Skip to main content

Home/ Globaltech/ Group items tagged home

Rss Feed Group items tagged

anonymous

Bangkok Post : Cloud services open up business opportunities - 1 views

  •  
    What does cloud computing deal with? Describe each of the characteristics cloud services must have. Explain horizontal and vertical services. Define each layer of services. Explain the infrastructure capability terms. Why is bandwidth important? march 17 cream
  •  
    What does cloud computing deal with? Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications. Describe each of the characteristics cloud services must have. Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them. Fstandard user interface - Web browsers to have access to the cloud services. Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human. Fservice metering - The Charge of the usage of the cloud services. Faccess over the internet - The medium of having access to the internet, as well as other places over the internet. Explain horizontal and vertical services. Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example. Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used. Define each layer of services. Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere. Why is bandwidth important? Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
  •  
    1.5 Intellectual property 2.5 Home and leisure 3.3 Networks 3.4 Internet 3.7 Databases
anonymous

BBC News - Facebook profile access 'leaked' claims Symantec - 3 views

  •  
    brief may 17 soo
  •  
    - Identify the area of impact the scenario relates to Home and Leisure, Business and e-commerce - Identify the main stakeholders to the IT system People who are using Facebook, Facebook Company and Application Company - Identify one ITGS social/ethical concern in the article Security, Privacy - Describe ITGS terminology and systems  Facebook Application= Apps on Facebook.com are web apps that are loaded in the context of Facebook. You can build your app using any language or tool chain that supports web programming, such as PHP, Python, Java or C#.Apps on Facebook.com are loaded into a Canvas Page. A Canvas Page is quite literally a blank canvas within Facebook on which to run your app. You populate the Canvas Page by providing a Canvas URL that contains the HTML, JavaScript and CSS that make up your app.  http://developers.facebook.com/docs/guides/canvas/  Symantec= Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.  http://kb.iu.edu/data/agzf.html - If possible, describe a solution to the concern (Issues) Facebook should enhance the security systems and authentication systems. User's personal information was leaked because they didn't work hard to manage transferring user's account to application systems. Therefore, it is better to enhance and put more effort to the transferring process.
anonymous

BBC News - Facebook works with Websense to add phishing safety net - 12 views

  •  
    brief all oct 10 nat
  •  
    1. Identify the area of impact the scenario relates to. Home, business 2. Identify the main stakeholders to the IT system. Facebook, Websesnse, Facebook users, Malicious web developers 3. Identify one ITGS social/ethical concern in the article. Reliability 4. Describe ITGS terminology and systems. URL: llows all resources on the internet to be located in a uniform manner. A URL is a website address that has all the pertinent information for finding the exact location attached to it. (E.g.WWW.facebook.com) Database-driven: Web pages that store information in their database. Phishing: Tricking Internet users into providing personal data for malicious or fraudulent use.
anonymous

iPhone Tracking Only Tip Of Security Iceberg -- InformationWeek - 1 views

  •  
    Explain what the following means: Miriam Wugmeister, chair of the global privacy practice at law firm Morrison & Foerster, echoes that assessment and stresses than employers should make it clear to employees that they can't expect privacy using corporate devices. While she observes that allowing employees to backup personal devices containing corporate data on a home computer could pose an e-discovery problem in the event of litigation, she also says there are good technical solutions that allow corporate IT administrators to create sandboxes that segregate personal and corporate communications. april 28 woo
  •  
    incomplete
anonymous

Apple named 'least green' tech company | Environment | guardian.co.uk - 0 views

  •  
    Why does apple rank low for being green? Which companies are fairly green? Why don't companies want to disclose their energy consumption? Is cloud computing green? Determine if use of IT often reduces environmental impacts or not. april 28 nat
  •  
    Why does apple rank low for being green? Because of their huge electricity consumption and the increase in their consumption in a new facility, which consumes approximately the same amount of electricity 80,000 US homes. Which companies are fairly green? Yahoo, Google and Amazon. Why don't companies want to disclose their energy consumption? They don't want others to know what they did or what they had to do to reach to the position they are in now. Is cloud computing green? No, it's not green as it already accounts for approximately 2& of the world's electricity consumption, and it is predicted that it will rise. Determine if use of IT often reduces environmental impacts or not. Yes it does, because if something was electronically saved, it can save paper. Moreover, It has been said that there are less carbon emissions produced when music is downloaded of the web, rather than bought in CD stores, because you don't need to use CDs.
anonymous

Identity Theft Resource Center ITRC Fact Sheet 102 - 0 views

  •  
    Select and list 5 guidelines you think are reasonable. May 9 az
  •  
    * Provide cross-cut paper shredders at each workstation or cash register area or uses a locked wastebasket and shredding company for the disposal of credit card slips, unwanted applications or documents, sensitive data or prescription forms. * Use an alternate number instead of Social Security Numbers (SSN) for employee, client and customer ID numbers. * Encrypt or password protect all sensitive data stored on computers and allow access only on a "need-to-know" basis. * Notify consumers and employees in advance as to the purposes of the data collection, to whom it will be distributed and the subsequent use after the fulfillment of the original purpose. * Keep sensitive information of consumers or employees on any item (timecards, badges, work schedules, licenses) out of view in public areas. That may include home addresses or phone numbers, SSN and driver's license numbers.
anonymous

BBC News - BT given 14 days to block access to Newzbin - 9 views

  •  
    brief all oct 31 cream
  •  
    1. Identify the area of impact the scenario relates to. Business, Home and Leisure 2. Identify the main stakeholders to the IT system. UK Telco BT, NewBinz2 pirate link sharing website and users, MPA (Motion picture association) 3. Identify one ITGS social/ethical concern in the article. Intellectual property 4. Describe ITGS terminology and systems. ISP - Internet Service Provider, is a company that collects monthly or yearly fee in exchange for providing the subscriber with Internet Access. The Terms of Service contract of the ISP will also state rules about hacking, protecting copyrighted materials, denial of service attacks, harassing other people, spam compromising the service, and many other issues. These are as much for the legal protection of the ISP as to let potential subscribers know what the ISP will and will not tolerate. 5. If possible, describe a solution to the concern (issue). NewBinz pirate link sharing website is essential site for various users who wish to download illegally copied materials. However, this action concerns as infringe laws and copyright among policies. Thus, This is why NewBinz would be permanently block by ISP. However, the fact is that online users are very active so the creative industries should maintain about this not just blocking the sites.
gwansik96

Malaysia: Interpol passport checks too time-consuming; Interpol: Wrong - 0 views

  •  
    Two passenger who are from Iranian used fake passport to board on the flight 370. Malaysiann home minister Datuk Seri Ahmad said that using Interpol's Stolen and Lost Travel Documents (SLTD) database might have slowed down the process of immigration checks at airport counters. He said the country's immigration's equipment couldn't handle the global database of 40.2 million lost passport. Later on Interpol fired back by saying that do not blame on technology or Interpol. SLTD database takes just seconds to reveal whether a passport is listed, with recent test providing results in 0.2 second. Also Interpol mention that US using more than 230 million times, UK using more than 140 million times, UAE using more than 100 million times, Singapore using 29 million times, none of the countries have complained about the time.
anonymous

BBC News - Smart home kit proves easy to hack, says HP study - 4 views

  •  
    Explain why this is a security issue.
anonymous

BBC News - How to hack and crack the connected home - 1 views

  •  
    Describe three examples of IoT hacks.
‹ Previous 21 - 30 of 30
Showing 20 items per page