements selling addictive drugs without a prescription and giving out incorrect information in order to get money. (can cause serious health issues and creating an unreliable communicating environment)
  • "the Internet has become a haven for drug seekers and abusers, particularly (regarding) controlled substances. It is a much more serious and dangerous phase of the Internet."
    • Maliha Rahman
       
      unreliable, illegal communication system
  • ...2 more annotations...
  • Microsoft disputes LegitScript's claim that 90 percent of the sponsored Internet pharmacy ads on Bing are fake or illegal, adding that it is working to weed out the rogue advertisers that do slip through. The company uses an Internet pharmacy verification service called PharmacyChecker--a competitor of LegitScript--to ensure that its sponsored prescription drug advertisements are legitimate.
    • Maliha Rahman
       
      (social, integrity)getting fake internet pharmacy verification lacks intregity. in this case selling unprescribed drugs that can cause serious health issues heavy concequences
  • The authors took a closer look at 10 of the 69 online drugstores. None of the 10 required a valid prescription. Orders were placed with two of them. Of the two drugs received, both were tested and one was found to be counterfeit.
    • Maliha Rahman
       
      (Impact, Health) People all over the world are using unreliable sites and purchasing counterfeit drugs which is highly risky to one's health and can badly affect a person.
  •  
    The NABP's own analysis of search results from Google and Yahoo turned up many drug ads from sketchy purveyors.
anonymous

FDIC: End to Identity Theft/Account Hijacking - 0 views

  •  
    This article presents the study of technology used to commit account hijacking and the methods available to prevent it. It gives a clean example of a phishing as a fraud email from Citibank. "The fifth method of acquiring the information necessary to hijack accounts is by inserting malicious software (such as a keystroke logger26), often referred to as "spyware," on a consumer's personal computer at home or on a computer used by many consumers in a public facility like an Internet café"
Eunice Vincent

Warning, Your Cell Phone May Be Hazardous To Your Health: Gear + Gadgets: GQ - 2 views

  • Earlier this winter, I met an investment banker who was diagnosed with a brain tumor five years ago. He's a managing director at a top Wall Street firm, and I was put in touch with him through a colleague who knew I was writing a story about the potential dangers of cell-phone radiation. He agreed to talk with me only if his name wasn't used, so I'll call him Jim. He explained that the tumor was located just behind his right ear and was not immediately fatal—the five-year survival rate is about 70 percent. He was 35 years old at the time of his diagnosis and immediately suspected it was the result of his intense cell-phone usage. "Not for nothing," he said, "but in investment banking we've been using cell phones since 1992, back when they were the Gordon-Gekko-on-the-beach kind of phone." When Jim asked his neurosurgeon, who was on the staff of a major medical center in Manhattan, about the possibility of a cell-phone-induced tumor, the doctor responded that in fact he was seeing more and more of such cases—young, relatively healthy businessmen who had long used their phones obsessively. He said he believed the industry had discredited studies showing there is a risk from cell phones. "I got a sense that he was pissed off," Jim told me. A handful of Jim's colleagues had already died from brain cancer; the more reports he encountered of young finance guys developing tumors, the more certain he felt that it wasn't a coincidence. "I knew four or five people just at my firm who got tumors," Jim says. "Each time, people ask the question. I hear it in the hallways." It's hard to talk about the dangers of cell-phone radiation without sounding like a conspiracy theorist. This is especially true in the United States, where non-industry-funded studies are rare, where legislation protecting the wireless industry from legal challenges has long been in place, and where our lives have been so thoroughly integrated with wireless technology that to suggest it might be a problem—maybe, eventually, a very big public-health problem—is like saying our shoes might be killing us.
    • Eunice Vincent
       
      This is the part of this article i will use as the stimulus
dr tech

'Our notion of privacy will be useless': what happens if technology learns to read our ... - 1 views

  •  
    "In a world first, in September 2021, Chilean law makers approved a constitutional amendment to enshrine mental integrity as a right of all citizens. Bills to regulate neurotechnology, digital platforms and the use of AI are also being worked on in Chile's senate. Neuro rights principles of the right to cognitive liberty, mental privacy, mental integrity, and psychological continuity will be considered. Europe is also making moves towards neuro rights. France approved a bioethics law this year that protects the right to mental integrity. Spain is working on a digital rights bill with a section on neuro rights, and the Italian Data Protection Authority is considering whether mental privacy falls under the country's privacy rights."
Maliha Rahman

loosing money through ebay - 0 views

  • But as these businesses have grown and gained popularity, security issues have also surfaced. Fears over identity theft, account theft, phishing (typically sending out fake e-mails that copy the appearance of trustworthy Web sites in order to dupe unsuspecting customers into giving out sensitive information) or buying faulty or broken products have always been a problem for eBay.
    • Maliha Rahman
       
      Fake, old, broken and unworthy products are sold on this site, making it an unreliable source.
    • Maliha Rahman
       
      (SOCIAL, Security) People sell items for twice the price and can also steal money from the credit cards issued on this site, in other words theft of identity and account which highly insecure and can also violate privacy.
  • the online auction site eBay.com is the perfect place to find a treasure trove of hard-to-find products and collectibles.
    • Maliha Rahman
       
      A communication system through which people purchase needed products and collectibles. (internet website)
  • One of a bidder's worst nightmares is spending lots of money on an item, only to receive the wrong product or nothing at all.
    • Maliha Rahman
       
      (Impact, Business) Ebay is mainly a site where people do their social/personal business, for example biding and buying clothes and shoes. This can be a great rip of because no one knows how good their purchasing item is. it causes a big loss in their own business
funeral director

A Big Uplifting Hand in Time of Distress - 2 views

At a time of loss and grief, having a trusted funeral director is really a big help. That is why I greatly appreciated Funeral Director UK's practical and timely service. We were able to find a fun...

funeral direcor

started by funeral director on 24 Nov 11 no follow-up yet
Chalana Perera

The Guts of the Station Finder Map - Inside NPR.org Blog : NPR - 0 views

  • The system has several underlying database tables, including zip codes, cities and station data. The zip code and city tables, in addition to containing information about the locations, also include the latitude and longitude for the centroid each location.
  • At the core, the system works based on latitudes and longitudes.
  • Once we have the latitude and longitude, we perform a series of calculations based on the Great Circle Calcuation (GCC), which helps us to determine distances on a curved surface (ie. the Earth - and we are assuming that it is not flat). Using the GCC, we look for stations near the latitude and longitude, based on a 100 mile radius from that point. From that list of stations, which is too inclusive, we start our process of narrowing down the results to the actual stations that can be heard.
  • ...1 more annotation...
  • - a web-based service to inform our audience as to which NPR stations are available throughout the country. There are other more sophisticated, more precise ways to identify the station coverage maps which are really overkill for this type of service.
Jason Carlson

Lying - 48 views

In this situation, the man should be asked if he wants to hear straight away and the doctors should know and understand the immediate phycological impacts on sharing the truth straight away, and th...

Jeff Ratliff

Vancouver's Programmable Lights (PBS ArtBeat) - 0 views

  •  
    Participants can create a light display on the project's Web site, VectorialVancouver.net, where they will also find a virtual model of Vancouver. Users create instructions for a new night-time display by setting the angles and power of the searchlights. The information is then queued in a server that operates the robotically maneuvered lights. The searchlights quietly project a new image every 12 seconds. For those who can't see it in person, the entire show is captured live via four Web cameras set up around Vancouver.
Jeff Ratliff

Text Messages: Digital Lipstick On the Collar (The Committed Sardine) - 1 views

  •  
    This became painfully obvious a week ago when a woman who claims to have had an affair with Tiger Woods told a celebrity publication that he had sent her flirty text messages, some of which were published. It follows on the heels of politicians who ran afoul of text I.Q., including a former Detroit mayor who went to prison after his steamy text messages to an aide were revealed, and Senator John Ensign of Nevada, whose affair with a former employee was confirmed by an incriminating text message.
anonymous

US Gov. 2.3 gegapixel camera - 0 views

  • it also means that people can be illuminated without being aware of it.
    • anonymous
       
      What about privacy, of people who are not criminals?
  • The ability to provide real-time surveillance of large areas may be getting closer, as the Army launches a quest for a 2.3 gigapixel camera that could be packaged aboard a drone or a manned aircraft.
    • anonymous
       
      Social > Privacy
  • In terms of specifics, the Army is looking for 2.3 gigapixels running at two frames per second. By my reckoning, this suggests continuous coverage of area of around sixty-two square miles at 0.3m resolution with a single sensor
    • anonymous
       
      It systesms > harware & software
  • ...1 more annotation...
  • Airborne cameras providing a persistent view were a key factor in Task Force ODIN’s success in Iraq; given the new technology, their successors could have even more impact. And those cameras might have some effect on the home front too.
ajay tambay

BBC NEWS | Technology | Battling swine flu in cyberspace - 1 views

  • battling swine flu
    • Sarwat Khan
       
      AREA OF IMPACT: HEALTH
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it,"
    • Sarwat Khan
       
      SOCIAL ISSUE - PEOPLE (AWARENESS) , POLICY (SPREAD INFORMATION VIA GAME)
  • The game is played online
    • Sarwat Khan
       
      IT SYSTEMS (COMMUNICATION SYSTEMS AND APPLICATIONS)
  • ...9 more annotations...
  • "Its purpose is simply to create another avenue of information."
    • Sarwat Khan
       
      AREAS OF IMPACT: EDUCATION (SPREADING INFORMATION)
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
Maliha Rahman

Facebook urged to add panic button (BBC news) - 2 views

  •  
    This news item is about how facebook is being accused for not having a panic button to warn facebook about inappropriate behavior and potentially harmful ones. Talks about a teenager 17, Ashleigh Hall lured by a man and murdered by a false identity on Facebook. The man, Chapman, 33 was jailed for at least 35 years for the murder. "The teenager had been raped, suffocated and her body dumped in a field near Sedgefield, County Durham, after agreeing to meet Chapman."
  •  
    This article discusses an issue in which a 17 year old girl was raped and then murdered due to the use of false identity. Due to this issue, facebook has been demanded to provide a "panic button" that would give information to users on how to handle issues like these or others like cyberbullying, hacking, viruses, distressing material and inappropriate sexual behaviour.
funeral director

Reliable and Trusted Lists of Funeral Directors - 1 views

When my father died, my mom and I were so depressed. We were so broken hearted that we cannot think clearly what to do or how to arrange a decent funeral for my father. So my aunt told me to get a...

funeral director

started by funeral director on 22 Jul 11 no follow-up yet
Elvira Russ

BBC NEWS | Technology | A life recorded in bits and bytes - 0 views

  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • ...12 more annotations...
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
    • Bhumika Regmi
       
      The plan is that one can include all of their information on to the programme like Gordon Bell. If the system is to fail or have some sort of error, one's privacy as well as security is at stake.
  • in the future we may all be able to offload our own memory into a comprehensive e-memory.
    • Bhumika Regmi
       
      Applications
  • Bell, a principle researcher at Microsoft Research, has now written a book about how
    • Bhumika Regmi
       
      education
  • "You basically have a great sense of freedom, because you are able to offload your bio-memory, and just commit all of the facts to an e-memory."
  • He said that the time is right for people to take e-memories seriously.
  • "I wouldn't have said this 20 years ago because of the difficulty and the cost to do it. The opportunity now is: it doesn't cost anything to do this."
  • For Mr Bell the benefit of his experiment is simple: it makes him feel better.
  • "I have a reasonably complicated life - so I wanted to find out just how many bits were coming and going, and how to deal with it."
  • His life is kept in a database for a project called MyLifeBits.
  •  
    Gordon Bell has digitised his entire life, from shopping receipts to phone calls.
Bassel Kanj

Monitoring web use at school - 19 views

I disagree, The teacher only has the right to view his history, or view the page he is currently on. Not continue viewing his Facebook, because they are taking advantage of him/her being logged i...

SOCIAL privacy anonymity

Jeff Ratliff

Student Sues Over Alleged Webcam Spying (NPR) - 5 views

  •  
    "A high school student is suing a suburban Philadelphia school district for allegedly spying on him outside of school through the webcam of a school-issued laptop. The allegation has infuriated many parents and spurred a criminal investigation by the FBI. "
1 - 20 of 284 Next › Last »
Showing 20 items per page