Skip to main content

Home/ Groups/ IB ITGS
Mr Brooke

joypad-evolution-small.pdf (application/pdf Object) - 2 views

  •  
    Evolution of gamepad controller
Richard Stevenson

How to Embed Almost Anything in your Website - 2 views

  •  
    embed anything into website
dr tech

10/GUI on Vimeo - 2 views

  •  
    odoo you will love this...
Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
Mahmud Shihab

Advanced Distributed Learning - What Is SCORM - 2 views

  •  
    SCORM is a collection of specifications and standards used as a "reference model" of interrelated technical specifications for Web-based learning content and systems.
Rafae Wathra

Nigeria Islamic court 'bans Twitter feed' (BBC News) - 2 views

  •  
    A rights group can no longer host debates on twitter because of the court.
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
Elvira Russ

The Strange Death of Illegal Downloading - 2 views

  •  
    This article reasons why illegal downloading of music is decreasing. It is because new softwares are allowing people to downloading music free and legally. People prefer this because they are proper, legal and virus free, which makes them easier to use. It suggests that this is a way of making the music industry better by having less thieves as it lessens the law breakers.
iman mustafa

BBC NEWS | Technology | Online politics reserved for rich - 2 views

  •  
    Online civic engagement remains in the hands of richer, better educated Americans, a US study finds.
iman mustafa

BBC NEWS | Technology | Downloading is not enough - 2 views

  • Kids, it seems, like unlicensed services because they are free. But the report also acknowledges their usefulness in finding more obscure music and letting them listen to a band before they buy
    • Alex David
       
      social & ethical issues- security, control & authenticity
  • They are willing to abandon p2p in favour of licensed services that they have to pay for, but they wouldn't pay for a streaming service like Spotify.
    • Alex David
       
      IT systems- application & communication systems
  • It might be that young people have no faith that the streaming services are going to stay around since they operate at the discretion of the record labels, which have clamped down on many services that are popular with young music fans in the past.
    • Alex David
       
      Area of Impact- Business & Arts, Entertainment & leisure
  •  
    Bill Thompson says young people's needs from online music may be too complex and transient for the industry to track.
Elvira Russ

BU student fined $675,000 for illegal music downloads - The Boston Globe - 2 views

  •  
    This is a more detailed article of what happened in the incident discussed in my stimulus article. I would use this one as a stimulus article but it was posted too long ago.
Elvira Russ

The FBI cracks the 'largest phishing case ever - 2 views

  •  
    Some 100 people face 20 years in jail following a two-year investigation by the FBI. This can be used as an example of phishing since it was the largest phishing case ever solved by the FBI.
Maliha Rahman

The Impact Red Light/Speeding Cameras- (newcarbuyingguide.com)) - 2 views

  •  
    -how red light/speeding cameras can be taken as a violation of privacy and how increased potential of receiving tickets could affect one's auto insurance rate. -you have to face the cameras because they can't be used, but what are other solutions that could make this process easier and less of an issue?
Rafae Wathra

Effect of Twitter on Politics (Corporate-Eye) - 2 views

  •  
    About the political significance of Twitter
Ståle Brokvam

Vermont uses draft horse to lay cable for Internet access - 2 views

  •  
    Surprising, but very efficient, low-tech approach to providing broadband for all.
samaraad

Google beats Egypt net blackout with voice tweets | News | PC Pro - 2 views

  •  
    According to this Guardian article, it seems the automatic speech-to-text-to-tweet feature was dropped for some reason and instead a team of people transcribe/translate into English and manually post with the #egypt hashtag. http://www.guardian.co.uk/technology/2011/feb/01/google-twitter-egypt?INTCMP=SRCH
Ståle Brokvam

EMI - Computer generated music - 2 views

  •  
    Collection of music "composed" by EMI (Experiments in Musical Intelligence) At http://www.radiolab.org/2007/sep/24/musical-dna/ there is also an Interview with David Cope, who's created a software that analyzes the works of famous composes and then composes new pieces in a very similar style. (ToK: is this art? Why (not)?)
‹ Previous 21 - 40 Next › Last »
Showing 20 items per page