Skip to main content

Home/ Globaltech/ Group items tagged developer

Rss Feed Group items tagged

anonymous

Apple iPad 2 vs. Motorola Xoom - 2 views

  •  
    Who's the winner in your opinion and why? be sure to read page 2 march 3 cream
  •  
    In my opinion it would be Ipad, but that's only if you're too intense about the aesthetics of Apple's iPad. I am sure that many people are obsessed with the look and how famous Apple products are. Even though Motorola Xoom seems to be better. i know how good Motorola Xoom is base on the rear end camera and the wider screen. But, new Ipad is out now! There is camera too which much better design. I believe that new Ipod would get develop much more.
anonymous

Judge Hands Over IP Logs of Several Geohot Sites to Sony - 4 views

  •  
    brief analysis march 11 nat
  •  
    Identify the area of impact the scenario relates to. Business Identify the main stakeholders to the IT system. Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Sources : http://en.wikipedia.org/wiki/IP_address iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV. Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers. 5. If possible, describe a solution to the concern (issue). There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.
anonymous

http://venturebeat.com/2011/02/20/arab-revolts-another-good-week-for-social-media-a-bad... - 1 views

  • The protests have been spurred by extensive use of social media such as Facebook and Twitter, which are seeing their moment in the sun as the tools of revolution
  • They’re unleashing movements for peace, democracy and freedom in a region of the world that seemed like it was content to live without them
  • It shows that the power of the network effect can work in political revolutions just as it does in other parts of our lives. Social media has become like the lever that opens the doors that stand in the way of freedom
  • ...1 more annotation...
  • “triumphalism about the recent events in the Middle East is premature. The contest is still in its early stages, and the new age of internet-driven democratization will endure only if we learn to counter the sophisticated measures now being developed to quash it
  •  
    To what extent do you think social media opens the door to freedom? march 1
anonymous

SecurID Company Suffers Security Breach - NYTimes.com - 1 views

  •  
    brief march 29 kuninari
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to the company who are selling product on security to the other company that need a security, and they got suffered. Business 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system are company and government who uses secuID 3. Describe one ITGS social/ethical concern in the article. The Data Breach in this article refers to their security system data being violated by an outside offender, such as it being stolen or copied when it's not supposed to be. The advanced cryptographic system is the security system that has an extra layer of security by an electronic token authenticator that generates a time-based number for the users to input while logging in with their password. It is suspected that the master key for the encryption algorithm was stolen, which is the huge secret number that is part of the system. 4. Describe ITGS terminology and systems. SecurID- a mechanism developed by RSA Security for performing two-factor authentication for a user to a network resource 5. If possible, describe a solution to the concern (issue). The solution for this issue is to update the security system often and try to get against from hackers. Having SecurID make up a new algorithm to be used for the system could reinforce the system's security again, if it's possible to make up a new algorithm. Other than that, SecurID would probably have to make up a whole new security system since their current stolen algorithm is probably going to be published and recopied, and the system not secure anymore.
anonymous

China Tightens Electronic Censorship - NYTimes.com - 2 views

  • A host of evidence over the past several weeks shows that Chinese authorities are more determined than ever to police cellphone calls, electronic messages, e-mail and access to the Internet in order to smother any hint of antigovernment sentiment. In the cat-and-mouse game that characterizes electronic communications here, analysts suggest that the cat is getting bigger
  • LinkedIn, a networking platform, was blocked for a day during the height of government concerns over Internet-based calls for protests in Chinese cities a few weeks ago, he said
  • China’s censorship machine has been operating ever more efficiently since mid-2008, and restrictions once viewed as temporary — like bans on Facebook, YouTube and Twitter — are now considered permanent. Government-friendly alternatives have sprung and developed a following
  •  
    This is similar to the Google accuses China... article and will help with the answers. Describe VPN. How does a proxy work? List a proxy you find useful. When would you use a proxy? Explain: Google has "played a role in manufacturing social disorder". march 25 Azman
  •  
    Describe VPN. A VPN means virtual private network and what it does is that it send you data over the Internet in a secure connection. It travels packet over unprotected network in a secured manner. It provides you tunnel which secures your data and send it encrypted form over the Internet. How does a proxy work? By using a proxy the web browser window is then coded as part of the proxy site address and not the real website the surfer is visiting. Any information cached in the temporary folder is that of the proxy, not the users. This means the user is not traced at all and the information is kept hidden. Article Source: http://EzineArticles.com/3786946 List a proxy you find useful. Tor Trycatchme anonsafe When would you use a proxy? When you want to hide your IP from anyone. It is a good idea to use it while online shopping, accessing bank websites, and putting personal information. Explain: Google has "played a role in manufacturing social disorder". This means that Google has been the source of creating all the social disorder in the real world. Examples of these social disorders include the Libyan Protests as well as the Egypt Protests. These are named as social disorders. And Google, who feeds information to the various organizations and governments as well as provide social networking interfaces play a role in the community to communicate with each other in order to plan these social disorder events, such as the protests to overthrow the government.
anonymous

BBC News - Apple acts on iPhone tracking bug - 1 views

  •  
    How does apple propose to solve the tracking program? Describe two examples of data tracking services that people use. Do you think privacy is still an issue with phones and apps? May 17 cream
  •  
    1. How does apple propose to solve the tracking program? Apple released newly developed software that cuts the amount of stored data to just a week and no longer transfer it to the owner's computer when the phone is connected. And if users disable the location services setting on their iPhone or iPad, it will stop collecting data completely. 2. Describe two examples of data tracking services that people use. - Foursquare: Foursquare is a location-based social networking website based on software for mobile devices. - Mobile Me: Mobile Me automatically pushes new email, contacts, and calendar events to your iPhone, Mac, and PC. So your devices always stay in perfect sync. 3. Do you think privacy is still an issue with phones and apps? Of course yes because mobile devices are connected to networks for all the time in order to access to files and media. Privacy is always going to be an issue with phones and apps because even though Apple is storing data for shorter time, the stored data can be used or leaked anytime when threats attack.
  •  
    1.1_reliability_integrity 1.3_privacy_anonymity 2.5_home_leisure 3.1_hardware 3.2 _software 3.3_networks 3.4_internet
anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
anonymous

BBC News - Facebook profile access 'leaked' claims Symantec - 3 views

  •  
    brief may 17 soo
  •  
    - Identify the area of impact the scenario relates to Home and Leisure, Business and e-commerce - Identify the main stakeholders to the IT system People who are using Facebook, Facebook Company and Application Company - Identify one ITGS social/ethical concern in the article Security, Privacy - Describe ITGS terminology and systems  Facebook Application= Apps on Facebook.com are web apps that are loaded in the context of Facebook. You can build your app using any language or tool chain that supports web programming, such as PHP, Python, Java or C#.Apps on Facebook.com are loaded into a Canvas Page. A Canvas Page is quite literally a blank canvas within Facebook on which to run your app. You populate the Canvas Page by providing a Canvas URL that contains the HTML, JavaScript and CSS that make up your app.  http://developers.facebook.com/docs/guides/canvas/  Symantec= Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.  http://kb.iu.edu/data/agzf.html - If possible, describe a solution to the concern (Issues) Facebook should enhance the security systems and authentication systems. User's personal information was leaked because they didn't work hard to manage transferring user's account to application systems. Therefore, it is better to enhance and put more effort to the transferring process.
anonymous

BBC - Newsbeat - HULC exoskeleton system ready for soldier tests - 16 views

  •  
    brief all sept 29 champ
  •  
    1. Identify the area of impact the scenario relates to. Business, government 2. Identify the main stakeholders to the IT system. US soldiers, US Department of Defense(Military), HULC project manager, Lokheed Martin, US Army's Natick Soldier Research Center 3. Indentify on ITGS social/ethical concern in the article. Reliability, People and machines 4. Describe ITGS terminology and systems. Robotic: The technology developed to combine software, mechanical manipulators, sensors, controllers and computers to provide programmable automation. The use of automated machines to replace human effort, although they may not perform. HULC (Human Universal Load Carrier) allows soldiers to carry weights of up to 200lbs (91kg) with little effort and is designed to reduce the strain of carrying heavy equipment which means soldiers can fight in the war very efficiently. Exoskeleton: outer layer that help covers, supports and protect the soldier body.
anonymous

BBC News - Facebook works with Websense to add phishing safety net - 12 views

  •  
    brief all oct 10 nat
  •  
    1. Identify the area of impact the scenario relates to. Home, business 2. Identify the main stakeholders to the IT system. Facebook, Websesnse, Facebook users, Malicious web developers 3. Identify one ITGS social/ethical concern in the article. Reliability 4. Describe ITGS terminology and systems. URL: llows all resources on the internet to be located in a uniform manner. A URL is a website address that has all the pertinent information for finding the exact location attached to it. (E.g.WWW.facebook.com) Database-driven: Web pages that store information in their database. Phishing: Tricking Internet users into providing personal data for malicious or fraudulent use.
anonymous

Bangkok Post : Simulation systems could help - 2 views

  •  
    Describe these IT systems: satellite imagery remote systems climate databases Explain how these systems help with forecasting. april 26 soo
  •  
     Satellite imagery Photograph of Earth or other planets made by means of artificial satellites Sources: http://en.wikipedia.org/wiki/Satellite_imagery  Remote Systems System which may be connected to by a local computer by using a modem or network Sources: http://dictionary.babylon.com/remote_system/  Climate databases Climate databases can predict risk coverage areas by simulating water flows and rain density, with geo-informatics applied to estimate how many households could face damage  Explain how these systems help with forecasting By these systems, people can find out the wind flow, geology issues easily and fast. If these systems are developing, the false information will be eliminating. Also it can help authorities evaluate damage more efficiently. Systems using satellite imagery, remote sensing, climate databases and high computing power can predict risk coverage areas by simulating water flows and rain density, with geo-informatics applied to estimate how many households could face damage.
  •  
    1. ITGS 2. Simulation 3. Systems 4. Modeling simulations 5. Database 6. computer 7. network
anonymous

http://www.theregister.co.uk/2011/04/21/amazon_web_services_outages_spans_zones/ - 4 views

  •  
    brief april 28 jen
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. Amazon and companies using Amazon's cloud service 3. Identify one ITGS social/ethical concern in the article Reliability 4. Describe ITGS terminology and systems. The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones. Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud. Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers. Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance. http://aws.amazon.com/ 5. If possible, describe a solution to the concern (issue). A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
‹ Previous 21 - 32 of 32
Showing 20 items per page