Skip to main content

Home/ Globaltech/ Group items tagged Business

Rss Feed Group items tagged

Kevin Ko

Facebook buys AOL patents from Microsoft in $550m deal - 0 views

  •  
    What happens when a company sues another?
Kevin Ko

Facebook coughs up details on its mobile problem - 0 views

shared by Kevin Ko on 15 May 12 - No Cached
  •  
    Explain facebook coughing up details on its mobile problem?
  •  
    Business Internet, Communications
Yonghyeon Shin

FBI warns travelers of pop-up window cyber-attacks - CNN.com - 4 views

  •  
    How does the attack work? Suggest ways to prevent pop-up windows.
  • ...1 more comment...
  •  
    Suggest ways to prevent pop-up windows. Why do travelers are seem to be a good target for hackers? How did the hackers hack travelers' laptop? What are the solutions to this attack? How does the SSL secure the connection?
  •  
    Leisure, Business Internet
  •  
    May 23
anonymous

Big Data's Impact in the World - NYTimes.com - 9 views

  •  
    Explain why becoming a data consultant might be a good career choice. Why is data measurement considered to be the modern equivalent of the microscope? How has data-driven decision making improved productivity? How is Big Data transforming the way social networks function? all feb 21 max
  •  
    Explain why becoming a data consultant might be a good career choice. Basically, their jobs are to help businesses make sense of an explosion of data Web traffic and social network comments as well as software and sensors that monitor shipments, suppliers and customers. So, since a great number of people have used the Internet frequently, their jobs are needed to people because as much as people use the Internet, the data will be increased and people need other people who can manage such things. Why is data measurement considered to be the modern equivalent of the microscope? The reason is that there is countless data sensor around the world. The sensors can measure and communicate location, movement, vibration, temperature, humidity, even chemical changes in the air. How has data-driven decision making improved productivity? Data-driven decision making has improved productivity because people collect as much as data they can before deciding. As people doing that, they can predict preference of consumers from the Internet. It is very useful because people don't have to spend much time on consumers' preference also, a small amount of money and time will be spent. How is Big Data transforming the way social networks function? Social networks websites such as Facebook and Twitter and Search engines like Google and Answer.com make profit with their users' data. Many companies will buy the users' data from Facebook, Google, Answer.com and Twitter. That's a way to earn money for social network websites.
anonymous

Privacy controversy over Path for iPhone, iPad should be a wake-up call - The Washingto... - 10 views

  •  
    Explain the issue with Path. Evaluate Apple's solution.  Should services such as Path take or hold our data? all feb 21 johnroy
  •  
    Explain the issue with Path. When you take apps by log in from your iOS device then it would take you personal information and put it into the Apple server. It does this without permission of the user. The reason why is doing this to locate the user where you are at and your friends. Evaluate Apple's solution. Their solution is just to add new feature so you would be aware that apps would take your private information and put into the main server apple server. When you're downloading or getting apps you need to approve that they get you privacy information. Should services such as Path take or hold our data? I believe that they shouldn't because it's hard to trust large companies. The information that they have could be sold to other person that interest about your privacy. Another possible solution is that the data that is stored could be hacked anytime and when this occurrence happens. The hacker can sell my privacy to someone or he directly knows where I live, what's my name and etc.
anonymous

Smarter ways to pay | Bangkok Post: tech - 10 views

  • charge it to their credit cards simply by saying their names.
  • Starbucks is also investing $25 million (about 787 million baht) in Square as part of its latest round of financing, which values the company at $3.25 billion, and Howard Schultz, Starbucks' chief executive, will join Square's board. Starbucks has offered its own mobile payment app since last year and processes more than a million payments a week. Customers will continue to be able to use it, but they will also be able to use Pay With Square, Square's cellphone app, which eliminates even having to take the phone out of your pocket or sign a receipt.
  • At first, Starbucks customers will need to show the merchant a barcode on their phones. But when Starbucks uses Square's full GPS technology, the customer's phone will automatically notify the store that the customer has entered, and the customer's name and photo will pop up on the cashier's screen. The customer will give the merchant his or her name, Starbucks will match the photo and the payment will be complete.
  • ...3 more annotations...
  • challenge
  • Square, which was introduced in 2010, is one of many businesses _ like Google, PayPal, Sprint and Microsoft and start-ups like Scvngr and GoPago _ that are trying to offer mobile payments. But they have been slow to catch on as they require the cooperation of many players, including retailers, credit card firms, banks, phone carriers and phone makers.
  • compelling, safe and convenient experience for shoppers
  •  
    Article Analysis
anonymous

BBC News - Web economy in G20 set to double by 2016, Google says - 11 views

  •  
    Why is this important to you? all feb 3 martin
  •  
    This is important to be for several reasons. First reason is that as the technology developes, i get the higher quality of technology.Second reason is that, the number of Internet and smart phone users will increase. In 2016, half of the population on the earth will use internet and smasrt phones. i will need to follow them.that way i can join with people globally.
anonymous

US Report Blasts China, Russia for Cybercrime - ABC News - 15 views

  •  
    Identify the issue and scenario. Describe 3 incidents of cyberattacks by China. List some of the most desired data. Describe how the US is responding to these cyberthreats. all nov 10 kuni
  •  
    Identify the issue and scenario. China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies. Describe 3 incidents of cyberattacks by China. 1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists. 2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company. 3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies. List some of the most desired data. Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts. Describe how the US is responding to these cyberthreats. The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
anonymous

In Piracy Debate, Is the Sky Falling? - NYTimes.com - 29 views

  •  
    Why are copyright violations a serious problem? Describe two advantages and two issues with illegitimate downloading. Explain two possible solutions to this kind of piracy. all feb 13 chut
  •  
    *Why copyright violations are serious problem?
  •  
    Why are copyright violations are a serious problem? Major entertainment companies are losing millions and billions or money due to these copyright violations. More people are turning to online pirated goods instead of buying legitimately. These companies who are losing their profits are not happy about this problem. Describe two advantages and two issues with illegitimate downloading. One advantage is that pirated download saves you a lot of money. You wouldn't have to spend any money downloading these stuffs. Another advantage is that you can mass download it or download just some parts of it. For example if I wanted to listen to only one song of an album I can just download it off the internet for free, I wouldn't have to buy the real Cd which costs quite a lot of money and listen to only one song. Most artists today sell their Cd's for a high price but the qualities of their songs are not so high plus one Cd usually contains only 5 to 8 tracks. Comparing with the old times, one Cd contains about 15 to 20 tracks and it would still cost less and the songs do have good quality. An issue to this is that it is illegal. Downloading pirated goods are not so different from shoplifting or stealing. These goods have owners which the owners are willing to sell them but we who download them illegally are just taking them for granted. Another issue is that if this continues then the companies will not make as much many as before. This of course would affect the artists, celebrities, directors etc., directly. It can cause problems with jobs. If those people do not make money, then there would be no jobs. There are many jobs in the entertainment business which can be destroyed by this issue. Explain two possible solutions to this kind of piracy. One possible solution is to make it legal to download pirated goods. It may be the best solution possible at this moment. Many people are agreeing that it should be legal when it comes to downloading pirated goods. The enterta
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
anonymous

BBC News - Firms 'ill prepared for IT failure' - 9 views

  •  
    Explain 2 solutions. all nov 28 kuni
  •  
    The most common causes of data loss and downtime are hardware failure, power outage and software malfunction. One solution is to regularly back up data (daily) and make sure that the computer has a recovery system enabled. The second solution is to plug every computer into a UPS (uninterruptable power supply) in case of power outage.
Alex Lenk

Smartphones all the rage, says St George | The Australian - 2 views

  •  
    Rot October 15th Brief Article Analysis
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify the main stakeholders to the IT system. St George Bank, the customers who use their services, 3. Identify and describe one ITGS social/ethical concern in the article. Reliability, the company and the customers depend on the new paying system developed by the company to perform reliably. 4. Describe ITGS terminology and systems. Applications: A piece of software that serves an auxiliary function for your electronic device IT: Short for information technology Internet: A large online server that stores information. Online: Being connected to a network. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
Alex Lenk

Omo GPS stunt opens doors for marketers | The Courier-Mail - 2 views

  •  
    Chae Min October 15th Brief Article Analysis
  •  
    Omo GPS stunt opens doors for marketers 1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Buyers who buy box of detergent, and users of technologies and companies like Unilever, Google, Microsoft and Apple 3. Identify and describe one ITGS social/ethical concern in the article. The main concern in this article is privacy. The article shows the detergent company detects their consumers who bought products with GPS for their event prize. It means, this intrusive behavior can find where you live where you go if you become the target. Besides, Google or other social networking site also makes use of people's personal information without their consent. This truly destroys your privacy, the right to decide how much information you will show to others. Furthermore, there is possibility that somebody gets your information from these companies and give harm to you, such as robbing your house 4. Describe ITGS terminology and systems. GPS- space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites social networking site- a platform to build social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. One solution to stop these intruders in your life is enacting strict laws that companies can't detect where their customers live and get the consent if they use the information. Government should protect citizen's privacy from danger. Companies should get consent if they want to use customer's private information, and if customers don't want it(such as stoking customer's house) they must stop to intrude other's privacy.
Alex Lenk

Electronic Brain Helps Cut Credit Card Fraud : NPR - 1 views

shared by Alex Lenk on 08 Oct 13 - Cached
  •  
    Da Woon October 10 Brief Article Analysis Answer here.
  •  
    1. Identify the area of impact the scenario relates to. Business and employment, home and leisure 2. Identify the main stakeholders to the IT system. in this article, the credit card user and credit card companies are the main stakeholder 3. Identify and describe one ITGS social/ethical concern in the article. In this article, the social/ethical concern is integrity. In this article, it tells that Credit Card Company uses neural networks to keep track of every purchase people make and sorts them into patterns and categories. If people changed their purchasing pattern, the credit card calls you and ask you about did you really buy it. So, if we buy the computer first time, we changed our purchase pattern, so we are losing our integrity to Credit Card Company. So we are really hard to use our own credit card. 4. Describe ITGS terminology and systems. Transaction - Electronic funds transfer, the electronic exchange or transfer of money from one account to another Software - any set of machine-readable instructions that directs a computer's processor to perform specific operations. Hardware - the collection of physical elements that comprise a electrical device system 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. The one solution in this social/ethical concern would be making a password then using that password with signature to prove our identity when we purchase the product which is not in our pattern such as put our password on our mobile device when we purchasing product with transaction. So we don't need to get the call from Credit Card Company when we purchase the product which is not in our purchasing pattern. Also we can using biometrics on our digital device to prove that we purchase that product when we using transaction to purchase the product.
Alex Lenk

BBC News - Police crackdown on fake shopping sites - 1 views

  •  
    Alex October 30th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment. 2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products. 3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites. 4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
Alex Lenk

Seeing That Ad on Every Site? You're Right. It's Tracking You. - NYTimes.com - 0 views

  •  
    Smile October 28th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business, Home and leisure, 2. Identify the main stakeholders to the IT system. The main stakeholders of the Internet users and the internet advertisement provider (such as Google) 3. Identify and describe one ITGS social/ethical concern in the article. A social/ ethical concern in this article is privacy. This article refer to advertisement stalking you around and show up in every site that you are in. The concern is privacy because of the tracking of ads on the users. The IT systems uses cookie to track the user. For example if a user open a commercial website such as ebay and amazon the clicking into a certain product will place a cookie onto your web browser. The next time the user open the web browser, the ads will track you around. The companies that it target marketing which shows users the product that they are interest in at the right time. However is it ok for this ads to track the users around? 4. Describe ITGS terminology and systems. Web browser: a software application for retrieving, presenting and traversing information resources on the World Wide Web. Cookie: Computing a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server. 5.Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. One solution that can help solve this problem is to install an adsblocker. Advertisement blockers will block the advertisement from showing on the web browsers. However the cookie is still in your computer. Some web browsers or operating system allow the user to delete the cookie on your computer.
Jab Itthipalkul

APP- CESSIBLE - 3 views

  •  
    The universe of apps has made life more convenient, more fun and more distracting. For example, you can find your lover. But in truth, most apps are designed for those whose life is already convenient. According survey there are total of 1.4 million people with disabilities in thailand. Worldwide, there are many apps which help facilitate the lives of physically impaired. 1. TTRS MESSAGE. This service allows people with hearing or speech impairment to place calls to standard telephone users via a keyboard or assistive device. TTRS operators interpret the calls, which can be initiated by either party. Callers use a text input device to contact the TTRS relay centre, then give the operator the number of the party he or she wants to call. The operator, in turn, will place an outbound traditional voice call to that particular party. The operator serves as a link between the two callers, relaying the text of the initial caller in voice to the other party, as well as converting spoken words to text. The service was first offered only via desktop and kiosk platforms, but it is now available to mobile users via an app. 2.Read for the blind. Wichai Pornpratang, vice president of telecommunications business at Thai Samsung Electronics, said the main technology used to develop this app is a voice recorder which records users reading. Those audio files are uploaded to the Thai Blind People Foundation's server. Then converted to DAISY3 books to achieve an acceptable level of audio quality. With this format, users can serach for and regulate reading voices, make duplicates and place bookmarks. 3.Wheel Go Round It is windows phone application for wheelchair users that locates and rates the nearest wheelchair accessible facilities such as parking areas, elevators, ramps and toilets. The app also allows users to take photos and add places where facilities for those in wheelchairs are available. It is great benefit, but the app could be improved if it allowed users to scan for t
  •  
    Questions: How does TTRS work? What is benefit of RFB? how can you improve wheel go round? What special techonolgy does Traffic voice information service have?
Alex Lenk

Would you pay for a good parking spot? | SmartPlanet - 1 views

  •  
    Rot November 5th  BAA
  •  
    Brief Article Analysis 1. Identify the area of impact the scenario relates to. Business 2. Identify the main stakeholders to the IT system. The drivers 3. Identify and describe one ITGS social/ethical concern in the article. Security: The system is currently in Beta, meaning it is prone to security faults such as hacking. This could potentially pose a problem to the users, as their location could get found out (where they live) and the hacker could use this information for potnetially malicious purposes. 4. Describe ITGS terminology and systems. Application: Sotfware that provides an auxillary function to the current IT operating system. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Improve the system's security, or test how well it can hold up against hacking in order to keep the customers safe.
« First ‹ Previous 41 - 60 of 88 Next › Last »
Showing 20 items per page