Skip to main content

Home/ Globaltech/ Group items tagged Technology

Rss Feed Group items tagged

anonymous

In Piracy Debate, Is the Sky Falling? - NYTimes.com - 29 views

  •  
    Why are copyright violations a serious problem? Describe two advantages and two issues with illegitimate downloading. Explain two possible solutions to this kind of piracy. all feb 13 chut
  •  
    *Why copyright violations are serious problem?
  •  
    Why are copyright violations are a serious problem? Major entertainment companies are losing millions and billions or money due to these copyright violations. More people are turning to online pirated goods instead of buying legitimately. These companies who are losing their profits are not happy about this problem. Describe two advantages and two issues with illegitimate downloading. One advantage is that pirated download saves you a lot of money. You wouldn't have to spend any money downloading these stuffs. Another advantage is that you can mass download it or download just some parts of it. For example if I wanted to listen to only one song of an album I can just download it off the internet for free, I wouldn't have to buy the real Cd which costs quite a lot of money and listen to only one song. Most artists today sell their Cd's for a high price but the qualities of their songs are not so high plus one Cd usually contains only 5 to 8 tracks. Comparing with the old times, one Cd contains about 15 to 20 tracks and it would still cost less and the songs do have good quality. An issue to this is that it is illegal. Downloading pirated goods are not so different from shoplifting or stealing. These goods have owners which the owners are willing to sell them but we who download them illegally are just taking them for granted. Another issue is that if this continues then the companies will not make as much many as before. This of course would affect the artists, celebrities, directors etc., directly. It can cause problems with jobs. If those people do not make money, then there would be no jobs. There are many jobs in the entertainment business which can be destroyed by this issue. Explain two possible solutions to this kind of piracy. One possible solution is to make it legal to download pirated goods. It may be the best solution possible at this moment. Many people are agreeing that it should be legal when it comes to downloading pirated goods. The enterta
anonymous

BBC News - Trendnet security cam flaw exposes video feeds on net - 6 views

  •  
    How was the system hacked? Describe possible solutions. all feb 13 hyojeon
  •  
    How was the system hacked? - Shodan search engine which specializes in finding online devices that could be used to discover cameras vulnerable to the flaw. - People set the camera with an own password, it video stream became accessible to anyone who typed in the correct net address. This consisted of the user's IP address followed by an identical sequence of 15 characters. The camera captures people password and IP address. This will invade camera users' privacy. Describe possible solutions. - The Trednet has to foster its network system and try to do their security system that they have to make new firmware and update which resolves the vulnerability of its cameras.
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
anonymous

BBC News - Hackers attack Norway's oil, gas and defence businesses - 14 views

  •  
    How did they attack? What was stolen? Describe a possible solution. all nov 23 Kevin
  •  
    How did they attack? - By using emails that are attatched with viruses, they attacked Norway's industrial secrets and information using their hacked network. However, none of the anti-malware software detect these emails. What was stolen? - Industrial drawings, user names, passwords, contracts negotiation and documents were stolen from the attack. Describe a possible solution - The whole attack was from "viruses." Which means that the company should feel necessary to have another stronger and higher quality of anti-malware software. When it detects things properly and more clearly, that means more possibility of defending the attacks that might happen in the future.
anonymous

BBC News - Why going online on smartphones can be costly - 15 views

  •  
    Why might smart phones be costly? Explain two possible solutions. all Nov 23 Tik
  •  
    Smart phones could be costly because it's download, upload and connect to the network almost all the time. People that use smart phones and don't have good deals or promotions,and people use data more than they think, so the phone company can cost the data that we download, upload with the network, and smart phones can do many thing that use a lot of data and it will cost a lot of money, for example sending 10 photos it's take 10MBand watch video on youtube it will take 15MB per video, etc. In this case the solutions are that users should make sure that they get the right deal or promotion, that they won't get a big bill in the end of the month. Secondly, there are people that use unlimit promotion, but every deal have a gap, so the phone company should tell their customers, or send the users a messages to warning them that they used data more than the deal they got.
anonymous

US water facility 'was shut down by hackers' - Telegraph - 17 views

  •  
    How was the attack done? How did they know an attack happened? Why is this an important issue? Describe a possible solution. all nov 23 Chut
  •  
    How was the attack done? The hackers were able to obtain credentials from a company that makes software used to control the industrial systems. How did they know an attack happened? They knew that there was an attack because one of the pumps that is used to deliver water to the city was turned off. Why is this an important issue? This is an important issue because it indicates the amount of attention the United States government is giving to cyber-attacks. A terrorist attack like the one happened on September 9th 2001 can be said to be the faults of those who were monitoring the cyber activity. If the government aren't able to connect the dots to why they are doing this and the patterns of the attacks it might cause the US to be under attack like what happened over ten years ago. Describe a possible solution. Since that the credential software are saved on the clients' server, the employees can do a part in protecting the software. The staffs can help support the software.
anonymous

BBC News - Secret net Tor asks users to sign up to cloud services - 3 views

  •  
    presentation az nov 28
anonymous

BBC News - US court hears net neutrality arguments - 1 views

  •  
    summary gwansik
  •  
    Net neutrality: principle of internet service providers should not block customers that pay less to give faster speeds to those who pay more. Verizon says, FCC is not following the principle(net neutrality) so they argued to FCC with the order called "Preserving the Free and Open Internet". Basically, verizon is arguing to FCC; Why FCC is not following the principle, and they should follow it. inventor Sir Tim Berners-Lee, have said that everyone should have the right to a free and open internet.
  •  
    BAA
anonymous

BBC News - Ads 'biggest mobile malware risk' - 0 views

  •  
    Describe the problem and possible solutions. March 14 Rot presents
anonymous

Control these large smart appliances with your iPhone | Appliances - CNET Reviews - 1 views

  •  
    Describe IT Dawoon Oct 2
  •  
    Most smart appliances have an accompanying application. Those applications are available on iOS and android. (Samsung's washer and dryer application is working on only iOS and Samsung's Galaxy mobile devices, not the rest of the Android devices.) There are some examples of using iOS to control the smart appliances 1. LG Smart ThinQ LFX31995ST LG Smart ThinQ app will tell you the internal temperatures of both the refrigerator and freezer, and whether it's on energy-saving mode or not. You can make grocery lists and automatically update your inventory once you've checked an item off the list. Also, you can search for recipes on the fridge based on what your fridge has in stock. 2. Whirlpool WRL767SIAM Side-by-Side Refrigerator with 6th Sense Live it transmits information directly to the free app on your smart device. Whirlpool's app can let you know, if the refrigerator door is open or if there has been a power outage. Whirlpool has also enabled this refrigerator to connect to the smart grid if it's available in your area, which will let you monitor energy usage through its app. 3. GE Profile PT9550SFSS Built-In Double Convection Wall Oven The game-change app turns your phone into a remote control for the oven. You can set the temperature, mode, and time for both ovens independently and turn them on with app. 4. LG Smart ThinQ LRE3027ST oven Smart ThinQ app will allow you to search for recipes and then cue up the cook time and temperature accordingly, but you still have to manually press start on the oven itself. LG app allows you to run diagnostics on the range to make sure that everything is running as it should be. 5. LG Smart ThinQ WT6001HV Washer/Smart ThinQ DLEX6001V Electric Dryer LG's Smart ThinQ washing machine features a gorgeous touch screen and connects to LG's Smart ThinQ app via your smartphone or tablet. It doesn't have a smart-grid function like some other washer/dryer apps, but it's otherwise similar in that it lets you check your wash cycle
Alex Lenk

Omo GPS stunt opens doors for marketers | The Courier-Mail - 2 views

  •  
    Chae Min October 15th Brief Article Analysis
  •  
    Omo GPS stunt opens doors for marketers 1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Buyers who buy box of detergent, and users of technologies and companies like Unilever, Google, Microsoft and Apple 3. Identify and describe one ITGS social/ethical concern in the article. The main concern in this article is privacy. The article shows the detergent company detects their consumers who bought products with GPS for their event prize. It means, this intrusive behavior can find where you live where you go if you become the target. Besides, Google or other social networking site also makes use of people's personal information without their consent. This truly destroys your privacy, the right to decide how much information you will show to others. Furthermore, there is possibility that somebody gets your information from these companies and give harm to you, such as robbing your house 4. Describe ITGS terminology and systems. GPS- space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites social networking site- a platform to build social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. One solution to stop these intruders in your life is enacting strict laws that companies can't detect where their customers live and get the consent if they use the information. Government should protect citizen's privacy from danger. Companies should get consent if they want to use customer's private information, and if customers don't want it(such as stoking customer's house) they must stop to intrude other's privacy.
Alex Lenk

BBC News - Police crackdown on fake shopping sites - 1 views

  •  
    Alex October 30th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment. 2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products. 3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites. 4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
Alex Lenk

Maybe Your Old Credit Cards Are Smart Enough - NYTimes.com - 3 views

  •  
    Jason October 17th  BAA
  •  
    1.Identify the area of impact the scenario relates to. Business and employee 2.Identify the main stakeholders to the IT system. The main stakeholder in this article is the credit cards company such as, Visa, MasterCard & American Express. The customer how are using these credit cards company service as well. 3.Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in the article is Reliability/ Security. In this article it talk about the old expired credit card that can be re-used again. Unwanted access and get a magnet chip/stripes of a credit card and still use it, to buy whatever they want. The magnet chip/stripes still provide some information of the conventional card. 4. Describe ITGS terminology and systems. PIN- A PIN is a 4-digit number that is used in combination with your Social Security Number, name, and date of birth to identify you as someone who has the right to access your own personal information Chips- is an integrated circuit in which all the components needed for a computer or other system are included on a single chip 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article When a customer uses their credit card to buy product from shops their must type in they PIN to continue the process and if the PIN is enter incorrectly the process cancels. This will allows the original card hold to buy the products only. Dynamics Inc recently unveiled smart-card technology that doesn't require a smart reader but could still require a PIN: the issuer could program the card so that the PIN has to be tapped on special buttons found on the card itself.
jasonkerr

Robot teachers invade South Korean classrooms - 0 views

  •  
    AI Rot describe the IT system Answer here :)
  •  
    * Telepresence: technologies which allow a person to feel as if they were present, to give the appearance of being present, or to have an effect, via telerobotics, at a place other than their true location. * voice recognition: Conversion of spoken words into text. * Robots: a machine capable of carrying out a complex series of actions automatically,
Jab Itthipalkul

APP- CESSIBLE - 3 views

  •  
    The universe of apps has made life more convenient, more fun and more distracting. For example, you can find your lover. But in truth, most apps are designed for those whose life is already convenient. According survey there are total of 1.4 million people with disabilities in thailand. Worldwide, there are many apps which help facilitate the lives of physically impaired. 1. TTRS MESSAGE. This service allows people with hearing or speech impairment to place calls to standard telephone users via a keyboard or assistive device. TTRS operators interpret the calls, which can be initiated by either party. Callers use a text input device to contact the TTRS relay centre, then give the operator the number of the party he or she wants to call. The operator, in turn, will place an outbound traditional voice call to that particular party. The operator serves as a link between the two callers, relaying the text of the initial caller in voice to the other party, as well as converting spoken words to text. The service was first offered only via desktop and kiosk platforms, but it is now available to mobile users via an app. 2.Read for the blind. Wichai Pornpratang, vice president of telecommunications business at Thai Samsung Electronics, said the main technology used to develop this app is a voice recorder which records users reading. Those audio files are uploaded to the Thai Blind People Foundation's server. Then converted to DAISY3 books to achieve an acceptable level of audio quality. With this format, users can serach for and regulate reading voices, make duplicates and place bookmarks. 3.Wheel Go Round It is windows phone application for wheelchair users that locates and rates the nearest wheelchair accessible facilities such as parking areas, elevators, ramps and toilets. The app also allows users to take photos and add places where facilities for those in wheelchairs are available. It is great benefit, but the app could be improved if it allowed users to scan for t
  •  
    Questions: How does TTRS work? What is benefit of RFB? how can you improve wheel go round? What special techonolgy does Traffic voice information service have?
Azman Fadhilah

Bangkok Post : The rise of the digital spies - 1 views

  •  
    1. Identify the area of impact the scenario relates to. Business and employment, Politics and Government 2. Identify the main stakeholders to the IT system. Politicians, Large Business owners, Victims 3. Identify one ITGS social/ethical concern in the article Surveillance / Privacy 4. Describe ITGS terminology and systems. The main IT system in this situation is the use of the evolving hardware that is customized to best fit the various situations that need to infiltrate a certain amount of security. The new spy devices today are integrated into everyday devices such as pens and glasses so that it is hard to track and sensor while going through security checks. 5. If possible, describe a solution to the concern (issue). Having the government and users agree to sign contracts which only allow certain amounts of digital spy equipment to be produced, and while shipment, if any equipment was found to be not authorized and legitimate to pay a large amount of fine to prevent further disuse of the equipment. Since most of the devices require some sort of signaling in order to spy, having new security checks based on lens reflection as well as machine signal waves can increase security because it would be easier to sensor such devices.
anonymous

Technology Live: Latest Tech News and Gadgets - USATODAY.com - 0 views

  •  
    fyi dec 2
« First ‹ Previous 61 - 80 of 128 Next › Last »
Showing 20 items per page