Skip to main content

Home/ Globaltech/ Group items tagged 2.1_bus_emp

Rss Feed Group items tagged

anonymous

How to Catch iPhone Thief? Officer Knows Buttons to Push - NYTimes.com - 8 views

  •  
    How does this work? all feb 3 champ
  •  
    There is a new function on icloud called "Find My iPhone". It used to locate lost iPhone on a digital map in the icloud webpage. It is work simply by logging in to your apple ID that you use to buy songs and the digital map will show where your iPhone is and it can send signal to iPhone and command it to ring calling sound when you get near so it is easier to track the missing iPhone.
anonymous

Ten Ways To Improve Your Search Engine Ranking - FindLaw - 10 views

  •  
    Define SEO. Describe the ten ways to improve a SEO. all nov 10 kuni
  •  
    Define SEO. SEO, (Search Engine Optimization) is a way of ensuring that your Web site shows up high in the rankings of search engines. Describe the ten ways to improve a SEO. 1. Learn Basic HTML- To do SEO yourself, you need to have a rudimentary understanding of HTML programming. 2. Understand the Difference Between Search Engines- There are basically four types of search engines in use today, (Google, Yahoo!, Bing, Altavista) and each has different methods of ranking sites. 3. The Quick Fix: Meta-Titles- it is important to include keywords in your meta-title that are relevant to your Web site. 4. The More Links, The Better- It is important to have a high number of quality links to your website from other similar websites. 5. The Content of Your Content Matters- Search engines also have the technology to look at the actual content or words you put on your page. So, if a user types in a search for a particular keyword, the more often that keyword appears on your site, the more weight your site will receive, and the higher it will probably be ranked. 6. What About Keywords?- Meta-keywords are something you find in the source code of a Web page. They serve no other purpose than to try to convince search engines that a Web site should be highly ranked. 7. Experiment- The best way to improve your search engine ranking is to continue to experiment with different meta-titles, meta-keywords, content, and linking strategies. 8. Avoid Dirty Tactics- There are many ways to try to trick search engines, but if the search engine discovers your tricks, it may ban your website completely. 9. Paid-Inclusion is an Option- you can guarantee that a search engine will see your Web site, and that your Web site will be ranked if you pay either pay a one-time or annual fee. 10. When in Doubt, Use a Professional- Many Web site designers have full-time SEO personnel to make sure that your website is highly ranked.
anonymous

Google Keeps Searches Fresh With Algorithm Update | News & Opinion | PCMag.com - 14 views

  •  
    Why did Google improve its search algorithm? all nov 9 Kong
  •  
    Google improved its search algorithm so they can stay up-to-date. Since that information is travels very fast with the internet, Google will need to keep the information on their search engine fresh. Its new algorithm update will prioritize most recent news about the current events, latest sports results, and most recent information.
anonymous

How Do Search Engines Rank Websites? - 4 views

  •  
    Describe the major areas of search engine optimization. m12 nov 10 alec
  •  
    1. Building Quality Back Links to Your Website - the way to a better ranking is to have quality websites link to yours. Such as websites in you niche or social media websites. If your site has these types of links search engines are more likely to give you website a higher ranking. 2. Anchor Text in Back Links - using anchor text also gets you a higher ranking, for example: if you use the URL www.sourcelinemedia.com - then the search engine only sees the site domain as part of its rankings. If you use anchor text such as Website Marketing and Design then search engines will rank you higher for anyone that searches for website marketing or website design. 3. On Page Optimization - Using key words helps to optimize your websites hits during a search. For example a site that has many key words relating to the information in its articles is more likely to get a hit on a search because the words relate to what they are searching. For example if you search Social Networking sites like Facebook, Twitter, and Tumblr would come up as the top few hits.
anonymous

How Does Google Rank Websites? - 14 views

  •  
    Explain how Google's algorithm works. Why is it hard to rank high? all nov 9 johny
  •  
    The Google algorithm is also called as page ranking. Page Rank depends on the outstandingly democratic nature of the web via to enormous link structure as the sign of the values for each individual page. Google would understand a page A to page B as vote; it would look noticeably more at links age receiver and the sheer volume of votes. It would analyze what you are searching for and it would pick pages the most important page from the rest of the file that is relevant to your topic. Sometimes important pages wont answer you question. That's why Google page rank is combined with complicated text matching techniques to find the page that is important and similar to your question. Google does more then searching pages that has a match to your question it would examine the feature of the page content (satisfied) and that it would decide that is this page is a good match of your question. Because many websites don't have the possibilities to get highly ranked, because they also need to compete with other websites that comes from the company and they got millions of back links. For example you want to make a website about selling second hand stuff. When your going to try to search about second hand stuff it would directly show you E-Bay because it more popular and it has more views. The websites that you may been searching for must be on the 15 page or more then that because the web may have not enough back links or even none.
anonymous

The voice behind Siri breaks his silence - Telegraph - 2 views

  •  
    for fun
anonymous

SCAM! This Is How To Hack Hotmail, Gmail And Yahoo Mail Account » Account, at... - 2 views

  •  
    Avik and last pass, etc.
anonymous

BBC News - Hackers attack Norway's oil, gas and defence businesses - 14 views

  •  
    How did they attack? What was stolen? Describe a possible solution. all nov 23 Kevin
  •  
    How did they attack? - By using emails that are attatched with viruses, they attacked Norway's industrial secrets and information using their hacked network. However, none of the anti-malware software detect these emails. What was stolen? - Industrial drawings, user names, passwords, contracts negotiation and documents were stolen from the attack. Describe a possible solution - The whole attack was from "viruses." Which means that the company should feel necessary to have another stronger and higher quality of anti-malware software. When it detects things properly and more clearly, that means more possibility of defending the attacks that might happen in the future.
anonymous

US water facility 'was shut down by hackers' - Telegraph - 17 views

  •  
    How was the attack done? How did they know an attack happened? Why is this an important issue? Describe a possible solution. all nov 23 Chut
  •  
    How was the attack done? The hackers were able to obtain credentials from a company that makes software used to control the industrial systems. How did they know an attack happened? They knew that there was an attack because one of the pumps that is used to deliver water to the city was turned off. Why is this an important issue? This is an important issue because it indicates the amount of attention the United States government is giving to cyber-attacks. A terrorist attack like the one happened on September 9th 2001 can be said to be the faults of those who were monitoring the cyber activity. If the government aren't able to connect the dots to why they are doing this and the patterns of the attacks it might cause the US to be under attack like what happened over ten years ago. Describe a possible solution. Since that the credential software are saved on the clients' server, the employees can do a part in protecting the software. The staffs can help support the software.
anonymous

BBC News - Firms 'ill prepared for IT failure' - 9 views

  •  
    Explain 2 solutions. all nov 28 kuni
  •  
    The most common causes of data loss and downtime are hardware failure, power outage and software malfunction. One solution is to regularly back up data (daily) and make sure that the computer has a recovery system enabled. The second solution is to plug every computer into a UPS (uninterruptable power supply) in case of power outage.
anonymous

Facebook tightens grip on user ID data - Yahoo! News - 4 views

  •  
    analysis Az dec 2
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment- Online business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Applications, Internet, UID, network, web, software developers, policy, analytics services, 3rd parties' applications. 3. Describe one ITGS social/ethical concern in the article. Privacy is the concern in this article because some software developers behind outside applications popular in the online community were "inadvertently" sharing user identification numbers. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder which is the Ad networks is sharing identifying information about users with advertising and Internet tracking companies. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Facebook (IT system) modified its policy to forbid user identification data from leaving third-party applications and for such information to remain confidential if used by analytics services connected to programs (privacy). 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The problem here is that all of the 10 most popular applications on Facebook were transmitting unique user ID numbers to outside companies which violates Facebook's policy: data received from Facebook, including UIDs, cannot be shared with data brokers and ad networks. 7. Evaluate one solution that addresses the problem identified. Facebook user should have a choice on whether or not to allow applications to get their UID. Facebook should also tighten their policy and make it harder for Ad networks to share UID with third party applications.
anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

Google Declines To Remove Police Brutality Videos, Still Complies With 63% Of Gov't Tak... - 10 views

  • lethal to the YouTube brand
  • legitimate takedown requests
  • Transparency Report
  •  
    Explain the meaning of the following: -lethal to the YouTube brand -legitimate takedown requests -Transparency Report all oct 31 soo
  •  
    Q1. Explain the meaning of the following: - Lethal to the YouTube brand The Lethal to the YouTube brand means that making less valuable of YouTube site. They are forcing YouTube to erase videos, which makes brand YouTube will feel shameful of. - Legitimate takedown requests The Legitimate takedown requests are from government. The government asks to erase all the post that are illegal in YouTube. - Transparency report The Transparency report is showing that why government and other agencies are requesting YouTube to remove all the reports that are inappropriate.
anonymous

Foxconn: Robots don't complain or die | The Economist - 3 views

  •  
    Summary m12 nov 2 jenny
  •  
    Foxconn's employment ways have come to light. With suicide cases of their workers jumping out of the window. Foxconn say that they will be replacing a large amount of human labor with robots by 2012. And that they will move the workers up the value chain beyond basic manufacture working to increase productivity and innovation. However, it's for sure that some workers will be losing their jobs. Because of China's economic development, the costs are increasing, and whether or not they will be able to maintain a cheap "China price." Some may consider moving to other Asian countries for cheaper labor. However, Germany's Mittelstand firm that has a highly automated manufacturing system is just as competitive with China, but it isn't worried. Chinese authorities will continuously monitor the situation of how China will come to develop similarly to the West.
anonymous

BBC News - Chemicals and defence firms targeted by hacking attack - 3 views

  •  
    Explain the type of attack and possible security measures to prevent it. m12 nov 8 jenny
  •  
    The type of attack was a phishing attack that involved sending e-mails that had attachments, that when opened, will install a Trojan horse code into the person's computer. From there, the Trojan horse will be able to locate and copy files to another part of the computer system where they will be extracted back to the hacker who performed the attack. Possible Security Measures to Prevent it: Don't open e-mail attachments unless you know they are from a trusted source, especially attachments containing extensions .exe, .ink, and .vbs. Always have your security software up to date. http://sync.sympatico.ca/how-to/computing/how_to_prevent_a_trojan_horse_infection/a1487f14 Customize your firewall settings for your browser to filter out content. (Default is usually all, but choose to "limit" your connection so that it limits the connection to possible attackers).
anonymous

BBC News - Free wi-fi in central London promotion launched - 8 views

  •  
    Explain possible security problems with this plan and possible solutions. all nov 8 woo
1 - 16 of 16
Showing 20 items per page