Skip to main content

Home/ Globaltech/ Group items tagged of

Rss Feed Group items tagged

anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

Unmanned aerial warfare: Flight of the drones | The Economist - 7 views

  •  
    Summarize m12 nov 2 az
  • ...1 more comment...
  •  
    On September 30th, a missile strike launched from a UAV killed Anwar al-Awlaki, al-Qaeda's most effective propagandist. This was an example of how the UAV are changing today's combat. These babies are equipped with sophisticated sensors and carry Hellfire missiles and laser-guided bombs. There may not be a man in the cockpit, but each Reaper UAV requires more than 180 people to keep it flying. A pilot is always at the controls from a ground control unit and another officer operates its sensors and cameras. UAV have become the weapon of choice over the past decade. Theres not a month that passes without reports that an al-Qaeda or Taliban leader has been killed by UAVs. There are more hours flown by America's UAS than by its manned fighter jets and more pilots are being trained to fly them than their manned equivalents. The frequency of drone stikes on terrorists in Pakistan has rose from one every 40 days to one every four days under Obama's admin. The UAV's ability to loiter for hours, minutely observe human activities while transmitting full motion video to its ground crews and can strike with pinpoint accuracy has made it the essential weapon in America's war on terrorism. Drones come in many different shapes and sizes. Predators and Reapers are the larger and more popular ones. Some are micro sized devices that imitate a bird used for eavesdropping or a mid sized plane that can be hand launched by soldiers to tell them what is happening over the hill. The medium sized UAVs would be able to defend airspace against enemy intrusion to attacking enemy air defenses. The largest UAV would operate as airborne warning and control, aerial refueling tankers, lift transports and long range bombers. The next generation of drones will also have AI, which allows them to shoot to kill. The UAS are used for "dull, dirty, dangerous, difficult or different" tasks. These tasks include surveillance missions requiring time and a degree of persistence that crews of
  •  
    manned aircraft couldn't provide. Also, UAS could be used to fly in to observe or take samples after a chemical or biological attack. Any missions too dangerous for manned aircraft will be taken care of by the UAV. UAV have other advantages over manned aircraft as they have more detailed information about their targets, their strikes are more accurate and cause fewer civilian casualties. They are also cheaper and smaller. Since they have no pilot, the space could be used for fuel and thus they can fly much longer than manned aircraft. Without the need to accommodate crew, drone can be given radar-cheating stealthy shapes and can maneuver better. There are however a problem afflicting the drones as they depend on two-way satellite communications. If the datalink is broken the remote pilot will lose control of the aircraft. For missions requiring constant oversight, the vulnerability to electronic jamming or a direct attack on a communications satellite is a huge problem. Another problem is that the dones has a slight delay between the remote pilot and the aircraft. To reduce latency, small, solar, or laser powered ultra long endurance drones can form a chain in the sky along which satellite signals can be bounced. To reduce the workload on pilots, big UAV can take off and land automatically. The US Air Force plans to have a pilot operating up to four drones at a time. Civil liberty advocacy groups have raised concerns about targeted killings by drones. Bus as long as a UAS pilot can trust data from remote sensors, he or she should be able to make a proper assessment the same ways as the pilot of a manned aircraft. UAS pilot will be in a better position to do so since he or she will have more time to assess the situation accurately and not be exhausted b the physical battering of flying a jet.
  •  
    Allowing the UAV to fire a weapon based entirely on its own data analysis raises a lot of ethical problems. Using UAV to kill enemies thousands of miles away is like a cowardly action of a bully sheltering behind superior technology. There are fears that UAS will lower the political threshold for fighting and an essential of restraint will be removed. Drones make leaders fonder of war.
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
Alex Lenk

The science and technology of air traffic control | Ars Technica - 6 views

  •  
    Da Woon November 1st  Describe the IT system
  •  
    This article tells us the air traffic controller (ATC) which helps us to have safe fly. ATC has access to sophisticated radar systems that provide an overview of the airspace they control, and they have communication tools to coordinate flight paths with the air crew. When the aircraft travel at higher speed than common modes of transport, the time available for pilots to react to a dangerous situation can be quite short. And ATC helps to aircraft approaching an airfield carefully and it checks the weather conditions for prevent pilots can't see other aircraft. ATC uses radar systems positioned at ATC facility to get a real time overview of the aircraft flying in the airspace they control. Many types of radar equipment are served for traffic on the ground. Primary Surveillance Radars (PSR) - The radar sends a directed pulse into the atmosphere, and when that pulse encounters an object it gets reflected back to the radar station. The bearing of the object with respect to the radar station and its approximate distance can be calculated by this. The radar is typically enclosed in a dome to protect it from adverse weather. Secondary Surveillance Radars (SSR) - the Secondary Surveillance Radar listens for messages from the aircraft's transponder. The radar rotates about the vertical axis, but transmits a specific signal on 1030 MHz. This signal is subsequently received by the aircraft's onboard transponder, which responds with a reply on 1090 MHz. SSR Modes - There are different modes of interrogation that compliant transponders respond to. A - The transponder responds with its squawk code, a unique identifier for the aircraft assigned by ATC comprising of four octal numbers. This code enables ATC to differentiate between the various aircraft being monitored, though it can also be used to discretely communicate the existence of an emergency situation onboard the aircraft. C - the transponder responds with the aircraft's pressure altitude, which is the altitude ab
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
anonymous

Electronic Security a Worry in an Age of Digital Espionage - NYTimes.com - 10 views

  •  
    List the precautions Mr. Lieberthal takes when visiting China. Define digital espionage. Why is it easy to steal information remotely? How was the US Chamber of Commerce hacked? Explain the reason for thwarting the cybertheft of trade secrets. all feb 16 soo paulo
  •  
    List the precautions Mr. Lieberthal takes when visiting China. * He leaves his cellphone and laptop at home. * He brings "loaner" devices. * He erases information before and after the trip. * He disables Bluetooth and Wifi. * He turns off his phone, and takes the battery out. * He only connects to the internet through an encrypted password protected channel. * He copies and pastes his password from a USB. Define digital espionage. Digital Espionage - The spying on digital information including corporate secrets and government secrets. These secrets are stored as digital data, and can be spied on and stolen. Why is it easy to steal information remotely? Because digital devices today are mostly connected to an internet network, and through this network, information can be stolen remotely if the hacker is able to hack into the system. Smart phones and digital personal devices are very common today. These devices are connected into workplace networks and carry information around. Hackers are able to hack into these devices and get onto the corporate network and steal information. How was the US Chamber of Commerce hacked? The US Chamber of Commerce was hacked through four of their employees, Asia policy experts' devices who travelled frequently to China. The Chamber's office digital devices including its printer and thermostat had a connection to an internet address in China. Through these remote connections to the digital devices, China could penetrate the inside information of the Chamber. Explain the reason for thwarting the cybertheft of trade secrets. Thwarting the cybertheft of trade secrets is to the benefit of the owner of those trade secrets. If cybertheft of trade secrets is not prevented, then other corporations would be able to use stolen trade information to their benefit, and possibly come out with the same product with slight modifications in order to gain more profit from other companies' ideas. This would also ruin the product
anonymous

Corporate computing: Online reputations in the dirt | The Economist - 2 views

  •  
    Explain the issues that are in common with both Amazon and Sony? Explain the reasons that cloud computing will continue to grow? What could have prevented Sony from getting hacked? Describe: Rambo architecture Chaos monkey Explain the reason that data centers for cloud computing need backups? may 9 woo
  • ...1 more comment...
  •  
    incomplete
  •  
    1. Explain the issues that are in common with both Amazon and Sony? Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people. 2. Explain the reasons that cloud computing will continue to grow? Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself. 3. What could have prevented Sony from getting hacked? Sony could have increased its protection system, as well as create random simulations in orde
  •  
    Tags: 1.1 Reliability and integrity 1.2 Security 3.3 Network
anonymous

Bangkok Post : Cloud services open up business opportunities - 1 views

  •  
    What does cloud computing deal with? Describe each of the characteristics cloud services must have. Explain horizontal and vertical services. Define each layer of services. Explain the infrastructure capability terms. Why is bandwidth important? march 17 cream
  •  
    What does cloud computing deal with? Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications. Describe each of the characteristics cloud services must have. Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them. Fstandard user interface - Web browsers to have access to the cloud services. Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human. Fservice metering - The Charge of the usage of the cloud services. Faccess over the internet - The medium of having access to the internet, as well as other places over the internet. Explain horizontal and vertical services. Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example. Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used. Define each layer of services. Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere. Why is bandwidth important? Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
  •  
    1.5 Intellectual property 2.5 Home and leisure 3.3 Networks 3.4 Internet 3.7 Databases
anonymous

Couchbase Offers NoSQL for IPhone | PCWorld Business Center - 1 views

  •  
    Explain: NoSQL non-relational database Explain the advantages of CouchDB's noSQL . May 9 soo
  •  
     Explain  NoSQL= NoSQL is a category of database engines that do not support the SQL (Structured Query Language) in order to achieve performance or reliability features that are incompatible with the flexibility of SQL. - http://stackoverflow.com/questions/4154635/what-is-nosql-what-is-purpose-of-nosql-where-can-i-get-sufficient-material-on-n  Non-relational database= a non-relational database developed by Damien Katz, now the chief technology officer for Couchbase. The company claims that Mobile Couchbase is the first non-relational, or NoSQL database, built for iOS. - http://stackoverflow.com/questions/202819/what-is-an-example-of-a-non-relational-database-where-how-are-they-used  Explain the advantages of CouchDB's noSQL - CouchDB and noSQL architecture has a number of advantages that make it attractive to iPhone applications developers, the company asserts. - CouchDB= Efficient use of working memory, Amount of storage space (takes up relatively minimal, under 20 megabytes download size limit imposed by many people CouchDB's NoSQL has advantages such as its synchronization capabilities with minimal coding. Data can be automatically synchronized across a network. The app can store data created on the phone itself, all the while also synchronizing the same data with a cloud service or a data center. The storage space taken up by CouchDB's NoSQL has efficient use of working memory. When it is embed in an app, it can still keep the app to be under the 20 mb download limit, and doesn't drain the battery.
  •  
    1. ITGS 2. NoSQL 3. iPhone 4. Network 5. Database
anonymous

Google beefs up voice search with personal recognition - 5 views

  •  
    Describe the IT terms. march 29 jenny
  •  
    1.11_people_machines 3.2 _software
  •  
    1. Describe the IT terms. Patented - Granted and protected by rights. A patent is a set of exclusive rights granted by a state, national government, to the inventor for a limited period of time in exchange for a public disclosure of the invention. http://www.whatspatented.com/ http://arstechnica.com/gadgets/ Cloud-based - software systems that based on the cloud (internet) Voice recognition system- computer technology that uses audio input to enter data instead of a keyboard input. Audio input is carried through a connected microphone. The Software is designed to recognize words or phrases with an internal database. The program would then match the audio signature of speech with corresponding data in the database. http://www.wisegeek.com/what-is-voice-recognition.htm Cloud-based voice recognition - The voice recognition software the is important to virtual reality since it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. The audio signals are converted to electrical signals, and then transformed into coding patterns to which meanings have been assigned. Automated voicemail - Automatic voicemail system that stores voice messages. Goog-411 - an automated information service that uses voice recognition to find information for what the caller is asking for on local businesses. This also has a feature to send the information to the caller's phone via text messaging. Goog-411 has provided a foundation for Voice Search (search Google by speaking instead of typing, Voice Input (filling in any text field on Andriod by speaking), and Voice Actions (Controlling Android phones with voice commands). http://arstechnica.com/business/news/2007/04/google-rolls-out-free-411-service.ars Android - Google's mobile operating system (a modified Linux Kernal system). This is the software stack for mobile devices that include the operating system as well as the middleware along with key apps. http://code.goo
Woogyeong Jung

The changing landscape of online fraud: Long life spam | The Economist - 2 views

  •  
    article analysis march 25 soobin
  •  
    1. Identify the area of impact the scenario relates to. -- Leisure, Business 2.Identify all ITGS terminology and phrases (IT and Social/Ethical) -- Twitter, Trojan, Facebook, E-mail spamming, Botnet, messaging service, social inbox, spam, e-mail, networks, online-security firms, junk e-mails, blacklisted addresses, output, domain names, .cn, internet registrars, fraud, web-hosting, cybercrime, hard drives. 3.Describe one ITGS social/ethical concern in the article. --Security is a concern in this article where users and spam is concerned. The security of the users' sensitive information is at risk when users click on spam links no matter from what source, from e-mails (which are decreasing now) to Twitter tweet links. By clicking onto these harmful links, users set free spam that can infiltrate the user's hard drive in search for sensitive information for example bank account numbers. 4.Describe the relationship of the main stakeholders to the IT system. ---The main stakeholder will be hackers and people who are using e-mail and social networking. The relationships between them are, normally hackers used spam mail to spend virus or hack their computer with Trojan horse, but as the email security develop hackers slowly moved to social network which is Facebook, and other many programs. They know that people are currently using social networking a lot and their privacy is open and they could easily get people's email too. Therefore by using Koobface, they could hack people's computer and information 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. -- The problem with the security is that the security of the users of their personal and public communications are at risk where spam is concerned. Spam is nowadays being planted in almost every corner of the internet, no matter where, in order to try and trick users into clicking on the harmful links in order to spread malware, such as Trojans. Spam is comm
Natsuno Yoshida

IBM supercomputer wins first Jeopardy dust up - Computerworld - 1 views

  •  
    Explain how Watson can mimic human intelligence. Watson mimics human intelligence by going through the same process humans do in order to find an answer. Watsons can comprehend clues and pieces of information, analyze the information that is given, and come up with an answer to the problem. Explain the ways that computers can rival a human in answering questions. Computers are systematic machines. Humans, can also be, but in a less precise manner. Thus, computers that are given the same amount of information, and have access to a lot of background knowledge can possibly rival humans in answering questions because of the systems' advantage of sorting out pieces of information and analyzing it digitally. Humans depends on their brains, and not knowing whether they really do, or how much they analyze the data correctly or not. A computer's digital system can come up with a number of possibilities precisely and thus calculate the best conclusion to the question. Explain the ways AI can impact personal lives. With the help of AI, human needed jobs such as diagnosing problems and illness, self-service centers, and information center tasks can be given to the AIs. Also, this can enhance humans personal lives by offering the humans an extra helping hand, that isn't as emotional as humans, and can be just as effective as well as useful, albeit the cost will be very high. Why was Jeopardy a good challenge? Jeopardy is a good challenge because of the structure of the Jeopardy game itself. The game itself only provides sly clues, riddles mixed with sarcasm and irony. Humans can detect such facts in the clues, but for a machine, as well as the system to be able to recognize these clues as well as reading in between the words to understand the meaning for an answer is a challenge. The system would have to be taught the same way humans are taught to notice such abnormalities of the hints. This is harder to teach an AI since it doesn't follow the same path of instruction
anonymous

http://www.macobserver.com/tmo/article/japanese_publishers_cry_foul_on_pirated_app_stor... - 6 views

  •  
    brief march 23 woo
  •  
    1. Identify the area of impact the scenario relates to. - Business and employment 2. Identify the main stakeholders to the IT system. - JBPA, The Japanese Magazine Publishers Association, the Electronic Book Publishers Association of Japan, the Digital Comic Association, Apple. 3. Identify one ITGS social/ethical concern in the article - Intellectual property 4. Describe ITGS terminology and systems. - Apps: Apps is an abbreviation for application. An app is a piece of software. It can run on the Internet, on your computer, or on your phone or other electronic device. - Copyright: a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. The App Store is some kind of a database for iPhone, iPod touch, and iPad created by apple that allows users to browse, download and install app on their devices. Applications in an app store can vary in cost, from free downloads to quite costly ones, depending on who developed the application and its purpose. Software Apps, E-books that are sold through the app store are pirated. This software is basically electronic books, similar to real life books, where its contents are stored online. This Japanese copyright infringement is done through software that is uploaded through the internet that can be downloaded for a price. However, the payment is delivered to the offender, not the original person who owns the contents' rights. These pirated apps are Chinese -based language apps which plays a role in delaying the notice of the copyright infringement. 5. If possible, describe a solution to the concern (issue). Illegal distribution of copyrighted property should be banned. However, the massive infringe of the law is common in China. There should be more strict policy and laws in national level to reduce the number of these issues, such as measurement and specified steps of installing and removing application to satisfy companies wor
anonymous

Libya turns off the Internet and the Massacres begin | ZDNet - 3 views

  • Now, though, realizing that they could no longer hide their abuses from a world a Twitter tweet away, the new model autocracies, such as Libya and Bahrain have realized that they need to cut their Internet links before bringing out the guns.
  • As in Bahrain, Libya’s Internet is essentially owned and controlled by the government through a telecommunication company Libya Telecom & Technology
  • Mobile phone services in Libya are also under the control of the government. So far though the government doesn’t seem to have cut international phone services off-perhaps because that’s harder to do without cutting off local telephone service.
  • ...1 more annotation...
  • “Should Libya block Internet traffic, as Egypt did, it will not affect http://bit.ly or any .ly domain.”
  •  
    Brief analysis march 1 natsuno
  •  
    Identify the area of impact the scenario relates to. Politics and government Identify the main stakeholders to the IT system. Libyan government, Libyan citizens, Libyan telecommunication company (Libya Telcom & Technology) 3. Identify one ITGS social/ethical concern in the article. Surveillance 4. Describe ITGS terminology and systems. Internet : a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange Bit.ly : URL shortening is a technique on the World Wide Web where a provider makes a web page available under a very short URL in addition to the original address. Top level domain : A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name. 5. If possible, describe a solution to the concern (issue). It is hard to suggest a solution basically because it is the government's decision to shut down the internet. Therefore the only way to solve this issue is to discourage dictatorship in Libya. Main reason for the shut down of the internet was the cooperation of Libya Telecom & Technology which is owned by the dictator's son.
anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

Amazon Goes Back to the Future With 'NoSQL' Database | Wired Enterprise | Wired.com - 1 views

  •  
    Describe NoSQL and its purpose. Explain how it is used differently than MySQL. M12 jan30 az
  •  
    Describe NoSQL and its purpose. NoSQL is a highly scalable and reliable non-relational databases designed to maintain high performance and to be highly cost efficient for workloads of any scale, from the smallest to the largest internet-scale applications. It is also used to build a new kind of database for "unstructured" information that comes spilling off the Internet with each passing second. It is capable of handling large amounts of data du to the fact that they use flash storage rather than traditional spinning disks. These solid-state drives can provide single-digit millisecond response times. Explain how it is used differently than MySQL. MySQL database is a relational database that stores data in neat rows and columns, and it's designed to run on a single machine, while NoSQL database can store data in a more flexible way and is designed to scale across a very large number of machines. "SQL databases are like automatic transmission and NoSQL databases are like manual transmission. Once you switch to NoSQL, you become responsible for a lot of work that the system takes care of automatically in a relational database system. Similar to what happens when you pick manual over automatic transmission. Secondly, NoSQL allows you to eke more performance out of the system by eliminating a lot of integrity checks done by relational databases from the database tier. Again, this is similar to how you can get more performance out of your car by driving a manual transmission versus an automatic transmission vehicle." http://stackoverflow.com/questions/2559411/sql-mysql-vs-nosql-couchdb
anonymous

In Piracy Debate, Is the Sky Falling? - NYTimes.com - 29 views

  •  
    Why are copyright violations a serious problem? Describe two advantages and two issues with illegitimate downloading. Explain two possible solutions to this kind of piracy. all feb 13 chut
  •  
    *Why copyright violations are serious problem?
  •  
    Why are copyright violations are a serious problem? Major entertainment companies are losing millions and billions or money due to these copyright violations. More people are turning to online pirated goods instead of buying legitimately. These companies who are losing their profits are not happy about this problem. Describe two advantages and two issues with illegitimate downloading. One advantage is that pirated download saves you a lot of money. You wouldn't have to spend any money downloading these stuffs. Another advantage is that you can mass download it or download just some parts of it. For example if I wanted to listen to only one song of an album I can just download it off the internet for free, I wouldn't have to buy the real Cd which costs quite a lot of money and listen to only one song. Most artists today sell their Cd's for a high price but the qualities of their songs are not so high plus one Cd usually contains only 5 to 8 tracks. Comparing with the old times, one Cd contains about 15 to 20 tracks and it would still cost less and the songs do have good quality. An issue to this is that it is illegal. Downloading pirated goods are not so different from shoplifting or stealing. These goods have owners which the owners are willing to sell them but we who download them illegally are just taking them for granted. Another issue is that if this continues then the companies will not make as much many as before. This of course would affect the artists, celebrities, directors etc., directly. It can cause problems with jobs. If those people do not make money, then there would be no jobs. There are many jobs in the entertainment business which can be destroyed by this issue. Explain two possible solutions to this kind of piracy. One possible solution is to make it legal to download pirated goods. It may be the best solution possible at this moment. Many people are agreeing that it should be legal when it comes to downloading pirated goods. The enterta
Azman Fadhilah

Bangkok Post : The rise of the digital spies - 1 views

  •  
    1. Identify the area of impact the scenario relates to. Business and employment, Politics and Government 2. Identify the main stakeholders to the IT system. Politicians, Large Business owners, Victims 3. Identify one ITGS social/ethical concern in the article Surveillance / Privacy 4. Describe ITGS terminology and systems. The main IT system in this situation is the use of the evolving hardware that is customized to best fit the various situations that need to infiltrate a certain amount of security. The new spy devices today are integrated into everyday devices such as pens and glasses so that it is hard to track and sensor while going through security checks. 5. If possible, describe a solution to the concern (issue). Having the government and users agree to sign contracts which only allow certain amounts of digital spy equipment to be produced, and while shipment, if any equipment was found to be not authorized and legitimate to pay a large amount of fine to prevent further disuse of the equipment. Since most of the devices require some sort of signaling in order to spy, having new security checks based on lens reflection as well as machine signal waves can increase security because it would be easier to sensor such devices.
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
anonymous

Koobface Worm Sharpens Facebook Security - NYTimes.com - 8 views

  •  
    Analysis Read 2 pages March 25 Azman
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook's users' computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer's Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim's social network contacts. This is a security breach to Facebook's users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a
1 - 20 of 221 Next › Last »
Showing 20 items per page