Skip to main content

Home/ IB ITGS/ Group items tagged explorer

Rss Feed Group items tagged

Jeff Ratliff

DARPA launches balloons - 1 views

  •  
    To mark the 40th anniversary of the Internet, DARPA has announced the DARPA Network Challenge, a competition that will explore the roles the Internet and social networking play in the timely communication, wide-area team-building, and urgent mobilization required to solve broad-scope, time-critical problems. The challenge is to be the first to submit the locations of 10 moored, 8-foot, red, weather balloons at 10 fixed locations in the continental United States. The balloons will be in readily accessible locations and visible from nearby roads.
Jeff Ratliff

Understanding Computers and the Internet | Harvard Video Course - 0 views

  •  
    This course is all about understanding: understanding what's going on inside your computer when you flip on the switch, why tech support has you constantly rebooting your computer, how everything you do on the Internet can be watched by others, and how your computer can become infected with a worm just by turning it on. In this course we demystify computers and the Internet, along with their jargon, so that students understand not only what they can do with each but also how it all works and why. Students leave this course armed with a new vocabulary and equipped for further exploration of computers and the Internet. Topics include hardware, software, the Internet, multimedia, security, website development, programming, and dotcoms. This course is designed both for those with little, if any, computer experience and for those who use a computer every day.
ajay tambay

Forecasting Malicious Internet Attacks - 0 views

  • cyberspace is dominated by it
    • ajay tambay
       
      IT Systems - Internet
  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • ajay tambay
       
      Social - Security
  • Last year, computer scientists began exploring a potentially more effective approach: predicting the sites most likely to attack and blocking them in advance. The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims .
    • ajay tambay
       
      Impact - Business, education
1 - 5 of 5
Showing 20 items per page