Skip to main content

Home/ IB ITGS/ Group items tagged IN

Rss Feed Group items tagged

ajay tambay

BBC NEWS | Technology | Battling swine flu in cyberspace - 1 views

  • battling swine flu
    • Sarwat Khan
       
      AREA OF IMPACT: HEALTH
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it,"
    • Sarwat Khan
       
      SOCIAL ISSUE - PEOPLE (AWARENESS) , POLICY (SPREAD INFORMATION VIA GAME)
  • The game is played online
    • Sarwat Khan
       
      IT SYSTEMS (COMMUNICATION SYSTEMS AND APPLICATIONS)
  • ...9 more annotations...
  • "Its purpose is simply to create another avenue of information."
    • Sarwat Khan
       
      AREAS OF IMPACT: EDUCATION (SPREADING INFORMATION)
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
Jason Carlson

Lying - 48 views

In this situation, the man should be asked if he wants to hear straight away and the doctors should know and understand the immediate phycological impacts on sharing the truth straight away, and th...

Jeff Ratliff

Criminal hacker 'Iceman' gets 13 years (ComputerWorld) - 0 views

  •  
    A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers. Max Ray Butler, who used the hacker pseudonym Iceman, was sentenced Friday morning in U.S. District Court in Pittsburgh on charges of wire fraud and identity theft. In addition to his 13-year sentence, Butler will face five years of supervised release and must pay US$27.5 million in restitution to his victims, according to Assistant U.S. Attorney Luke Dembosky, who prosecuted the case for the federal government. Dembosky believes the 13 year sentence is the longest-ever handed down for hacking charges.
Eunice Vincent

Warning, Your Cell Phone May Be Hazardous To Your Health: Gear + Gadgets: GQ - 2 views

  • Earlier this winter, I met an investment banker who was diagnosed with a brain tumor five years ago. He's a managing director at a top Wall Street firm, and I was put in touch with him through a colleague who knew I was writing a story about the potential dangers of cell-phone radiation. He agreed to talk with me only if his name wasn't used, so I'll call him Jim. He explained that the tumor was located just behind his right ear and was not immediately fatal—the five-year survival rate is about 70 percent. He was 35 years old at the time of his diagnosis and immediately suspected it was the result of his intense cell-phone usage. "Not for nothing," he said, "but in investment banking we've been using cell phones since 1992, back when they were the Gordon-Gekko-on-the-beach kind of phone." When Jim asked his neurosurgeon, who was on the staff of a major medical center in Manhattan, about the possibility of a cell-phone-induced tumor, the doctor responded that in fact he was seeing more and more of such cases—young, relatively healthy businessmen who had long used their phones obsessively. He said he believed the industry had discredited studies showing there is a risk from cell phones. "I got a sense that he was pissed off," Jim told me. A handful of Jim's colleagues had already died from brain cancer; the more reports he encountered of young finance guys developing tumors, the more certain he felt that it wasn't a coincidence. "I knew four or five people just at my firm who got tumors," Jim says. "Each time, people ask the question. I hear it in the hallways." It's hard to talk about the dangers of cell-phone radiation without sounding like a conspiracy theorist. This is especially true in the United States, where non-industry-funded studies are rare, where legislation protecting the wireless industry from legal challenges has long been in place, and where our lives have been so thoroughly integrated with wireless technology that to suggest it might be a problem—maybe, eventually, a very big public-health problem—is like saying our shoes might be killing us.
    • Eunice Vincent
       
      This is the part of this article i will use as the stimulus
Shih-Chen Chiu

Wallet of the future? Your mobile phone - CNN.com - 0 views

  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
    • Shih-Chen Chiu
       
      social& ethical issue -people and machines ITsystems in a social context -Applications -Integrated Systems Areas of impact -Business & employment -Scoence & the enviornment
  • ...4 more annotations...
  • And technology that turns phones into credit cards and IDs poses several potential problems.
    • Shih-Chen Chiu
       
      social & ethical issues -security -authenticity -integrity -control
  • In the late 1990s and early 2000s, banks and cell phone makers started conducting trials with U.S. customers. Limited groups of people were given the ability to scan their phones to make payments, enter stadiums and access public transit.
    • Shih-Chen Chiu
       
      areas of impact -business & employment
  • If phones replace wallets, would-be thieves will see every person walking down the street talking on his or her phone as a target for robbery, said Lillie Coney, associate director of the Electronic Privacy Information Center.
    • Shih-Chen Chiu
       
      social & ethical issues -security
  • Eye scans and fingerprints would make phone IDs and payments more secure, Brown said. The ID technology might work like a corporate security badge, which pulls up personal information when scanned.
    • Shih-Chen Chiu
       
      social & ethical issues -reliability -security -integrity -privacy IT systems in a social context hardware integrated systems
anonymous

Identity Theft and Fraud - 0 views

  •  
    Description of Identity theft, and that it is indeed a crime. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. In the US and Canada many poeple have reported that unauthorized persons have taken frauds out of their bank or finacial accounts, or the worst care, taken over their identity all together (another person who is using someone else's name/credit card).
Jeff Ratliff

DARPA launches balloons - 1 views

  •  
    To mark the 40th anniversary of the Internet, DARPA has announced the DARPA Network Challenge, a competition that will explore the roles the Internet and social networking play in the timely communication, wide-area team-building, and urgent mobilization required to solve broad-scope, time-critical problems. The challenge is to be the first to submit the locations of 10 moored, 8-foot, red, weather balloons at 10 fixed locations in the continental United States. The balloons will be in readily accessible locations and visible from nearby roads.
Chalana Perera

Open Captioning for Live Theatre (Signature Theatre) - 0 views

  • without requiring special equipment
  • listening devices are also available, free of charge.
  • profit advocate for the provision of professional Live Performance Captioning
  • ...1 more annotation...
  • House which scrolls the entire text of the production, open captioning provides enjoyment for audience members who are not self-identified as hard of hearing or who merely wish to catch a missed word or phrase.
  •  
    This article describes the use of Open Captioning roling in front of the "house" or stage for the 30 million auditorically-challenged (deaf) viewers in the US.
  •  
    This article describes the use of Open Captioning roling in front of the "house" or stage for the 30 million auditorically-challenged (deaf) viewers in the US.
Jeff Ratliff

Google threatens to leave China (Independent) - 2 views

  •  
    "Last month, Google discovered that it had been the subject of a sophisticated attack on its computer systems, carried out by hackers in search of private data from more than 30 internet companies. Among the targets were the accounts of Chinese human rights activists; experts claimed the hack could be traced to the Chinese government or its proxies. In response, Google announced on Tuesday that it would stop censoring results on Google.cn - the Chinese version of its search engine - or, should Beijing oppose the move, cease operating in China altogether. "
Eunice Vincent

BBC News : Two held in global PC fraud probe - 1 views

  • Two held in global PC fraud probe
  • Two held in global PC fraud probe
  • Two held in global PC fraud probe
    • Eunice Vincent
       
      Eunice Trojan- information theft security business, government
  •  
    Two suspected hackers are arrested in an investigation into software designed to steal banking information.
dr tech

'Our notion of privacy will be useless': what happens if technology learns to read our ... - 1 views

  •  
    "In a world first, in September 2021, Chilean law makers approved a constitutional amendment to enshrine mental integrity as a right of all citizens. Bills to regulate neurotechnology, digital platforms and the use of AI are also being worked on in Chile's senate. Neuro rights principles of the right to cognitive liberty, mental privacy, mental integrity, and psychological continuity will be considered. Europe is also making moves towards neuro rights. France approved a bioethics law this year that protects the right to mental integrity. Spain is working on a digital rights bill with a section on neuro rights, and the Italian Data Protection Authority is considering whether mental privacy falls under the country's privacy rights."
shazad rouf

BBC NEWS | Technology | Video appears in paper magazines - 0 views

  • The video-in-print ads will appear in select copies of the US show business title Entertainment Weekly.
    • shazad rouf
       
      IT systems in a social context: Applications
  • He likened the technology to the Daily Prophet - a newspaper with moving pictures described in the Harry Potter books.
Luay Kanaan

The Secret Of Google's Book Scanning Machine Revealed - As A Matter Of Fact Blog : NPR - 28 views

  • The software used to scan books, called Optical Character Recognition software or OCR for short
    • dana engineer
       
      how can you destroy a book when u scan it?
    • dana engineer
       
      Google created a nifty infared camera technology that detects the three-dimensional shape and angle of book pages when it is placed in the scanner. It allows the OCR software to read text more accurately.
    • Bassel Kanj
       
      Yeah.
    • Luay Kanaan
       
      Google actually created a camera technology that detects the three-dimensional shape and angle of book pages when it is placed in the scanner. It allows the OCR software to read text more accurately.
  • ...12 more annotations...
  • How was one to go about scanning a book quickly and efficiently without destroying it?
  • book scanning was a tedious process that sometimes resulted in the death of a book.
  • The software used to scan books, called Optical Character Recognition software or OCR for short
    • Dalal Najibi
       
      How is the process? Do they have to open every book and scan each page?
  • Google created some seriously nifty infrared camera technology that detects the three-dimensional shape and angle of book pages when the book is placed in the scanner
  • a way to digitize books en masse
  • The Secret Of Google's Book Scanning Machine Revealed
  • The Secret Of Google's Book Scanning Machine Revealed
  • Now anyone who's ever opened a book knows it's next to impossible for a book to lie flat without some sort of device. One solution to the problem was to use glass plates that individually flattened each page, but this method wasn't very efficient. The other solution was to chop off the book's binding, but that method destroyed the book.
  • It was a problem that vexed book scanners for years until Google came up with this solution
  • OCR for short
  • was a tedious process that sometimes resulted in the death of a book
  •  
    Message board assignment
  • ...1 more comment...
  •  
    Message Board Assignment
  •  
    Message board assignment
  •  
    Message board assignment
Rafae Wathra

Rise of Paywalls and their Impact in the Past (The Economist) - 0 views

  •  
    The article explains how in 2010 many news companies will turn to paywalls but also how some have worked effectively in the past.
Chalana Perera

Chicago Theater offers live captioning (abc news) - 0 views

  • Their captioning runs though a PowerPoint program, says associate artistic director Sandy Shinner.
  • "We have the scripts electronically, and then it's formatted in a PowerPoint presentation and then presented both on the small television screens and on a screen, a larger screen sometimes integrated into the set design, sometimes to the side of the set on the wall,"
  • Captioning is only available for specific performances. "We could do it at every single performance, we would just have to pay someone else to be in the booth and advance text,
  •  
    This article discusses the theatre set up for handicapped and hearing impaired audiences in broadway-town CHICAGO.
  •  
    This article discusses the theatre set up for handicapped and hearing impaired audiences in broadway-town CHICAGO.
Chalana Perera

Why Subtitles may affect Theatre Set up (Electronic House) - 0 views

  • Constant Image Height' widescreen setup
  • There are three common subtitle placements for standard DVD and high-definition Blu-ray disc transfers that Hollywood has settled into: Within the film frame (like it would be if you were watching in a movie theater)Below the film frame in the bottom black bar spacePartially within and partially below the frame
  • Some disc players are capable of shifting the placement of subtitles on the screen
  •  
    This article analysizes the impacts of onscreen subtitles in theatre and screened shows, and how there are several disadvantages to having subtitles on the screen.
  •  
    This article analysizes the impacts of onscreen subtitles in theatre and screened shows, and how there are several disadvantages to having subtitles on the screen.
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
Elvira Russ

Paralysis led Donald J. Dalton to create technology for the disabled (chicagotribune.com) - 1 views

  •  
    Despite a 1969 swimming accident that rendered him a quadriplegic, Donald J. Dalton achieved tremendous success in providing technology applications for people with disabilities. This Article describes his life and achievements in a short summary.
Maliha Rahman

Young 'cyber-mentors' step up (BBC) Criterion B - 1 views

  •  
    this article talks about cyber mentors or in other words people who help out others, are stepping up in the technological world of the internet and mentoring people or users who are being bullied or bugged through online sources
Ali Parrish

YouTube Shares Video Profits with Individual Users - 0 views

  • The new scheme aims to identify hugely popular videos from individuals
  • Such videos are typically by individual users; the more entertaining among them get posted in many other places and as a result get a rapidly growing number of views.
  • For instance, Lauren Luke of northeast England began posting make-up tips on YouTube in 2007. She was approached to become an advertising partner and now the hobby has become her main source of income.
  • ...2 more annotations...
  • The Partner Program will start in the US, and YouTube says it plans an international version soon.
  • and have helped many people earn thousands of dollars a month as their videos went viral and endured over time," YouTube product manager Shenaz Zack said in the post.
1 - 20 of 273 Next › Last »
Showing 20 items per page