Skip to main content

Home/ ITGS News/ Group items tagged Home

Rss Feed Group items tagged

Madeline Brownstone

BBC News - Manchester to gain fibre network - 0 views

  •  
    "With speeds of 100Mbps (megabits per second) for both download and uploads, those behind the project hope it will also breed some innovative services. "It will allow home working, telemedicine, video calling and net-based services on TV," explained Chris Smedley, chief executive of Geo, the company appointed to build the network. Such services are often touted as great uses for fibre-to-the-home networks but most are at a very embryonic stage. But there are more mundane wins for consumers, thinks Mr Smedley. Because it has super-fast upload speeds, a fibre-to-the-home network will allow users to store data such as pictures and videos remotely. "
Rubayeth M

How Do Teens Do Homework Today? - 2 views

  •  
    This relates to ITGS because the stakeholder her is a 17-year female who goes to high school in California and does her homework. However, when it comes to doing homework she gets distracted really quick and forgets. When she comes back she feels like she has so much homework until she finally she goes in to a room where she is isolated without technology which helps her complete concentrate and finish her tasks for school. This shows that home leisure comes in affect where technology at home which in this case is a computer and a phone directly links it to social networking and communication. If she was without a phone and a computer I am pretty sure it would less harder for her to get distracted. Sometimes using a computer will help complete the task faster this then will give her more time with her social life. What I am trying to say is that technology has its advantages and disadvantages.
Madeline Brownstone

Activists utilizing Twitter, Web proxies to sidestep Iranian censorship - The Boston Globe - 0 views

  • Derek Lowe and his Iranian-born wife were appalled by the violence that came in the wake of Iran’s disputed presidential election, and by the Tehran government’s attempts to censor news of the upheavals. And so they joined the protest, as best they could from their home in Acton. They decided to become members of the legion of Internet activists fighting the Iranian government’s aggressive attempts at post-election censorship. Armed with their computers and Internet access, they are helping Iranian protesters get the words and images out of their country for the world to see.
  •  
    "Derek Lowe and his Iranian-born wife were appalled by the violence that came in the wake of Iran's disputed presidential election, and by the Tehran government's attempts to censor news of the upheavals. And so they joined the protest, as best they could from their home in Acton. They decided to become members of the legion of Internet activists fighting the Iranian government's aggressive attempts at post-election censorship. Armed with their computers and Internet access, they are helping Iranian protesters get the words and images out of their country for the world to see."
Madeline Brownstone

Hacking For Good Reasons - Articles - Educational Technology - ICT in Education - 0 views

  •  
    "We tend to think of hacking as bad, and hackers as evil. But as well as the ones wearing white hats, ie the ones who are on our side and checking out vulnerabilities that others might exploit, there are the techno-geeks who are all dressed up and with nowhere to go. Until now. On the 11th March, the UK's Home Office, Cabinet Office and Ministry of Justice opened their doors to 10 technical experts from http://www.rewiredstate.com who used data.gov.uk and the web to develop tools and services that help people."
Madeline Brownstone

School District Faces Lawsuit Over Webcam Spying Claims - PCWorld Business Center - 1 views

  •  
    School uses iSight camera to view students at home on laptops
Daniell S

'One app for all' effort launches - 1 views

  •  
    This is an article about a European team creating an app can be downloaded on to any internet connected communications device. However, even after being presented with 10m euros, this group of 22 organizations hasn't yet received help from companies such as Apple. Apple still wishes to be different from others.
  •  
    This meets the requirements for the IT triangle because within the article it refers to some companies not accepting this application. Within strand 1 the issue of The digital divide and equality of access comes up. Within the article i learned about the organizations who are trying to make this app for all people with internet connected devices. This shows that the Apple company is at a sort of disadvantage for being behind in this new "App for all" program. By staying out of they will not be allowing the app created to the devices the company has created. This also related to Strand 2. In this app it will created to work on what ever people desire the app to work on. This is expressed in the article through "The idea would enable a given app to work, for example, on a web-ready television, in a car and on a mobile, no matter the makers of the devices." It would work on all of these things listed. This is represented through "Home and Leisure" and "Political Process". It would relate to "Home and Leisure" because the app can connect to computers and cell phones. It can also relate to the political process, with Apple not really wanting to get involved with the project. The relation between this article and Strand 3 is that this article involves Personal and Public Communications. This app can be downloaded by just about anyone with a internet connected device. The stakeholders in this situation would be the people using the apps. Another stakeholder would be the 22 organizations creating the app. The other stakeholders would the Companies who are allowing this app into their device;.
Madeline Brownstone

BBC NEWS | Health | NHS Stories: Telemedicine - 3 views

  •  
    "nce a week at a pre-arranged time, Olive sets up the complicated looking equipment her end. She then phones Victor to make sure he is ready to receive her call and that his computer is switched on. She then calls him up, and they have a face-to-face consultation. While Victor sits on his bed in his semi-detached home in Middlesex, Olive can check his breathing, heart rate and temperature and watch out for any early signs that his body is rejecting his double lung transplant. "This allows us to be there for him," Olive said. "
Madeline Brownstone

BBC News - George Osborne MP transcript - 0 views

  •  
    "We're talking about 100 megabits, which is a big step forward for this country. It means you can have interactive teaching over the Internet at home; you can have telemedicine; "
Madeline Brownstone

The Florence Nightingales of the internet - World Politics, World - The Independent - 0 views

  •  
    "At his wits' end, the doctor in Baghdad dispatched his plea for help - an email detailing a patient with a particularly difficult case of uterine cancer. More than two thousand miles away, in the study of her Kent home, Pat Swinfen swiftly forwarded the request on to a British specialist. The man who received that email, Dr Philip Savage, replied: "Don't give up on this woman. Her life can be saved." And that, with the help of continued advice from the eminent oncologist from Imperial College, is exactly what the Iraqi doctor did. "
Madeline Brownstone

F.B.I. Queries Webcam Use by Schools - NYTimes.com - 2 views

  •  
    "A Pennsylvania school district accused of secretly switching on laptop computer cameras inside students' homes is under investigation by federal authorities, a law enforcement official with knowledge of the case said."
Alex F

Regulations and Security Concerns Hinder Asia's Move to Cloud Computing - NYTimes.com - 0 views

  •  
    In this article it talks about how the organization known as "The Youth Olympic Games" were hosting their games in August. But they have done something different this year. Unlike what they have done every year, purchasing their items all the time and selling them or giving them away for free; they have now would have an third-world country who has the equipment do their job if they were to buy it. By that I mean they would used a system called "cloud services", and the group in charge of working would be Asia and they would have the data of everyone who is watching, performing and workers of the organization. Therefore these are the stakeholders in with this program that because they are having someone else from a different country; without knowing if they are someone who wants to steal their identity has full access. The IT system in this "cloud services" would be cloud computing since someone that may be from home, or sitting in an office has control over the organization and the data. The issue in this would be security, that because the people that are using "cloud services" are in Asia; therefore they are in a different having control in the U.S. The scenarios in this would be the fact that everyone identity would be stolen since the controls would be in Asia and they wouldn't be tracked since they are in a different country. They also couldn't be charged since they were given permission to have access to the data.
T Graham

Page 2 Bringing IT outsourcing closer to home - ComputerworldUK.com - 1 views

  •  
    This article presents a unique view of outsourcing from the perspective of the big businesses turning to places like India to save money in labor. This article argues about the negative aspects of offshoring. The author Naoum argues that the negatives of sending IT labor to India outweigh the positives. Naoum writes that even though offshoring may save money in terms of lower costs to pay Indian workers many business owners are not aware of the hidden costs associated with this type of move. He goes on to give statistics of businesses who have sunk due to offshoring without researching all the costs. Naoum points out that business owners may be solely focused on the fact that they are saving some money but ignore that consequences that include the lowering of labor quality and "business innovation." The article mostly focuses on the American or European business owner who is considering offsourcing. The area of impact is business and employment because it involves first world businesses and the labor (employment) of skilled third world citizens. The issue raised in this article is that of reliability he is questioning the quality of IT business done in these nations and whether or not it is worth the extra costs. At the end of the article he suggests outsourcing somewhere a little closer where people are more skilled and the hidden costs are not a threat. For example he suggests outsourcing to Spain where 20% of the older workers are educated in the use of IT. Naoum also raises the issue of security in offshoring to a place like India. He uses the example of a business that outsourced to India and experienced a leak of sensitive information about its clients. Naoum brings an alternate view about outsourcing/offshoring, he points out the negative aspects that people don't usually recognize.
  •  
    Seems like you missed the point of data security.
Carmen M

Home Office Data Security: Protect Customer Info - And Your Small Business - 0 views

  •  
    This article talks about Data security regarding information kept in a computer. The stakeholders in this case are the employee and the customer. The IT system is, like previously mentioned, a computer. The issue regarding the system is reliability. If you have a customers information such as credit card numbers and other personal data, then security and reliability definitely come up as an issue. Computers are prone to get viruses which could wipe out all the information stored on your hardrive. Hackers and other spyware can also be another concern. Your customer is trusting you with their information. The article also proposes a solution. The solution would be to have two separate computers, one for personal uses and the other for work. That way, eliminating visiting websites that might have viruses.
Noreen C

New Toolkit for Disaster Response: Social Media, Mobile Tools & Telehealth - Features -... - 1 views

  •  
    According to Alexander Vo, an associate professor in preventive medicine and community health, telemedicine is a helpful measure to be taken in order to help patients from a remote location. However, he says that problems have arose when telemedicine was used in relation to diaster relief. One example given is the earthquake in Haiti, when many technologies were donated by companies in order to promote the use of telemedicine for immediate disaster relief. Vo says that this technology was not used, especially within the first few weeks, because the locations were staffed with enough doctors. Further, even if the technology could be used, the doctors were not trained to use it, and there was no time to train them at that moment.Only after the voluntary doctors went back to their home towns could they be of any use in regard to telemedicine. The patients in need of special care could then connect with the doctors in the remote areas, however, there could be problems if the internet was down, or if the necessary hardware was destroyed due to the diaster. Even though the egagement in telemedicine was not the best for Haiti, it was seen to be of great help for a hurricane in Texas recently. Vo explains that telemedicine was successful because it was already established within the communities. The technology was available throughout the affected areas, and could be put to use immediately. The use of cell phones was also crucial, because many of the patients had pre-established access to doctors who could help diagnose and alleviate the problems of the patients in affected areas. Because the protocols were established prior to the disasters, the care was planed out to be available to the most amount of patients. Plans in advance can also taken into account the problem of damaged internet service, cables, and networks, and determine what the best plan of action is given the situation. Thus, the relief would allow the affected area to be back on track quickly, and efficientl
Madeline Brownstone

Flames with names? That is the online question | online, world, real - Home - The Orang... - 2 views

  •  
    "Last week, one of the world's most successful online gaming companies, Blizzard Entertainment of Irvine, told its global community of World of Warcraft players that they'd have to use real names in forums. The pushback was severe. The most outraged, as Register writer Ian Hamilton reported, lashed out by publishing online every public item they could find about Blizzard employees and, in some cases, their relatives."
  •  
    Might be a good lead article to spur classroom debate about anonymity in social networking.
Jialin C

Twitter worm was unleashed by 17-year-old Australian - 1 views

  •  
    This article is about a 17-year old teenager had wanted to put Javascript code in a tweet. But then, others picked up the code and hacked Twitter by leading to viruses and pornography sites. It wasn't his intention to spread the worm to any users, but he wanted to see if it was possible to break the 140 words challenge on a tweet.
  •  
    This news post provides information regarding to three strands of the ITGS triangle. It's based on home and leisure and due to many privacy issues. Stakeholders are the Twitter users who have posted tweets and received viruses on their computers. Privacy and anonymity determines whether a user wants to post certain tweets regarding him/her and the anonymity would be how this teen had caused the spread of this worm onto other's computers which was a severe consequence for many. Tweets are meant to be secure, however any users that have accessed Twitter and clicked on the harmful link which have caused damages to their computers. The lack of security measure is terrible because it's suppose to prevent employess and users from having access to hacking; but it had done the opposite. The topic of people and machine is the benefit of Twitter. Users who have tweeted are somehow 'addicted' to posting personal information online and to their friends. It's a daily habit and a routine that most people do almost every five minutes each day. Twitter hits 50 million tweets a day and not only that, but people are very much attached to their cyber life nowadays. The internet is definitely not the safest place to talk about your daily life and the worm was spread across the cyberspace because of a advertisement that advertised for colored tweets on profiles, which was a mistake to click on.
  •  
    Poor guy! was my first thought, at the age of 17 and caused such a problem on twitter. This makes me think about how technology can go wrong so fast, which is why we shouldnt become so dependent on technology all the time! A simple java script on a tweet and bam! A worm was caught by all the other twitter users. And it wasnt even done intentiionally, imagine if it were done? The numerous things that can occur. Well thanks for sharing!
Elisavet M

"Virtual Reality tackles tough questions" - 1 views

  •  
    Scientists in Barcelona have constructed a technological device, enabling users to engage and "live" within a virtual reality; this digital world however, is bound by the oppressive and devastating human conditions experienced by the victimized individuals of physical and verbal maltreatment. The device, although it may conjure ethical realizations within the user's mind, also poses as an ethical dilemma for it brings the cruel severity of the downtrodden and exploited people into visual and mental display terrorizing the emotional stability of the participants.
  •  
    Technological breakthroughs in decoding the human mind have blossomed ever since the invention of a device through which users are immersed within a virtual reality, to live and experience the trauma and distressing scenarios of people victimized by physical as well as emotional abuse. Developed by a team of Spanish scientists, this device is breaking down the mind's irrational judgement in relation to discriminatory or wrongful perceptions against others. The user of the device, once transported into the anguished lives of the virtual characters, comes face to face with the agony of living through abusive violence, and begins to form a clearer impression about the effects of such experiences upon the lifestyle, behavior and well being of any victim. In doing so, the participant ultimately widens the boundaries of his mental state of thought, and begins to appreciate and acknowledge the peace given by a happy life rid of gnawing internal complications. However, in engaging with such a virtual reality the user becomes an unshielded target of bitter misery, felt and illustrated by the depictions seen through the device. The software that is included in this article is the technological device that offers an entrance into the virtual world for the user. The stakeholders within this article are the users of the device, whose mental and emotional stability is controlled by the virtual reality developed by the scientists. The scientists hold the success of the entire experiment in the palm of their hands, and really are the source of the effect upon human behavior. One has to take into consideration the physical and psychological considerations (in "Health" scenario) of technology on the user of this particular device; although this device does help others modify their morality as they expand their considerations for the factors that have made people what they are today. The device however, does inflict the same trauma and terror depicted by the gestures and movements
  •  
    I agree with the ethical and social concerns involved within your article. Although there are some benefits of recognizing the pain and violence inflicted on others, it can cause emotional stigma and trauma upon the person who is using this technological device. Technology controls our ethical morality, in developing software that explores the way the human brain works we destroy this boundary of what is right and wrong because we begin to focus on research and forget the effects involved. In this case, those involved in the experiment are unaware of the effects that this virtual reality exposed to the user will eventually have on them mentally and emotionally.
Rubayeth M

RIM's BlackPad tablet launch reported to be imminent - 2 views

  •  
    "BlackBerry-maker ready to launch hotly-anticipated tablet device, sources tell the Wall Street Journal." About their new tablet device that is similar to Apple's iPad.
  •  
    The requirements for ITGS are that it has Social and Ethical Significance and IT Systems. The Social and Ethical Significance that is included to this article are home and leisure and reliability because this product will be used by the people for the people. It is something that people will enjoy when used. This will create more ways to faster and easier way of keeping up with social networking, digital entertainment and many others. The reliability of this product will be compared to the iPad. For instance the 7in Blackberry is known as the BlackPad and is now a trademark by Blackberry. It weighs almost the same as an iPad and will be on AT&T or Verizon or only on AT&T and Verizon. The IT systems required for this product is a network provider which will be between AT&T and Verizon, wireless internet, internal memory, flash (is expected soon) and many others that are normal as regular phones and Apple's iPad. The stakeholder will be the people buying the BlackPad and the people learning how to adjust to this new generation of phones.
Noreen C

TAGSYS Develops Airline Industry's First Reusable RFID Baggage Tag for Qantas | Busines... - 1 views

  •  
    In airports nationally and internationally, flyers have to stand in line to wait to check in. The process is anything but welcoming for those who are running late, dislike crowds, and are just simply impatient. The process is just has grueling for the workers who have to deal witht the annoyed customers day after day. Luckily, the ticket kiosks have made the check in time shorter, being great for those who have no luggage to check in, but still just a part of the process for those who do. With RFID tags, the check in process isn't as dreadful. Companies are now begining to use reusable RFID tags that can track up to four flights at a time for each luggage, and can be programmed to track upcoming flights. This technology reduces the check in time, and increases effciency as the luggage is already associated with the flyer, and it's location is known at all times. Lost luggage can be found easier, and the manual labor needed for check in is cut down. There is also less paper being used, since the RFID tags only involve electronic mediums. For both the flyer and the company, the RFID tags can be a bright future. However, with more and more ways to eliminate time and human error, it is possible that the jobs of the people at the check in will be reduced. This seems to be a problem with many technologies, but this is the way in which our future is going. But, even though technology seems to be super efficient and a lot better than humans, it has it's flaws. RFID tags are read by radio rignals. If the tags are broken, or placed in an area where the radio signals cannot reach, then the tags are useless. There also needs to be new technology that allows airline companies to begin to use the tags, which may be costly. Another major issue is that in order to increase efficiency, all of the customers must be on board. There is no guarantee that this will happen any time soon, or that all of the airline companies will wish to use the technolgy.
Yuval S

Outsourcing to India Draws Western Lawyers - 2 views

  •  
    There is a huge increase in India's Legal outsourcing business. Many of these companies use hundreds Indian lawyers who do the hard work that young lawyers in the United States usually have, at a fraction of the cost. Some Lawyers in the Unites States go because "they say they stay for the opportunities to build a business and manage people." Some issues of this is that the Westerners must adapt to India's environment. Managers estimate that "About 5 percent of Western transplants cannot handle it and move back home."
1 - 20 of 30 Next ›
Showing 20 items per page