Skip to main content

Home/ Globaltech/ Group items tagged https

Rss Feed Group items tagged

anonymous

Google beefs up voice search with personal recognition - 5 views

  •  
    Describe the IT terms. march 29 jenny
  •  
    1.11_people_machines 3.2 _software
  •  
    1. Describe the IT terms. Patented - Granted and protected by rights. A patent is a set of exclusive rights granted by a state, national government, to the inventor for a limited period of time in exchange for a public disclosure of the invention. http://www.whatspatented.com/ http://arstechnica.com/gadgets/ Cloud-based - software systems that based on the cloud (internet) Voice recognition system- computer technology that uses audio input to enter data instead of a keyboard input. Audio input is carried through a connected microphone. The Software is designed to recognize words or phrases with an internal database. The program would then match the audio signature of speech with corresponding data in the database. http://www.wisegeek.com/what-is-voice-recognition.htm Cloud-based voice recognition - The voice recognition software the is important to virtual reality since it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. The audio signals are converted to electrical signals, and then transformed into coding patterns to which meanings have been assigned. Automated voicemail - Automatic voicemail system that stores voice messages. Goog-411 - an automated information service that uses voice recognition to find information for what the caller is asking for on local businesses. This also has a feature to send the information to the caller's phone via text messaging. Goog-411 has provided a foundation for Voice Search (search Google by speaking instead of typing, Voice Input (filling in any text field on Andriod by speaking), and Voice Actions (Controlling Android phones with voice commands). http://arstechnica.com/business/news/2007/04/google-rolls-out-free-411-service.ars Android - Google's mobile operating system (a modified Linux Kernal system). This is the software stack for mobile devices that include the operating system as well as the middleware along with key apps. http://code.goo
anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
anonymous

Libya turns off the Internet and the Massacres begin | ZDNet - 3 views

  • Now, though, realizing that they could no longer hide their abuses from a world a Twitter tweet away, the new model autocracies, such as Libya and Bahrain have realized that they need to cut their Internet links before bringing out the guns.
  • As in Bahrain, Libya’s Internet is essentially owned and controlled by the government through a telecommunication company Libya Telecom & Technology
  • Mobile phone services in Libya are also under the control of the government. So far though the government doesn’t seem to have cut international phone services off-perhaps because that’s harder to do without cutting off local telephone service.
  • ...1 more annotation...
  • “Should Libya block Internet traffic, as Egypt did, it will not affect http://bit.ly or any .ly domain.”
  •  
    Brief analysis march 1 natsuno
  •  
    Identify the area of impact the scenario relates to. Politics and government Identify the main stakeholders to the IT system. Libyan government, Libyan citizens, Libyan telecommunication company (Libya Telcom & Technology) 3. Identify one ITGS social/ethical concern in the article. Surveillance 4. Describe ITGS terminology and systems. Internet : a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange Bit.ly : URL shortening is a technique on the World Wide Web where a provider makes a web page available under a very short URL in addition to the original address. Top level domain : A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name. 5. If possible, describe a solution to the concern (issue). It is hard to suggest a solution basically because it is the government's decision to shut down the internet. Therefore the only way to solve this issue is to discourage dictatorship in Libya. Main reason for the shut down of the internet was the cooperation of Libya Telecom & Technology which is owned by the dictator's son.
anonymous

Hackers steal SSL certificates for CIA, MI6, Mossad - Computerworld - 13 views

  •  
    brief all sept 7 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Goverment 2. Identify the main stakeholders to the IT system. Mozilla, Google, DigiNotar, CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter, and Microsoft's Windows 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. SSL- Secure socket layer certificates used for transmitting private documents via the Internet. It creates an encrypted connection between your web server and you web browser that will protect transmitted private information from eavesdropping, data tampering, or message forgery. Man in the Middle- is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DigiNotar= DigiNotar is registered by the OPTA as a CSP that delivers qualified certificates that comply with the Dutch act on electronic signatures with respect to the European directive on electronic signatures. Sinces 2004 DigiNotar has entered the PKI hierarchy of the Dutch Government: PKIoverheid. This allows DigiNotar as Certificate Services Provider (CSP) to issue certificates complying with PKIoverheid specifications to government organisations. HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. 5. If possible, describe a solution to the concern (issue). Increase the security of the data for issuing a digital certificate to websites, and have updates of digital certificate periodically to check whether or not it has been compromised. Delete mo
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

Couchbase Offers NoSQL for IPhone | PCWorld Business Center - 1 views

  •  
    Explain: NoSQL non-relational database Explain the advantages of CouchDB's noSQL . May 9 soo
  •  
     Explain  NoSQL= NoSQL is a category of database engines that do not support the SQL (Structured Query Language) in order to achieve performance or reliability features that are incompatible with the flexibility of SQL. - http://stackoverflow.com/questions/4154635/what-is-nosql-what-is-purpose-of-nosql-where-can-i-get-sufficient-material-on-n  Non-relational database= a non-relational database developed by Damien Katz, now the chief technology officer for Couchbase. The company claims that Mobile Couchbase is the first non-relational, or NoSQL database, built for iOS. - http://stackoverflow.com/questions/202819/what-is-an-example-of-a-non-relational-database-where-how-are-they-used  Explain the advantages of CouchDB's noSQL - CouchDB and noSQL architecture has a number of advantages that make it attractive to iPhone applications developers, the company asserts. - CouchDB= Efficient use of working memory, Amount of storage space (takes up relatively minimal, under 20 megabytes download size limit imposed by many people CouchDB's NoSQL has advantages such as its synchronization capabilities with minimal coding. Data can be automatically synchronized across a network. The app can store data created on the phone itself, all the while also synchronizing the same data with a cloud service or a data center. The storage space taken up by CouchDB's NoSQL has efficient use of working memory. When it is embed in an app, it can still keep the app to be under the 20 mb download limit, and doesn't drain the battery.
  •  
    1. ITGS 2. NoSQL 3. iPhone 4. Network 5. Database
anonymous

Identity Theft Resource Center ITRC Fact Sheet 118 - 0 views

  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. may 9 cream
  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? It is about checking the validity of site certificates for guarantee myself that I sent sensitive information to real and Safety Company. Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? This action is when you see a green lock in the URL space of web browser such as hotmail.com, which it says about US privacy and stuff. Https codes help you know that you are transmitting via a safe system. If the padlock is open, do not transmit sensitive information! You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. It is best to ere on the side of caution and use encryption to not only protect the data but also protect yourself
  •  
    1.3 Privacy and anonymity 3.3 Networks 3.4 Internet 3.5 Personal and public communications
anonymous

Bangkok Post : Staying secure - 9 views

  •  
    Presentation: Explain the issue of mobile security. Provide a detailed explanation of how to provide mobile security. nov 14 champ az
  •  
    Mobile devices can be occupied by malware that are no longer only exist in the computer. With the growing population of smart phones, it also increases chance of getting viruses, worm, or Trojan. These viruses can invade by number in fonts, SMS or MMS messaging, downloadable content, public Wi-Fi or Bluetooth connections. Mobile malware can cause serious problems. They can drain your phone's battery very fast, delete your important information such as contacts or messages, and also it can destroy your phone's function completely. The worst thing it could do is to display your personal images online. How to provide mobile security? Use anti-virus software You can keep your mobile phone secured by using mobile security software such as Kaspersky Mobile Security. This software is a complete protection that will keep away malwares and block threatening network connections. It also has many features such as control of private contacts and phone numbers, blocking accession of other people, and an mobile phone locator application in case it get lost or stolen. Works Cited http://www.cellphonebeat.com/10-security-software-smart-phone.html http://linestechnology.blogspot.com/2011/06/overcoming-mobile-virus.html http://expertitgurus.blogspot.com/2011_05_01_archive.html
anonymous

China Tightens Electronic Censorship - NYTimes.com - 2 views

  • A host of evidence over the past several weeks shows that Chinese authorities are more determined than ever to police cellphone calls, electronic messages, e-mail and access to the Internet in order to smother any hint of antigovernment sentiment. In the cat-and-mouse game that characterizes electronic communications here, analysts suggest that the cat is getting bigger
  • LinkedIn, a networking platform, was blocked for a day during the height of government concerns over Internet-based calls for protests in Chinese cities a few weeks ago, he said
  • China’s censorship machine has been operating ever more efficiently since mid-2008, and restrictions once viewed as temporary — like bans on Facebook, YouTube and Twitter — are now considered permanent. Government-friendly alternatives have sprung and developed a following
  •  
    This is similar to the Google accuses China... article and will help with the answers. Describe VPN. How does a proxy work? List a proxy you find useful. When would you use a proxy? Explain: Google has "played a role in manufacturing social disorder". march 25 Azman
  •  
    Describe VPN. A VPN means virtual private network and what it does is that it send you data over the Internet in a secure connection. It travels packet over unprotected network in a secured manner. It provides you tunnel which secures your data and send it encrypted form over the Internet. How does a proxy work? By using a proxy the web browser window is then coded as part of the proxy site address and not the real website the surfer is visiting. Any information cached in the temporary folder is that of the proxy, not the users. This means the user is not traced at all and the information is kept hidden. Article Source: http://EzineArticles.com/3786946 List a proxy you find useful. Tor Trycatchme anonsafe When would you use a proxy? When you want to hide your IP from anyone. It is a good idea to use it while online shopping, accessing bank websites, and putting personal information. Explain: Google has "played a role in manufacturing social disorder". This means that Google has been the source of creating all the social disorder in the real world. Examples of these social disorders include the Libyan Protests as well as the Egypt Protests. These are named as social disorders. And Google, who feeds information to the various organizations and governments as well as provide social networking interfaces play a role in the community to communicate with each other in order to plan these social disorder events, such as the protests to overthrow the government.
anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

Google Consumer Surveys: How to create surveys - YouTube - 3 views

  •  
    Create and administer a consumer-like survey with google and administer it to the class then share the results. http://www.youtube.com/watch?NR=1&v=wxha6fNBDpk&feature=endscreen Pick a topic like: Choosing a phone or laptop. This is a team project. Team:  Palm Chut Tik  Champ April 11
  •  
    We need to pay if we want to create a survey. $100 is the minimum
anonymous

How Google could have made the Web secure and failed -- again | Common Sense Tech - CNE... - 1 views

  •  
    Describe IT Jason Oct 4
  •  
    Google have transfer you automatically to its "encrypted" service, one designed to prevent potential "eavesdropping" on your searches. Google have use SSL( secure socket layer) to protect your search. Is can also be use when you are logging on to your bank account online. Google have introduce the SSL search, with the SSL search you can do your searches on Google with more secure and you are in private so no one can see what are you searching. Before Google URL was HTTP/www.google.com but now it is HTTPS/www.google.com. Its secure now. Google have use SSL to help protect your data from unwanted access. So what you are connected to internet café, local hotspots or hotel your data will be secure. But Google is not responsible for any viruses you get over the internet searches. The SSL will only protect your personal information.
anonymous

Egypt, Internet access: Egyptian government restores Internet service - latimes.com - 6 views

  • bring down Egyptian government websites
  • Welcome back to the Internet, #Egypt. Well, except http://www.moiegypt.gov.eg — you stay down,"
  •  
    Wooh How might the internet be useful for the Egyptian citizens? What does it mean "bring down Egyptian websites"? Feb 4
  •  
    1. How might the internet be useful for the Egyptian citizens? Egyptian citizens, especially for the protesters, have organized the initial protests against the government online, through social media such as Facebook groups. The restored Internet would allow them to use to do so again and other citizens are now back to their computers and can have regular socialization online. A main ways of communication with the outside world as well as with themselves, Internet would allow the citizens to join together through websites on the internet to create groups that support what they think is best for them. In this case, they want a reelection from their current leader. 2. What does it mean "bring down Egyptian websites"? "Bring down Egyptian websites" means to stop access to those Egyptian websites through means such as having a DoS attack on the website. Also hackers can hack into the website and destroy the coding and content of the website and thus "bring down" the websites. Bringing down Egyptian websites can also mean that they are blocking all access to Egypt because there wouldn't be any portal into Egypt if all the Egyptian websites are brought down.
anonymous

http://insideitgs.ning.com/ - 1 views

shared by anonymous on 22 Feb 11 - Cached
  •  
    az wiki versus ning, or wikis linked to ning which is better especially compare to - http://itgsopedia.wikispaces.com/ march 1 look at some of the other itgs sites i am posting here on diigo to compare... and ideas for format also consider individual wikis linked to mother site or everything on one site What's more feasible and practical?
anonymous

BBC News - Facebook profile access 'leaked' claims Symantec - 3 views

  •  
    brief may 17 soo
  •  
    - Identify the area of impact the scenario relates to Home and Leisure, Business and e-commerce - Identify the main stakeholders to the IT system People who are using Facebook, Facebook Company and Application Company - Identify one ITGS social/ethical concern in the article Security, Privacy - Describe ITGS terminology and systems  Facebook Application= Apps on Facebook.com are web apps that are loaded in the context of Facebook. You can build your app using any language or tool chain that supports web programming, such as PHP, Python, Java or C#.Apps on Facebook.com are loaded into a Canvas Page. A Canvas Page is quite literally a blank canvas within Facebook on which to run your app. You populate the Canvas Page by providing a Canvas URL that contains the HTML, JavaScript and CSS that make up your app.  http://developers.facebook.com/docs/guides/canvas/  Symantec= Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.  http://kb.iu.edu/data/agzf.html - If possible, describe a solution to the concern (Issues) Facebook should enhance the security systems and authentication systems. User's personal information was leaked because they didn't work hard to manage transferring user's account to application systems. Therefore, it is better to enhance and put more effort to the transferring process.
anonymous

Bangkok Post : Simulation systems could help - 2 views

  •  
    Describe these IT systems: satellite imagery remote systems climate databases Explain how these systems help with forecasting. april 26 soo
  •  
     Satellite imagery Photograph of Earth or other planets made by means of artificial satellites Sources: http://en.wikipedia.org/wiki/Satellite_imagery  Remote Systems System which may be connected to by a local computer by using a modem or network Sources: http://dictionary.babylon.com/remote_system/  Climate databases Climate databases can predict risk coverage areas by simulating water flows and rain density, with geo-informatics applied to estimate how many households could face damage  Explain how these systems help with forecasting By these systems, people can find out the wind flow, geology issues easily and fast. If these systems are developing, the false information will be eliminating. Also it can help authorities evaluate damage more efficiently. Systems using satellite imagery, remote sensing, climate databases and high computing power can predict risk coverage areas by simulating water flows and rain density, with geo-informatics applied to estimate how many households could face damage.
  •  
    1. ITGS 2. Simulation 3. Systems 4. Modeling simulations 5. Database 6. computer 7. network
anonymous

http://www.theregister.co.uk/2011/04/21/amazon_web_services_outages_spans_zones/ - 4 views

  •  
    brief april 28 jen
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. Amazon and companies using Amazon's cloud service 3. Identify one ITGS social/ethical concern in the article Reliability 4. Describe ITGS terminology and systems. The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones. Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud. Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers. Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance. http://aws.amazon.com/ 5. If possible, describe a solution to the concern (issue). A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
kittinat chitpluem

How to build a mineral oil PC - 1 views

  •  
    check this out! You can see all information here: http://www.pugetsystems.com/submerged.php
Chut Sanghiran

BBC News - The 'eye-tech' future of vision - 7 views

  •  
    What are the benefits of this technology? What are the disadvantages?
  •  
    We selected this Article, because it's essential to be up to date these centuries. This kind of technology would be useful in many types of ways. This future technology piece may be able to lead us to the next generation of technology.
  •  
    In case the video does not work. http://www.youtube.com/watch?v=pzLrRUuaMe4
1 - 20 of 496 Next › Last »
Showing 20 items per page