Fuzzy Logic and Rice Cookers - 0 views
Singapore Airlines to launch inflight Internet in May? - Flights | hotels | frequent fl... - 3 views
-
Chae Min November 5th Describe the IT
-
The IT system is in this article is internet access in flight at 30,000 feet. The Singapore airlines now provide internet for any digital device (such as tablet or laptop). The internet is provided by the self contained telecoms system on board each plain. It get the signal from satellite. Currently over 20 airlines using this WiFI and 3G signal thought to inmarsat's swift broadband satellite network.
http://www.wired.com/reviews/2010/11/review_bg_tablets/ - 6 views
-
Why won't tablets replace PCs? dec 2 nat
-
Why won't tablets replace PCs? Tablets are recommended, but won't replace PCs because they aren't made to carry out tasks that PCs are capable of doing. Tablets may be useful when looking at emails or searching the web, but it's not easy to use when typing up word documents. They will be handy to have it next to your PC, but it will never be your primary computer.
AppleInsider | Georgia state senator hopes to replace schoolbooks with iPads - 3 views
-
Is this a good or bad idea? Feb 14 Alec
-
I believe that this is a good idea because the children will get an ipad for $500 and also the text books included this will cut down on the price of schooling because instead of having to pay more money for books. Also this will give the children more up to date knowledge on current events because they will get updates from around the world everyday.
JAP -- ANONYMITY & PRIVACY - 3 views
-
What is Anonymization and how does it work? march 11 cream
-
Anonymization can be defined as the act of making anonymous onto a person who accesses to the Internet. According JAP as it describes in the article, JAP makes it possible the Internet anonymously. The system is like how you wont get tracked by hackers.
http://www.deathandtaxesmag.com/48941/obama-kill-switch-what-if-theres-a-war-in-america/ - 3 views
http://www.eweek.com/c/a/Security/Senate-Do-Not-Track-Bill-Aims-to-Add-Teeth-to-Web-Pri... - 3 views
-
Why is the US introducing a bill to limit tracking? Explain problems with implementing a no-tracking law. may 17 jen
-
Why is the US introducing a bill to limit tracking? The US is introducing a bill to limit tracking because practically every website you visit keep track of at least some activity for some conventional purposes, while some aren't (such as preventing you to vote twice in a poll). With this bill, the users will be able to have the Do Not Track option while visiting the website. Explain problem with implementing a no-tracking law. The problem with implementing a no-tracking law is that once the law is passed, users will still have a hard time of knowing whether or not a site is tracking them. Not all sites will honor the no-tracking law, and because they don't honor it, they probably won't tell their users' that they're still being tracked, along with what information is being gathered for what purpose.
How Google Chromebook Will Feel for Music Fans | Epicenter | Wired.com - 2 views
-
What are the problems with doing everything on the cloud? may 19 az
-
Doing everything on the cloud is efficient in a way that we can work on from anywhere anytime as long as we have internet connection. However, when we don't have good internet connection, there is nothing we can do since everything we have done is stored on the cloud. . Internet data storing plans might also be an obstacle while operating on the cloud because the costs increase as more data is wanted to be stored on the cloud. Moreover, The cloud is not invincible to attacks so your data is not 100% safe. Having a backup saved on a physical hard drive is a must, cause you can't rely too much in the cloud (look what happen to Amazon and Sony).
Moods on Twitter Follow Biological Rhythms, Study Finds - NYTimes.com - 3 views
-
The new analysis suggests that our moods are driven in part by a shared underlying biological rhythm that transcends culture and environment.
BBC News - Facebook works with Websense to add phishing safety net - 12 views
-
brief all oct 10 nat
-
1. Identify the area of impact the scenario relates to. Home, business 2. Identify the main stakeholders to the IT system. Facebook, Websesnse, Facebook users, Malicious web developers 3. Identify one ITGS social/ethical concern in the article. Reliability 4. Describe ITGS terminology and systems. URL: llows all resources on the internet to be located in a uniform manner. A URL is a website address that has all the pertinent information for finding the exact location attached to it. (E.g.WWW.facebook.com) Database-driven: Web pages that store information in their database. Phishing: Tricking Internet users into providing personal data for malicious or fraudulent use.
Bangkok Post : The power of preparedness - 0 views
http://www.wired.com/gadgetlab/2009/07/sms-hijack-iphone/ - 1 views
-
How can iphone be hijacked? How can a user tell if she is being SMS attacked? April 26 woo
-
was i supposed to do this? it wasnt on the list so i didnt know...
-
1. How can iphone be hijacked? The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. The iPhone can be hijacked through a series of invisible SMS message bursts that hijacks the iPhone. The attacker would then be able to control all the functions on the iPhone, as well as continue to send messages to hijack more phones. 2. How can a user tell if she is being SMS attacked? The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. A user can tell if she is being SMS attacked if they receive a message containing a square character. Prevention measures include immediately turning off your iPhone.
BBC News - Rise in UK requests for Google content removal - 8 views
-
Describe 3 examples of legitamate cases for removal. all oct 31 kuni
-
i. Critical Politician movement: Google remove 236 communities and profiles from social network in India after the government complained that they were critical of a local politician. ii. Privacy violation: The users in Turkey were restricted from being able to see material about the private lives of political officials. iii. Local law violation: There was a problem that in Thailand, where someone uploads the video that insulted Thailand's monarchy, which was illegal under local laws. This caused the user in Thailand to ban YouTube site for a year.
Google Declines To Remove Police Brutality Videos, Still Complies With 63% Of Gov't Tak... - 10 views
-
lethal to the YouTube brand
-
legitimate takedown requests
-
Transparency Report
-
Explain the meaning of the following: -lethal to the YouTube brand -legitimate takedown requests -Transparency Report all oct 31 soo
-
Q1. Explain the meaning of the following: - Lethal to the YouTube brand The Lethal to the YouTube brand means that making less valuable of YouTube site. They are forcing YouTube to erase videos, which makes brand YouTube will feel shameful of. - Legitimate takedown requests The Legitimate takedown requests are from government. The government asks to erase all the post that are illegal in YouTube. - Transparency report The Transparency report is showing that why government and other agencies are requesting YouTube to remove all the reports that are inappropriate.
« First
‹ Previous
241 - 260 of 266
Next ›
Showing 20▼ items per page