Skip to main content

Home/ IB ITGS/ Group items tagged computers

Rss Feed Group items tagged

Chalana Perera

OLPC's Netbook Impact on Laptop PC Industry - OLPC News - 1 views

  • 1. Windows XP would have been discontinued in 2007 or 2008 as was Microsoft's original plan
  • 2. The Windows XP licence for netbooks was lowered to $30 per device
  • 3. Netbooks are selling at a rate of 35 million units per year and represent more than 30% of the notebook market and this share is increasing.
  • ...3 more annotations...
  • 4. Intel's profits shrank 90% between Q4 2007 and Q4 2008
  • OLPC is going to make the PC/Laptop industry realize that there is an alternative to X86 for full sized keyboard/screen computing.
  • prices and market trends obviously do matter for the education aspect of the OLPC project
Chalana Perera

Microsoft and One Laptop per Child Partner to Deliver Affordable Computing to Students ... - 0 views

  • Microsoft Windows operating system available on OLPC’s low-cost XO laptops for the world’s poorest children
  • The availability of Windows, in addition to Linux, on the XO laptop will allow customers to have an expanded choice of operating environments that best fit their requirements.
  • Transforming education is a fundamental goal of Microsoft Unlimited Potential, our ambitious effort to bring sustained social and economic opportunity to people who currently don’t enjoy the benefits of technology
Chalana Perera

Stimulus: Laptop for every pupil in Uruguay - 0 views

  • The total figure represents less than 5% of the country's education budget.
  • Linux operating
  • particularly those in rural areas, where many still do not have internet access
  • ...2 more annotations...
  • some teachers have chosen not to include computer-related work in their lesson plans
  • last two years 362,000 pupils and 18,000 teachers
Eunice Vincent

HowStuffWorks- Phishing - 0 views

  •  
    Phishing is a common method of online identity theft and virus spreading. Find out how phishing scams work and learn ways to protect yourself from phishing.
Jeff Ratliff

HowStuffWorks "How Web Servers Work" - 0 views

  •  
    For Kavi
Chalana Perera

Debate over possible responses to cyber attacks (MSNBC) - 0 views

  • the U.S. military's secret offensive cyber capability
  • counterstrike on an attacker's computer network
  •  
    This article discusses the idea of a cyber-war and promotes tit-for-tat solutions and counter-attack strategies that the US could use in a cyber war. It also discusses some short term solutions for small-scale cyber attacks.
Rafae Wathra

Twitter on Your Cell Phone (How Stuff Works) - 0 views

  •  
    Article about the technology behind using twitter from a scell phone.
Rafae Wathra

How Twitter Works (How Stuff Worrks) - 0 views

  •  
    About the API (application programming interface) used in twitter and other IT background
Ståle Brokvam

EMI - Computer generated music - 2 views

  •  
    Collection of music "composed" by EMI (Experiments in Musical Intelligence) At http://www.radiolab.org/2007/sep/24/musical-dna/ there is also an Interview with David Cope, who's created a software that analyzes the works of famous composes and then composes new pieces in a very similar style. (ToK: is this art? Why (not)?)
Rafae Wathra

Hackers target Guardian jobs site - 1 views

  • Computer hackers have targeted the Guardian newspaper's jobs website in a "sophisticated and deliberate" move, the company has said.
    • Rafae Wathra
       
      Claimed by Rafae and Tanveer
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
Maliha Rahman

Sexting and Teens (Suite101) Portfolio 1 Criteria D - 1 views

  • Cell phones are now embedded with cameras and have the capability to send pictures to other phones and computers.
  • With sexting, sexually active kids can harass each other simply and quickly.
  • Because they can’t control who these pictures are subsequently sent to, they run the risk that they may wind up in the hands of a sexual predator or someone else who could harm them.
  • ...1 more annotation...
  • How Adults Can Prevent Sexting
  •  
    In this article we see a lot of ways of sexting, their reasoning's plus their consequences. We also see a few suggestions or examples of how to prevent your child from getting into and taking actions like this.
« First ‹ Previous 41 - 59 of 59
Showing 20 items per page