Skip to main content

Home/ Globaltech/ Group items tagged post

Rss Feed Group items tagged

anonymous

Your Facebook Posts, Gift-Wrapped In Identity, Will Soon Be Given To Marketers | TechCr... - 2 views

  •  
    Brief article analysis.
Jab Itthipalkul

OLX: Trash to Treasure - 1 views

  •  
    This article is about a trading website called "OLX" which is previously called "Dealfish". The purpose of this website is for people to trade unused items or second hand items to another people who want it. It's a useful website to clear out valuable items that we doesn't use for some cash. This website is similar to Ebay and is popularly used around the world(and also in Thailand). There are around 9 million visitors(Thailand) each month so it's quite a lively place. A lot of people also get good feedback from posting their possessions online.
  •  
    What is purpose of OLX?
Azman Fadhilah

Bangkok Post : Every breath you take ... - 0 views

  •  
    1. The area of impact that the scenario relates to the Prgivacies that people can visit to the other people's profiles and view histories to find what the other person done in the past. 2. This is related to the Databases where Google stores the information on profile and history that what they had done. It is also related to surveillance 3. There is the problem with the privacy and anonymity that people can have access to the other persons profile to see their actions in the past. Most companies do this in career test for finding some inappropriate action that the person has done. 4.The database is a collection of information stored in an organized form in a computer. Program helps keep track of corporate passengers 5. For sollution, it might be helpfult to use proxy to get away from google tracking accounts.
Azman Fadhilah

Bangkok Post : The rise of the digital spies - 1 views

  •  
    1. Identify the area of impact the scenario relates to. Business and employment, Politics and Government 2. Identify the main stakeholders to the IT system. Politicians, Large Business owners, Victims 3. Identify one ITGS social/ethical concern in the article Surveillance / Privacy 4. Describe ITGS terminology and systems. The main IT system in this situation is the use of the evolving hardware that is customized to best fit the various situations that need to infiltrate a certain amount of security. The new spy devices today are integrated into everyday devices such as pens and glasses so that it is hard to track and sensor while going through security checks. 5. If possible, describe a solution to the concern (issue). Having the government and users agree to sign contracts which only allow certain amounts of digital spy equipment to be produced, and while shipment, if any equipment was found to be not authorized and legitimate to pay a large amount of fine to prevent further disuse of the equipment. Since most of the devices require some sort of signaling in order to spy, having new security checks based on lens reflection as well as machine signal waves can increase security because it would be easier to sensor such devices.
anonymous

Bangkok Post : Privacy a double-edged sword - 1 views

  •  
    What are the basic advantages and disadvantages of encryption? Alec nov 22
  •  
    incomplete
anonymous

Bangkok Post : The cloud has been around for a while - 0 views

  •  
    summary about the cloud soo nov 22
  •  
    1. The cloud has been around for a while  Summary about the cloud Many people are doing their own business everywhere around the world and they need something that can communicate with their customers, workers, and many other people. We call these communicating systems as Clouding. For example, currently there is phone call, emails and messaging systems are examples of clouding system. When people are using clouding system, they have to care about backup system to protect their files from losing. To have good clouding system, people need connection of Internet to send or receive their emails with cell phones or laptops. Then people should have their free email accounts like G-mail or Yahoo. Theses free email accounts allow large attachments and people can access theses emails everywhere. Unfortunately, business user who has Google or Yahoo accounts with their company name should pay a small annual fee. These systems are all cloud. People are using clouding computing already.
anonymous

Bangkok Post : Galaxy Tab taps enterprise market - 6 views

  •  
    Define enterprise market. Describe 3 examples of increasing the productivity and efficiency of employees. dec 2 nat
  •  
    Define enterprise market. A different market to the consumer market, for an example, to companies and businesses so that they can use it for their business. Describe 3 examples of increasing the productivity and efficiency of employees. Car insurance - If there is an road accident, the insurance company can take pictures and send information through the tablet, without going back to the company to tell the information. Auto business - Customers can look at e-catalogs, where they can see the models easily because it is touch sensitive.
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
Woogyeong Jung

Bangkok Post : Social networking sites boost e-commerce - 1 views

  •  
    Describe social commerce. What is commercial about these sites: Groupon.com ensogo.com Describe the advantages of online shopping. due Feb 22
anonymous

http://insideitgs.ning.com/ - 1 views

shared by anonymous on 22 Feb 11 - Cached
  •  
    az wiki versus ning, or wikis linked to ning which is better especially compare to - http://itgsopedia.wikispaces.com/ march 1 look at some of the other itgs sites i am posting here on diigo to compare... and ideas for format also consider individual wikis linked to mother site or everything on one site What's more feasible and practical?
anonymous

Bangkok Post : It's a small world - 4 views

  •  
    brief analysis march 3 Jen
  • ...1 more comment...
  •  
    business and leisure
  •  
    1.11_people_machines 2.5_social_networking 3.4_internet 3.5_per_public_com
  •  
    1. Identify the area of impact the scenario relates to. Business, Leisure 2. Identify the main stakeholders to the IT system. IT users, mainly the ones who access social networking sites through mobile devices smart phone/tablet users, the business companies. 3. Identify one ITGS social/ethical concern in the article. The digital Divide and the Equality of Access / Globalization and Cultural Diversity 4. Describe ITGS terminology and systems. The tablets that offer internet as well as phone features play an important role in making the system work. The tablets offer a larger screen for the access compared to mobile phones, and it is challenging business companies and sites to remake their site into different various resolutions to fit all the new screen sizes. This affects the software of the program as well as the use of internet to connect to these sites. These sites offer personal and public communications through sites like Facebook. Social Networking - the grouping of individuals who have joined together to form a virtual community or neighborhood subdivision. Smart Phone: the "smart" mobile device that offers more advanced connectivity than the normal contemporary feature phone. 5. If possible, describe a solution to the concern (issue). Users around Thailand are now being more connected online besides the rural areas where cable TV have a larger impact. Having governmental or commercial groups to try and build signal towers as well as spread the awareness of the use of mobile phones and decreases who uses the internet, and who doesn't.
anonymous

Bangkok Post : Leveraging social networks for sales - 4 views

  •  
    What does it mean to leverage social networks? Define digimarketing. Explain the mistakes marketers make with social networking. march 17 nat
  •  
    What does it mean to leverage social networks? To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising. Define digimarketing. Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online. Explain the mistakes marketers make with social networking. Marketers are not using the 'social' side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers. Like for example via Twitter, some marketers try to take advantage of the 'Twitter trend', and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users.
anonymous

Bangkok Post : Cloud services open up business opportunities - 1 views

  •  
    What does cloud computing deal with? Describe each of the characteristics cloud services must have. Explain horizontal and vertical services. Define each layer of services. Explain the infrastructure capability terms. Why is bandwidth important? march 17 cream
  •  
    What does cloud computing deal with? Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications. Describe each of the characteristics cloud services must have. Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them. Fstandard user interface - Web browsers to have access to the cloud services. Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human. Fservice metering - The Charge of the usage of the cloud services. Faccess over the internet - The medium of having access to the internet, as well as other places over the internet. Explain horizontal and vertical services. Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example. Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used. Define each layer of services. Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere. Why is bandwidth important? Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
  •  
    1.5 Intellectual property 2.5 Home and leisure 3.3 Networks 3.4 Internet 3.7 Databases
anonymous

Bangkok Post : Heads in the cloud - 1 views

  • Tangerine, a reseller of Google enterprise product, says business policies for dealing with cloud computing in Thailand will start to emerge this year
  • The cloud applications specialist has just started providing consulting and selling cloud services for Salesforce.com after providing services for enterprises and supply chains for two decades.
  • The new generation encourages collaboration
  •  
    Why is cloud computing gaining widespread adoption? Why is it cheaper? Describe saas Describe the Tangerine example. What kind of customers does salesforce target? How does cloud computing encourage collaboration? march 17 soo
  •  
    1.Why is cloud computing gaining widespread adoption? Cloud computing is gaining widespread adoption because cloud computing enables users to connect to corporate data and applications via online enabled devices. It offers the complexities and unique requirements of sophisticated applications, yet delivers them in less time and with lower startup costs. 2.Why is it cheaper? Cloud computing is cheaper cost when they deliver IT systems because businesses pay for only what is used and by that they could reduce the amount of cost in capital and operating cost. 3.Describe SaaS. SaaS stands for Software as a Service. Users who use services that is net-based are charged for the software they used, either as a subscription or as a pay-as-you-go basis. It is basically charging the service costs for the software that the users are utilizing. 4.Describe the Tangerine example. Tangerine is a company that sells enterprise version of Google mail and applications. These applications uses Gmail or Google's online document systems as an interface. Users who use Tangerine are charged a subscription fee for the usage of Tangerine. 5.What kind of customer does sales-force target? Salesforce is targeting people who actively use clouding computing system. Basically, it could be individual people but mostly many huge companies are using clouding computing to work efficiently. Also this system could save the money for the storage systems. 6. How does cloud computing encourage collaboration? By using user-friendly services like Facebook rather than conventional e-mail, feeds rather than memos, a touch-based system rather than a click-user interface, a push-based information system rather than pull or browse, location-based technology rather than unknown locations, and web service/HTML rather than Windows or Mac.
anonymous

Bangkok Post : US names Baidu, PirateBay on copyright piracy list - 2 views

  • list of the world's top marketplaces for pirated and counterfeit goods
  • enabling piracy with "deep linking" searches
  • continue to work closely with brand owners and others to further enhance the level of trust and integrity in our online marketplaces
  • ...1 more annotation...
  • efforts to work with brand owners in protecting their intellectual property rights
  •  
    Identify the issue. Describe the possible solutions. march 11 jenny
  •  
    1.4_intellectual_property 2.5_digital_policing 3.4_internet
  •  
    Identify the issue Intellectual Property Rights - Piracy Describe the possible solutions Solutions that are harsh to the point of shutting down the website that hosts these download links to pirated music, videos, and other intellectual property, etc. Or censoring the pirated files on the website to be inaccessible. However, this isn't a feasible solution since it would cause massive uproar for the users who use the sites on a regular basis, which in this case may be millions of people. Policing IT malls, as well as formulating and enforcing strict laws with hard punishments for violators.
anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
anonymous

Bangkok Post : Medicine without borders - 2 views

  •  
    brief april 4
anonymous

Bangkok Post : Patient data need protection - 2 views

  •  
    Explain the issues and possible solutions. april 4 kuni
  •  
    The issue is that the increasing integration of medical devices in hospital networks can increases the risk of being attacked easily, which they hack into the network and steals information. They need to strengthen the security to get against with the possibility of virus attacks which could have a huge damage on delivering data for medication. The Public Health Ministry can play an important role as a regulator in healthcare security, as a same system with the security in the network banking.
‹ Previous 21 - 40 of 45 Next ›
Showing 20 items per page