Skip to main content

Home/ ITGS News/ Group items tagged 3.5_per_public_com

Rss Feed Group items tagged

Baris T

The player: will the PlayStation Move or Kinect for Xbox change the future of gaming? |... - 1 views

  •  
    The future of gaming is in the hands of these two companies, who will do it the best?
  •  
    the stakeholders in this situation are gamers. the future of gaming is changing and many are asking the question which console is developing the 3D simulation better. many students are gamers and so they are drawn into games and learn about how they can improve. in this case 2 systems the xbox 360 and the ps3 are evolving into 3d systems. who is going to execute the systems better?
Kim T

BBC NEWS | Middle East | Is that cellphone kosher? - 1 views

  •  
    The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
  • ...5 more comments...
  •  
    This article meets the requirements for ITGS because it mentions the three strands related to the ITGS triangle. The social and ethical significance includes the digital divide and equality of access, policies, people and machines and digital citizenship. In this article, members of the Haredi community in parts of Israel were restrained to usages of the internet and cellphones. There are a few people who do use what we consider all the normal features of the internet and cellphone but many others use "kosher" cellphones that do not allow texting, internet usage or even calling numbers that are of non-kosher cellphones. For those who use the government's internet, they have to follow the policies set up by the government's filtered internet service provider and are unable to go on many websites. Because of their limited access as well as for many youths who are given restrictions, they are on one end of the digital divide. Once they may actually have control to use the internet freely as some people may choose to do in their area, they will have to learn self control and stay within the boundaries of digital citizenship because they were not familiar to the use of IT growing up. Furthermore, the use of internet raises concern in the Haredic community and some members look down on others for using it because the internet may interfere or give them "unsafe" images against their religion, therefore relating to people and machines. All these are related to the interference for those who do business online and need access to certain websites and the government's censorship on the internet.
  •  
    It really makes me wonder about the things that people do because of their devotion to God and religion. However, people who need it for business should be able to surf the net without having the "urge" to do anything else but do research. Filter or no filter, it's up the person to make those smart decisions and not look up anything inappropiate other than what their top priorities are for even going online. Even if filters are installed, some people who are a whiz at computers could easily use proxies or unblock any material they want. But it's all up to the person and how strong their values and beliefs are.
  •  
    Dear Kim, All I have to say about this article is...WOW. I think that this article is very interesting . I didn't know that in order to sign up a child for school you would have to have a certain cell phone number in order to call the school or for the school to call you. The school also requires a certain cell phone. I think this is a little extreme to allow your child just attend the school. I also find it a little crazy to constrict the internet as well. If a child has a school assignment based on something not found in that service package, they would have to go to very far lengths to do the assignment.
  •  
    Wow this is amazing. I have never heard of such a thing, and it intrigues me that there is such a thing as phone's influenced by RELIGION. It's new and strange to me because I can't believe a religion would take it as far as making phones with such restrictions. It intrigues me though, and it makes me very curious as to how the restrictions so many things have on childrens lives will affect them. Will they grow up like any other child or will they come out different and strange?
  •  
    Wow, this is simply the most fascinating article I have ever read. It's interesting how the Haredi community isolates themselves from the use of technology. But of course, as times modernize, it's important to be in contact for safety reasons. This kosher cellphone is quite unique, only for the kosher stamp found in foods as well, because it's basically a smaller cellphone version of the ones that first came out. But this community surprisingly reminds me of the Amish, how they choose not to use any technology, the only difference being that Amish don't use electricity at all, where the people of the Haredi community do. But I don't think it's easy living without technology these days, now that everything is going to involve technology in the future. Like the Shift Happens Video: Did You Know 3.0 "We are currently preparing students for jobs that don't yet exist...using technologies that haven't been invented...in order to solve problems we don't even know are problems yet."
  •  
    This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
  •  
    This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
Noreen C

More Than Half of Mobile Apps Not Secure, Report Says - 5 views

  •  
    An article about the unsafe nature of many mobile phone applications including commerce and finance related apps. This article allows the reader to see the increasing problem of security holes of these apps and sites like Twitter who were hit with the same problems, such as "cross site scripting."
  • ...3 more comments...
  •  
    Security in this day an age has become a major problem. The protection of hardware, software, machines, and networks from unauthorized access is becoming increasingly harder because hackers have gotten smarter in identifying the security holes of these programs. Mobile phone applications are just one of their latest hits. More than half of the applications on mobile phones are considered unsafe and therefore vulnerable to security attacks. Third party codes were even more devastating with a "81 percent failure rate." Commerce and finance related apps did just as poorly, both exceeding just about the half way mark. The process of fixing these security holes has become quicker over, however, not quick enough. It takes sixteen days on average to fix the problems and this is rather long time in a society that can get and bit of information in the palms of their hands in nano seconds. Hackers are also going into other user's profiles, or creating fake profiles in order to spread "cross site scripting." This was recently seen as a problem for Twitter and it's users. Tweets were changed into different colors, and there were unwelcomed pop-ups that would appear to users when they clicked on a Tweet. This would then publish the original script on that user's page without their knowledge, or consent. This is a problem that has taken over mobile apps, resulting in "51 percent of all vulnerabilities." The stakeholders of this issue are mainly the users. However, it is also a problem for the companies who created the application and those who are fixing it when it goes down, if not the creator. In the world of applications on mobile phones, things are expanding quickly and largely. However, with this great expansion, there are downsides when more than half are deemed not secure. Although there are various apps that are safe, our need to have everything in our sight available to us, even the most seemingly useless app, has driven us to put our devices, privacy,security, and
  •  
    Please go back and "cache" this page.
  •  
    It will not let me, it says I need to upgrade my subscription in order to do so. Also, the last part of the comment is cut off. Here is the continuation: "authenticity at risk. The coolest apps that are so desired, many not be the coolest things on the market these days. Let's not let our wants surpass our judgment of these problems."
  •  
    Actually, if you click on the link to the article (the one in blue) and bookmark it again (it won't loose your previous work) you can click the Cache box and it will actually cache it. Try it. Normally, you would cache it the first time you bookmark it, but that technique works after the fact.
  •  
    In a way, downloading an app or downloading anything in fact is like interviewing a book or finding a reliable source. It's always better to pick from an author or publisher you know about. Usually, more well known companies will release an app and if there are a lot of people complaining about it, then they will fix it. It takes patience and control to wait for a better version to come out so that you know its safe. Additionally, people should take more caution into the apps they are using and what kind of information they are registering in it.
Madeline Brownstone

The Best TED Talks To Make Use Of Social Media - 1 views

  •  
    View these TED Talks
nicholas n

iPhone Application Tracks Runners in the New York City Marathon - NYTimes.com - 0 views

  •  
    This articles shows the conventional uses of RFID, and you me personally the fears of doing using such technologies. This article tells the reader that in the latest new york city marathon, the people watching wanted to track certain runners(stakeholder). So for the race each runner placed an RFID tag (Hardware 3.1) on the shoes, and on the track (set intervals) sensors would pick up these RFID tags and record the information to each individual runner. To obtain this information one would need an Iphone and 4 dollars to pay for an app that can give you up to date information. There was an issue of reliability present from the perspectives of the cell companies(AT&T). That issue was reliability, to overcome this issue they put temporary cell tower around the track. While no major issue was sparked, I was scared of what it could potentially do. This may do into the realm of sci-fi but my own issue would be survaillence, what if one day everyone was forced to where one of these, there will be these seners at every door or entry way tracking our every move(1984-George Orwell Big brother). Maybe we will have less crime since everything is monatered, but we will lose all privacy. It may be an exaggerated case but not impossible. In reality I can see it being place in our passports, ensuring more security at our flights, but what are we losing
nicholas n

BlackBerry denies India email access deal as struggle continues | Technology | guardian... - 0 views

  •  
    This is a news report that RIM(research in motion ) I denying claims that India is now able to access the messages that many send through RIM secure network. This access includes company messages. However RIM refutes these claims and states they don't have access to any of this information. This is one part of a greater story India's government is not the only government that had problems with RIM due to lack of equality of service and the fact that RIM has the best encryption on their messages. There are many stakeholders such as RIM who are running a business that desires to make a profit and realize on their reputation on security, any company that uses blackberry service. The government that wants to have access to the messages to protect their national security, and finally the average consumer that loves using blackberry for their everyday lives. for the primary stakeholder which is RIM social and ethical issues are security, and reliability and integrity. Security refers to the protection of the blackberries encrypted network. The reliability and security concerns RIM's reputation for their secure networks. the primary scenario in this case is business and employment from various points of view, and the IT system is the blackberry cell phones.
Madeline Brownstone

Privacy is dead on Facebook. Get over it. - Technology & science - Tech and gadgets - T... - 0 views

  •  
    I wonder how many students at BSGE think the privacy is dead.
Madeline Brownstone

USC Annenberg School Center for the Digital Future - 0 views

  •  
    This is a warehouse of information on digital communication.
1 - 11 of 11
Showing 20 items per page