Skip to main content

Home/ ITGS News/ Group items tagged companies

Rss Feed Group items tagged

Mariam B

Intel and J.P. Morgan Chase to Expand Indian Operations - 1 views

  •  
    Intel is a company that develops processing technologies such as chips that are put into computer hardware. However recently they have decided to outsource certain necessary business operation to India instead of in the US. Additionally Intel has agreed with an investment banker named Morgan Chase, to invest about 1 billion of the company's money into this plan. Intel already has many of it's workers in India however wants to expand the business by increasing its workers within the company. Workers will be needed to help expand the company a long with workers both qualified and graduates due to the increased opportunities and positions. The reasoning as to why Intel continues to offshore work to India is because they are able to find high quality workers and can get work done at cheaper/lower costs. The organization affected mainly is Intel who is able to make a profit through investing in the workforce in India. Additionally the people who are in India that are given the jobs are able to benefit because more jobs are becoming available. The negative side to this is that, they are not paid as much as Intel workers in the US. Additionally another stakeholder is the U.S government itself that frowns upon the idea of offshoring jobs due to the knowledge that by doing this, job oppertunities available to Americans will decrease. The social and ethical issues and impacts of these are related to globalization and its impacts on both the country (India) and the United States. Although workers are given jobs the pay that they receive is not as much as a worker in the U.S would. This is done for the economic benefit of the country Intel itself, allowing them to create a greater profit by off shoring jobs to India. However those who are highly qualified and trained are able to find a job at Intel that matches their level of training. Thus they become employed if they need money. A positive impact to globalization is getting rid of the digital divide in a sense because fr
Santiago P.

Why IT Jobs Are Never Coming Back - Computerworld - 0 views

  •  
    I chose this article because I found that it especially related to the field that we are currently studying in. It is that of ITGS, Information Technology. IT jobs are more and more frequently being offshored to nations like India. There is an obvious issue relating to Business and Employment, or in this case, a rising unemployment. The main stakeholders are the IT workers, who, with the hopes of entering a strong workforce, are having their jobs offshored by multinational companies like IBM and HP (these companies are also primary stakeholders). The primary social and ethical issue involved is that of equality of access. This is due to the fact that access is becoming more widespread - access to technology, computers, databases, servers - all throughout the world. There is no longer "the need to be local", as the article states. People's jobs can be moved to a cheaper place, where it won't be so expensive for the company to keep its workers. Offshoring is not only creating higher levels of unemployment, but helps worsen the U.S. economy while it strengthens foreign economies.
Jaymee C

I'm in Your Google Docs, Reading Your Spreadsheets - NYTimes.com - 0 views

  • There was a time when it would have taken a fair amount of criminal activity to get access to this much information about a company’s internal workings and Web site performance. Now an employee can accidentally drop it into the lap of a random outsider without even knowing that anything is amiss. That’s the power of cloud computing at work.
  • Sharing documents with your co-workers via Google Docs sure is convenient. It can also be hazardous. Make one little typo and your sensitive data could fall into the hands of… someone like me.
  •  
    This article is about a man who received spreadsheets and documents from a newspaper company that was not supposed to be sent to him but to an employee who had a similar name. The typo problem had caused a security issue to arise. The stakeholders include: the employee who sent the message, the man who received them and the company. The employee might have to be repremanded if the writer of the article were to use this information against them. In the same respect, the company would be in trouble if this information was very private and it we released to the general public. The fact is that the security of using googledocs is questionable if users are not careful.
Rubayeth M

Data Security Is No Long an Option - 0 views

  •  
    - In this article, "Data Security Is No Longer an Option," written by Eve Tahmincioglu is stating that the issues that concern Groogle. Groogle is a company which is a small online travel site that can supply the same to others from this site. (Scott Larsen, IT Director for the company, Groogle.) Jon Clay (product marketing manager for Trend Micro) will help get Tokyo based security software that will help this small business result in to a faster growing business. They will require a set of requirements that will be met by 95%. The upgrades made by the security measures have increased sales. Looking on from other companies, they have seen what is known as the virtual private network which sends encrypted data one location to the other without others looking at it. This is possible because of the firewalls and he spyware filtering programs that help keep out unknown individuals. At the end they came down to a decision that says they will upgrade to an intrusion detecting system that will cost around $25,000 to $125,000. Even though they will be enhancing their system there will be one problem which is the idea of making the computer adapt to the changes.
Noreen C

U.S. Tries Open-Source Model for Health Data Systems - NYTimes.com - 1 views

  • easily and securely share information
  • A fancy electronic patient record, unconnected, is just an expensive way to capture data.
  • Getting many different health care providers and suppliers of specialized software to agree on how to do that is no simple task.
  • ...2 more annotations...
  • The solution the group agreed to is essentially Internet-based e-mail and public key encryption technology, tailored for health care.
  • For health care technology companies, the data-sharing standards, experts say, should stimulate the market for electronic health records and allow them to focus their efforts on making their individual offerings more affordable and easier to use.
  •  
    This article is primarily about setting standards and protocols so that an electronic health records could world easily and securely for many health care providers and suppliers. The reason the introduction of an EHR hasn't worked before, is that there were no data-sharing standards, which would ensure that the data is transmitted securely across the internet. These standards are also in accordance of many of the interests of all of the health providers and stakeholders involved, which was a major problem previously. Without the issue of connecting the EHR from provider to provider, then the records would be a "fancy...way to capture data," and it's full potential would never be recognized. However, these new standards and protocols, filled with secure transactions based on encryptions, have made the introduction of an electronic health record possible. There are many benefits to the use of an EHR, including productivity and financial improvement for the companies and the employees. For example, doctors/nurses no longer need to spend time pulling a patient's file, or writing the details of the visit afterwards. There are also fewer repetitive tasks, and improved communication between doctor and nurse, or doctor and another doctor. Quality of care may also improve because doctors have quick access to a patient's information, there is better monitoring and discovery of chronic illnesses, and doctors can return phone calls/ provide medication refills immediately. Also, in general, the electronic charts allow for a more efficient office, which leads to a less stressful environment and more attention on the patients' care rather than searching for their charts. This can only be done through the introduction of an EHR, leading to easier queries, instant reorganization, and file management that could be transmitted to both the patient and any other doctors. This minimizes the ambiguity of not having tests results from one doctor, and allows all doctors treating a p
  •  
    patient to see all of the patient's history. This is important in having a correct diagnosis and treatment. However, there are also some drawbacks. Initially, doctors who chose to engage in the implementation of a EHR, see some decreases in productivity. This is because entering information and learning how to use the software takes some time. Some doctors also do not have the money to invest in such software and accompanying hardware to, and others no not want to because they are accustomed to their hand-written charts. There are also some security issues, leading to greater privacy issues. The EHR maintains very personal data about a patient, and if the records are breached, then the privacy of the patient may be put at risk. There is also the issue of interoperability, which was brought up in the article. Many of the companies in different countries wishing to engage in the implementation of EHR have different standards involving the usage. This could harm the usage of an international EHR.
Madeline Brownstone

BBC NEWS | Programmes | Click | How biometrics could change security - 0 views

  •  
    Recent losses of personal data held on discs, laptops and USB keys by governments and companies have highlighted the need for better security. Here Dan Simmons looks to see if biometrics can help.
  •  
    Recent losses of personal data held on discs, laptops and USB keys by governments and companies have highlighted the need for better security. Here Dan Simmons looks to see if biometrics can help.
Madeline Brownstone

Flames with names? That is the online question | online, world, real - Home - The Orang... - 2 views

  •  
    "Last week, one of the world's most successful online gaming companies, Blizzard Entertainment of Irvine, told its global community of World of Warcraft players that they'd have to use real names in forums. The pushback was severe. The most outraged, as Register writer Ian Hamilton reported, lashed out by publishing online every public item they could find about Blizzard employees and, in some cases, their relatives."
  •  
    Might be a good lead article to spur classroom debate about anonymity in social networking.
Baris T

The player: will the PlayStation Move or Kinect for Xbox change the future of gaming? |... - 1 views

  •  
    The future of gaming is in the hands of these two companies, who will do it the best?
  •  
    the stakeholders in this situation are gamers. the future of gaming is changing and many are asking the question which console is developing the 3D simulation better. many students are gamers and so they are drawn into games and learn about how they can improve. in this case 2 systems the xbox 360 and the ps3 are evolving into 3d systems. who is going to execute the systems better?
Noreen C

More Than Half of Mobile Apps Not Secure, Report Says - 5 views

  •  
    An article about the unsafe nature of many mobile phone applications including commerce and finance related apps. This article allows the reader to see the increasing problem of security holes of these apps and sites like Twitter who were hit with the same problems, such as "cross site scripting."
  • ...3 more comments...
  •  
    Security in this day an age has become a major problem. The protection of hardware, software, machines, and networks from unauthorized access is becoming increasingly harder because hackers have gotten smarter in identifying the security holes of these programs. Mobile phone applications are just one of their latest hits. More than half of the applications on mobile phones are considered unsafe and therefore vulnerable to security attacks. Third party codes were even more devastating with a "81 percent failure rate." Commerce and finance related apps did just as poorly, both exceeding just about the half way mark. The process of fixing these security holes has become quicker over, however, not quick enough. It takes sixteen days on average to fix the problems and this is rather long time in a society that can get and bit of information in the palms of their hands in nano seconds. Hackers are also going into other user's profiles, or creating fake profiles in order to spread "cross site scripting." This was recently seen as a problem for Twitter and it's users. Tweets were changed into different colors, and there were unwelcomed pop-ups that would appear to users when they clicked on a Tweet. This would then publish the original script on that user's page without their knowledge, or consent. This is a problem that has taken over mobile apps, resulting in "51 percent of all vulnerabilities." The stakeholders of this issue are mainly the users. However, it is also a problem for the companies who created the application and those who are fixing it when it goes down, if not the creator. In the world of applications on mobile phones, things are expanding quickly and largely. However, with this great expansion, there are downsides when more than half are deemed not secure. Although there are various apps that are safe, our need to have everything in our sight available to us, even the most seemingly useless app, has driven us to put our devices, privacy,security, and
  •  
    Please go back and "cache" this page.
  •  
    It will not let me, it says I need to upgrade my subscription in order to do so. Also, the last part of the comment is cut off. Here is the continuation: "authenticity at risk. The coolest apps that are so desired, many not be the coolest things on the market these days. Let's not let our wants surpass our judgment of these problems."
  •  
    Actually, if you click on the link to the article (the one in blue) and bookmark it again (it won't loose your previous work) you can click the Cache box and it will actually cache it. Try it. Normally, you would cache it the first time you bookmark it, but that technique works after the fact.
  •  
    In a way, downloading an app or downloading anything in fact is like interviewing a book or finding a reliable source. It's always better to pick from an author or publisher you know about. Usually, more well known companies will release an app and if there are a lot of people complaining about it, then they will fix it. It takes patience and control to wait for a better version to come out so that you know its safe. Additionally, people should take more caution into the apps they are using and what kind of information they are registering in it.
Karen M

Visa Introduces a Credit Card on a Phone - NYTimes.com - 1 views

  •  
    In this article, RFID is being used in the business world. People are now able to purchase phones with the capability of making purchases by moving it over the terminal. RFID technology allows people to stop using credit cards, making the process of buying something even more convenient. The stakeholders are the credit card companies, the people using this new technology, and the stores with the terminals that read RFID. Credit card companies need to have a good security system to ensure their customers and users that their information will be kept safe on the RFID chip. The people who are switching to this new technology are risking their private information for convenience. The stores with these new RFID terminals are also risking their customers' private information because there is a possibility that their system could be hacked. The area of impact is Business and Employment. Businesses are switching to this new technology because it is convenient for them as well as their customers. The main issues that arise from using RFID are security and reliability. The RFID terminal needs to be reliable so that every customer is able to use the RFID chip on their phone to make purchases. The security issue is that a hacker may be able to get into the system to read customers' private information. It may also be possible for a hacker to carry around a portable terminal that would be able to store people's private information on it for future usage. The security system described in this article sounds like a good start, but more needs to be done to keep up with the technology that is growing along with it.
Daniell S

Security risk found in new credit cards - Technology - International Herald Tribune - 1 views

  •  
    In this article it talks about the idea of putting RFID, or Radio Frequency Identification technology into a credit card. This can be both a good thing and a bad thing. It would be a good thing because it would totally change the way a business could work. It would decrease the amount of time a person spends in a store. A person could simply walk in and out of the supermarket with the items they wanted and the amount of money would be charged directly to the persons credit card. However, this could result in an increase in credit card abuse. with RFID technology the signal could be picked up by any radio frequency. This can result in identity theft, and credit card fraud. This is a a violation of the social and ethical issue Security. The stakeholders in this situation would be the credit card users, and the companies issuing the credit card. The users would become angered that their credit cards could be maxed out without them using it more than once and the companies could be sued for each credit card they issued.
Madeline Brownstone

BBC News - Manchester to gain fibre network - 0 views

  •  
    "With speeds of 100Mbps (megabits per second) for both download and uploads, those behind the project hope it will also breed some innovative services. "It will allow home working, telemedicine, video calling and net-based services on TV," explained Chris Smedley, chief executive of Geo, the company appointed to build the network. Such services are often touted as great uses for fibre-to-the-home networks but most are at a very embryonic stage. But there are more mundane wins for consumers, thinks Mr Smedley. Because it has super-fast upload speeds, a fibre-to-the-home network will allow users to store data such as pictures and videos remotely. "
Madeline Brownstone

Technology: The data deluge | The Economist - 1 views

  •  
    "Everywhere you look, the quantity of information in the world is soaring. According to one estimate, mankind created 150 exabytes (billion gigabytes) of data in 2005. This year, it will create 1,200 exabytes. Merely keeping up with this flood, and storing the bits that might be useful, is difficult enough. Analysing it, to spot patterns and extract useful information, is harder still. Even so, the data deluge is already starting to transform business, government, science and everyday life (see our special report in this issue). It has great potential for good-as long as consumers, companies and governments make the right choices about when to restrict the flow of data, and when to encourage it."
Madeline Brownstone

Keeping Uncle Sam from spying on citizens | InSecurity Complex - CNET News - 1 views

  •  
    "But things might be turning around. The CDT and other civil liberties groups have been able to convince Congress to consider reforming a part of the law that gave the FBI the authority to issue "National Security Letters" (NSL) ordering ISPs and other types of businesses to turn over sensitive customer records. A measure before the U.S. House of Representatives would require that records sought with an NSL pertain to somebody who is either a terrorist or a spy or someone known to be in contact with a terrorist or spy, Nojeim said. For Americans with no ties to such individuals, the FBI can require a company to turn over its financial information and communications only after judicial review or with a subpoena in a criminal investigation, he said. The issue is likely to be resolved in the spring, he added."
Madeline Brownstone

Africa can teach development experts - This is Africa - 0 views

  •  
    "African entrepreneurs have successfully capitalised on cascading prices of digital technologies and brought widespread use of mobile phones, internet applications and media products to the doorsteps of many Africans. Local entrepreneurs have built services and infrastructure based on ordinary people's ability to pay. Productivity gains and higher incomes resulting from these services mean that people can afford them. The profitability of these companies invites competition, which lowers costs for consumers and leads to even greater innovations as competitors try to outdo one another. And competition prevents abuses."
nicholas n

BlackBerry denies India email access deal as struggle continues | Technology | guardian... - 0 views

  •  
    This is a news report that RIM(research in motion ) I denying claims that India is now able to access the messages that many send through RIM secure network. This access includes company messages. However RIM refutes these claims and states they don't have access to any of this information. This is one part of a greater story India's government is not the only government that had problems with RIM due to lack of equality of service and the fact that RIM has the best encryption on their messages. There are many stakeholders such as RIM who are running a business that desires to make a profit and realize on their reputation on security, any company that uses blackberry service. The government that wants to have access to the messages to protect their national security, and finally the average consumer that loves using blackberry for their everyday lives. for the primary stakeholder which is RIM social and ethical issues are security, and reliability and integrity. Security refers to the protection of the blackberries encrypted network. The reliability and security concerns RIM's reputation for their secure networks. the primary scenario in this case is business and employment from various points of view, and the IT system is the blackberry cell phones.
Michael M

Video of purported PlayStation Phone hits Web | The Digital Home - CNET News - 0 views

  •  
    There is supposedly a new telephone that supports the Sony game playing experience coming out, running under the Android OS, found under the website Cnet.com. The main stakeholders here are those who look forward to a gaming telephone, so basically it can run from kids to adults that look for a phone with all this phones capabilities. This development will change the life of gamers who can now take a system that can work as a psp and a phone at the same, and also an mp3 player, picture taker, and other big upgrades to the psp, play station portable. The biggest impact is the development of a new Android phone. This phone combines game play and a cell phone all in one, and the quality of game play is much higher than all phones that have come out so far, which begs questions to be asked, will the phone, which runs under Android, have problems with battery time? Will it be able to have such good game play and be able to function as a fully functional phone, without lag time? If this phone fully functions as a gaming system and a phone, then there will definitely be success to the Android Company, and Sony as well, these two companies will thrive from the money that they will make. Since the phone functions as a computer, its processor is required to be high, especially since it will be playing video games, and the RAM must also be high. The processor and RAM, or random access memory, both define the speed and capability of this cell phone/gaming system. It all comes down to the specs and the scrutiny of the stakeholders, those who will be using this cell phone
  •  
    I liked my own work XD
Elisavet M

Data Security Laws Seem Likely, So Consumers and Businesses Vie to Shape Them - 0 views

  •  
    During 2005, political organizations advocated for strict laws implementing data security enforcement, as rising concerns stemmed out of alarming statistical studies and research, revealing identity theft, credit card frauds and hacking as emerging and terrorizing practices overtaking much of the internet realm. This article introduces the beginning of the rise in public awareness, as technology strongly began to redirect the business world into another more digital phase. It was during that year, the primary stakeholders, also known as the businesses ( participants of e-commerce that stored, verified and utilized private consumer data), vocalized their needs clarifying their desire for the creation of constraints in regards to the consequences or negative implications of passing certain bills (for data security). The past exemplifies the various influences the introduction of data security measures, passed by the government legislatures, had upon newly initiated businesses; among the most significant implications discussed were: the need to build a secure database for reliable storage of clientele digital data with the utilization of particular software as well as improving business organizational structure in order to maximize the rate of security notifications towards consumers based on a foundation of rigid security standards. Far from the adaptation to such implications, the political crisis of establishing solid ground for a new set of security data policies and standards became an overwhelming process for politicians, congress members in conjunction with consumer and data privacy groups that rivaled in attaining the responsibilities of passing the needed laws. The politicians (stakeholders, holding the role of administering governmental legislation to stabilize data security breaches), came into opposition with the concerns of many members of advocacy groups (stakeholders, holding the responsibility of supervising and publicly navigating the direction of th
  •  
    continuation: the adjusted standards enforced by politicians). The problem of adhering to the instruction of newly created laws motioning businesses to appoint data security officers, draft policies, to comply with policies and procedures involving giving access to files in business databases for the Federal Trade Commission to check comes into collision with what most online businesses want to go through the process of doing. However, with the issue of security surfacing future consumer problems, as security breaches become major forces threatening the safe entering of digitally encrypted information (such as credit card codes), many companies become increasingly aware of the needed adherence to the strict security data laws, in order to continue profiting financially in order to keep the rate of consumer trust and payment increasing.
Kim T

iTunes warning as thousands of fraudulent accounts are auctioned online - 1/7/2011 - Co... - 0 views

  •  
    Purchasing songs, apps, movies, and etc on ITunes requires each user to have an ITunes account. Upon signing up for the account, a valid credit or paypal account must be entered to pay for any purchased items. These purchases are made using a SSL (secure socket layer) connection so that when the user sends their information to ITunes to set up an account, log in, or purchase an item, the information they are sending is encrypted.The sender is given a public key to show that he or she was the one sending the message and ITunes will get the private key. The data is encrypted using a code that will translate the data into a message incomprehensible to others if not decrypted using a private key. Once it has reached the ITunes database after being sent over the network, the private key will decode the message and proceed with the transaction.  However, the problem lies within the process of setting up an account. Many customers' itunes accounts are being hacked into and sold online to other people in China. Hackers are still able to find and intercept customers' information, such as their passwords or credit card number, and use it to sell to other people. Passwords may be too weak in some cases or authentication by the itunes store may be too weak. The issue of security is therefore involved as sensitive information can be accessed by others. The customers are affected since they are being charged for items that they are not purchasing. The company, Apple, is also affected negatively since their customers may not feel safe buying from them anymore and therefore losing business. Then there are the hackers who are benefiting in such a situation, profiting off of other people illegally.
‹ Previous 21 - 40 of 74 Next › Last »
Showing 20 items per page