Skip to main content

Home/ IB ITGS/ Group items tagged tools

Rss Feed Group items tagged

Johan Autio

Chart and image gallery: 30 free tools for data visualization and analysis - Computerworld - 0 views

  •  
    30 free tools for data visualization and analysis
Eunice Vincent

The Fundamentals of GPS - Articles - 0 views

  •  
    GIS News, Articles, Maps, Data, Tools
JACKIE AGUIAR

My List: A Collection on "ITGS sources & Tools" (IBITGS,ITGS,information,in,a,global,so... - 0 views

shared by JACKIE AGUIAR on 10 Sep 09 - Cached
  •  
    Main Diigo site.
Eunice Vincent

Can cell phone radiation impact human health? - 0 views

  •  
    Microwaves from wireless phones are surrounding us! Have you been aware of this? Today cell phones have become an tool in people's daily life. It is no longer a piece of news that cell phones radiate microwaves that might cause diseases to human body, or bring potential harm to our health.
Jeff Ratliff

33 Best Typography Effect Photoshop Tutorials - 0 views

  •  
    "Photoshop's text and layer tools can be used to create some really awesome Typography's. We've put together a list of 33 of the best Typography tutorials we could find to help you stay up to date on the latest trends and techniques. You'll find some really cool grunge and glass styles, learn how some of the best designers create their unique effects using typography."
anonymous

BBC NEWS | Technology | Web tool oversees Afghan election - 0 views

  • Their reports feature alongside those of full-time Afghan journalists to ensure the election and reporting of it is as "free
  • The Alive in Afghanistan project plots the SMS reports on an online map.
  • The text messages are collected via a free-platform known as FrontlineSMS, developed by UK programmer Ken Banks.
  • ...8 more annotations...
  • Any attempt to rig or interfere with Afghanistan's election could be caught out by a system that allows anyone to record incidents via text message.
  • authenticity.
    • Chalana Perera
       
      stakeholder 2
  • Ushahidi
    • Chalana Perera
       
      stakeholder 1
  • National Security Council
    • anonymous
       
      Stakeholder 3
  • "We hope to enable people to report on what is going on in the country
    • anonymous
       
      Stalkholder 4, the people create the impact, and are going to use the SMS technology.
  • of Afghanistan has asked all domestic and international media agencies to "refrain form broadcasting any incidence of violence during the election process".
    • anonymous
       
      Areas of Impact>Politics and Government
  •  
    Any attempt to rig or interfere with Afghanistan's election could be caught out by a system that allows anyone to record incidents via text message.
Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
Rafae Wathra

Twitter tweets are 40% 'babble' - 0 views

  • A short-term study of Twitter has found that 40% of the messages sent via it are "pointless babble."
    • Rafae Wathra
       
      Social: Privacy This shows how little privacy that Twitter users have sinced they are being judged by complete strangers based on how they tweet (who came to the conclusion that its a lot of pointless babble)
  • In total it grabbed 2,000 messages and then put each message it grabbed into one of six categories; news, spam, self-promotion, pointless babble, conversational and those with pass-along value
    • Rafae Wathra
       
      IT systems: Communication System This shows how Twitter is used as a communication system and what people communicate with it
  • This belief, it said, was driven by the growing number of firms starting to use Twitter as a tool to drum up sales.
    • Rafae Wathra
       
      Impact: Business This is an example of a way by which large businesses use technology to increase sales
Chalana Perera

Internet Time and the Reliability of Search Engines | EDUCAUSE - 4 views

  • earch engines are unreliable tools for data collection for research that aims to reconstruct the historical record.
Chalana Perera

Translating Spectacles (BBC Technology) - 0 views

  • headset uses a tiny projector to display images on a user's retina
  • used real-time translation to provide subtitles for a conversation between people lacking a common language
  • The cost does not include the price of the translation tools and software
  • ...1 more annotation...
  • At the same time as a user hears a translation, they would also get text subtitles beamed onto the retina.
  •  
    This article discusses the Japanese designed NEC Smart Spectacles which are designed to create conversation flowing when there is no common language between the people interacting. The lens reads and interprets, then displays words so the person wearing it can hear and see what is being said by the other person.
  •  
    This article discusses the Japanese designed NEC Smart Spectacles which are designed to create conversation flowing when there is no common language between the people interacting. The lens reads and interprets, then displays words so the person wearing it can hear and see what is being said by the other person.
Chalana Perera

Google launches Maps tool for finding flu vaccine | Webware - CNET - 0 views

  • users can now visit Google's new flu shot Google Maps page to find out if there is any vaccine available in their area.
  • has yet to receive information on flu shots from many locations.
  • working with the Centers for Disease Control
  • ...2 more annotations...
  • users can input their Zip code or town and find all the vaccine available in their area
  • e vaccine providers aware of the project so that they can contribute."
1 - 17 of 17
Showing 20 items per page