Skip to main content

Home/ Globaltech/ Group items tagged and

Rss Feed Group items tagged

anonymous

BBC News - Americans face piracy website blocking - 2 views

  •  
    If passed, it would "accelerate" the net down a path that could lead to governments everywhere sanitising online content so citizens only get what those in power think they should see... What does this mean? may 19 nat
  •  
    This means that once the bill passes, the government will have control, and block any sites that they think people should not see, and this quote is saying that the people will only be able to see what the government approves of, leaving them with no freedom on the internet.
anonymous

Get protected: anti-virus software - Safe Surfing - beginner's guide - butterscotch - 5 views

  •  
    Helen and Hyojeon Presentation on antivirus tutorials #1-11. September 6
anonymous

IPhone Users in South Korea Sue Apple for Collecting Data Without Consent - Bloomberg - 3 views

  •  
    Brief Aug 24 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Government 2. Identify the main stakeholders to the IT system. Apple, Google, iOS device users 3. Identify one ITGS social/ethical concern in the article. Privacy, Anonymity 4. Describe ITGS terminology and systems. iPhone smartphone - Apple's iPhone smartphone that includes various smart features such as receiving e-mail, and application, more than just the average phone. Location recognition - the feature on the iPhone that allows the users to be recognized by their location near wifi hubs. Apple was ordered to encrypt location data of people using iPhones to address privacy concerns but the users claim that the device secretly collected information of the users' whereabouts. 5. If possible, describe a solution to the concern (issue). A solution to the privacy issue would be for users to turn off the location-recognition features on their iPhones so that Apple doesn't have access to your phone. Apple needs to be more careful with their data collection process, as well as encrypting the data so there is no breach of privacy of its users, or completely get rid of the whole system itself.
anonymous

Ellison brandishes 'speed of thought' Exalytics appliance * The Register - 4 views

  • "To deliver data analytics at the speed of thought – faster than you can type – you have to change the interface because it moves so fast," Ellison bragged. "Before you finish asking a question, it can guess and give you the answer."
  •  
    What does 'speed of thought' mean? only Azman and Avik October 4
anonymous

BBC News - Football tweets offer insight into harnessing Twitter - 2 views

  •  
    How is twitter used as a barometer? Explain the potential uses of networks as barometers? m12 october 10 jenny
  •  
    How is twitter used as a barometer? Twitter is used as a barometer because of its users' tweets that update happening events in real time, and can be used to know the change of events in real time. (From this article's example, they monitor users' tweets at major events during a football game (touch downs, scoring). Because of its live feeds, it is up to date all the time, and can have stacks of updates within seconds. Explain the potential uses of networks as barometers. Potential uses include anything with a large audience, televised media like reality shows, political debates, localized applications such as storm news updates, an electricity black out etc. Users will be able to know the changes of what's happening in real time from their mobile devices that supports viewing tweets as barometers.
anonymous

http://gigaom.com/2011/08/10/how-social-search-is-changing-the-search-industry-2/ - 2 views

  •  
    Explain why Google considers the information created in social networks to be so important. M12 Sept 1 nat
  •  
    Basically, what people do on social networks are; like people's statuses, comment on others' pictures, retweet others' statuses and etc. This can help companies like Google determine what the user might be interested in, as these activities on social networks sites reflect the users' behaviour online. Moreover, we tend to show to other users what you are interested in, (like liking fan pages)therefore a lot of the information companies like Google can get out from these websites are accurate. They can then put sites that they might take interest in at the top (first page), which may be more efficient for the user looking for that information, and the website itself.
anonymous

Bangkok Post : Patient data need protection - 2 views

  •  
    Explain the issues and possible solutions. april 4 kuni
  •  
    The issue is that the increasing integration of medical devices in hospital networks can increases the risk of being attacked easily, which they hack into the network and steals information. They need to strengthen the security to get against with the possibility of virus attacks which could have a huge damage on delivering data for medication. The Public Health Ministry can play an important role as a regulator in healthcare security, as a same system with the security in the network banking.
anonymous

iPhone Tracking Only Tip Of Security Iceberg -- InformationWeek - 1 views

  •  
    Explain what the following means: Miriam Wugmeister, chair of the global privacy practice at law firm Morrison & Foerster, echoes that assessment and stresses than employers should make it clear to employees that they can't expect privacy using corporate devices. While she observes that allowing employees to backup personal devices containing corporate data on a home computer could pose an e-discovery problem in the event of litigation, she also says there are good technical solutions that allow corporate IT administrators to create sandboxes that segregate personal and corporate communications. april 28 woo
  •  
    incomplete
anonymous

http://www.wired.com/gadgetlab/2011/04/apple-iphone-tracking/ - 2 views

  •  
    Why were the customers spooked? Why is this a problem? Describe consolidated.db. Check this link: tracking and recording your location data. How is apple collecting geodata? Why is apple collecting geodata? Explain the problems with collecting geodata. Could law enforcement in America be able to subpoena these types of records from people's iPhones or iPads? april 26 cream
  •  
    How can iphone be hijacked? The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. How can a user tell if she is being SMS attacked? The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. Just turn off your iphone right away!
  •  
    Cream: Wrong Comment for this article. Comment again with the right answers. incomplete
anonymous

Couchbase Offers NoSQL for IPhone | PCWorld Business Center - 1 views

  •  
    Explain: NoSQL non-relational database Explain the advantages of CouchDB's noSQL . May 9 soo
  •  
     Explain  NoSQL= NoSQL is a category of database engines that do not support the SQL (Structured Query Language) in order to achieve performance or reliability features that are incompatible with the flexibility of SQL. - http://stackoverflow.com/questions/4154635/what-is-nosql-what-is-purpose-of-nosql-where-can-i-get-sufficient-material-on-n  Non-relational database= a non-relational database developed by Damien Katz, now the chief technology officer for Couchbase. The company claims that Mobile Couchbase is the first non-relational, or NoSQL database, built for iOS. - http://stackoverflow.com/questions/202819/what-is-an-example-of-a-non-relational-database-where-how-are-they-used  Explain the advantages of CouchDB's noSQL - CouchDB and noSQL architecture has a number of advantages that make it attractive to iPhone applications developers, the company asserts. - CouchDB= Efficient use of working memory, Amount of storage space (takes up relatively minimal, under 20 megabytes download size limit imposed by many people CouchDB's NoSQL has advantages such as its synchronization capabilities with minimal coding. Data can be automatically synchronized across a network. The app can store data created on the phone itself, all the while also synchronizing the same data with a cloud service or a data center. The storage space taken up by CouchDB's NoSQL has efficient use of working memory. When it is embed in an app, it can still keep the app to be under the 20 mb download limit, and doesn't drain the battery.
  •  
    1. ITGS 2. NoSQL 3. iPhone 4. Network 5. Database
anonymous

Beware of Spyware Game - OnGuard Online - 1 views

  •  
    Play the spyware game and state your score. May 9
anonymous

Twine / An open-source tool for telling interactive, nonlinear stories - 1 views

  •  
    "You don't need to write any code to create a simple story with Twine, but you can extend your stories with variables, conditional logic, images, CSS, and JavaScript when you're ready. "
anonymous

Samsung smart TV can hear, transmit owners' conversations - SiliconValley.com - 3 views

  •  
    How does voice recognition and voice command work? Explain the issue. What's the solution? dj, mj,
anonymous

Future in the cloud | Bangkok Post: business - 7 views

  •  
    How are cloud computing, real-time analytics, and IoT impacting business, particularly in Thailand? JiJi
anonymous

(2) Facebook Site Governance - 3 views

  •  
    What does this mean? Should users be concerned? How can users check settings? presentation Rebecca and Smile
anonymous

Facebook Asked by Privacy Groups to Stop Proposed Policy Changes - Bloomberg - 2 views

  •  
    Related to the facebook policy. Rebecca and Smile
Rot Homkrathok

Kompozer - 0 views

shared by Rot Homkrathok on 04 Mar 13 - Cached
  •  
    How download it and stuff.
anonymous

Bank app users warned over Android security | IT PRO - 4 views

  •  
    Mobile apps provided by mobile operators and handset manufacturers could put expose phone users to fraud, according to research that as many as 64 per cent of manufacturer added applications were exposing users to serious security issues.
  •  
    "Bank app users warned over Android security" Describe at least four types of vulnerabilities. Describe mobile point-of-sale devices. Explain why card fraud could endanger the payment chain.
« First ‹ Previous 201 - 220 of 266 Next › Last »
Showing 20 items per page