Skip to main content

Home/ Globaltech/ Group items tagged data

Rss Feed Group items tagged

anonymous

Bangkok Post : Patient data need protection - 2 views

  •  
    Explain the issues and possible solutions. april 4 kuni
  •  
    The issue is that the increasing integration of medical devices in hospital networks can increases the risk of being attacked easily, which they hack into the network and steals information. They need to strengthen the security to get against with the possibility of virus attacks which could have a huge damage on delivering data for medication. The Public Health Ministry can play an important role as a regulator in healthcare security, as a same system with the security in the network banking.
anonymous

Couchbase Offers NoSQL for IPhone | PCWorld Business Center - 1 views

  •  
    Explain: NoSQL non-relational database Explain the advantages of CouchDB's noSQL . May 9 soo
  •  
     Explain  NoSQL= NoSQL is a category of database engines that do not support the SQL (Structured Query Language) in order to achieve performance or reliability features that are incompatible with the flexibility of SQL. - http://stackoverflow.com/questions/4154635/what-is-nosql-what-is-purpose-of-nosql-where-can-i-get-sufficient-material-on-n  Non-relational database= a non-relational database developed by Damien Katz, now the chief technology officer for Couchbase. The company claims that Mobile Couchbase is the first non-relational, or NoSQL database, built for iOS. - http://stackoverflow.com/questions/202819/what-is-an-example-of-a-non-relational-database-where-how-are-they-used  Explain the advantages of CouchDB's noSQL - CouchDB and noSQL architecture has a number of advantages that make it attractive to iPhone applications developers, the company asserts. - CouchDB= Efficient use of working memory, Amount of storage space (takes up relatively minimal, under 20 megabytes download size limit imposed by many people CouchDB's NoSQL has advantages such as its synchronization capabilities with minimal coding. Data can be automatically synchronized across a network. The app can store data created on the phone itself, all the while also synchronizing the same data with a cloud service or a data center. The storage space taken up by CouchDB's NoSQL has efficient use of working memory. When it is embed in an app, it can still keep the app to be under the 20 mb download limit, and doesn't drain the battery.
  •  
    1. ITGS 2. NoSQL 3. iPhone 4. Network 5. Database
anonymous

Unmanned aerial warfare: Flight of the drones | The Economist - 7 views

  •  
    Summarize m12 nov 2 az
  • ...1 more comment...
  •  
    On September 30th, a missile strike launched from a UAV killed Anwar al-Awlaki, al-Qaeda's most effective propagandist. This was an example of how the UAV are changing today's combat. These babies are equipped with sophisticated sensors and carry Hellfire missiles and laser-guided bombs. There may not be a man in the cockpit, but each Reaper UAV requires more than 180 people to keep it flying. A pilot is always at the controls from a ground control unit and another officer operates its sensors and cameras. UAV have become the weapon of choice over the past decade. Theres not a month that passes without reports that an al-Qaeda or Taliban leader has been killed by UAVs. There are more hours flown by America's UAS than by its manned fighter jets and more pilots are being trained to fly them than their manned equivalents. The frequency of drone stikes on terrorists in Pakistan has rose from one every 40 days to one every four days under Obama's admin. The UAV's ability to loiter for hours, minutely observe human activities while transmitting full motion video to its ground crews and can strike with pinpoint accuracy has made it the essential weapon in America's war on terrorism. Drones come in many different shapes and sizes. Predators and Reapers are the larger and more popular ones. Some are micro sized devices that imitate a bird used for eavesdropping or a mid sized plane that can be hand launched by soldiers to tell them what is happening over the hill. The medium sized UAVs would be able to defend airspace against enemy intrusion to attacking enemy air defenses. The largest UAV would operate as airborne warning and control, aerial refueling tankers, lift transports and long range bombers. The next generation of drones will also have AI, which allows them to shoot to kill. The UAS are used for "dull, dirty, dangerous, difficult or different" tasks. These tasks include surveillance missions requiring time and a degree of persistence that crews of
  •  
    manned aircraft couldn't provide. Also, UAS could be used to fly in to observe or take samples after a chemical or biological attack. Any missions too dangerous for manned aircraft will be taken care of by the UAV. UAV have other advantages over manned aircraft as they have more detailed information about their targets, their strikes are more accurate and cause fewer civilian casualties. They are also cheaper and smaller. Since they have no pilot, the space could be used for fuel and thus they can fly much longer than manned aircraft. Without the need to accommodate crew, drone can be given radar-cheating stealthy shapes and can maneuver better. There are however a problem afflicting the drones as they depend on two-way satellite communications. If the datalink is broken the remote pilot will lose control of the aircraft. For missions requiring constant oversight, the vulnerability to electronic jamming or a direct attack on a communications satellite is a huge problem. Another problem is that the dones has a slight delay between the remote pilot and the aircraft. To reduce latency, small, solar, or laser powered ultra long endurance drones can form a chain in the sky along which satellite signals can be bounced. To reduce the workload on pilots, big UAV can take off and land automatically. The US Air Force plans to have a pilot operating up to four drones at a time. Civil liberty advocacy groups have raised concerns about targeted killings by drones. Bus as long as a UAS pilot can trust data from remote sensors, he or she should be able to make a proper assessment the same ways as the pilot of a manned aircraft. UAS pilot will be in a better position to do so since he or she will have more time to assess the situation accurately and not be exhausted b the physical battering of flying a jet.
  •  
    Allowing the UAV to fire a weapon based entirely on its own data analysis raises a lot of ethical problems. Using UAV to kill enemies thousands of miles away is like a cowardly action of a bully sheltering behind superior technology. There are fears that UAS will lower the political threshold for fighting and an essential of restraint will be removed. Drones make leaders fonder of war.
anonymous

Amazon Goes Back to the Future With 'NoSQL' Database | Wired Enterprise | Wired.com - 1 views

  •  
    Describe NoSQL and its purpose. Explain how it is used differently than MySQL. M12 jan30 az
  •  
    Describe NoSQL and its purpose. NoSQL is a highly scalable and reliable non-relational databases designed to maintain high performance and to be highly cost efficient for workloads of any scale, from the smallest to the largest internet-scale applications. It is also used to build a new kind of database for "unstructured" information that comes spilling off the Internet with each passing second. It is capable of handling large amounts of data du to the fact that they use flash storage rather than traditional spinning disks. These solid-state drives can provide single-digit millisecond response times. Explain how it is used differently than MySQL. MySQL database is a relational database that stores data in neat rows and columns, and it's designed to run on a single machine, while NoSQL database can store data in a more flexible way and is designed to scale across a very large number of machines. "SQL databases are like automatic transmission and NoSQL databases are like manual transmission. Once you switch to NoSQL, you become responsible for a lot of work that the system takes care of automatically in a relational database system. Similar to what happens when you pick manual over automatic transmission. Secondly, NoSQL allows you to eke more performance out of the system by eliminating a lot of integrity checks done by relational databases from the database tier. Again, this is similar to how you can get more performance out of your car by driving a manual transmission versus an automatic transmission vehicle." http://stackoverflow.com/questions/2559411/sql-mysql-vs-nosql-couchdb
anonymous

Data Brokers | Visual.ly - 1 views

  •  
    Summary Rot Oct 4
  •  
    * Customizability, highlighting parts required, bookmarking necessary 'pages' * Choice of chapters (relevant material) * Saves room in backpacks (less back strain), it's also lighter * Digital textbooks can't be lost, and if the E-reader is lost it can simply be replaced, the material is also digitized and can't be lost * Easy access and distribution, if everyone has their own E-reader, the material can simply be shared. * Students are more receptive to digitized learning material
Alex Lenk

BBC News - Australia's central bank targeted by hackers - 2 views

  •  
    Eun Young  October 17th  BAA
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to is 'business and employment'. 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system from this article are the RBA (Reserve Bank of Australia) and customers. 3. Identify and describe one ITGS social/ethical concern in the article. The social/ethical concern that has been identified in this article is 'security'. Security refers to the protection of hardware, software from unauthorized access. Security tries to prevent the access by hackers. In this article, the RBA has been hacked (cyber attacked). For an example, the malware has embedded in the emails. They think it is China to blame because they thought that China has already been through a similar cyber attack, which aimed to get the information out of it. The staffs in the RBA have opened several malware emails. This malware application has managed to go through the computer system. 4. Describe ITGS terminology and systems. * Malware: Malware refers to software programs that are designed to damage or do other unwanted actions on a computer system. * Cyber Attack: Cyber attackers use malicious code to alter computer code,logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes (information and identity theft). * Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through infected data files, introduced into a system via disks or Internet. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Even though the RBA did not lose any of their information, it's better to have a safe security system/software to protect their information. The RBA needs to be more careful when opening email files, and for a better protection, they would need to find a better way to secure. I would suggest them to have an encryp
anonymous

Congressmen, Facebook go back and forth over personal data sharing - 3 views

  •  
    brief analysis march 7 kuni
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is that personal information about people using a site such as Facebook is being made available to businesses. Even with the safeguards and agreements put in place to stop spammers there have already been cases of misuse of information. This is particularly worrying if personal information about children and young people is being made available. 2. Identify the main stakeholders to the IT system. The main stakeholders are the person who uses the Facebook, and they are having the businesses by the games and the system on making money from them. They use the work on creating the privacy issues 3. Describe one ITGS social/ethical concern in the article. The ITGS social/ethical concern is that there are problem on the information that can be shared on the third parties, which will have problem on the privacy issues where you could get stolen your information. 4. Describe ITGS terminology and systems. App- Protocols seen by user programs, such as email and the web API- is an interface implemented by a software program to enable interaction with other software, similar to the way a user interface facilitates interaction between humans and computers. ... 5. If possible, describe a solution to the concern (issue). Facebook have strict policy on collection regarding the companies collecting information from users as well as a harsher punishment instead of just a 6 month suspension. The change of policies should be notified to every users and the team should ask for the agreement of general users.
anonymous

How Google Chromebook Will Feel for Music Fans | Epicenter | Wired.com - 2 views

  •  
    What are the problems with doing everything on the cloud? may 19 az
  •  
    Doing everything on the cloud is efficient in a way that we can work on from anywhere anytime as long as we have internet connection. However, when we don't have good internet connection, there is nothing we can do since everything we have done is stored on the cloud. . Internet data storing plans might also be an obstacle while operating on the cloud because the costs increase as more data is wanted to be stored on the cloud. Moreover, The cloud is not invincible to attacks so your data is not 100% safe. Having a backup saved on a physical hard drive is a must, cause you can't rely too much in the cloud (look what happen to Amazon and Sony).
anonymous

Crime Map Beta - Trulia - 9 views

  •  
    What is the value of this? all sept 29 Jang
  •  
    The crime map is a site that shows the amount of crimes committed in an area. The map gives specific information about what kind crime was committed, the location and time of the crime. The site also gives data of places that crimes do not happen frequently. This crime map website can be really useful for avoiding crime scenes and being aware of crimes that are happening in your neighborhood. If you want to move to a new place you can look at the crime map to see if your new neighborhood is safe and crime free. This site is still on beta and only have information on few states in America. I think a lot of people would use this site if it have data for all the countries in the world. However keeping up with new information everyday would be very hard because there are so many crimes happening all over the world and the site would need to be updated every few minutes.
anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

Identity Theft Resource Center ITRC Fact Sheet 102 - 0 views

  •  
    Select and list 5 guidelines you think are reasonable. May 9 az
  •  
    * Provide cross-cut paper shredders at each workstation or cash register area or uses a locked wastebasket and shredding company for the disposal of credit card slips, unwanted applications or documents, sensitive data or prescription forms. * Use an alternate number instead of Social Security Numbers (SSN) for employee, client and customer ID numbers. * Encrypt or password protect all sensitive data stored on computers and allow access only on a "need-to-know" basis. * Notify consumers and employees in advance as to the purposes of the data collection, to whom it will be distributed and the subsequent use after the fulfillment of the original purpose. * Keep sensitive information of consumers or employees on any item (timecards, badges, work schedules, licenses) out of view in public areas. That may include home addresses or phone numbers, SSN and driver's license numbers.
Yonghyeon Shin

Privacy controls to be adopted by mobile phone operators - 1 views

  •  
    How does this program help users to protect your mobile phone? give us detail examples and provide specific reasons. 26 April Kuninari
  •  
    How does this program help users to protect their mobile phone? Give us detail examples and provide specific reasons. These guidelines (it's NOT a program) will help customers decide what data phone companies can collect about them. Customers will be able to allow or refuse phone companies from passing on personal data to other companies. These guidelines protect the customer, not the mobile phone. An example of an app which currently shares information without permission from the customer is "Girls Around Me" app.
anonymous

Do Not Track Plus vs. Ghostery | Digital Trends - 0 views

  •  
    browser plug-ins to  protect against advertisers and data collection
anonymous

BBC News - Firms 'ill prepared for IT failure' - 9 views

  •  
    Explain 2 solutions. all nov 28 kuni
  •  
    The most common causes of data loss and downtime are hardware failure, power outage and software malfunction. One solution is to regularly back up data (daily) and make sure that the computer has a recovery system enabled. The second solution is to plug every computer into a UPS (uninterruptable power supply) in case of power outage.
anonymous

How Google could have made the Web secure and failed -- again | Common Sense Tech - CNE... - 1 views

  •  
    Describe IT Jason Oct 4
  •  
    Google have transfer you automatically to its "encrypted" service, one designed to prevent potential "eavesdropping" on your searches. Google have use SSL( secure socket layer) to protect your search. Is can also be use when you are logging on to your bank account online. Google have introduce the SSL search, with the SSL search you can do your searches on Google with more secure and you are in private so no one can see what are you searching. Before Google URL was HTTP/www.google.com but now it is HTTPS/www.google.com. Its secure now. Google have use SSL to help protect your data from unwanted access. So what you are connected to internet café, local hotspots or hotel your data will be secure. But Google is not responsible for any viruses you get over the internet searches. The SSL will only protect your personal information.
anonymous

SecurID Company Suffers Security Breach - NYTimes.com - 1 views

  •  
    brief march 29 kuninari
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to the company who are selling product on security to the other company that need a security, and they got suffered. Business 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system are company and government who uses secuID 3. Describe one ITGS social/ethical concern in the article. The Data Breach in this article refers to their security system data being violated by an outside offender, such as it being stolen or copied when it's not supposed to be. The advanced cryptographic system is the security system that has an extra layer of security by an electronic token authenticator that generates a time-based number for the users to input while logging in with their password. It is suspected that the master key for the encryption algorithm was stolen, which is the huge secret number that is part of the system. 4. Describe ITGS terminology and systems. SecurID- a mechanism developed by RSA Security for performing two-factor authentication for a user to a network resource 5. If possible, describe a solution to the concern (issue). The solution for this issue is to update the security system often and try to get against from hackers. Having SecurID make up a new algorithm to be used for the system could reinforce the system's security again, if it's possible to make up a new algorithm. Other than that, SecurID would probably have to make up a whole new security system since their current stolen algorithm is probably going to be published and recopied, and the system not secure anymore.
‹ Previous 21 - 40 of 72 Next › Last »
Showing 20 items per page