Skip to main content

Home/ IB ITGS/ Group items tagged OF

Rss Feed Group items tagged

Andrew Beadle

BBC NEWS | Business | Blackberry 'fastest-growing firm' - 0 views

  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • ...14 more annotations...
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  • Canada-based RIM has come top of the magazine's latest annual guide to the 100 fastest-growing businesses.
  •  
    Ranking of the top 100 growing Firms
ajay tambay

BBC NEWS | Technology | Battling swine flu in cyberspace - 1 views

  • battling swine flu
    • Sarwat Khan
       
      AREA OF IMPACT: HEALTH
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it,"
    • Sarwat Khan
       
      SOCIAL ISSUE - PEOPLE (AWARENESS) , POLICY (SPREAD INFORMATION VIA GAME)
  • The game is played online
    • Sarwat Khan
       
      IT SYSTEMS (COMMUNICATION SYSTEMS AND APPLICATIONS)
  • ...9 more annotations...
  • "Its purpose is simply to create another avenue of information."
    • Sarwat Khan
       
      AREAS OF IMPACT: EDUCATION (SPREADING INFORMATION)
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
Jason Carlson

Lying - 48 views

In this situation, the man should be asked if he wants to hear straight away and the doctors should know and understand the immediate phycological impacts on sharing the truth straight away, and th...

shazad rouf

Designing an Internet for kids - CNN.com - 1 views

  • The goal is to be both educational and entertaining. So KidZui has mapped out 8,600 channels of what kids are interested in, ranging from photosynthesis to Miley Cyrus. And we relate all of those categories to each other so kids can independently and safely browse, search and share.
    • shazad rouf
       
      Social and ethnical issues: control; security Parents can easily control kids from going to bad sites.
  • Our goal with KidZui is to focus on the light, not the darkness. Of course, we keep all of the bad content and the bad people out of KidZui. But we focus on letting kids who want to discover, who want YouTube, to get YouTube videos that are fun and appropriate for them ... I think it is indicative of just how much kids want to be online.
  • Our goal with KidZui is to focus on the light, not the darkness. Of course, we keep all of the bad content and the bad people out of KidZui. But we focus on letting kids who want to discover, who want YouTube, to get YouTube videos that are fun and appropriate for them ... I think it is indicative of just how much kids want to be online.
    • shazad rouf
       
      Areas of impact: Health, Education, Arts, entertainment and leisure
Maliha Rahman

Rogue pharmacies still a problem for search engines | Health Tech - CNET News - 1 views

  • The study, conducted by LegitScript, an online pharmacy verification service, and KnujOn, an Internet compliance company, found that 90 percent of the reviewed Internet pharmacy advertisements were from fake or illegal Internet pharmacies.
    • Maliha Rahman
       
      (IT systems: communication system): the idea that 90% of the pharmacies advertising online through the internet are fake and illegal , and is providing people with a unreliable communication system.
  • "We were able to purchase potentially addictive drugs without a prescription or any age verification via Bing.com ads," LegitScript President John Horton told CNET News. "We also received counterfeit medication. Microsoft profits from these illegal ads, which put Internet users at risk."
    • Maliha Rahman
       
      fake unreliable advertisements selling addictive drugs without a prescription and giving out incorrect information in order to get money. (can cause serious health issues and creating an unreliable communicating environment)
  • "the Internet has become a haven for drug seekers and abusers, particularly (regarding) controlled substances. It is a much more serious and dangerous phase of the Internet."
    • Maliha Rahman
       
      unreliable, illegal communication system
  • ...2 more annotations...
  • Microsoft disputes LegitScript's claim that 90 percent of the sponsored Internet pharmacy ads on Bing are fake or illegal, adding that it is working to weed out the rogue advertisers that do slip through. The company uses an Internet pharmacy verification service called PharmacyChecker--a competitor of LegitScript--to ensure that its sponsored prescription drug advertisements are legitimate.
    • Maliha Rahman
       
      (social, integrity)getting fake internet pharmacy verification lacks intregity. in this case selling unprescribed drugs that can cause serious health issues heavy concequences
  • The authors took a closer look at 10 of the 69 online drugstores. None of the 10 required a valid prescription. Orders were placed with two of them. Of the two drugs received, both were tested and one was found to be counterfeit.
    • Maliha Rahman
       
      (Impact, Health) People all over the world are using unreliable sites and purchasing counterfeit drugs which is highly risky to one's health and can badly affect a person.
  •  
    The NABP's own analysis of search results from Google and Yahoo turned up many drug ads from sketchy purveyors.
ajay tambay

BBC - dot.life: Teenage hackers: Making a better world - 0 views

  • Around 70 teenagers had gathered for this weekend event which is the brainchild of Rewired State - an organisation thinking of clever ways to free up public data.
    • ajay tambay
       
      Social - Equality , Globalization
  • different groups as they spread themselves across the third floor of the Googleplex, taking advantage of the free wi-fi - and food - laid on by the search company.
  • different groups as they spread themselves across the third floor of the Googleplex, taking advantage of the free wi-fi - and food - laid on by the search company.
  • ...3 more annotations...
  • One group was seeking a way to scrape bus timetable information from the Transport For London website
    • ajay tambay
       
      IT Systems - comm sys (internet)
  • they mingled, discussed software, the rights and wrongs of file-sharing, how to get free access to Spotify's premium music streaming service - and how they'd found out about the event through a friend or some enthusiastic teacher
    • ajay tambay
       
      Impact - education
  • Sunday afternoon, they presented their ideas to a panel of government officials and web luminaries. Among the winners was that group trying to free up London bus data - TFHell won the "Most Likely to be Bought By Google" award. One of the judges, Ben Hammersley of Wired UK, said he "found the standard of the work produced by 15-18-year-olds in many cases infinitely superior to that produced by government professionals."
    • ajay tambay
       
      Impact - Business
Eunice Vincent

Warning, Your Cell Phone May Be Hazardous To Your Health: Gear + Gadgets: GQ - 2 views

  • Earlier this winter, I met an investment banker who was diagnosed with a brain tumor five years ago. He's a managing director at a top Wall Street firm, and I was put in touch with him through a colleague who knew I was writing a story about the potential dangers of cell-phone radiation. He agreed to talk with me only if his name wasn't used, so I'll call him Jim. He explained that the tumor was located just behind his right ear and was not immediately fatal—the five-year survival rate is about 70 percent. He was 35 years old at the time of his diagnosis and immediately suspected it was the result of his intense cell-phone usage. "Not for nothing," he said, "but in investment banking we've been using cell phones since 1992, back when they were the Gordon-Gekko-on-the-beach kind of phone." When Jim asked his neurosurgeon, who was on the staff of a major medical center in Manhattan, about the possibility of a cell-phone-induced tumor, the doctor responded that in fact he was seeing more and more of such cases—young, relatively healthy businessmen who had long used their phones obsessively. He said he believed the industry had discredited studies showing there is a risk from cell phones. "I got a sense that he was pissed off," Jim told me. A handful of Jim's colleagues had already died from brain cancer; the more reports he encountered of young finance guys developing tumors, the more certain he felt that it wasn't a coincidence. "I knew four or five people just at my firm who got tumors," Jim says. "Each time, people ask the question. I hear it in the hallways." It's hard to talk about the dangers of cell-phone radiation without sounding like a conspiracy theorist. This is especially true in the United States, where non-industry-funded studies are rare, where legislation protecting the wireless industry from legal challenges has long been in place, and where our lives have been so thoroughly integrated with wireless technology that to suggest it might be a problem—maybe, eventually, a very big public-health problem—is like saying our shoes might be killing us.
    • Eunice Vincent
       
      This is the part of this article i will use as the stimulus
Jeff Ratliff

Dialogues with Colorful Personalities of Early AI - 1 views

  •  
    Of all the legacies of the era of the sixties, three colorful, not to say garrulous, "personalities" that emerged from the early days of artificial intelligence research are worth mentioning: ELIZA, the Rogerian psychotherapist; PARRY, the paranoid; and (as part of a younger generation) RACTER, the "artificially insane" raconteur.
Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
Luay Kanaan

The Secret Of Google's Book Scanning Machine Revealed - As A Matter Of Fact Blog : NPR - 28 views

  • The software used to scan books, called Optical Character Recognition software or OCR for short
    • dana engineer
       
      how can you destroy a book when u scan it?
    • dana engineer
       
      Google created a nifty infared camera technology that detects the three-dimensional shape and angle of book pages when it is placed in the scanner. It allows the OCR software to read text more accurately.
    • Bassel Kanj
       
      Yeah.
    • Luay Kanaan
       
      Google actually created a camera technology that detects the three-dimensional shape and angle of book pages when it is placed in the scanner. It allows the OCR software to read text more accurately.
  • ...12 more annotations...
  • How was one to go about scanning a book quickly and efficiently without destroying it?
  • book scanning was a tedious process that sometimes resulted in the death of a book.
  • The software used to scan books, called Optical Character Recognition software or OCR for short
    • Dalal Najibi
       
      How is the process? Do they have to open every book and scan each page?
  • Google created some seriously nifty infrared camera technology that detects the three-dimensional shape and angle of book pages when the book is placed in the scanner
  • a way to digitize books en masse
  • The Secret Of Google's Book Scanning Machine Revealed
  • The Secret Of Google's Book Scanning Machine Revealed
  • Now anyone who's ever opened a book knows it's next to impossible for a book to lie flat without some sort of device. One solution to the problem was to use glass plates that individually flattened each page, but this method wasn't very efficient. The other solution was to chop off the book's binding, but that method destroyed the book.
  • It was a problem that vexed book scanners for years until Google came up with this solution
  • OCR for short
  • was a tedious process that sometimes resulted in the death of a book
  •  
    Message board assignment
  • ...1 more comment...
  •  
    Message Board Assignment
  •  
    Message board assignment
  •  
    Message board assignment
Chalana Perera

Open Captioning for Live Theatre (Signature Theatre) - 0 views

  • without requiring special equipment
  • listening devices are also available, free of charge.
  • profit advocate for the provision of professional Live Performance Captioning
  • ...1 more annotation...
  • House which scrolls the entire text of the production, open captioning provides enjoyment for audience members who are not self-identified as hard of hearing or who merely wish to catch a missed word or phrase.
  •  
    This article describes the use of Open Captioning roling in front of the "house" or stage for the 30 million auditorically-challenged (deaf) viewers in the US.
  •  
    This article describes the use of Open Captioning roling in front of the "house" or stage for the 30 million auditorically-challenged (deaf) viewers in the US.
ajay tambay

Meet Bustadrive, a home-made hard disk destroyer | PC Pro blog - 0 views

  • If your job involves having to destroy hard disks and make sure that their data is impossible to recover, you’ll know that it can be an expensive business: properly disposing of each hard disk can cost between £5 and £10 and, when you’re managing the IT affairs of potentially large businesses, these costs can mount up.
    • ajay tambay
       
      IT Systems - basics Impact - business
  • simply chopping the platter in half wouldn’t remove the data” and confirmed that it could be recovered – but the costs of retrieving any remaining information “would be prohibitive”. That’s because you’d need “something along the lines of an electron scanning microscope” to read the data from the remains of the platter – and those currently sell second-hand for at least £40,000. Tanfield-Johnson also confirmed that, once you’d cracked open a hard disk to extract the platters within, recovering any data would become even more difficult, because you’d need “the same model and make of [circuit] board” to access each track of data on the disk. So, unless you’re willing to spend tens of thousands of pounds, it looks like your data is safe.
    • ajay tambay
       
      Social - privacy
Maliha Rahman

Sexting Growing Trend Among Teens (Get Legal public) Portfolio 1 - 0 views

  • ''Sexting'' has lawyers grappling for a new definition of what constitutes a predatory sex offender. In general, the law says any nude or semi-nude photo of someone under the age of 18 constitutes child pornography.
  • A 2008 survey by the National Campaign to Prevent Teen and Unwanted Pregnancy found that 39 percent of teens have sent or posted sexually suggestive messages and 48 percent say they have received such messages. Many parents worry the images could find their way onto the Internet, or even worse, into the possession of actual sexual predators.
  • Hannah Montana star Miley Cyrus also experienced the pitfalls of ''sexting'' when someone hacked into her phone and leaked racy images of her—meant only for her boyfriend—online.
Shih-Chen Chiu

Wallet of the future? Your mobile phone - CNN.com - 0 views

  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
    • Shih-Chen Chiu
       
      social& ethical issue -people and machines ITsystems in a social context -Applications -Integrated Systems Areas of impact -Business & employment -Scoence & the enviornment
  • ...4 more annotations...
  • And technology that turns phones into credit cards and IDs poses several potential problems.
    • Shih-Chen Chiu
       
      social & ethical issues -security -authenticity -integrity -control
  • In the late 1990s and early 2000s, banks and cell phone makers started conducting trials with U.S. customers. Limited groups of people were given the ability to scan their phones to make payments, enter stadiums and access public transit.
    • Shih-Chen Chiu
       
      areas of impact -business & employment
  • If phones replace wallets, would-be thieves will see every person walking down the street talking on his or her phone as a target for robbery, said Lillie Coney, associate director of the Electronic Privacy Information Center.
    • Shih-Chen Chiu
       
      social & ethical issues -security
  • Eye scans and fingerprints would make phone IDs and payments more secure, Brown said. The ID technology might work like a corporate security badge, which pulls up personal information when scanned.
    • Shih-Chen Chiu
       
      social & ethical issues -reliability -security -integrity -privacy IT systems in a social context hardware integrated systems
Jeff Ratliff

End of the Music Industry? - 1 views

  • First, piracy punched a big hole in it
  • music streaming
  • Recording Industry Association of America
  •  
    Graph of types of media used in recording music and rise and fall over time (LP, 8-track. cassette, CD, etc.)
  •  
    Graph of types of media used in recording music and rise and fall over time (LP, 8-track. cassette, CD, etc.)
Rafae Wathra

BBC NEWS | Technology | Mobile data show friend networks - 0 views

  • "It's invisible to the user but logs everything: communication, users' locations, people's proximity by doing continuous Bluetooth scans."
    • Rafae Wathra
       
      This is a privacy issue (social) because these users don't know that so much information about them is being logged
    • Rafae Wathra
       
      This is also an integrity issue because the companies supplying these products don't tell the users that there is a chip in their phones.
  • Friendships can be inferred with 95% accuracy from call records and the proximity of users, says a new report.
    • Rafae Wathra
       
      This relates to communication systems because the phone companies are using communication systems in order to track the social activity of their users
  • but to carry on this "reality mining" in contexts ranging from the modelling of the spread of disease t
    • Rafae Wathra
       
      If gathering mobile data can help track the spread of disease, then its implications in improving the health of the target area (area of impact) have a lot of potential
Rafae Wathra

DLC for Games - 0 views

    • Rafae Wathra
       
      basics (gaming consoles are hardware)
  • We look at patches as little more than an excuse for developers to ship a half-finished game and have us beta test it.
    • Rafae Wathra
       
      Social and Ethical issues: this questions the integrity of the gaming companies because they aren't delivering gamers the whole product
  • features of this console generation
    • Rafae Wathra
       
      This is a part of Basics: hardware and software because the console is the hardware and the games are software
  • ...2 more annotations...
  • The idea of downloading additional things into your game after release was supposed to be something that extended the lives of games and made them better over time
    • Rafae Wathra
       
      Areas of Impact: DLC adds to the entertainment factor in games
  • Xbox owners of the same game however have only received maybe half of that content and have had to pay for it in $5 packs.
Jeff Ratliff

Text Messages: Digital Lipstick On the Collar (The Committed Sardine) - 1 views

  •  
    This became painfully obvious a week ago when a woman who claims to have had an affair with Tiger Woods told a celebrity publication that he had sent her flirty text messages, some of which were published. It follows on the heels of politicians who ran afoul of text I.Q., including a former Detroit mayor who went to prison after his steamy text messages to an aide were revealed, and Senator John Ensign of Nevada, whose affair with a former employee was confirmed by an incriminating text message.
Elvira Russ

Digital Sales Gaining on CDs - 0 views

  •  
    This article gives the reader the numbers and percentage on how fast the digital downloading of music is increasing and the purchases of CDs in stores decrease. By the information, we know that the CD purchases will stop by the year of 2011 because of the digital music revolution. It also discusses different companies that sell music legally online, their differences and how well they're doing compared to others.
1 - 20 of 348 Next › Last »
Showing 20 items per page