Skip to main content

Home/ Globaltech/ Group items tagged hardware

Rss Feed Group items tagged

anonymous

PayPal Debuts Its Newest Hardware, Beacon, A Bluetooth LE Enabled Device For Hands-Free... - 6 views

  •  
    summary yongkyu
  • ...2 more comments...
  •  
    describe the IT systems
  •  
    One of David Marcus's biggest challenges when taking on the role of President of PayPal was extending the platform into point of sale, and making it easier to pay with PayPal than swiping your credit card. But changing consumer behavior is an enormously difficult task. PayPal played with geo-location leveraging GPS and Wi-Fi for iOS and Android. These technologies are what powers Square's hands free payment system 'Pay with Square. But they found that it ended up being a poor experience for the consumer because it sucked the batter life out of their phones. PayPal also warns that it is aware of the potential privacy issues so PayPal Beacon won't constantly track your location unlike other technologies. If you enter a store and decline to check in, or just ignore the prompt entirely, no information is transmitted to PayPal or the merchant. PayPal has also said that there will be no ads served via the platform. As evidenced by PayPal latest app update from last week, the company is making a big bet on creating an in-store experience for both consumers and retailers. It's ambitious to say the least because not only does the payments company have to change the behavior of the consumer (from just swiping a card) but it also has to convince retailers and the 100 million plus PayPal users that it is worth it. Marcus says that providing a frictionless experience for both parties will be the key to success when changing behavior.
  •  
    Describe IT. Alex Oct 4
  •  
    Bluetooth Low Energy: Allows connected devices to communicate with each other while keeping the energy consumption of the devices at a very low level. The transaction should take place without GPS, other apps running, or even without a phone signal. PayPal Beacon: A small hardware device that runs on its own Wi-Fi, plugs into an outlet and serves as a beacon to other devices. It updates itself and the storekeeper doesn't have to touch it at all. It will track your location according to privacy issues. It is completely up to you whether you accept or decline Beacon when you enter the store. A hands free check in payment device.
Azman Fadhilah

FoxNews.com - Uncovered: Images From Full-Body Scanners Hit the Web - 2 views

  •  
    brief jen nov 22
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. People who go through full-body scans Operators controlling the scan machines 3. Identify one ITGS social/ethical concern in the article Privacy 4. Describe ITGS terminology and systems. The systems in this situation include both hardware and software. The hardware is the actual scanning machine while the software is the scanning machine's system that controls whether or not the scanned files of the people passing through are saved into the system or discarded or not. 5. If possible, describe a solution to the concern (issue). Modifying the system to remove the option of saving files could be useful because if the option to save was not present, then it can be assured that the operators do not have the ability to go against the policy. If it is a requirement for the system to need to save files, then the system should be modified to only save files that detect an abnormality that goes against the policy of the scanning. (For example if the scan shows that the person is carrying weapons etc.) Only having the authorized people to view it when it is need with stricter rules.
anonymous

Bangkok Post : Cloud services open up business opportunities - 1 views

  •  
    What does cloud computing deal with? Describe each of the characteristics cloud services must have. Explain horizontal and vertical services. Define each layer of services. Explain the infrastructure capability terms. Why is bandwidth important? march 17 cream
  •  
    What does cloud computing deal with? Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications. Describe each of the characteristics cloud services must have. Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them. Fstandard user interface - Web browsers to have access to the cloud services. Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human. Fservice metering - The Charge of the usage of the cloud services. Faccess over the internet - The medium of having access to the internet, as well as other places over the internet. Explain horizontal and vertical services. Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example. Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used. Define each layer of services. Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere. Why is bandwidth important? Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
  •  
    1.5 Intellectual property 2.5 Home and leisure 3.3 Networks 3.4 Internet 3.7 Databases
anonymous

When Passwords Aren't Enough: The Need for Strong Online Authentication That is Easy to... - 2 views

  •  
    Describe the IT terms. april 28 kuni
  •  
    Authentication- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. Tokens- A Hardware Token is an Authenticator in the form of a physical object, where the user's interaction with a login system proves that the user physically possesses the object. Hardware Tokens authenticate users on the basis that only the Token assigned to the user could have generated the pseudo-random number or code response keyed in by the user. Successful entry of this code implies that the user is in physical possession of the Token. This implies that the user does not allow users to use his Token, and has not lost it. It is use to prove one's identity electronically, and it is small enough to put it in the pocket or attach to keychain. Smart Card-A card with an embedded computer chip on which information can be stored and processed. It is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Biometric- Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
Tick Kanjanamaneeroj

Thailand signs the world's largest educational tablet distribution deal - 5 views

  •  
    Will tablets benefit children for their education? How?
  •  
    Education Hardware May 17
kittinat chitpluem

15 Current Technologies A Child Born Today Will Never Use - 6 views

  •  
    1. Of the 15 current technologies that we presently use today, what do you think will be the first 5 to be obsolete or outdated 2 years from now, and why? 2. If the technologies in the future to come will be faster and better, does it necessarily mean that our future life will be easier and better?
  •  
    Home Hardware May 21
Chut Sanghiran

iPad gives voice to kids with autism - 5 views

  •  
    Explain how can Ipads help Handicapped kids?
  •  
    Health and Education Hardware, Software, Personal and Public Communications,
  •  
    May 21
anonymous

BBC News - Firms 'ill prepared for IT failure' - 9 views

  •  
    Explain 2 solutions. all nov 28 kuni
  •  
    The most common causes of data loss and downtime are hardware failure, power outage and software malfunction. One solution is to regularly back up data (daily) and make sure that the computer has a recovery system enabled. The second solution is to plug every computer into a UPS (uninterruptable power supply) in case of power outage.
Alex Lenk

Electronic Brain Helps Cut Credit Card Fraud : NPR - 1 views

shared by Alex Lenk on 08 Oct 13 - Cached
  •  
    Da Woon October 10 Brief Article Analysis Answer here.
  •  
    1. Identify the area of impact the scenario relates to. Business and employment, home and leisure 2. Identify the main stakeholders to the IT system. in this article, the credit card user and credit card companies are the main stakeholder 3. Identify and describe one ITGS social/ethical concern in the article. In this article, the social/ethical concern is integrity. In this article, it tells that Credit Card Company uses neural networks to keep track of every purchase people make and sorts them into patterns and categories. If people changed their purchasing pattern, the credit card calls you and ask you about did you really buy it. So, if we buy the computer first time, we changed our purchase pattern, so we are losing our integrity to Credit Card Company. So we are really hard to use our own credit card. 4. Describe ITGS terminology and systems. Transaction - Electronic funds transfer, the electronic exchange or transfer of money from one account to another Software - any set of machine-readable instructions that directs a computer's processor to perform specific operations. Hardware - the collection of physical elements that comprise a electrical device system 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. The one solution in this social/ethical concern would be making a password then using that password with signature to prove our identity when we purchase the product which is not in our pattern such as put our password on our mobile device when we purchasing product with transaction. So we don't need to get the call from Credit Card Company when we purchase the product which is not in our purchasing pattern. Also we can using biometrics on our digital device to prove that we purchase that product when we using transaction to purchase the product.
Alex Lenk

BBC News - Australia's central bank targeted by hackers - 2 views

  •  
    Eun Young  October 17th  BAA
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to is 'business and employment'. 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system from this article are the RBA (Reserve Bank of Australia) and customers. 3. Identify and describe one ITGS social/ethical concern in the article. The social/ethical concern that has been identified in this article is 'security'. Security refers to the protection of hardware, software from unauthorized access. Security tries to prevent the access by hackers. In this article, the RBA has been hacked (cyber attacked). For an example, the malware has embedded in the emails. They think it is China to blame because they thought that China has already been through a similar cyber attack, which aimed to get the information out of it. The staffs in the RBA have opened several malware emails. This malware application has managed to go through the computer system. 4. Describe ITGS terminology and systems. * Malware: Malware refers to software programs that are designed to damage or do other unwanted actions on a computer system. * Cyber Attack: Cyber attackers use malicious code to alter computer code,logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes (information and identity theft). * Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through infected data files, introduced into a system via disks or Internet. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Even though the RBA did not lose any of their information, it's better to have a safe security system/software to protect their information. The RBA needs to be more careful when opening email files, and for a better protection, they would need to find a better way to secure. I would suggest them to have an encryp
Azman Fadhilah

Bangkok Post : The rise of the digital spies - 1 views

  •  
    1. Identify the area of impact the scenario relates to. Business and employment, Politics and Government 2. Identify the main stakeholders to the IT system. Politicians, Large Business owners, Victims 3. Identify one ITGS social/ethical concern in the article Surveillance / Privacy 4. Describe ITGS terminology and systems. The main IT system in this situation is the use of the evolving hardware that is customized to best fit the various situations that need to infiltrate a certain amount of security. The new spy devices today are integrated into everyday devices such as pens and glasses so that it is hard to track and sensor while going through security checks. 5. If possible, describe a solution to the concern (issue). Having the government and users agree to sign contracts which only allow certain amounts of digital spy equipment to be produced, and while shipment, if any equipment was found to be not authorized and legitimate to pay a large amount of fine to prevent further disuse of the equipment. Since most of the devices require some sort of signaling in order to spy, having new security checks based on lens reflection as well as machine signal waves can increase security because it would be easier to sensor such devices.
anonymous

On Computers » BACKUP, AND THEN WHAT? - 1 views

  •  
    Describe the IT systems. Az nov 22
  •  
    The IT system in this article is software that lets you restore your whole system back on the old or new computer in case your computer dies. But first, you need a "bootable disk". If your computer won't start, insert the bootable disk and the operating system will find it and start up. Second, you need to backup your computer to an external hard drive or DVD before it died. Then, you can use this software called "Acronis True Image Home 2011" that put Windows and all your programs, files and settings, onto a different computer without any hardware conflicts. True Image also comes with a "Try and Decide" mode where you can try any program that is stored on your external hard drive and decide whether you want to keep it on your new computer. Acronis True Image Home also comes with online backup, which is free for 2gb and it makes a bootable disk for you.
anonymous

Nokia at the crossroads: Blazing platforms | The Economist - 1 views

  •  
    Explain: As microprocessors become more powerful, mobile phones are changing into hand-held computers. As a result, most of their value is now in software and data services. This is where America, in particular Silicon Valley, is hard to beat. Companies like Apple and Google know how to build overarching technology platforms. And the Valley boasts an unparalleled ecosystem of entrepreneurs, venture capitalists and software developers who regularly spawn innovative services. march 29 cream
  •  
    It is all about microprocessor and how powerful it is. According to this article, it concerns with Nokia mobile phones as the company develop so much on hardware, which lack in software nowadays. In the other hand, Apple provides a really good with software, because they are mostly useful and impressive. So, now it is quite hard for Nokia to fight against this advance of Apple.
anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

http://www.theregister.co.uk/2011/04/21/amazon_web_services_outages_spans_zones/ - 4 views

  •  
    brief april 28 jen
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. Amazon and companies using Amazon's cloud service 3. Identify one ITGS social/ethical concern in the article Reliability 4. Describe ITGS terminology and systems. The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones. Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud. Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers. Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance. http://aws.amazon.com/ 5. If possible, describe a solution to the concern (issue). A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
1 - 16 of 16
Showing 20 items per page