Skip to main content

Home/ IB ITGS/ Group items tagged computing

Rss Feed Group items tagged

Jeff Ratliff

Google threatens to leave China (Independent) - 2 views

  •  
    "Last month, Google discovered that it had been the subject of a sophisticated attack on its computer systems, carried out by hackers in search of private data from more than 30 internet companies. Among the targets were the accounts of Chinese human rights activists; experts claimed the hack could be traced to the Chinese government or its proxies. In response, Google announced on Tuesday that it would stop censoring results on Google.cn - the Chinese version of its search engine - or, should Beijing oppose the move, cease operating in China altogether. "
laila-hass

Smart Dust - Computerworld - 2 views

  • Smart dust" devices are tiny wireless microelectromechanical sensors (MEMS) that can detect everything from light to vibrations. Thanks to recent breakthroughs in silicon and fabrication techniques, these "motes" could eventually be the size of a grain of sand, though each would contain sensors, computing circuits, bidirectional wireless communications technology and a power supply. Motes would gather scads of data, run computations and communicate that information using two-way band radio between motes at distances approaching 1,000 feet.
  • The goal for researchers is to get these chips down to 1mm on a side. Current motes are about 5mm, says Kristofer Pister, professor of electrical engineering at UC Berkeley, who's been working with smart dust since 1997.
  • The cost of motes has been dropping steadily. Prices range from $50 to $100 each today, and Pister anticipates that they will fall to $1 within five years.
  •  
    "Smart dust" devices are tiny wireless microelectromechanical sensors (MEMS) that can detect everything from light to vibrations."
  •  
    This is a great article and the smart dust devices have the potential to impact of so many industries and sectors of society. Thanks for sharing.
Zaheen Ahmad

BBC NEWS | Programmes | Click | Pirates look forward to business - 0 views

  • UK's Federation Against Copyright Theft (Fact).
  • "They have advertising on their sites and, as those sites attract more eyeballs, they are getting more advertising income.
  • Isohunt, Mininova and The Pirate Bay.
  • ...4 more annotations...
  • - links to TV, film and music files held on its users' computers.
  • Peer-to-peer (p2p) software connects users to one another and shares files through means such as so-called bit torrent, which chops up files into manageable bits.
  • No copyright content is hosted on the websites themselves - they simply do the indexing of the available content.
  • damages to entertainment companies such as Columbia Pictures, Warner Brothers, EMI and Sony Music Entertainment.
  •  
    For the Issue analysis
Joe Chiverton

Credit and Debit cards stolen worth 130m - 0 views

  • Mr Gonzalez, who had once been an informant for the US Secret Service helping to track hackers, is already in custody on separate charges of hacking into the computer systems of a national restaurant chain and eight major retailers, including TJ Maxx, involving the theft of data related to 40 million credit cards.
    • Joe Chiverton
       
      This is why i put Social issues as security. As he used to work for the government trying to find hackers, therefore knowing how everything works.
Jeewon Yoon

Technology Review: Blogs: arXiv blog: How to Forecast Malicious Internet Attacks - 0 views

  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • Jeewon Yoon
       
      Social Security
  • The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims . It then runs a Google PageRank type algorithm for each victim looking for the most relevant attackers.
    • Jeewon Yoon
       
      IT Systems Communication systems
Ali Parrish

Nokia: New Laptop Offering - 0 views

  • The Booklet also has integrated Bluetooth, GPS, a webcam and an SD card reader. Nokia claims it has a 12-hour battery life.
  • "The presence of this internal wireless modem is why the Booklet 3G is a natural extension to Nokia's traditional phone handset product range."
  • "A growing number of people want the computing power of a PC with the full benefits of mobility," said Kai Oistamo, Nokia's executive vice president for devices.
  • ...3 more annotations...
  • The Booklet has an aluminium case, weighs 1.25 kilograms (2.75 lbs) and its 10-inch screen is HD-ready.
  • Mr Fogg said the Booklet's unique selling point was an "internal mobile broadband card with a SIM slot." "Other netbooks rely on external USB mobile broadband modems for Internet access," he wrote on his blog.
  • The Windows-based device is about 2cm thick and will offer 3G connectivity as well as wi-fi.
Sheila Trudgett

Visuwords™ online graphical dictionary and thesaurus - 0 views

  •  
    Useful for definitions
Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
JACKIE AGUIAR

My List: A Collection on "ITGS sources & Tools" (IBITGS,ITGS,information,in,a,global,so... - 0 views

shared by JACKIE AGUIAR on 10 Sep 09 - Cached
  •  
    Main Diigo site.
L Sutton

New Web Code Draws Concern Over Privacy Risks - 0 views

  •  
    The article begins with "Worries over Internet privacy have spurred lawsuits, conspiracy theories and consumer anxiety as marketers and others invent new ways to track computer users on the Internet. But the alarmists have not seen anything yet."
samaraad

Two million US PCs recruited to botnets - 0 views

  •  
    Hi-tech criminals use botnets to send out spam . It was found in the US that "More than 2.2 million US PCs were found to be part of botnets, networks of hijacked home computers, in the first six months of 2010"
samaraad

Burma hit by massive net attack ahead of election - 2 views

  •  
    An ongoing computer attack has knocked Burma off the internet, just days ahead of its first election in 20 years. This can have political impacts!
‹ Previous 21 - 40 of 59 Next ›
Showing 20 items per page