Skip to main content

Home/ IB ITGS/ Group items tagged employment

Rss Feed Group items tagged

Davy Tsai

Need help on ITGS portfolio(Business and Employment) - 1 views

Business and Employment how can i use http://www.nytimes.com/2009/11/22/technology/22distracted.html?_r=4&ref=technology to write about the business and employment??

started by Davy Tsai on 20 Jan 10 no follow-up yet
Shih-Chen Chiu

Wallet of the future? Your mobile phone - CNN.com - 0 views

  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
    • Shih-Chen Chiu
       
      social& ethical issue -people and machines ITsystems in a social context -Applications -Integrated Systems Areas of impact -Business & employment -Scoence & the enviornment
  • ...4 more annotations...
  • And technology that turns phones into credit cards and IDs poses several potential problems.
    • Shih-Chen Chiu
       
      social & ethical issues -security -authenticity -integrity -control
  • In the late 1990s and early 2000s, banks and cell phone makers started conducting trials with U.S. customers. Limited groups of people were given the ability to scan their phones to make payments, enter stadiums and access public transit.
    • Shih-Chen Chiu
       
      areas of impact -business & employment
  • If phones replace wallets, would-be thieves will see every person walking down the street talking on his or her phone as a target for robbery, said Lillie Coney, associate director of the Electronic Privacy Information Center.
    • Shih-Chen Chiu
       
      social & ethical issues -security
  • Eye scans and fingerprints would make phone IDs and payments more secure, Brown said. The ID technology might work like a corporate security badge, which pulls up personal information when scanned.
    • Shih-Chen Chiu
       
      social & ethical issues -reliability -security -integrity -privacy IT systems in a social context hardware integrated systems
shazad rouf

Online career matchmaker helps MBAs land jobs - CNN.com - 0 views

  • "Even though the economy is not as bad as it used to be, we are still seeing a good uptake. Our traffic is still going strong," Larizadeh says.
    • shazad rouf
       
      areas of impact: business and employment
  • Four years and a round of venture capital funding later, what started as a hobby designed to help friends share career information has turned into a network with approximately 600,000 members.
    • shazad rouf
       
      social and ethnic issues: security
  • Schools like The Wharton School of the University of Pennsylvania and Duke University's Fuqua School of Business have formed partnerships with Doostang that enable their students to access the network's premium job listings for free.
    • shazad rouf
       
      IT systems in a social sytem: Communication system
iman mustafa

Twitter, Facebook attack targeted one user - 0 views

  • The blogger, who uses the account name "Cyxymu," (the name of a town in the Republic of Georgia) had accounts on all of the different sites that were attacked at the same time, Max Kelly, chief security officer at Facebook, told CNET New
  • A Georgian blogger with accounts on Twitter, Facebook, LiveJournal, and Google's Blogger and YouTube was targeted in a denial-of-service attack that led to the sitewide outage at Twitter and problems at the other sites on Thursday, according to a Facebook executive.
  • Kelly declined to speculate on who was behind the attack, but he said: "You have to ask who would benefit the most from doing this and think about what those people are doing and the disregard for the rest of the users and the Internet."
iman mustafa

Privacy for palm consumers - 0 views

  • The discovery was made by software developer and Pre owner Joey Hess, who found that his phone was reporting his location over a secure connection back to Palm. It also sent back information about application crashes - even those not seen by a Pre owner.
  • It added: "Our privacy policy is like many policies in the industry and includes very detailed language about potential scenarios in which we might use a customer's information, all toward a goal of offering a great user experience."
  • The company issued a statement after one owner discovered his phone was sending data every day back to Palm.
Eunice Vincent

Nations May Reuse More Electronics Than Thought - 0 views

  • "At least 85 percent of discarded computers imported to Peru are reused, as opposed to going directly to recycling. [... Thus,] the image of the trade in e-waste as mainly being about dumping unusable junk is, at least for Peru, inaccurate."
    • Eunice Vincent
       
      Social: Globalization
  • "highly dynamic flow [that] reuses and recycles almost every part and material found in a computer,"
    • Eunice Vincent
       
      IT SYSTEMS: basics
  • that it is possible to stop the environmentally damaging practices without diluting or eliminating informal dismantling and collection. This informal reuse and recycling sector is valuable for generating employment in the country and in making computing technology more accessible to low-income families and small businesses, the paper contends.
    • Eunice Vincent
       
      AREAS OF IMPACT: business, science&the environment
1 - 8 of 8
Showing 20 items per page