Skip to main content

Home/ Globaltech/ Group items tagged Better

Rss Feed Group items tagged

anonymous

Unmanned aerial warfare: Flight of the drones | The Economist - 7 views

  •  
    Summarize m12 nov 2 az
  • ...1 more comment...
  •  
    On September 30th, a missile strike launched from a UAV killed Anwar al-Awlaki, al-Qaeda's most effective propagandist. This was an example of how the UAV are changing today's combat. These babies are equipped with sophisticated sensors and carry Hellfire missiles and laser-guided bombs. There may not be a man in the cockpit, but each Reaper UAV requires more than 180 people to keep it flying. A pilot is always at the controls from a ground control unit and another officer operates its sensors and cameras. UAV have become the weapon of choice over the past decade. Theres not a month that passes without reports that an al-Qaeda or Taliban leader has been killed by UAVs. There are more hours flown by America's UAS than by its manned fighter jets and more pilots are being trained to fly them than their manned equivalents. The frequency of drone stikes on terrorists in Pakistan has rose from one every 40 days to one every four days under Obama's admin. The UAV's ability to loiter for hours, minutely observe human activities while transmitting full motion video to its ground crews and can strike with pinpoint accuracy has made it the essential weapon in America's war on terrorism. Drones come in many different shapes and sizes. Predators and Reapers are the larger and more popular ones. Some are micro sized devices that imitate a bird used for eavesdropping or a mid sized plane that can be hand launched by soldiers to tell them what is happening over the hill. The medium sized UAVs would be able to defend airspace against enemy intrusion to attacking enemy air defenses. The largest UAV would operate as airborne warning and control, aerial refueling tankers, lift transports and long range bombers. The next generation of drones will also have AI, which allows them to shoot to kill. The UAS are used for "dull, dirty, dangerous, difficult or different" tasks. These tasks include surveillance missions requiring time and a degree of persistence that crews of
  •  
    manned aircraft couldn't provide. Also, UAS could be used to fly in to observe or take samples after a chemical or biological attack. Any missions too dangerous for manned aircraft will be taken care of by the UAV. UAV have other advantages over manned aircraft as they have more detailed information about their targets, their strikes are more accurate and cause fewer civilian casualties. They are also cheaper and smaller. Since they have no pilot, the space could be used for fuel and thus they can fly much longer than manned aircraft. Without the need to accommodate crew, drone can be given radar-cheating stealthy shapes and can maneuver better. There are however a problem afflicting the drones as they depend on two-way satellite communications. If the datalink is broken the remote pilot will lose control of the aircraft. For missions requiring constant oversight, the vulnerability to electronic jamming or a direct attack on a communications satellite is a huge problem. Another problem is that the dones has a slight delay between the remote pilot and the aircraft. To reduce latency, small, solar, or laser powered ultra long endurance drones can form a chain in the sky along which satellite signals can be bounced. To reduce the workload on pilots, big UAV can take off and land automatically. The US Air Force plans to have a pilot operating up to four drones at a time. Civil liberty advocacy groups have raised concerns about targeted killings by drones. Bus as long as a UAS pilot can trust data from remote sensors, he or she should be able to make a proper assessment the same ways as the pilot of a manned aircraft. UAS pilot will be in a better position to do so since he or she will have more time to assess the situation accurately and not be exhausted b the physical battering of flying a jet.
  •  
    Allowing the UAV to fire a weapon based entirely on its own data analysis raises a lot of ethical problems. Using UAV to kill enemies thousands of miles away is like a cowardly action of a bully sheltering behind superior technology. There are fears that UAS will lower the political threshold for fighting and an essential of restraint will be removed. Drones make leaders fonder of war.
Alex Lenk

BBC News - Australia's central bank targeted by hackers - 2 views

  •  
    Eun Young  October 17th  BAA
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to is 'business and employment'. 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system from this article are the RBA (Reserve Bank of Australia) and customers. 3. Identify and describe one ITGS social/ethical concern in the article. The social/ethical concern that has been identified in this article is 'security'. Security refers to the protection of hardware, software from unauthorized access. Security tries to prevent the access by hackers. In this article, the RBA has been hacked (cyber attacked). For an example, the malware has embedded in the emails. They think it is China to blame because they thought that China has already been through a similar cyber attack, which aimed to get the information out of it. The staffs in the RBA have opened several malware emails. This malware application has managed to go through the computer system. 4. Describe ITGS terminology and systems. * Malware: Malware refers to software programs that are designed to damage or do other unwanted actions on a computer system. * Cyber Attack: Cyber attackers use malicious code to alter computer code,logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes (information and identity theft). * Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through infected data files, introduced into a system via disks or Internet. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Even though the RBA did not lose any of their information, it's better to have a safe security system/software to protect their information. The RBA needs to be more careful when opening email files, and for a better protection, they would need to find a better way to secure. I would suggest them to have an encryp
kittinat chitpluem

15 Current Technologies A Child Born Today Will Never Use - 6 views

  •  
    1. Of the 15 current technologies that we presently use today, what do you think will be the first 5 to be obsolete or outdated 2 years from now, and why? 2. If the technologies in the future to come will be faster and better, does it necessarily mean that our future life will be easier and better?
  •  
    Home Hardware May 21
anonymous

Apple iPad 2 vs. Motorola Xoom - 2 views

  •  
    Who's the winner in your opinion and why? be sure to read page 2 march 3 cream
  •  
    In my opinion it would be Ipad, but that's only if you're too intense about the aesthetics of Apple's iPad. I am sure that many people are obsessed with the look and how famous Apple products are. Even though Motorola Xoom seems to be better. i know how good Motorola Xoom is base on the rear end camera and the wider screen. But, new Ipad is out now! There is camera too which much better design. I believe that new Ipod would get develop much more.
anonymous

BBC News - Bionic hand for 'elective amputation' patient - 13 views

  •  
    brief all sept 29 tik
  •  
    1. Identify the area of impact the scenario to. - Business, Health 2. Identify the main stakeholders to IT system. - the elective amputation patient. The people that are unable to use their hand. 3. Identify on ITGS social/ethical concern in the article. - People and machines. 4. Describe ITGS terminology and system. - Bionic: Artificial body part. The application of biology engineering. - Sensor: The device that use to record that something is present. 5. If possible, describe a solution to the concern. - The problem that this bionic hand got is that the patient may not feel like the bionic hands can replace their real hands, and the solution is that in the future that the technology is better so they can make the bionic hand better.
Helen Choi

Monitoring Your Health With Mobile Devices - 9 views

  •  
    How would this technology help people take better control of their health?
  •  
    Health Communications May 17
anonymous

Ten Ways To Improve Your Search Engine Ranking - FindLaw - 10 views

  •  
    Define SEO. Describe the ten ways to improve a SEO. all nov 10 kuni
  •  
    Define SEO. SEO, (Search Engine Optimization) is a way of ensuring that your Web site shows up high in the rankings of search engines. Describe the ten ways to improve a SEO. 1. Learn Basic HTML- To do SEO yourself, you need to have a rudimentary understanding of HTML programming. 2. Understand the Difference Between Search Engines- There are basically four types of search engines in use today, (Google, Yahoo!, Bing, Altavista) and each has different methods of ranking sites. 3. The Quick Fix: Meta-Titles- it is important to include keywords in your meta-title that are relevant to your Web site. 4. The More Links, The Better- It is important to have a high number of quality links to your website from other similar websites. 5. The Content of Your Content Matters- Search engines also have the technology to look at the actual content or words you put on your page. So, if a user types in a search for a particular keyword, the more often that keyword appears on your site, the more weight your site will receive, and the higher it will probably be ranked. 6. What About Keywords?- Meta-keywords are something you find in the source code of a Web page. They serve no other purpose than to try to convince search engines that a Web site should be highly ranked. 7. Experiment- The best way to improve your search engine ranking is to continue to experiment with different meta-titles, meta-keywords, content, and linking strategies. 8. Avoid Dirty Tactics- There are many ways to try to trick search engines, but if the search engine discovers your tricks, it may ban your website completely. 9. Paid-Inclusion is an Option- you can guarantee that a search engine will see your Web site, and that your Web site will be ranked if you pay either pay a one-time or annual fee. 10. When in Doubt, Use a Professional- Many Web site designers have full-time SEO personnel to make sure that your website is highly ranked.
anonymous

How Do Search Engines Rank Websites? - 4 views

  •  
    Describe the major areas of search engine optimization. m12 nov 10 alec
  •  
    1. Building Quality Back Links to Your Website - the way to a better ranking is to have quality websites link to yours. Such as websites in you niche or social media websites. If your site has these types of links search engines are more likely to give you website a higher ranking. 2. Anchor Text in Back Links - using anchor text also gets you a higher ranking, for example: if you use the URL www.sourcelinemedia.com - then the search engine only sees the site domain as part of its rankings. If you use anchor text such as Website Marketing and Design then search engines will rank you higher for anyone that searches for website marketing or website design. 3. On Page Optimization - Using key words helps to optimize your websites hits during a search. For example a site that has many key words relating to the information in its articles is more likely to get a hit on a search because the words relate to what they are searching. For example if you search Social Networking sites like Facebook, Twitter, and Tumblr would come up as the top few hits.
anonymous

48 NASA Laptops Stolen in Two Years: A Case for Better Encryption Practices | PCWorld B... - 14 views

  •  
    Explain the problem and solution. How should you Choose a Laptop for Your Small Business? How can you Recover a Lost Phone, Tablet, or Laptop? How can you Stop Laptop Theft? all march 13 Kevin
Young Woong Hong

Tracking iPhone thieves prompts killswitch call - 2 views

  •  
    This article starts with issue of one woman losing her iPhone, which was stolen by someone who lives 20 km away from her. Since there is a app called Track my iPhone, she used this app to go after the thieve and asked for her iPhone back. Not only her who had been finding the thief herself but lots of people are doing it to avoid conflict with the police. This is causing a concern with the police officer because of the increase in phone robbery in many places and if these are gang member, it can cause life to be lost. Even though the police had devoted more resources to combat the theft, but accessibility of police is quite low. Therefore, people usually like to take action alone neglecting the danger that they might find. Therefore, police came up with further and better solution called 'kill switch'. Which automatically make your phone unavailable and unattractive to the thieves.
  •  
    What is Kill switch? How is it beneficial to protect your personal information on your phone?
Woogyeong Jung

The changing landscape of online fraud: Long life spam | The Economist - 2 views

  •  
    article analysis march 25 soobin
  •  
    1. Identify the area of impact the scenario relates to. -- Leisure, Business 2.Identify all ITGS terminology and phrases (IT and Social/Ethical) -- Twitter, Trojan, Facebook, E-mail spamming, Botnet, messaging service, social inbox, spam, e-mail, networks, online-security firms, junk e-mails, blacklisted addresses, output, domain names, .cn, internet registrars, fraud, web-hosting, cybercrime, hard drives. 3.Describe one ITGS social/ethical concern in the article. --Security is a concern in this article where users and spam is concerned. The security of the users' sensitive information is at risk when users click on spam links no matter from what source, from e-mails (which are decreasing now) to Twitter tweet links. By clicking onto these harmful links, users set free spam that can infiltrate the user's hard drive in search for sensitive information for example bank account numbers. 4.Describe the relationship of the main stakeholders to the IT system. ---The main stakeholder will be hackers and people who are using e-mail and social networking. The relationships between them are, normally hackers used spam mail to spend virus or hack their computer with Trojan horse, but as the email security develop hackers slowly moved to social network which is Facebook, and other many programs. They know that people are currently using social networking a lot and their privacy is open and they could easily get people's email too. Therefore by using Koobface, they could hack people's computer and information 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. -- The problem with the security is that the security of the users of their personal and public communications are at risk where spam is concerned. Spam is nowadays being planted in almost every corner of the internet, no matter where, in order to try and trick users into clicking on the harmful links in order to spread malware, such as Trojans. Spam is comm
anonymous

http://insideitgs.ning.com/ - 1 views

shared by anonymous on 22 Feb 11 - Cached
  •  
    az wiki versus ning, or wikis linked to ning which is better especially compare to - http://itgsopedia.wikispaces.com/ march 1 look at some of the other itgs sites i am posting here on diigo to compare... and ideas for format also consider individual wikis linked to mother site or everything on one site What's more feasible and practical?
anonymous

Why Did Newspapers Take So Long to Copy Groupon? - BusinessWeek - 3 views

  •  
    brief analysis Make sure to describe major terms, like groupon and livingsocial. march 7 woo
  •  
    1. Identify the area of impact the scenario relates to. Business, E-commerce 2. Identify the main stakeholders to the IT system. Online Newspaper companies, newspaper subscribers 3. Identify one ITGS social/ethical concern in the article. Globalization 4. Describe ITGS terminology and systems. - Groupon: a deal-of-the-day website that is localized to major geographic markets worldwide. Launched in November 2008, the first market for Groupon was Chicago. - LivingSocial: an international social buying company based in Washington, D.C. They specialize in daily deals offered in cities across the United States, as well as in Canada, Europe and Australia. - TimeLiimited: is a service just like Groupon, which emails its readers on special offers for travel and living terms The New York Times newspapers are going to start using the internet, and connection of the companies to its subscribers for a fee to their advantage, even though there is a slim chance now. It is the spread of public communication of news, the latest trends, and discounts to events and merchandise while connecting directly to personal communication means of its subscribers (through their e-mails). 5. If possible, describe a solution to the concern (issue). Straightforward copying Groupon is not the answer for the success online. The New York times might be able to have a chance against Groupon and LivingSocial, but these two big groups have already topped the business of connecting companies with deals to its customers and subscribers for a fee. The companies should be able to manage connection between merchants and their customers. The New York Times would have to come up with special deals that appeal to users, such as a subscription discount, so on, and so forth to grab customers' attention from Goupon and LivingSocial to the New York Time's TimesLimited. The process involves sending people e-mail offers and discounts from companies and service providers, then charging a fee for
anonymous

BBC News - Facebook profile access 'leaked' claims Symantec - 3 views

  •  
    brief may 17 soo
  •  
    - Identify the area of impact the scenario relates to Home and Leisure, Business and e-commerce - Identify the main stakeholders to the IT system People who are using Facebook, Facebook Company and Application Company - Identify one ITGS social/ethical concern in the article Security, Privacy - Describe ITGS terminology and systems  Facebook Application= Apps on Facebook.com are web apps that are loaded in the context of Facebook. You can build your app using any language or tool chain that supports web programming, such as PHP, Python, Java or C#.Apps on Facebook.com are loaded into a Canvas Page. A Canvas Page is quite literally a blank canvas within Facebook on which to run your app. You populate the Canvas Page by providing a Canvas URL that contains the HTML, JavaScript and CSS that make up your app.  http://developers.facebook.com/docs/guides/canvas/  Symantec= Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.  http://kb.iu.edu/data/agzf.html - If possible, describe a solution to the concern (Issues) Facebook should enhance the security systems and authentication systems. User's personal information was leaked because they didn't work hard to manage transferring user's account to application systems. Therefore, it is better to enhance and put more effort to the transferring process.
anonymous

Hackers steal SSL certificates for CIA, MI6, Mossad - Computerworld - 13 views

  •  
    brief all sept 7 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Goverment 2. Identify the main stakeholders to the IT system. Mozilla, Google, DigiNotar, CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter, and Microsoft's Windows 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. SSL- Secure socket layer certificates used for transmitting private documents via the Internet. It creates an encrypted connection between your web server and you web browser that will protect transmitted private information from eavesdropping, data tampering, or message forgery. Man in the Middle- is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DigiNotar= DigiNotar is registered by the OPTA as a CSP that delivers qualified certificates that comply with the Dutch act on electronic signatures with respect to the European directive on electronic signatures. Sinces 2004 DigiNotar has entered the PKI hierarchy of the Dutch Government: PKIoverheid. This allows DigiNotar as Certificate Services Provider (CSP) to issue certificates complying with PKIoverheid specifications to government organisations. HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. 5. If possible, describe a solution to the concern (issue). Increase the security of the data for issuing a digital certificate to websites, and have updates of digital certificate periodically to check whether or not it has been compromised. Delete mo
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

Learning The Right Lessons From The Amazon Outage - 5 views

  •  
    Define: AWS Iaas Define and describe: Free redundancy rapid scalability server failover maintainability Explain each lesson and determine whether you agree or not with each one. May 13 az
  •  
    1) Define: AWS- The Amazon Web Services (AWS) are a collection of remote computing services (also calledweb services) that together make up a cloud computing platform, offered over the Internet byAmazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3. Iaas - infrastructure-as-a-service; a way to deploy a less reliable server, quickly and without human intervention. 2) Define and describe: Free redundancy- re-deploying your application in another data center or cloud service using on-demand resources instead of having an idle redundant data center. Rapid scalability- Scalability approach that doesn't require access to AMIs that is stored on S3 or EBS. Instead, it uses the on-demand resources. This is when the system can withstand changes in transaction volume without major changes. Server failover- Virtual servers fail more frequently that physical servers, and when they do, there is less ability to recover them. Treat server failover the same way as scalability, just bring up a new server. Maintainability- Use a fully automated deployment and not a server configuration that is created manually to make it maintainability. Since, when a server configuration that is created manually and saved to a "golden image" has numerous problems such as: only the person who built it knows what is there, so if that person is gone, it can be time consuming to re-configure it. On the other hand, a fully automated deployment is not only a maintainable process, it also serves as documentation. 3) Explain each lesson and determine whether you agree or not with each one. Wrong lesson #1 The lesson where the infrastructure of the cloud is either not ready for its time to shine, or never will be. This is the lesson that explains that the infrastructure is still carried out on physical servers, just in remote areas where they are held in the physical data center in large numbers. These physical server
anonymous

'Anti-Facebook' Overwhelmed With Responses After Public Launch - The Hollywood Reporter - 14 views

  • our editor recommends
  • exploitive nature of the existing paradigm
  • difference between Facebook and Unthink
  •  
    Explain: -exploitive nature of the existing paradigm -difference between Facebook and Unthink Summarize the TechCrunch article. all nov 1 avik
  •  
    Unthink is a brand new social networking site where you can customize anything you want however way we want it to be. There are no arbitrary changes that will happen. It also aims to expose all the "evils" of Facebook and other social networking sites, since they have access and can use our information as and when they'd like. Unthink has branded itself as the 'anti-Facebook' and has gotten an amazing response on the day of its inauguration. Unthink is still in its beta stages. There are a few differences: - * Unthink allows you to make changes to your privacy settings, which are better compared to Facebook. There are no arbitrary changes that will happen on Unthink. * Unthink also allows for migration of accounts from an existing Facebook account. * We can also isolate the advertisements and group them accordingly as we want. Our interest and liking of particular brands may also be rewarded with discounts and offers.
1 - 20 of 20
Showing 20 items per page