Skip to main content

Home/ Globaltech/ Group items tagged news

Rss Feed Group items tagged

anonymous

Social Media News and Web Tips - Mashable - The Social Media Guide - 1 views

  •  
    What is mashable about? march 23 woo
  •  
    Mashable is the top source for news in social and digital media, technology and web culture started by Pete Cashmore back in July 05. With more than 40 million monthly page views, Mashable is the most prolific news site reporting breaking web news, providing analysis of trends, reviewing new websites and services, and offering social media resources and guides. The site contains various news update blogs in the social media, tech & Gadegets, business & marketing, areas as well as video mobile, dev & design, media, social good, and startups categories.
anonymous

Q&A: Google to Dig Deeper Into Users' Lives - ABC News - 9 views

  •  
    How will Google's privacy changes affect users? Explain the reasons for making the changes. Is there a way to prevent Google from combining the personal data it collects from all its services? Explain the users major complaint about Google's new privacy policy? How could the government regulate google's privacy changes?  all March 6 chut
  •  
    How will Google's privacy changes affect users? - When you are logged into Google, the data that you search into its search engine can be culled to suggest videos for you on YouTube. If you use Google Docs, Google will alert you if you misspelled your friends' names or co-workers' names. Google will collect information from its devices that you use to empower the company to connect the dots from one service to another. Explain the reasons for making the changes. - Google wants to make use of all of its companies that they own. Plus all the data that they collect from their users worldwide. Google wants to use their services to its full potential. They want to tell their users that they are not drawing the users' profiles for their profit only. Is there a way to prevent Google from combining the personal data it collects from all its services? - No there are no ways to prevent Google from combining the data that Google collects from its services. Unless you are not logged on to one of Google's products. Even if you are not logged onto one of Google's services Google can still keep track of you by your IP address instead of your name. if you are logged on and you do not wish to be tracked you can delete your browsing history. Explain the users' major complaint about Google's new privacy policy legal? - The users are not allowed to consent to or reject this new privacy policy. Each users have different setting for their privacy so this new change will not allow the users to use different set of rules. How could the government regulate Google's privacy changes? - The government is carefully looking over Google when it comes to handling personal information of the people. Google settled this argument with the governemtn when Google made a mistake by exposing their client's email accounts. Google's handling over personal information will be audited every other year and they are not allowed to make changes that are misleading or deceptive.
anonymous

Why Did Newspapers Take So Long to Copy Groupon? - BusinessWeek - 3 views

  •  
    brief analysis Make sure to describe major terms, like groupon and livingsocial. march 7 woo
  •  
    1. Identify the area of impact the scenario relates to. Business, E-commerce 2. Identify the main stakeholders to the IT system. Online Newspaper companies, newspaper subscribers 3. Identify one ITGS social/ethical concern in the article. Globalization 4. Describe ITGS terminology and systems. - Groupon: a deal-of-the-day website that is localized to major geographic markets worldwide. Launched in November 2008, the first market for Groupon was Chicago. - LivingSocial: an international social buying company based in Washington, D.C. They specialize in daily deals offered in cities across the United States, as well as in Canada, Europe and Australia. - TimeLiimited: is a service just like Groupon, which emails its readers on special offers for travel and living terms The New York Times newspapers are going to start using the internet, and connection of the companies to its subscribers for a fee to their advantage, even though there is a slim chance now. It is the spread of public communication of news, the latest trends, and discounts to events and merchandise while connecting directly to personal communication means of its subscribers (through their e-mails). 5. If possible, describe a solution to the concern (issue). Straightforward copying Groupon is not the answer for the success online. The New York times might be able to have a chance against Groupon and LivingSocial, but these two big groups have already topped the business of connecting companies with deals to its customers and subscribers for a fee. The companies should be able to manage connection between merchants and their customers. The New York Times would have to come up with special deals that appeal to users, such as a subscription discount, so on, and so forth to grab customers' attention from Goupon and LivingSocial to the New York Time's TimesLimited. The process involves sending people e-mail offers and discounts from companies and service providers, then charging a fee for
Avik Bag

Apple, Facebook and Others Team Up To Launch New Web Standards Website - 1 views

  •  
    The new web standards
anonymous

Twitter tired? Fatigued with Facebook? Try a new network - 11 views

  •  
    Would you try a new network? all feb 10 nat
  •  
    Personally I wouldn't try new networks, unless I have friends there. A lot of my friends are focused on Facebook, and I don't mind sharing my content with people I am friends with, as I usually decline requests from strangers, and are friends with people who I actually know or have mutual friends. However, I wouldn't mind giving Pinterest a go, as I think it sounds interesting, and also it sounds like Tumblr, which I like a lot, because we can share images with people with the same interest.
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
Tick Kanjanamaneeroj

Tablets expected to become preferred computing device | Apple - CNET News - 4 views

  •  
    Why do people prefer tablet more than PC ? What advantages of tablet that PCs don't have?
  •  
    Selected Article Tablet is becoming more and more popular so it is important for us to know the advantages of this device that a Laptop doesn't have and why is is so popular among users.
Jang Han

BBC News - 3D images of tissue may help spot and treat cancer - 7 views

  •  
    Describe how 3D images helps the treatment of cancer. Who will benefit from this new technology?
  •  
    We assume that this article is very important to the society. This Article demonstrates how technology can cure diseases that never can be cured in the previous time. It also will show how necessary the society needs the technology.
Paulo Moacyr

BBC News - Nokia accuses Apple of Siri bias over smartphone answer - 0 views

  •  
    How does this affect the business of Nokia?
  •  
    Strands?
anonymous

BBC News - 'Europe's biggest' free wi-fi zone set for London - 8 views

  •  
    Describe 3 benefits and 1 issue with this system. all jan 17 champ
  •  
    3 Benefits 1. Tourists came London to see the Olympics, they can share updated news and pictures with friends by using free WiFi connection 2. Free WiFi connection may reduce communicating cost because overseas calls are very expensive. 3. London will become a world-class city by providing fast, reliable, and free WiFI connection for people. 1 Issue The disadvantage is that if so many people use WiFi, malware can be easily spread through the signal. It may be difficult to find out who cause it.
anonymous

Google Keeps Searches Fresh With Algorithm Update | News & Opinion | PCMag.com - 14 views

  •  
    Why did Google improve its search algorithm? all nov 9 Kong
  •  
    Google improved its search algorithm so they can stay up-to-date. Since that information is travels very fast with the internet, Google will need to keep the information on their search engine fresh. Its new algorithm update will prioritize most recent news about the current events, latest sports results, and most recent information.
anonymous

BBC News - Trendnet security cam flaw exposes video feeds on net - 6 views

  •  
    How was the system hacked? Describe possible solutions. all feb 13 hyojeon
  •  
    How was the system hacked? - Shodan search engine which specializes in finding online devices that could be used to discover cameras vulnerable to the flaw. - People set the camera with an own password, it video stream became accessible to anyone who typed in the correct net address. This consisted of the user's IP address followed by an identical sequence of 15 characters. The camera captures people password and IP address. This will invade camera users' privacy. Describe possible solutions. - The Trednet has to foster its network system and try to do their security system that they have to make new firmware and update which resolves the vulnerability of its cameras.
jasonkerr

Kibot the robot entertains kids, spies on them - 0 views

  •  
    AI Rock Summary Answer here :)
  •  
    Korean children, already fast becoming a robot-friendly lot, have a new companion in Kibot, a monkey-faced bot that can read fairy tales, sing songs, take pictures, and make video calls via a display embedded in its tummy. It is like a robot that will keep children accompany, Kibot, which runs on a rechargeable battery and is manufactured by iRiver, has plenty of other tricks up its sensor-enabled sleeves, too. It responds to gestures, like pats, by turning and pleasantly saying, "It feels good." When it encounters an obstacle, it can change direction to avoid it. It can take pictures and record and play back customized voices. It even serves as a language tutor for Korean and English. About the only things it doesn't do, seemingly, are scratch its head and swing from branch to branch.
anonymous

The New Media Literacies - YouTube - 0 views

  •  
    "New Media Literacies" presentation ni and sand aug 27
anonymous

Egypt's net ruled by phone, not kill switch > DDoS > Vulnerabilities & Exploits > News ... - 4 views

  • Google operated a crisis response page and a "Speak to Tweet" service that allowed Egyptians to communicate online via voice telephone in the face of the internet blackout. Others, like net activist group Telecomix, were monitoring amateur radio channels and provided virtual private networks and proxies to Egyptian activists who required online anonymity.
  •  
    Feb 8 Ginnie What did people use when the net was down?
  •  
    1.7_surveillance 2.6_gov_control_use_info 3.4_internet
  •  
    The people used voice telephone to communicate with each other while the net was down. Amateur radio channels and virtual private networks and proxies were provided and used by Egyptian activists in order to communicate with each other.
anonymous

WikiLeaks Julian Assange Arrested in London: Is it a Conspiracy? - 4 views

  •  
    High cholesterol milk Feb 8 Who is Julian? What is wikileaks? Describe cyber attacks. How did politics impact wikileaks? How did wikileaks fight back?
  •  
     Who is Julian? - Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.  What is WikiLeaks? - WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.  Describe cyber attacks - A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.  How did politics impact WikiLeaks? - Protect citizens from knowing the secrets about politics - They keep find track on information -  How did WikiLeaks fight back? - Protesting way back Julian being treated (Letting attacks to each other)
  •  
    1.5 Intellectual property 1.9 Policies 2.6 Politics and government 3.5 Personal and public communications
anonymous

SecurID Company Suffers Security Breach - NYTimes.com - 1 views

  •  
    brief march 29 kuninari
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to the company who are selling product on security to the other company that need a security, and they got suffered. Business 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system are company and government who uses secuID 3. Describe one ITGS social/ethical concern in the article. The Data Breach in this article refers to their security system data being violated by an outside offender, such as it being stolen or copied when it's not supposed to be. The advanced cryptographic system is the security system that has an extra layer of security by an electronic token authenticator that generates a time-based number for the users to input while logging in with their password. It is suspected that the master key for the encryption algorithm was stolen, which is the huge secret number that is part of the system. 4. Describe ITGS terminology and systems. SecurID- a mechanism developed by RSA Security for performing two-factor authentication for a user to a network resource 5. If possible, describe a solution to the concern (issue). The solution for this issue is to update the security system often and try to get against from hackers. Having SecurID make up a new algorithm to be used for the system could reinforce the system's security again, if it's possible to make up a new algorithm. Other than that, SecurID would probably have to make up a whole new security system since their current stolen algorithm is probably going to be published and recopied, and the system not secure anymore.
anonymous

BBC News - TalkTalk offers centralised website blocking - 2 views

  •  
    Describe talktalk. What is new about talktalk's way of blocking sites? Explain 3 possible problems with the system. may 17 nat
anonymous

BBC News - Apple acts on iPhone tracking bug - 1 views

  •  
    How does apple propose to solve the tracking program? Describe two examples of data tracking services that people use. Do you think privacy is still an issue with phones and apps? May 17 cream
  •  
    1. How does apple propose to solve the tracking program? Apple released newly developed software that cuts the amount of stored data to just a week and no longer transfer it to the owner's computer when the phone is connected. And if users disable the location services setting on their iPhone or iPad, it will stop collecting data completely. 2. Describe two examples of data tracking services that people use. - Foursquare: Foursquare is a location-based social networking website based on software for mobile devices. - Mobile Me: Mobile Me automatically pushes new email, contacts, and calendar events to your iPhone, Mac, and PC. So your devices always stay in perfect sync. 3. Do you think privacy is still an issue with phones and apps? Of course yes because mobile devices are connected to networks for all the time in order to access to files and media. Privacy is always going to be an issue with phones and apps because even though Apple is storing data for shorter time, the stored data can be used or leaked anytime when threats attack.
  •  
    1.1_reliability_integrity 1.3_privacy_anonymity 2.5_home_leisure 3.1_hardware 3.2 _software 3.3_networks 3.4_internet
1 - 20 of 171 Next › Last »
Showing 20 items per page