Skip to main content

Home/ Globaltech/ Group items tagged computer

Rss Feed Group items tagged

anonymous

http://www.theregister.co.uk/2011/04/21/amazon_web_services_outages_spans_zones/ - 4 views

  •  
    brief april 28 jen
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. Amazon and companies using Amazon's cloud service 3. Identify one ITGS social/ethical concern in the article Reliability 4. Describe ITGS terminology and systems. The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones. Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud. Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers. Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance. http://aws.amazon.com/ 5. If possible, describe a solution to the concern (issue). A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
anonymous

BBC News - Chemicals and defence firms targeted by hacking attack - 3 views

  •  
    Explain the type of attack and possible security measures to prevent it. m12 nov 8 jenny
  •  
    The type of attack was a phishing attack that involved sending e-mails that had attachments, that when opened, will install a Trojan horse code into the person's computer. From there, the Trojan horse will be able to locate and copy files to another part of the computer system where they will be extracted back to the hacker who performed the attack. Possible Security Measures to Prevent it: Don't open e-mail attachments unless you know they are from a trusted source, especially attachments containing extensions .exe, .ink, and .vbs. Always have your security software up to date. http://sync.sympatico.ca/how-to/computing/how_to_prevent_a_trojan_horse_infection/a1487f14 Customize your firewall settings for your browser to filter out content. (Default is usually all, but choose to "limit" your connection so that it limits the connection to possible attackers).
anonymous

How to use MSCONFIG in Windows 7: NetSquirrel.com - 1 views

  •  
    How to use MSCONFIG in Windows 7 Here is how to use MSCONFIG in Windows 7 to disable some of the unnecessary programs that automatically load on start-up. Disabling these programs will help your computer boot faster and crash less."
Max Seol

Key Iranian oil terminal 'hacked' - 6 views

  •  
    Iran has been forced to disconnect key oil facilities after suffering a malware attack on Sunday, say reports. The computer virus is believed to have hit the internal computer systems at Iran's oil ministry and its national oil company. Equipment on the Kharg island and at other Iranian oil plants has been disconnected from the net as a precaution.
  •  
    Why is it a serious problem?
  •  
    Selected Article Oil is one of the valuable resources in the world so it is important for us to know how can this happen and how serious it is.
anonymous

BBC News - Firms 'ill prepared for IT failure' - 9 views

  •  
    Explain 2 solutions. all nov 28 kuni
  •  
    The most common causes of data loss and downtime are hardware failure, power outage and software malfunction. One solution is to regularly back up data (daily) and make sure that the computer has a recovery system enabled. The second solution is to plug every computer into a UPS (uninterruptable power supply) in case of power outage.
Alex Lenk

BBC News - Police crackdown on fake shopping sites - 1 views

  •  
    Alex October 30th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment. 2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products. 3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites. 4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
anonymous

Asia computer market has room for both tablets and laptops - 5 views

  •  
    Why might some people want to use tablets? dec 2 nat
  •  
    Why might some people want to use tablets? They are lighter and easier to carry around than PCs and easier to control because it is touch screen so you don't need a mouse to control the cursor, and just touch the screen. It may not be good for typing up documents, but they are easy for online searches as you don't need to sit down, open the laptop and search, but just do it on the spot.
anonymous

http://edition.cnn.com/2010/TECH/web/12/13/5.online.privacy.tips/ - 6 views

  •  
    summary march 29 kuni
  •  
    1. Adjust social-network privacy settings, You should adjust privacy setting in Facebook by changing the privacy option in Facebook. Facebook updated its privacy dashboard in October, which now, it can change the privacy setting in mobile phone, and you don't have to do it in computer. You can also protect twitter to not let show in the public. 2. Ensure personal data is sent over a secure connection, You should find if the site is secured enough before giving a credit card number. Make sure the adress shows that the site is encrypted. 3. Consider opting out of ad tracking, You should get rid of ad tracking by disabling the third party cookies. Now, no one will be able to track your pc. 4. Use private Web browsing features or install a VPN Install VPN for more strong security for your browser. Such as Little Snich, which gives out a warning sign every time the website automatically changes your settings. 5. Think before you post. You should always check and think if the site is secured enough to give out a privacy information or post email. You have to be careful to not let hackers get into your computer. And don't give out privacy information even to friends.
Woogyeong Jung

http://www.bangkokpost.com/mail/207851/ - 1 views

  •  
    brief analysis march 23 azman
  •  
    Identify the area of impact the scenario relates to. Health Identify the main stakeholders to the IT system. Patients, Brain Computer Interface, Tridi Identify one ITGS social/ethical concern in the article. Reliability Describe ITGS terminology and systems. BCI- Brain Computer Interface recognizes brain signals and uses them to control electrical or communication devices and can even assist in repairing human cognitive or sensory-motor functions. The technology use sensors to detect brain activity and amplify signals, which can then be processed into messages or commands to aid decision-making. If possible, describe a solution to the concern (issue). The reliability of the IT systems may be a concerned because the IT system may not be able to handle the different kind of disability, because there are many different kinds of disability. Moreover, the current concerns are that the users' lack of strengths. A possible solution for the system is to experiment the system to different people with different needs, so that it can handle different kind of people and their specific needs. A possible solution for the users, is to train them so that they can use the systems for a long time without getting exhausted, because the purpose of the BCI is to be able to use for a long term.
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
anonymous

Top 10 Google Products You Forgot All About - 1 views

  •  
    Which would you use? march 17 kuni
  •  
    I would use Google Sketchup, because this is one of the applications that I have on my computer. Google Sketchup is a software with which you can make a 3D model easily. Compared to the other 3D modeling software, Google Sketchup is easier to use. It has some tutorials for beginners, and you will find out how easy it is to create 3D model like a kid making a tower of blocks. Also, if you buy it, you will be able to convert it to a file that can be used for other 3D modeling software and modding games. I would use Google Trends just to see what's trending and Flight simulator in Google earth sounds pretty fun for when you're bored. I would use ; Google Page Creator, Flight simulator in Google Earth, and SketchUp. I would use the fight simulator, because it looks fun, and SketchUp mainly because I've always wanted to do some sort of graphics design on the computer. -In my opinion I would like to use Google SketchUp, and Google Book Search. First of all Google Sketch Up is helping me to make 3-D model. This is very useful in art class because when we have something like installations, we need some sketch of location and installation therefore by this program, I can draw 3-D installation and see how it looks like therefore this program is very useful for me. Also For the Google Book Search, this is kind of digital library which I can find book very easily and efficiently. I can see the books by this program also I can upload by own books which I can scan it. Therefore it might be very useful when I have something like writing essays. I would use Google Page creator. It enables to me create a page where I can find snippets of web pages, quotes, and images all over the web.
anonymous

Sony Nextep Computer Concept for 2020 by Hiromi Kiriki » Yanko Design - 0 views

  •  
    A peak into the future? Comments? soobin
  •  
    anything?
anonymous

Ethics in Computing - 3 views

  •  
    read march 1
anonymous

Judge Hands Over IP Logs of Several Geohot Sites to Sony - 4 views

  •  
    brief analysis march 11 nat
  •  
    Identify the area of impact the scenario relates to. Business Identify the main stakeholders to the IT system. Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Sources : http://en.wikipedia.org/wiki/IP_address iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV. Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers. 5. If possible, describe a solution to the concern (issue). There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.
anonymous

Libya turns off the Internet and the Massacres begin | ZDNet - 3 views

  • Now, though, realizing that they could no longer hide their abuses from a world a Twitter tweet away, the new model autocracies, such as Libya and Bahrain have realized that they need to cut their Internet links before bringing out the guns.
  • As in Bahrain, Libya’s Internet is essentially owned and controlled by the government through a telecommunication company Libya Telecom & Technology
  • Mobile phone services in Libya are also under the control of the government. So far though the government doesn’t seem to have cut international phone services off-perhaps because that’s harder to do without cutting off local telephone service.
  • ...1 more annotation...
  • “Should Libya block Internet traffic, as Egypt did, it will not affect http://bit.ly or any .ly domain.”
  •  
    Brief analysis march 1 natsuno
  •  
    Identify the area of impact the scenario relates to. Politics and government Identify the main stakeholders to the IT system. Libyan government, Libyan citizens, Libyan telecommunication company (Libya Telcom & Technology) 3. Identify one ITGS social/ethical concern in the article. Surveillance 4. Describe ITGS terminology and systems. Internet : a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange Bit.ly : URL shortening is a technique on the World Wide Web where a provider makes a web page available under a very short URL in addition to the original address. Top level domain : A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name. 5. If possible, describe a solution to the concern (issue). It is hard to suggest a solution basically because it is the government's decision to shut down the internet. Therefore the only way to solve this issue is to discourage dictatorship in Libya. Main reason for the shut down of the internet was the cooperation of Libya Telecom & Technology which is owned by the dictator's son.
anonymous

Apple named 'least green' tech company | Environment | guardian.co.uk - 0 views

  •  
    Why does apple rank low for being green? Which companies are fairly green? Why don't companies want to disclose their energy consumption? Is cloud computing green? Determine if use of IT often reduces environmental impacts or not. april 28 nat
  •  
    Why does apple rank low for being green? Because of their huge electricity consumption and the increase in their consumption in a new facility, which consumes approximately the same amount of electricity 80,000 US homes. Which companies are fairly green? Yahoo, Google and Amazon. Why don't companies want to disclose their energy consumption? They don't want others to know what they did or what they had to do to reach to the position they are in now. Is cloud computing green? No, it's not green as it already accounts for approximately 2& of the world's electricity consumption, and it is predicted that it will rise. Determine if use of IT often reduces environmental impacts or not. Yes it does, because if something was electronically saved, it can save paper. Moreover, It has been said that there are less carbon emissions produced when music is downloaded of the web, rather than bought in CD stores, because you don't need to use CDs.
anonymous

When Passwords Aren't Enough: The Need for Strong Online Authentication That is Easy to... - 2 views

  •  
    Describe the IT terms. april 28 kuni
  •  
    Authentication- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. Tokens- A Hardware Token is an Authenticator in the form of a physical object, where the user's interaction with a login system proves that the user physically possesses the object. Hardware Tokens authenticate users on the basis that only the Token assigned to the user could have generated the pseudo-random number or code response keyed in by the user. Successful entry of this code implies that the user is in physical possession of the Token. This implies that the user does not allow users to use his Token, and has not lost it. It is use to prove one's identity electronically, and it is small enough to put it in the pocket or attach to keychain. Smart Card-A card with an embedded computer chip on which information can be stored and processed. It is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Biometric- Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
anonymous

Learning The Right Lessons From The Amazon Outage - 5 views

  •  
    Define: AWS Iaas Define and describe: Free redundancy rapid scalability server failover maintainability Explain each lesson and determine whether you agree or not with each one. May 13 az
  •  
    1) Define: AWS- The Amazon Web Services (AWS) are a collection of remote computing services (also calledweb services) that together make up a cloud computing platform, offered over the Internet byAmazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3. Iaas - infrastructure-as-a-service; a way to deploy a less reliable server, quickly and without human intervention. 2) Define and describe: Free redundancy- re-deploying your application in another data center or cloud service using on-demand resources instead of having an idle redundant data center. Rapid scalability- Scalability approach that doesn't require access to AMIs that is stored on S3 or EBS. Instead, it uses the on-demand resources. This is when the system can withstand changes in transaction volume without major changes. Server failover- Virtual servers fail more frequently that physical servers, and when they do, there is less ability to recover them. Treat server failover the same way as scalability, just bring up a new server. Maintainability- Use a fully automated deployment and not a server configuration that is created manually to make it maintainability. Since, when a server configuration that is created manually and saved to a "golden image" has numerous problems such as: only the person who built it knows what is there, so if that person is gone, it can be time consuming to re-configure it. On the other hand, a fully automated deployment is not only a maintainable process, it also serves as documentation. 3) Explain each lesson and determine whether you agree or not with each one. Wrong lesson #1 The lesson where the infrastructure of the cloud is either not ready for its time to shine, or never will be. This is the lesson that explains that the infrastructure is still carried out on physical servers, just in remote areas where they are held in the physical data center in large numbers. These physical server
anonymous

Future in the cloud | Bangkok Post: business - 7 views

  •  
    How are cloud computing, real-time analytics, and IoT impacting business, particularly in Thailand? JiJi
‹ Previous 21 - 40 of 88 Next › Last »
Showing 20 items per page