Skip to main content

Home/ Globaltech/ Group items tagged Technology

Rss Feed Group items tagged

Max Seol

Millions of Americans ignore Facebook's privacy controls - 6 views

shared by Max Seol on 15 May 12 - No Cached
  •  
    NEW YORK (CNNMoney) -- As Facebook barrels toward its IPO, one of its biggest lightening-rod issues -- privacy -- is drawing a fresh spotlight. A Consumer Reports study released this week estimates that 13 million American Facebook users have never set or simply don't know about the site's privacy controls.
  •  
    What consequences will happen seriously? Why should people follow Facebook's privacy controls?
  •  
    Home Communications May 21
Kevin Ko

Facebook coughs up details on its mobile problem - 0 views

shared by Kevin Ko on 15 May 12 - No Cached
  •  
    Explain facebook coughing up details on its mobile problem?
  •  
    Business Internet, Communications
anonymous

Privacy controversy over Path for iPhone, iPad should be a wake-up call - The Washingto... - 10 views

  •  
    Explain the issue with Path. Evaluate Apple's solution.  Should services such as Path take or hold our data? all feb 21 johnroy
  •  
    Explain the issue with Path. When you take apps by log in from your iOS device then it would take you personal information and put it into the Apple server. It does this without permission of the user. The reason why is doing this to locate the user where you are at and your friends. Evaluate Apple's solution. Their solution is just to add new feature so you would be aware that apps would take your private information and put into the main server apple server. When you're downloading or getting apps you need to approve that they get you privacy information. Should services such as Path take or hold our data? I believe that they shouldn't because it's hard to trust large companies. The information that they have could be sold to other person that interest about your privacy. Another possible solution is that the data that is stored could be hacked anytime and when this occurrence happens. The hacker can sell my privacy to someone or he directly knows where I live, what's my name and etc.
Paulo Moacyr

BBC News - Nokia accuses Apple of Siri bias over smartphone answer - 0 views

  •  
    How does this affect the business of Nokia?
  •  
    Strands?
anonymous

Smarter ways to pay | Bangkok Post: tech - 10 views

  • charge it to their credit cards simply by saying their names.
  • Starbucks is also investing $25 million (about 787 million baht) in Square as part of its latest round of financing, which values the company at $3.25 billion, and Howard Schultz, Starbucks' chief executive, will join Square's board. Starbucks has offered its own mobile payment app since last year and processes more than a million payments a week. Customers will continue to be able to use it, but they will also be able to use Pay With Square, Square's cellphone app, which eliminates even having to take the phone out of your pocket or sign a receipt.
  • At first, Starbucks customers will need to show the merchant a barcode on their phones. But when Starbucks uses Square's full GPS technology, the customer's phone will automatically notify the store that the customer has entered, and the customer's name and photo will pop up on the cashier's screen. The customer will give the merchant his or her name, Starbucks will match the photo and the payment will be complete.
  • ...3 more annotations...
  • challenge
  • Square, which was introduced in 2010, is one of many businesses _ like Google, PayPal, Sprint and Microsoft and start-ups like Scvngr and GoPago _ that are trying to offer mobile payments. But they have been slow to catch on as they require the cooperation of many players, including retailers, credit card firms, banks, phone carriers and phone makers.
  • compelling, safe and convenient experience for shoppers
  •  
    Article Analysis
Alex Lenk

Scanning plan aims to help robots in the home - 2 views

  •  
    What can robots be used for to recognize objects in everyday life? In your House? Outside?
Dawoon Jung

Patch issued for Java loopholes - 1 views

  •  
    Oracle has issued a patch for loopholes in its Java program that was being actively abused by cyber-thieves. The software giant took the unusual step of issuing the patch well before the usual date for security updates. The patch closes loopholes that together left users of almost every operating system vulnerable to infection by viruses.
  •  
    What is Java used for ????????
Eun Young Park

FileSonic cyberlocker offline after piracy complaints - 2 views

  •  
    "FileSonic has become the latest cyberlocker service to go offline. The service used to be one of the most popular file-sharing sites, but had restricted its members' ability to access other's uploads after the Megaupload arrests."
  •  
    Why are they forced offline?
Smile Dhanaraks

Twitter helps adverts be targeted on its network - 1 views

  •  
    Twitter has taken further action to encourage advertisers to use it.
anonymous

BBC News - Robotic prison wardens to patrol South Korean prison - 8 views

  •  
    Explain the function of the robots in prisons. all dec 1 soo
  •  
    The robots in prisons will act as a helper in monitoring behavior of inmates in prison and to alert the human prison guards if any dangerous or suspicious behavior is detected. The robot is 5 feet high, moving with four wheels, and includes cameras and sensors to detect the risky behavior.
anonymous

Correction: Facebook-Privacy Q&A story - The Washington Post - 10 views

  •  
    How does Facebook use the information people share to make money? Describe the issues that Facebook should address. all Dec 6 cream
  •  
    How does Facebook use the information people share to make money? Facebook uses the information people share to make money by using the data to give to advertising companies, which in turn, pay Facebook for the data they receive so that they can target Facebook users with more individualized advertising. The advertising business can choose who they want ads to be shown to, customized to be relevant to the person's personal interests and likes. The more ads that users see on Facebook, the more money Facebook earns from the advertising company. Therefore, the exposure of the information people share to advertising companies, in order to place these advertisements, earn them money. Describe the issues that Facebook should address. Issues that Facebook should address include: Privacy - The privacy of users' and their data should be kept private, and the issue needs to be addressed where other online companies target the user data, where the user clicks to see pages, and their online activity even though the user may not be online. Reliability - The reliability of Facebook's security system should also be addressed. Facebook needs to address how users are aware or unaware of how their data is being shared through their friends' apps, or shared to advertising companies. Also, users would need to be reassured that their data isn't distributed to other third party companies.
anonymous

BBC News - 'Europe's biggest' free wi-fi zone set for London - 8 views

  •  
    Describe 3 benefits and 1 issue with this system. all jan 17 champ
  •  
    3 Benefits 1. Tourists came London to see the Olympics, they can share updated news and pictures with friends by using free WiFi connection 2. Free WiFi connection may reduce communicating cost because overseas calls are very expensive. 3. London will become a world-class city by providing fast, reliable, and free WiFI connection for people. 1 Issue The disadvantage is that if so many people use WiFi, malware can be easily spread through the signal. It may be difficult to find out who cause it.
anonymous

BBC News - Worm steals 45,000 Facebook passwords, researchers say - 8 views

  •  
    Explain the ways these networks are being hacked. How could you know if your facebook account had been hacked? all jan 17 jang
  •  
    Explain the ways these networks are being hacked. It is explained in the article that these networks are being hacked by using the stole credentials to log into the user's Facebook account. When the hackers logs into the Facebook account, it is used to transmit malicious links to other people such as friends. Friends would be a trustworthy person so the link would be visited. This would increase the speed of the malware's speed. Also, some users use the same password for many accounts which can be used by ill-intentioned people on the web. How could you know if your facebook account had been hacked? For you to know if your Facebook account had been hacked, users should run an anti-virus software to check and get rid of any malware that is hacking your account.
anonymous

BBC News - Hackers outwit online banking identity security systems - 9 views

  •  
    Describe the kinds of attacks. Explain the security measures. all feb 9 kevin
  •  
    Describe the kinds of attacks. - First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages. Explain the security measures. - Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
anonymous

Ten Ways To Improve Your Search Engine Ranking - FindLaw - 10 views

  •  
    Define SEO. Describe the ten ways to improve a SEO. all nov 10 kuni
  •  
    Define SEO. SEO, (Search Engine Optimization) is a way of ensuring that your Web site shows up high in the rankings of search engines. Describe the ten ways to improve a SEO. 1. Learn Basic HTML- To do SEO yourself, you need to have a rudimentary understanding of HTML programming. 2. Understand the Difference Between Search Engines- There are basically four types of search engines in use today, (Google, Yahoo!, Bing, Altavista) and each has different methods of ranking sites. 3. The Quick Fix: Meta-Titles- it is important to include keywords in your meta-title that are relevant to your Web site. 4. The More Links, The Better- It is important to have a high number of quality links to your website from other similar websites. 5. The Content of Your Content Matters- Search engines also have the technology to look at the actual content or words you put on your page. So, if a user types in a search for a particular keyword, the more often that keyword appears on your site, the more weight your site will receive, and the higher it will probably be ranked. 6. What About Keywords?- Meta-keywords are something you find in the source code of a Web page. They serve no other purpose than to try to convince search engines that a Web site should be highly ranked. 7. Experiment- The best way to improve your search engine ranking is to continue to experiment with different meta-titles, meta-keywords, content, and linking strategies. 8. Avoid Dirty Tactics- There are many ways to try to trick search engines, but if the search engine discovers your tricks, it may ban your website completely. 9. Paid-Inclusion is an Option- you can guarantee that a search engine will see your Web site, and that your Web site will be ranked if you pay either pay a one-time or annual fee. 10. When in Doubt, Use a Professional- Many Web site designers have full-time SEO personnel to make sure that your website is highly ranked.
anonymous

BBC News - EU and US cybersecurity experts stress-test defences - 9 views

  •  
    How did they test their response to a cyber attack? all nov 10 alec
  •  
    They intentionally sent a Trojan virus in to try and steel information from chemical and defense firms. They also used a Duqu malware attacks against organizations in at least eight countries.
anonymous

The voice behind Siri breaks his silence - Telegraph - 2 views

  •  
    for fun
anonymous

Electronic Security a Worry in an Age of Digital Espionage - NYTimes.com - 10 views

  •  
    List the precautions Mr. Lieberthal takes when visiting China. Define digital espionage. Why is it easy to steal information remotely? How was the US Chamber of Commerce hacked? Explain the reason for thwarting the cybertheft of trade secrets. all feb 16 soo paulo
  •  
    List the precautions Mr. Lieberthal takes when visiting China. * He leaves his cellphone and laptop at home. * He brings "loaner" devices. * He erases information before and after the trip. * He disables Bluetooth and Wifi. * He turns off his phone, and takes the battery out. * He only connects to the internet through an encrypted password protected channel. * He copies and pastes his password from a USB. Define digital espionage. Digital Espionage - The spying on digital information including corporate secrets and government secrets. These secrets are stored as digital data, and can be spied on and stolen. Why is it easy to steal information remotely? Because digital devices today are mostly connected to an internet network, and through this network, information can be stolen remotely if the hacker is able to hack into the system. Smart phones and digital personal devices are very common today. These devices are connected into workplace networks and carry information around. Hackers are able to hack into these devices and get onto the corporate network and steal information. How was the US Chamber of Commerce hacked? The US Chamber of Commerce was hacked through four of their employees, Asia policy experts' devices who travelled frequently to China. The Chamber's office digital devices including its printer and thermostat had a connection to an internet address in China. Through these remote connections to the digital devices, China could penetrate the inside information of the Chamber. Explain the reason for thwarting the cybertheft of trade secrets. Thwarting the cybertheft of trade secrets is to the benefit of the owner of those trade secrets. If cybertheft of trade secrets is not prevented, then other corporations would be able to use stolen trade information to their benefit, and possibly come out with the same product with slight modifications in order to gain more profit from other companies' ideas. This would also ruin the product
anonymous

Q&A: Google to Dig Deeper Into Users' Lives - ABC News - 9 views

  •  
    How will Google's privacy changes affect users? Explain the reasons for making the changes. Is there a way to prevent Google from combining the personal data it collects from all its services? Explain the users major complaint about Google's new privacy policy? How could the government regulate google's privacy changes?  all March 6 chut
  •  
    How will Google's privacy changes affect users? - When you are logged into Google, the data that you search into its search engine can be culled to suggest videos for you on YouTube. If you use Google Docs, Google will alert you if you misspelled your friends' names or co-workers' names. Google will collect information from its devices that you use to empower the company to connect the dots from one service to another. Explain the reasons for making the changes. - Google wants to make use of all of its companies that they own. Plus all the data that they collect from their users worldwide. Google wants to use their services to its full potential. They want to tell their users that they are not drawing the users' profiles for their profit only. Is there a way to prevent Google from combining the personal data it collects from all its services? - No there are no ways to prevent Google from combining the data that Google collects from its services. Unless you are not logged on to one of Google's products. Even if you are not logged onto one of Google's services Google can still keep track of you by your IP address instead of your name. if you are logged on and you do not wish to be tracked you can delete your browsing history. Explain the users' major complaint about Google's new privacy policy legal? - The users are not allowed to consent to or reject this new privacy policy. Each users have different setting for their privacy so this new change will not allow the users to use different set of rules. How could the government regulate Google's privacy changes? - The government is carefully looking over Google when it comes to handling personal information of the people. Google settled this argument with the governemtn when Google made a mistake by exposing their client's email accounts. Google's handling over personal information will be audited every other year and they are not allowed to make changes that are misleading or deceptive.
« First ‹ Previous 41 - 60 of 128 Next › Last »
Showing 20 items per page