Skip to main content

Home/ IB ITGS/ Group items tagged and

Rss Feed Group items tagged

Shih-Chen Chiu

BBC NEWS | Technology | Facebook changes privacy policy - 0 views

  • be more transparent about what data it collects and why.
    • Farah Alam
       
      social and ethical issues- privacy the user will be able to know why facebook wants certain information and not give it to them if they think its not justified and maintain their privacy.
  • privacy settings and make it clear to users that they can delete or deactivate an account
    • Farah Alam
       
      IT systems- communication systems are involved ( internet)
  • The country is the first to complete a full investigation of Facebook's privacy practices.
    • Farah Alam
       
      IMPACT- science. through their investigation they are able to find out more(and also create more jobs)
  • ...4 more annotations...
  • There are around 950,000 developers in 180 countries who provide applications for the site.
  • social network
  • Facebook's Michael Richter said if a user chose to deactivate their account, the site would still store their information "even if it is for 10 years".
  • "Application developers have had virtually unrestricted access to Facebook users' personal information,"
    • Salman Rushdi
       
      Social and Ethical issue Impacting on privacy.-sharing information through an unclear privacy policy
iman mustafa

Twitter, Facebook attack targeted one user - 0 views

  • The blogger, who uses the account name "Cyxymu," (the name of a town in the Republic of Georgia) had accounts on all of the different sites that were attacked at the same time, Max Kelly, chief security officer at Facebook, told CNET New
  • A Georgian blogger with accounts on Twitter, Facebook, LiveJournal, and Google's Blogger and YouTube was targeted in a denial-of-service attack that led to the sitewide outage at Twitter and problems at the other sites on Thursday, according to a Facebook executive.
  • Kelly declined to speculate on who was behind the attack, but he said: "You have to ask who would benefit the most from doing this and think about what those people are doing and the disregard for the rest of the users and the Internet."
Chalana Perera

The Guts of the Station Finder Map - Inside NPR.org Blog : NPR - 0 views

  • The system has several underlying database tables, including zip codes, cities and station data. The zip code and city tables, in addition to containing information about the locations, also include the latitude and longitude for the centroid each location.
  • At the core, the system works based on latitudes and longitudes.
  • Once we have the latitude and longitude, we perform a series of calculations based on the Great Circle Calcuation (GCC), which helps us to determine distances on a curved surface (ie. the Earth - and we are assuming that it is not flat). Using the GCC, we look for stations near the latitude and longitude, based on a 100 mile radius from that point. From that list of stations, which is too inclusive, we start our process of narrowing down the results to the actual stations that can be heard.
  • ...1 more annotation...
  • - a web-based service to inform our audience as to which NPR stations are available throughout the country. There are other more sophisticated, more precise ways to identify the station coverage maps which are really overkill for this type of service.
Chalana Perera

Chicago Theater offers live captioning (abc news) - 0 views

  • Their captioning runs though a PowerPoint program, says associate artistic director Sandy Shinner.
  • "We have the scripts electronically, and then it's formatted in a PowerPoint presentation and then presented both on the small television screens and on a screen, a larger screen sometimes integrated into the set design, sometimes to the side of the set on the wall,"
  • Captioning is only available for specific performances. "We could do it at every single performance, we would just have to pay someone else to be in the booth and advance text,
  •  
    This article discusses the theatre set up for handicapped and hearing impaired audiences in broadway-town CHICAGO.
  •  
    This article discusses the theatre set up for handicapped and hearing impaired audiences in broadway-town CHICAGO.
Chalana Perera

Live Theater Captioning (Hearing Loss Web) - 0 views

  • Captioning Systems has a great method of delivering captioning in the theater.
  • Prior to the performances the script was converted from a standard live theater/musical theater script to standard captioning format using PCS Live Theater Captioning software
  • One in 10 people has some form of hearing loss, and this larger group would appreciate communication enablement,
  • ...1 more annotation...
  • Sign language interpreters are useful to a minuscule group of deaf people fluent in sign language who are positioned close enough to be able to watch interpreters' hand movements
  •  
    This article offers many insights on to technology and shows that are deaf-viewer-friendly and provides links to shows which have captioning options for the many interested deaf audiences.
  •  
    This article offers many insights on to technology and shows that are deaf-viewer-friendly and provides links to shows which have captioning options for the many interested deaf audiences.
Chalana Perera

Translating Spectacles (BBC Technology) - 0 views

  • headset uses a tiny projector to display images on a user's retina
  • used real-time translation to provide subtitles for a conversation between people lacking a common language
  • The cost does not include the price of the translation tools and software
  • ...1 more annotation...
  • At the same time as a user hears a translation, they would also get text subtitles beamed onto the retina.
  •  
    This article discusses the Japanese designed NEC Smart Spectacles which are designed to create conversation flowing when there is no common language between the people interacting. The lens reads and interprets, then displays words so the person wearing it can hear and see what is being said by the other person.
  •  
    This article discusses the Japanese designed NEC Smart Spectacles which are designed to create conversation flowing when there is no common language between the people interacting. The lens reads and interprets, then displays words so the person wearing it can hear and see what is being said by the other person.
Maliha Rahman

Facebook urged to add panic button (BBC news) - 2 views

  •  
    This news item is about how facebook is being accused for not having a panic button to warn facebook about inappropriate behavior and potentially harmful ones. Talks about a teenager 17, Ashleigh Hall lured by a man and murdered by a false identity on Facebook. The man, Chapman, 33 was jailed for at least 35 years for the murder. "The teenager had been raped, suffocated and her body dumped in a field near Sedgefield, County Durham, after agreeing to meet Chapman."
  •  
    This article discusses an issue in which a 17 year old girl was raped and then murdered due to the use of false identity. Due to this issue, facebook has been demanded to provide a "panic button" that would give information to users on how to handle issues like these or others like cyberbullying, hacking, viruses, distressing material and inappropriate sexual behaviour.
anonymous

Facebook, Fake ID, Effects (Info World) - 0 views

  •  
    Talks about the security implications of web 2.0, including identity management and privacy concerns. The legal effects of faking an account in web 2.0 has been adressed as "the dark side," due to the seriousness, and immediate effects if someone is caught doing it.  The Internet is just another form of human expression, so it's subject to human imperfection like any other conduit," said Chris Alden, CEO of blogging company Six Apart, who was on the panel with executives from Facebook and the South Korean Internet giant Daum Communications.
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
dr tech

'Our notion of privacy will be useless': what happens if technology learns to read our ... - 1 views

  •  
    "In a world first, in September 2021, Chilean law makers approved a constitutional amendment to enshrine mental integrity as a right of all citizens. Bills to regulate neurotechnology, digital platforms and the use of AI are also being worked on in Chile's senate. Neuro rights principles of the right to cognitive liberty, mental privacy, mental integrity, and psychological continuity will be considered. Europe is also making moves towards neuro rights. France approved a bioethics law this year that protects the right to mental integrity. Spain is working on a digital rights bill with a section on neuro rights, and the Italian Data Protection Authority is considering whether mental privacy falls under the country's privacy rights."
funeral director

Reliable and Trusted Lists of Funeral Directors - 1 views

When my father died, my mom and I were so depressed. We were so broken hearted that we cannot think clearly what to do or how to arrange a decent funeral for my father. So my aunt told me to get a...

funeral director

started by funeral director on 22 Jul 11 no follow-up yet
Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
YooJin Jung

TomTom for iPhone 3G and 3GS: Satisfied-nav - Recombu :: read > compare > buy - 0 views

  • Today TomTom released its iPhone 3G and 3GS app that offers sat-nav goodness without the clunky looking sat-nav.
    • YooJin Jung
       
      it systems-applications
  • t costs £60, which isn't that expensive when you consider how much you would pay for a standalone sat-nav, and takes eight minutes to download.
    • YooJin Jung
       
      areas of impact-business
  • The app boasts turn-by-turn navigation, automatic re-routing, safety camera info, 2D and 3D viewing modes and points of interest
    • YooJin Jung
       
      socialðnical issue-reliability
Jeff Ratliff

End of the Music Industry? - 1 views

  • First, piracy punched a big hole in it
  • music streaming
  • Recording Industry Association of America
  •  
    Graph of types of media used in recording music and rise and fall over time (LP, 8-track. cassette, CD, etc.)
  •  
    Graph of types of media used in recording music and rise and fall over time (LP, 8-track. cassette, CD, etc.)
Eunice Vincent

Nations May Reuse More Electronics Than Thought - 0 views

  • "At least 85 percent of discarded computers imported to Peru are reused, as opposed to going directly to recycling. [... Thus,] the image of the trade in e-waste as mainly being about dumping unusable junk is, at least for Peru, inaccurate."
    • Eunice Vincent
       
      Social: Globalization
  • "highly dynamic flow [that] reuses and recycles almost every part and material found in a computer,"
    • Eunice Vincent
       
      IT SYSTEMS: basics
  • that it is possible to stop the environmentally damaging practices without diluting or eliminating informal dismantling and collection. This informal reuse and recycling sector is valuable for generating employment in the country and in making computing technology more accessible to low-income families and small businesses, the paper contends.
    • Eunice Vincent
       
      AREAS OF IMPACT: business, science&the environment
ajay tambay

Meet Bustadrive, a home-made hard disk destroyer | PC Pro blog - 0 views

  • If your job involves having to destroy hard disks and make sure that their data is impossible to recover, you’ll know that it can be an expensive business: properly disposing of each hard disk can cost between £5 and £10 and, when you’re managing the IT affairs of potentially large businesses, these costs can mount up.
    • ajay tambay
       
      IT Systems - basics Impact - business
  • simply chopping the platter in half wouldn’t remove the data” and confirmed that it could be recovered – but the costs of retrieving any remaining information “would be prohibitive”. That’s because you’d need “something along the lines of an electron scanning microscope” to read the data from the remains of the platter – and those currently sell second-hand for at least £40,000. Tanfield-Johnson also confirmed that, once you’d cracked open a hard disk to extract the platters within, recovering any data would become even more difficult, because you’d need “the same model and make of [circuit] board” to access each track of data on the disk. So, unless you’re willing to spend tens of thousands of pounds, it looks like your data is safe.
    • ajay tambay
       
      Social - privacy
Shih-Chen Chiu

'Facebook Lite' gets public debut - 0 views

  • aimed at countries where broadband is limited.
  • Facebook Lite appears to be a cut-down version of Facebook and is aimed at countries where broadband is limited.
    • Shih-Chen Chiu
       
      IT systems in a social context-software & applications
  • "Facebook Lite is a fast-loading, simplified version of Facebook that enables people to make comments, accept friend requests, write on people's walls, and look at photos and status updates," the statement continued.
    • Shih-Chen Chiu
       
      social & ethical issues- globalization, equality of acces
  • ...2 more annotations...
  • The site is currently on trial in India and it is thought there are plans to extend this to China and Russia.
    • Shih-Chen Chiu
       
      areas of impact- business
  • In a statement Facebook said the new service would be a "faster, simpler version similar to the Facebook experience you get on a mobile phone".
    • Shih-Chen Chiu
       
      social & ethical issues people and machines
Rafae Wathra

DLC for Games - 0 views

    • Rafae Wathra
       
      basics (gaming consoles are hardware)
  • We look at patches as little more than an excuse for developers to ship a half-finished game and have us beta test it.
    • Rafae Wathra
       
      Social and Ethical issues: this questions the integrity of the gaming companies because they aren't delivering gamers the whole product
  • features of this console generation
    • Rafae Wathra
       
      This is a part of Basics: hardware and software because the console is the hardware and the games are software
  • ...2 more annotations...
  • The idea of downloading additional things into your game after release was supposed to be something that extended the lives of games and made them better over time
    • Rafae Wathra
       
      Areas of Impact: DLC adds to the entertainment factor in games
  • Xbox owners of the same game however have only received maybe half of that content and have had to pay for it in $5 packs.
Eunice Vincent

Warning, Your Cell Phone May Be Hazardous To Your Health: Gear + Gadgets: GQ - 2 views

  • Earlier this winter, I met an investment banker who was diagnosed with a brain tumor five years ago. He's a managing director at a top Wall Street firm, and I was put in touch with him through a colleague who knew I was writing a story about the potential dangers of cell-phone radiation. He agreed to talk with me only if his name wasn't used, so I'll call him Jim. He explained that the tumor was located just behind his right ear and was not immediately fatal—the five-year survival rate is about 70 percent. He was 35 years old at the time of his diagnosis and immediately suspected it was the result of his intense cell-phone usage. "Not for nothing," he said, "but in investment banking we've been using cell phones since 1992, back when they were the Gordon-Gekko-on-the-beach kind of phone." When Jim asked his neurosurgeon, who was on the staff of a major medical center in Manhattan, about the possibility of a cell-phone-induced tumor, the doctor responded that in fact he was seeing more and more of such cases—young, relatively healthy businessmen who had long used their phones obsessively. He said he believed the industry had discredited studies showing there is a risk from cell phones. "I got a sense that he was pissed off," Jim told me. A handful of Jim's colleagues had already died from brain cancer; the more reports he encountered of young finance guys developing tumors, the more certain he felt that it wasn't a coincidence. "I knew four or five people just at my firm who got tumors," Jim says. "Each time, people ask the question. I hear it in the hallways." It's hard to talk about the dangers of cell-phone radiation without sounding like a conspiracy theorist. This is especially true in the United States, where non-industry-funded studies are rare, where legislation protecting the wireless industry from legal challenges has long been in place, and where our lives have been so thoroughly integrated with wireless technology that to suggest it might be a problem—maybe, eventually, a very big public-health problem—is like saying our shoes might be killing us.
    • Eunice Vincent
       
      This is the part of this article i will use as the stimulus
Jeff Ratliff

Criminal hacker 'Iceman' gets 13 years (ComputerWorld) - 0 views

  •  
    A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers. Max Ray Butler, who used the hacker pseudonym Iceman, was sentenced Friday morning in U.S. District Court in Pittsburgh on charges of wire fraud and identity theft. In addition to his 13-year sentence, Butler will face five years of supervised release and must pay US$27.5 million in restitution to his victims, according to Assistant U.S. Attorney Luke Dembosky, who prosecuted the case for the federal government. Dembosky believes the 13 year sentence is the longest-ever handed down for hacking charges.
‹ Previous 21 - 40 of 324 Next › Last »
Showing 20 items per page