Skip to main content

Home/ Globaltech/ Group items tagged computer

Rss Feed Group items tagged

anonymous

On Computers » SOLAR NETWORKS - 6 views

  •  
    Describe the IT system. What problem does it solve? dec 7 Alec
  •  
    1.13 home and leisure 2.5 _IT_managed_home_networks 2.5_digital_entertainment 2.5_social_networking 3.3 3.4
  •  
    The IT system in this is wireless repeaters they simply repeat the wireless signal that the router sends out so that a larger area can be covered by a single signal. It solves the problem of having to spend money for more routers and also having to constantly change your signal when you move around a large area like a park because you would lose one signal while gaining another. =D
anonymous

On Computers » FACEBOOK DOWNLOADER - 1 views

  •  
    fyi dec 2
anonymous

http://www.macobserver.com/tmo/article/japanese_publishers_cry_foul_on_pirated_app_stor... - 6 views

  •  
    brief march 23 woo
  •  
    1. Identify the area of impact the scenario relates to. - Business and employment 2. Identify the main stakeholders to the IT system. - JBPA, The Japanese Magazine Publishers Association, the Electronic Book Publishers Association of Japan, the Digital Comic Association, Apple. 3. Identify one ITGS social/ethical concern in the article - Intellectual property 4. Describe ITGS terminology and systems. - Apps: Apps is an abbreviation for application. An app is a piece of software. It can run on the Internet, on your computer, or on your phone or other electronic device. - Copyright: a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. The App Store is some kind of a database for iPhone, iPod touch, and iPad created by apple that allows users to browse, download and install app on their devices. Applications in an app store can vary in cost, from free downloads to quite costly ones, depending on who developed the application and its purpose. Software Apps, E-books that are sold through the app store are pirated. This software is basically electronic books, similar to real life books, where its contents are stored online. This Japanese copyright infringement is done through software that is uploaded through the internet that can be downloaded for a price. However, the payment is delivered to the offender, not the original person who owns the contents' rights. These pirated apps are Chinese -based language apps which plays a role in delaying the notice of the copyright infringement. 5. If possible, describe a solution to the concern (issue). Illegal distribution of copyrighted property should be banned. However, the massive infringe of the law is common in China. There should be more strict policy and laws in national level to reduce the number of these issues, such as measurement and specified steps of installing and removing application to satisfy companies wor
anonymous

Google beefs up voice search with personal recognition - 5 views

  •  
    Describe the IT terms. march 29 jenny
  •  
    1.11_people_machines 3.2 _software
  •  
    1. Describe the IT terms. Patented - Granted and protected by rights. A patent is a set of exclusive rights granted by a state, national government, to the inventor for a limited period of time in exchange for a public disclosure of the invention. http://www.whatspatented.com/ http://arstechnica.com/gadgets/ Cloud-based - software systems that based on the cloud (internet) Voice recognition system- computer technology that uses audio input to enter data instead of a keyboard input. Audio input is carried through a connected microphone. The Software is designed to recognize words or phrases with an internal database. The program would then match the audio signature of speech with corresponding data in the database. http://www.wisegeek.com/what-is-voice-recognition.htm Cloud-based voice recognition - The voice recognition software the is important to virtual reality since it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. The audio signals are converted to electrical signals, and then transformed into coding patterns to which meanings have been assigned. Automated voicemail - Automatic voicemail system that stores voice messages. Goog-411 - an automated information service that uses voice recognition to find information for what the caller is asking for on local businesses. This also has a feature to send the information to the caller's phone via text messaging. Goog-411 has provided a foundation for Voice Search (search Google by speaking instead of typing, Voice Input (filling in any text field on Andriod by speaking), and Voice Actions (Controlling Android phones with voice commands). http://arstechnica.com/business/news/2007/04/google-rolls-out-free-411-service.ars Android - Google's mobile operating system (a modified Linux Kernal system). This is the software stack for mobile devices that include the operating system as well as the middleware along with key apps. http://code.goo
anonymous

WikiLeaks Julian Assange Arrested in London: Is it a Conspiracy? - 4 views

  •  
    High cholesterol milk Feb 8 Who is Julian? What is wikileaks? Describe cyber attacks. How did politics impact wikileaks? How did wikileaks fight back?
  •  
     Who is Julian? - Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.  What is WikiLeaks? - WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.  Describe cyber attacks - A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.  How did politics impact WikiLeaks? - Protect citizens from knowing the secrets about politics - They keep find track on information -  How did WikiLeaks fight back? - Protesting way back Julian being treated (Letting attacks to each other)
  •  
    1.5 Intellectual property 1.9 Policies 2.6 Politics and government 3.5 Personal and public communications
anonymous

Egypt, Internet access: Egyptian government restores Internet service - latimes.com - 6 views

  • bring down Egyptian government websites
  • Welcome back to the Internet, #Egypt. Well, except http://www.moiegypt.gov.eg — you stay down,"
  •  
    Wooh How might the internet be useful for the Egyptian citizens? What does it mean "bring down Egyptian websites"? Feb 4
  •  
    1. How might the internet be useful for the Egyptian citizens? Egyptian citizens, especially for the protesters, have organized the initial protests against the government online, through social media such as Facebook groups. The restored Internet would allow them to use to do so again and other citizens are now back to their computers and can have regular socialization online. A main ways of communication with the outside world as well as with themselves, Internet would allow the citizens to join together through websites on the internet to create groups that support what they think is best for them. In this case, they want a reelection from their current leader. 2. What does it mean "bring down Egyptian websites"? "Bring down Egyptian websites" means to stop access to those Egyptian websites through means such as having a DoS attack on the website. Also hackers can hack into the website and destroy the coding and content of the website and thus "bring down" the websites. Bringing down Egyptian websites can also mean that they are blocking all access to Egypt because there wouldn't be any portal into Egypt if all the Egyptian websites are brought down.
anonymous

Congressmen, Facebook go back and forth over personal data sharing - 3 views

  •  
    brief analysis march 7 kuni
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is that personal information about people using a site such as Facebook is being made available to businesses. Even with the safeguards and agreements put in place to stop spammers there have already been cases of misuse of information. This is particularly worrying if personal information about children and young people is being made available. 2. Identify the main stakeholders to the IT system. The main stakeholders are the person who uses the Facebook, and they are having the businesses by the games and the system on making money from them. They use the work on creating the privacy issues 3. Describe one ITGS social/ethical concern in the article. The ITGS social/ethical concern is that there are problem on the information that can be shared on the third parties, which will have problem on the privacy issues where you could get stolen your information. 4. Describe ITGS terminology and systems. App- Protocols seen by user programs, such as email and the web API- is an interface implemented by a software program to enable interaction with other software, similar to the way a user interface facilitates interaction between humans and computers. ... 5. If possible, describe a solution to the concern (issue). Facebook have strict policy on collection regarding the companies collecting information from users as well as a harsher punishment instead of just a 6 month suspension. The change of policies should be notified to every users and the team should ask for the agreement of general users.
anonymous

Nokia at the crossroads: Blazing platforms | The Economist - 1 views

  •  
    Explain: As microprocessors become more powerful, mobile phones are changing into hand-held computers. As a result, most of their value is now in software and data services. This is where America, in particular Silicon Valley, is hard to beat. Companies like Apple and Google know how to build overarching technology platforms. And the Valley boasts an unparalleled ecosystem of entrepreneurs, venture capitalists and software developers who regularly spawn innovative services. march 29 cream
  •  
    It is all about microprocessor and how powerful it is. According to this article, it concerns with Nokia mobile phones as the company develop so much on hardware, which lack in software nowadays. In the other hand, Apple provides a really good with software, because they are mostly useful and impressive. So, now it is quite hard for Nokia to fight against this advance of Apple.
anonymous

Google expands social collaboration features in Docs | Cloud Computing News - Betanews - 0 views

  •  
    jenny - check and report
anonymous

Bangkok Post : US names Baidu, PirateBay on copyright piracy list - 2 views

  • list of the world's top marketplaces for pirated and counterfeit goods
  • enabling piracy with "deep linking" searches
  • continue to work closely with brand owners and others to further enhance the level of trust and integrity in our online marketplaces
  • ...1 more annotation...
  • efforts to work with brand owners in protecting their intellectual property rights
  •  
    Identify the issue. Describe the possible solutions. march 11 jenny
  •  
    1.4_intellectual_property 2.5_digital_policing 3.4_internet
  •  
    Identify the issue Intellectual Property Rights - Piracy Describe the possible solutions Solutions that are harsh to the point of shutting down the website that hosts these download links to pirated music, videos, and other intellectual property, etc. Or censoring the pirated files on the website to be inaccessible. However, this isn't a feasible solution since it would cause massive uproar for the users who use the sites on a regular basis, which in this case may be millions of people. Policing IT malls, as well as formulating and enforcing strict laws with hard punishments for violators.
anonymous

BBC News - Apple acts on iPhone tracking bug - 1 views

  •  
    How does apple propose to solve the tracking program? Describe two examples of data tracking services that people use. Do you think privacy is still an issue with phones and apps? May 17 cream
  •  
    1. How does apple propose to solve the tracking program? Apple released newly developed software that cuts the amount of stored data to just a week and no longer transfer it to the owner's computer when the phone is connected. And if users disable the location services setting on their iPhone or iPad, it will stop collecting data completely. 2. Describe two examples of data tracking services that people use. - Foursquare: Foursquare is a location-based social networking website based on software for mobile devices. - Mobile Me: Mobile Me automatically pushes new email, contacts, and calendar events to your iPhone, Mac, and PC. So your devices always stay in perfect sync. 3. Do you think privacy is still an issue with phones and apps? Of course yes because mobile devices are connected to networks for all the time in order to access to files and media. Privacy is always going to be an issue with phones and apps because even though Apple is storing data for shorter time, the stored data can be used or leaked anytime when threats attack.
  •  
    1.1_reliability_integrity 1.3_privacy_anonymity 2.5_home_leisure 3.1_hardware 3.2 _software 3.3_networks 3.4_internet
anonymous

BBC - Newsbeat - HULC exoskeleton system ready for soldier tests - 16 views

  •  
    brief all sept 29 champ
  •  
    1. Identify the area of impact the scenario relates to. Business, government 2. Identify the main stakeholders to the IT system. US soldiers, US Department of Defense(Military), HULC project manager, Lokheed Martin, US Army's Natick Soldier Research Center 3. Indentify on ITGS social/ethical concern in the article. Reliability, People and machines 4. Describe ITGS terminology and systems. Robotic: The technology developed to combine software, mechanical manipulators, sensors, controllers and computers to provide programmable automation. The use of automated machines to replace human effort, although they may not perform. HULC (Human Universal Load Carrier) allows soldiers to carry weights of up to 200lbs (91kg) with little effort and is designed to reduce the strain of carrying heavy equipment which means soldiers can fight in the war very efficiently. Exoskeleton: outer layer that help covers, supports and protect the soldier body.
anonymous

Your smartphone: a new frontier for hackers - Technology & science - Security - msnbc.com - 15 views

  •  
    Describe the different ways that iphones and android phones are being hacked. all sept 5 soo
  •  
    Malicious Applications that log details about incoming/outgoing phone calls, as well as recording the calls. They can create unwanted service charges subscriptions to phone users. The users may or may not even receive the "service" that was subscribed, and paid for. They cab intercept text messages, compromise emails, photos and private content. Malicious applications that appear to be games, calculators, or pornographic photos and videos are downloaded to smartphones. Malware that replies incoming text messages with spam links. E-mail based phishing - because the phone screens are smaller than computers, it is harder to tell apart phishing links and scams in the url. iPhone's unencrypted file of location logs for iPhone users. Jailbroken iPhones that run unauthorized content is also a gap where malware can get through. Because these apps are unauthorized, they haven't gone through Apple's authorization process, and can contain malware, and can hack the user's phone. o By Malicious Application= The Applications which Apple and Android offers to customer, sometimes have malicious worms or viruses. Sometimes, malicious applications masquerade to games, calculators, or pornographic photos and videos. Hackers made their own malicious app and phishing people to download. The payment will charge to the victim's phone bills. o By Phishing Texting= Personal texting sometimes contain spam and malicious links which lead to the hacking site o By Advertisement link= Viruses might attach to the advertisement link o By Weak Security= Weak security of iPhone and Android phone therefore, find the weak part of the phone and hack. o By E-mail= Users tend to be less caring on phones, as the words and the screen itself are small
anonymous

BBC News - British Gas installs smart meters - 19 views

  •  
    brief all sept 5 woo
  •  
    1. Identify the area of impact the scenario relates to. Home and Leisure, Environment, Business 2. Identify the main stakeholders to the IT system. People, British Gas, UK Customers 3. Identify one ITGS social/ethical concern in the article. Reliability and Integrity 4. Describe ITGS terminology and systems. - Smart meter: an electronic device which enables users to monitor the cost of their electricity and gas consumption in real time, and eventually see how much power individual appliances are using. - Smart phones and Tablets - Devices that include smart features such as reading e-mails and featuring applications for users. Both smart phones and tablets today can feature touch screens, without needing a physical keyboard to operate the various actions. - GPRS: General Packet Radio Services (GPRS) is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. 5. If possible, describe a solution to the concern (issue). The concern that might rise from this case is that the devices, that are about to be installed on million homes, may not as effective as people have estimated. The reliability of the device depends on the device itself and the production company.
anonymous

BBC News - Microchip implant monitors tumour growth - 23 views

  •  
    brief all sept 6 jang
  •  
    1. Identify the area of impact the scenario relates to. Health, business 2. Identify the main stakeholders to the IT system. Companies that makes microchips. Patients with tumor. Doctors 3. Identify one ITGS social/ethical concern in the article. People and machines 4. Describe ITGS terminology and system. Microelectronics: A subfield of electronics. Microelectronics relates to study and manufacture of very small electronic components. Electrodes: An electrical conductor used to make contact with a nonmetallic part of a circuit. Microchips: A small semiconductor used to relay information through specific electrical characteristics. Sensor: A device that is light, temperature, or radiation sensitive. It transmits a signal to a control or measuring instrument. PC: Personal computers
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

What is network monitoring? - A Word Definition From the Webopedia Computer Dictionary - 1 views

  •  
    coming soon
anonymous

KeePass Password Safe - 2 views

anonymous

Bangkok Post : Medicine without borders - 2 views

  •  
    brief april 4
anonymous

Bangkok Post : Patient data need protection - 2 views

  •  
    Explain the issues and possible solutions. april 4 kuni
  •  
    The issue is that the increasing integration of medical devices in hospital networks can increases the risk of being attacked easily, which they hack into the network and steals information. They need to strengthen the security to get against with the possibility of virus attacks which could have a huge damage on delivering data for medication. The Public Health Ministry can play an important role as a regulator in healthcare security, as a same system with the security in the network banking.
« First ‹ Previous 61 - 80 of 88 Next ›
Showing 20 items per page