Skip to main content

Home/ IB ITGS/ Group items tagged and

Rss Feed Group items tagged

Chalana Perera

BBC News | Sci/Tech | Search engine seeks billion URLs - 0 views

  • But size is not everything and while alltheweb seemed lightning fast when I tried it, it did not appear to match the relevancy of a much smaller search engine now
  • find more of these highly rated gems and place them on the first or second page of search results, resulting in a better and more satisfying search experience."
  • the result of more than a decade of research into optimising search algorithms and architectures in a project initiated at the
  • ...1 more annotation...
  • storage subsystems, operating in parallel to distribute user queries, search the catalogue and spider the Web.
Luay Kanaan

The Secret Of Google's Book Scanning Machine Revealed - As A Matter Of Fact Blog : NPR - 28 views

  • The software used to scan books, called Optical Character Recognition software or OCR for short
    • dana engineer
       
      how can you destroy a book when u scan it?
    • dana engineer
       
      Google created a nifty infared camera technology that detects the three-dimensional shape and angle of book pages when it is placed in the scanner. It allows the OCR software to read text more accurately.
    • Bassel Kanj
       
      Yeah.
    • Luay Kanaan
       
      Google actually created a camera technology that detects the three-dimensional shape and angle of book pages when it is placed in the scanner. It allows the OCR software to read text more accurately.
  • ...12 more annotations...
  • How was one to go about scanning a book quickly and efficiently without destroying it?
  • book scanning was a tedious process that sometimes resulted in the death of a book.
  • The software used to scan books, called Optical Character Recognition software or OCR for short
    • Dalal Najibi
       
      How is the process? Do they have to open every book and scan each page?
  • Google created some seriously nifty infrared camera technology that detects the three-dimensional shape and angle of book pages when the book is placed in the scanner
  • a way to digitize books en masse
  • The Secret Of Google's Book Scanning Machine Revealed
  • The Secret Of Google's Book Scanning Machine Revealed
  • Now anyone who's ever opened a book knows it's next to impossible for a book to lie flat without some sort of device. One solution to the problem was to use glass plates that individually flattened each page, but this method wasn't very efficient. The other solution was to chop off the book's binding, but that method destroyed the book.
  • It was a problem that vexed book scanners for years until Google came up with this solution
  • OCR for short
  • was a tedious process that sometimes resulted in the death of a book
  •  
    Message board assignment
  • ...1 more comment...
  •  
    Message Board Assignment
  •  
    Message board assignment
  •  
    Message board assignment
Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
Eunice Vincent

It's Your Health - Safety of Cell Phones and Cell Phone Towers [Health Canada, 2009] - 0 views

  •  
    2009 article from Health Canada and the Public Health Agency of Canada regarding Safety standards related to cellular phones and resources concerning radiofrequency (RF) energy
Elvira Russ

Congress and Phishing, the laws against phishing - 1 views

  •  
    Congress and Phishing has resulted in phishing laws to protect the internet. discusses the law.
Elvira Russ

Google Books and Chinese Authors - 0 views

  •  
    This article discusses the problem going on between Google and Chinese authors because Google digitalizes their books without permission and copyright. It gives percentages of the violation of copyrights as well as numbers within the deal Google is offering.
Maliha Rahman

Sexting Growing Trend Among Teens (Get Legal public) Portfolio 1 - 0 views

  • ''Sexting'' has lawyers grappling for a new definition of what constitutes a predatory sex offender. In general, the law says any nude or semi-nude photo of someone under the age of 18 constitutes child pornography.
  • A 2008 survey by the National Campaign to Prevent Teen and Unwanted Pregnancy found that 39 percent of teens have sent or posted sexually suggestive messages and 48 percent say they have received such messages. Many parents worry the images could find their way onto the Internet, or even worse, into the possession of actual sexual predators.
  • Hannah Montana star Miley Cyrus also experienced the pitfalls of ''sexting'' when someone hacked into her phone and leaked racy images of her—meant only for her boyfriend—online.
Chalana Perera

(H) Security experts say Google cyber-attack was routine (BBC) - 0 views

  • hackers got very limited information
  • phishing
  • Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organisation.
  •  
    This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
anonymous

BBC NEWS | Technology | Government opens data to public - 7 views

  • Government opens data to public
    • anonymous
       
      Claimed by Iman and Dol.
  •  
    Iman's and Dol's Article
  •  
    Iman's and Dol's Article
Johan Autio

Chart and image gallery: 30 free tools for data visualization and analysis - Computerworld - 0 views

  •  
    30 free tools for data visualization and analysis
shalani mujer

Reliable and Fast Online Computer Tech Support - 1 views

I love watching movies and I usually get them online. There was this one time that my computer automatically shut down while downloading a movie. Good thing I was able to sign up with an online ...

online computer tech support

started by shalani mujer on 10 Nov 11 no follow-up yet
shazad rouf

Online career matchmaker helps MBAs land jobs - CNN.com - 0 views

  • "Even though the economy is not as bad as it used to be, we are still seeing a good uptake. Our traffic is still going strong," Larizadeh says.
    • shazad rouf
       
      areas of impact: business and employment
  • Four years and a round of venture capital funding later, what started as a hobby designed to help friends share career information has turned into a network with approximately 600,000 members.
    • shazad rouf
       
      social and ethnic issues: security
  • Schools like The Wharton School of the University of Pennsylvania and Duke University's Fuqua School of Business have formed partnerships with Doostang that enable their students to access the network's premium job listings for free.
    • shazad rouf
       
      IT systems in a social sytem: Communication system
Sung Won Kwak

BBC NEWS | Technology | Sony cuts price of PS3 consoles - 0 views

  • Sony Entertainment has announced it is reducing the price of its PlayStation 3 games consoles.In Europe the price has been lowered to 299 euros, in the US to $299 and in the UK to £249.99.
    • YooJin Jung
       
      area of impact-business
  • new slim-line PS3 would be available from the first week of September. "It has the same features and functionality [as the old PS3], but now it is 32% smaller, 36% lighter and consumes 34% less power," he said.
    • YooJin Jung
       
      it systems-Basics:hardware
    • YooJin Jung
       
      socialðnical issue-people&machines
  • a new digital reader for the PSP - called Digital Comics - that will allow users to read Spiderman, Fantastic 4 and other DC comics on their portable, along with a range of graphic novels.
    • YooJin Jung
       
      it systems-basics:software
anonymous

BBC NEWS | Technology | Web tool oversees Afghan election - 0 views

  • Their reports feature alongside those of full-time Afghan journalists to ensure the election and reporting of it is as "free
  • The Alive in Afghanistan project plots the SMS reports on an online map.
  • The text messages are collected via a free-platform known as FrontlineSMS, developed by UK programmer Ken Banks.
  • ...8 more annotations...
  • Any attempt to rig or interfere with Afghanistan's election could be caught out by a system that allows anyone to record incidents via text message.
  • authenticity.
    • Chalana Perera
       
      stakeholder 2
  • Ushahidi
    • Chalana Perera
       
      stakeholder 1
  • National Security Council
    • anonymous
       
      Stakeholder 3
  • "We hope to enable people to report on what is going on in the country
    • anonymous
       
      Stalkholder 4, the people create the impact, and are going to use the SMS technology.
  • of Afghanistan has asked all domestic and international media agencies to "refrain form broadcasting any incidence of violence during the election process".
    • anonymous
       
      Areas of Impact>Politics and Government
  •  
    Any attempt to rig or interfere with Afghanistan's election could be caught out by a system that allows anyone to record incidents via text message.
Sanchit Jain

Castle 'rebuilt' in virtual world-TOURS OFFERED! - 0 views

  • The 1740 virtual castle was cloned and then torn down to leave it looking like today's ruin.
  • Second Life is the best-known virtual world on the internet.
  • People are shown as digital versions of themselves, known as avatars, who can build homes and businesses, buy and sell land and have relationships.
iman mustafa

BBC NEWS | Technology | Downloading is not enough - 2 views

  • Kids, it seems, like unlicensed services because they are free. But the report also acknowledges their usefulness in finding more obscure music and letting them listen to a band before they buy
    • Alex David
       
      social & ethical issues- security, control & authenticity
  • They are willing to abandon p2p in favour of licensed services that they have to pay for, but they wouldn't pay for a streaming service like Spotify.
    • Alex David
       
      IT systems- application & communication systems
  • It might be that young people have no faith that the streaming services are going to stay around since they operate at the discretion of the record labels, which have clamped down on many services that are popular with young music fans in the past.
    • Alex David
       
      Area of Impact- Business & Arts, Entertainment & leisure
  •  
    Bill Thompson says young people's needs from online music may be too complex and transient for the industry to track.
Sarwat Khan

BBC NEWS | UK | UK Politics | MP is named Labour 'Twitter tsar' - 0 views

  • Labour MP Kerry McCarthy has been given the job of improving the party's use of social media sites such as Twitter and Facebook ahead of the next election.
    • Sarwat Khan
       
      AREAS OF IMPACT : POLITICS AND GOVERNMENT, PEOPLE
  • She will train MPs and candidates in the best use of the internet.
    • Sarwat Khan
       
      IT SYSTEMS : COMMUNICATION SYSTEMS
  • Rather than being something completely new, campaigning using new media is simply doing what we've always done in a new setting - and rather than replacing traditional ways of doing things, it is about making traditional campaigning methods even more effective."
    • Sarwat Khan
       
      SOCIAL ISSUE: POLICY, PEOPLE
Farah Alam

BBC NEWS | Technology | Where tech and philosophy collide - 0 views

  • "At the moment, people live longer, healthier and for the most part happier lives than they used to because of medical technology.
    • Farah Alam
       
      areas of impact- health
  • Laurie thinks the future will see a class divide between those who can afford the latest technology and those who can't.
    • Farah Alam
       
      social and ethical issue- equality of access.
  • Among the futures envisaged is a world where human consciousness can be uploaded onto storage devices to live inside virtual environments.
    • Farah Alam
       
      It systems in a social context-applications
Chalana Perera

West Africa looses and regains internet connection - 0 views

  • A cable fault that caused a major blackout
  • causing severe problems for its banking sector, government and mobile phone networks.
  • Services were severely disrupted or knocked out in Togo, Niger and Benin.
  • ...4 more annotations...
  • Countries had to either reroute traffic overland or use expensive satellite links to maintain connectivity.
  • Nigeria was particularly badly hit because around 70% of its bandwidth is routed through neighbouring Benin.
  • SAT-3 cable lands in eight West African countries as it winds its way between Europe and South Africa.
  • by Suburban Telecom, was set up to bypass Nigeria's principal telecoms operator Nitel which runs the SAT-3 branch cable which lands in Nigeria.
Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
« First ‹ Previous 61 - 80 of 324 Next › Last »
Showing 20 items per page