Skip to main content

Home/ ITGS News/ Group items tagged texting

Rss Feed Group items tagged

Madeline Brownstone

Commercial Vehicles « Denver Accident Information - 2 views

  •  
    "Obama Signs Executive Order Limiting Text Messaging for On-The-Job Government Employees Monday, November 23rd, 2009 On September 30, 2009, the Obama administration ordered a ban on texting for all government employees while driving on the job or driving government-owned vehicles. Studies show that talking on a cell phone causes almost 25% of all car accidents. Already, seven states have banned any cellphone use while driving, 18 states have banned texting while driving, and 17 states have made it illegal for school bus drivers to use cellphones while driving. This is all great news for U.S. drivers since last year distracted drivers caused nearly 6,000 deaths in this country alone. The administration is considering additional restrictions on cellphone use by rail, truck and bus drivers."
Madeline Brownstone

Tractor Trailer Accident Caused by Driver Texting Brings Up Legislation Questions :: Mi... - 0 views

  •  
    "The tractor trailer driver turned himself in to authorities after the tractor trailer crash, accepting that he was distracted from the road and negligent in driving. Despite his remorse, the fact of the matter is that a young girl died and eleven others were injured because of a simple negligent action on the road that could have been prevented. Recent legislation in some states ban texting while driving, although Florida is not one of them. Despite the lack in particular legislation, texting while driving can still be used to show negligence and prove liability in personal injury claims stemming from a tractor trailer accident."
Madeline Brownstone

On Camera: Bus Driver Crashes While Texting - Geekologie - 1 views

  •  
    "He's not just driving any bus either, he's sporting that short joint (see man in wheelchair tethered in the back). Jesus. Dude texts for six minutes straight before finally rear-ending somebody. You'd think being on camera would be enough to deter this sort of behavior, but no, it's not. This is almost as bad as your middle school bus driver drinking and smoking the whole ride. Miss you Mrs. Wright! Madison County (AL) Public Schools Bus #114 FTW!"
Madeline Brownstone

Technology News: Handheld Devices: Road Warning: Swarms of Texting Teens Ahead - 1 views

  •  
    "Textecution, for example, is an app for the Android platform that uses GSP technology to disable a phone's text function when the device is traveling more than 10 miles per hour. Jonathan Young, developer of Textecution, told TechNewsWorld he originally thought up the app when his teenage son was getting ready to get his driver's license. "This is a huge problem, and parents are finally becoming aware of it," he said. "Sure, you can preach to your children, but what they do when they are not around you is another "
Kristin O

Breaking News, Kenya, Africa, Politics, Business, Sports, Blogs, Photos, Vide... - 1 views

shared by Kristin O on 14 Sep 09 - Cached
  •  
    Here SMS text messaging is being taken advantage of by people when they are angry
Madeline Brownstone

Expert: Technology fosters voyeurism - Washington Times - 0 views

  •  
    It seems new personal video technology is having unintended consequences for our culture. Answer: Without a doubt. I work with a lot of adolescents, and one of the issues we are running into is the "sexting" or text-messaging of sexually explicit materials and pictures. In a lot of ways, it's raising or heightening the sexualized nature of adolescence.
  •  
    It seems new personal video technology is having unintended consequences for our culture. Answer: Without a doubt. I work with a lot of adolescents, and one of the issues we are running into is the "sexting" or text-messaging of sexually explicit materials and pictures. In a lot of ways, it's raising or heightening the sexualized nature of adolescence.
Madeline Brownstone

BBC NEWS | Technology | Emergency text system goes live - 1 views

  •  
    "Trials are under way of a UK service allowing people to contact emergency services by text message. The system is aimed at people who cannot make normal voice calls to the 999 service due to disability"
Madeline Brownstone

Bus Accidents :: North Carolina Injury Lawyer Blog - 0 views

  •  
    "Virginia Tech Transportation Institute recently reported that large truck drivers increase their crash risk by 23 times when they text and drive. Merely reaching for communication device or dialing a cell phone increased the chance of a car accident or a truck collision by six times. The AAA Foundation for Traffic Safety says that more than 1 million auto crashes a year that happen in North American can be linked to driver inattention."
Yuval S

NAEA Deployed CipherOptics Advanced IPSec Network Encryption Solution - 0 views

  •  
    Cipheroptics give data security and network encryption solutions to security enterprises, financial institutions, health care, and government agencies. NAEA (North American Energy Alliance) utilized Cipheropitics to protect their data, using encryption. Dominick Birolin, the network engineer for NAEA, states that the company was "looking for a solution that could protect our critical cyber assets and meet our unique deployment requirements when we found CipherOptics." They chose this over others because CipherOptics offers security solutions for high performance networks. In addition to that, "the company's wire-speed encryption appliances are able to secure any network without changing the underlying infrastructure or application performance." Encryption works: initially by the business putting the sensitive data in plaintext. Plaintext is the normal, readable digital text. The business, using Cipheroptics, then converts the text into ciphertext. This text is made in a way that it can only be read by someone who has the key to put it back into plaintext and make it readable. The business holds the private key, which enables them to encrypt, and keep private, the data while still managing to access it when necessary.
Kristin O

Law or no, it's simple: Don't text and drive - OregonLive.com - 0 views

  • In the first place, you'd think you wouldn't need a law, that simple common sense would be enough to tell us it's unsafe to divert attention to a tiny keyboard and screen while simultaneously piloting 2 tons of metal, rubber, glass and, let us not forget, flesh
    • Kristin O
       
      he is trying to understand why people still text while they are driving when they know its dangerous
Kim T

BBC NEWS | Middle East | Is that cellphone kosher? - 1 views

  •  
    The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
  • ...5 more comments...
  •  
    This article meets the requirements for ITGS because it mentions the three strands related to the ITGS triangle. The social and ethical significance includes the digital divide and equality of access, policies, people and machines and digital citizenship. In this article, members of the Haredi community in parts of Israel were restrained to usages of the internet and cellphones. There are a few people who do use what we consider all the normal features of the internet and cellphone but many others use "kosher" cellphones that do not allow texting, internet usage or even calling numbers that are of non-kosher cellphones. For those who use the government's internet, they have to follow the policies set up by the government's filtered internet service provider and are unable to go on many websites. Because of their limited access as well as for many youths who are given restrictions, they are on one end of the digital divide. Once they may actually have control to use the internet freely as some people may choose to do in their area, they will have to learn self control and stay within the boundaries of digital citizenship because they were not familiar to the use of IT growing up. Furthermore, the use of internet raises concern in the Haredic community and some members look down on others for using it because the internet may interfere or give them "unsafe" images against their religion, therefore relating to people and machines. All these are related to the interference for those who do business online and need access to certain websites and the government's censorship on the internet.
  •  
    It really makes me wonder about the things that people do because of their devotion to God and religion. However, people who need it for business should be able to surf the net without having the "urge" to do anything else but do research. Filter or no filter, it's up the person to make those smart decisions and not look up anything inappropiate other than what their top priorities are for even going online. Even if filters are installed, some people who are a whiz at computers could easily use proxies or unblock any material they want. But it's all up to the person and how strong their values and beliefs are.
  •  
    Dear Kim, All I have to say about this article is...WOW. I think that this article is very interesting . I didn't know that in order to sign up a child for school you would have to have a certain cell phone number in order to call the school or for the school to call you. The school also requires a certain cell phone. I think this is a little extreme to allow your child just attend the school. I also find it a little crazy to constrict the internet as well. If a child has a school assignment based on something not found in that service package, they would have to go to very far lengths to do the assignment.
  •  
    Wow this is amazing. I have never heard of such a thing, and it intrigues me that there is such a thing as phone's influenced by RELIGION. It's new and strange to me because I can't believe a religion would take it as far as making phones with such restrictions. It intrigues me though, and it makes me very curious as to how the restrictions so many things have on childrens lives will affect them. Will they grow up like any other child or will they come out different and strange?
  •  
    Wow, this is simply the most fascinating article I have ever read. It's interesting how the Haredi community isolates themselves from the use of technology. But of course, as times modernize, it's important to be in contact for safety reasons. This kosher cellphone is quite unique, only for the kosher stamp found in foods as well, because it's basically a smaller cellphone version of the ones that first came out. But this community surprisingly reminds me of the Amish, how they choose not to use any technology, the only difference being that Amish don't use electricity at all, where the people of the Haredi community do. But I don't think it's easy living without technology these days, now that everything is going to involve technology in the future. Like the Shift Happens Video: Did You Know 3.0 "We are currently preparing students for jobs that don't yet exist...using technologies that haven't been invented...in order to solve problems we don't even know are problems yet."
  •  
    This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
  •  
    This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
Madeline Brownstone

BBC NEWS | Technology | Software blocks car phone users - 0 views

  •  
    "A safety device which prevents drivers using mobile phones by automatically intercepting calls and text messages when they are moving has been unveiled. The software tells callers the person they are trying to reach is driving and asks them to leave a message. "
Madeline Brownstone

Captioning and Transcribing Media | Accessibility | Computing @ UW-Madison - 0 views

  • captions can be open, closed, or both. Closed captions are a technique of displaying synchronized captioned text only when the user desires it. Open captions include the same text as closed captions, but the captions are a permanent part of the picture, and cannot typically be turned off.
    • Madeline Brownstone
       
      Key Terms: Open Captions Closed Captions
Madeline Brownstone

Text Messages in China to Be Scanned for 'Illegal Content' - NYTimes.com - 2 views

  •  
    ""It really is quite a program to seize control of all the new forms of media, one by one," said Jeremy Goldkorn, editor and publisher of Danwei.org, an English-language Web site about the Chinese media and Internet that is currently blocked in China. "It has been a bad half year for censorship.""
Madeline Brownstone

Flash Mobs Take Violent Turn in Philadelphia - NYTimes.com - 0 views

  •  
    "It started innocently enough seven years ago as an act of performance art where people linked through social-networking Web sites and text messaging suddenly gathered on the streets for impromptu pillow fights in New York, group disco routines in London, and even a huge snowball fight in Washington. Enlarge This Image Laurence Kesterson/The Philadephia Inquirer Young people filled South Street in Philadelphia on Saturday in what officials said was the latest flash mob to turn dangerous. Enlarge This Image Mustafah Abdulaziz for The New York Times Seth Kaufman was injured in the flash mob Saturday, which he called "a tsunami of kids." But these so-called flash mobs have taken a more aggressive and raucous turn here as hundreds of teenagers have been converging downtown for a ritual that is part bullying, part running of the bulls: sprinting down the block, the teenagers sometimes pause to brawl with one another, assault pedestrians or vandalize property. "
Madeline Brownstone

Mob appeal for teens: 'It builds them up' | Philadelphia Daily News | 03/26/2010 - 0 views

  •  
    ""One group sends a Facebook message to another group to tell them to meet them there, and then they tell everybody else to come," the student added. Not surprisingly, teens say there are a lot of adult misconceptions about the flash mob. For one thing, none of the teens involved used that terminology. "Well, so far as I know, we get these mass text, or Facebooks or tweets telling us all come meet down South Street. But it's not for, you know, mobbing; it's to like have fun," said Kiki Adams, a Philadelphia high school senior who was at the mayhem on South Street. "But you know teenagers," she added. "They get out of control. One person start actin' up so everybody else feel like OK we can do it." The senior confirmed what other teens have also been saying, that the groups involved in the mob incidents have been previously unknown neighborhood party groups with names like AAS - All Adidas S---, or A.B.M. - All About Money - or the Platter Boyz. The groups, which have their own hoodies and post videos on YouTube.com, compete to see who can have the biggest parties or quarrel over boasts or taunts posted online, or "cyber chatting.""
Madeline Brownstone

SOME SOFTWARE CAN TURN MOBILE DEVICES INTO TOOLS OF ESPIONAGE, HARASSMENT | Media & Tel... - 0 views

  •  
    "Sneaky people and technology can turn your cell phone against you. Cell phone spyware makes it easy for someone to eavesdrop on your conversations, intercept text messages and identify your location. And you may never know it's happening, experts say."
Noreen C

Keeping Secrets WikiSafe - NYTimes.com - 0 views

  •  
    WikiLeaks has led to several problems related to privacy and security of government data. The legal debate weighs whether the posting of this data is against Constitutional laws, but many others in the Government fear the magnitude of this problem. Some people ask, what would the founding fathers have done....but the world of the internet is a whole other ball field. The latest on the WikiLeaks threats claim that Assange still has more documents which were uploaded onto the website. However, the files are encrypted. Many people have access to these files, but because they are in cipher text, they cannot be read. As soon as Assange, or anyone who has access to the information publishes the Public Key, the encrypted documents will be decoded, using the same software that Assange used to encrypt it. If these documents have material in them that could threaten national security, then the USFG will have a stronger case against Assange on the basis of a privacy breach. Because of the high security, and the reliability of the encryption software, these documents have little value at the moment. The Obama Administration is clearly keeping an eye on the situation, because they wish to protect the privacy of the documents, but also because they want to find a way to take down the documents before they create damage. However, there is an extreme level of difficulty in decrypting the data, which is protected by a mathematical algorithm specific to the software that Assange initially used. The intersection of the privacy of the Government and the reliable security that Assange used comes to show that the IT world is constantly expanding, beyond the prediction of one business, or even the Government. But these Assange and the USFG aren't the only ones involved. Many people around the world are trying to attain access to these documents, primarily in the US in order to understand national secrets that have been held back from the public. The internet as a form of media has transfo
  •  
    continued.....transformed the notion of what is private and what isn't, and clearly now more than ever privacy needs to be secured. Maybe the USFG should look into some high security protocols such as encryption, and their data files wouldn't be intercepted and posted on the internet.
1 - 20 of 31 Next ›
Showing 20 items per page