Skip to main content

Home/ Globaltech/ Group items tagged software

Rss Feed Group items tagged

anonymous

BBC News - Apple acts on iPhone tracking bug - 1 views

  •  
    How does apple propose to solve the tracking program? Describe two examples of data tracking services that people use. Do you think privacy is still an issue with phones and apps? May 17 cream
  •  
    1. How does apple propose to solve the tracking program? Apple released newly developed software that cuts the amount of stored data to just a week and no longer transfer it to the owner's computer when the phone is connected. And if users disable the location services setting on their iPhone or iPad, it will stop collecting data completely. 2. Describe two examples of data tracking services that people use. - Foursquare: Foursquare is a location-based social networking website based on software for mobile devices. - Mobile Me: Mobile Me automatically pushes new email, contacts, and calendar events to your iPhone, Mac, and PC. So your devices always stay in perfect sync. 3. Do you think privacy is still an issue with phones and apps? Of course yes because mobile devices are connected to networks for all the time in order to access to files and media. Privacy is always going to be an issue with phones and apps because even though Apple is storing data for shorter time, the stored data can be used or leaked anytime when threats attack.
  •  
    1.1_reliability_integrity 1.3_privacy_anonymity 2.5_home_leisure 3.1_hardware 3.2 _software 3.3_networks 3.4_internet
anonymous

Get protected: anti-virus software - Safe Surfing - beginner's guide - butterscotch - 5 views

  •  
    Helen and Hyojeon Presentation on antivirus tutorials #1-11. September 6
anonymous

Sony suffers second major user data theft | Reuters - 1 views

  •  
    Explain what happened. Describe the issues. May 9 jen
  •  
    1.Explain what happened. Sony suffered a hack on their PC games network, which lead to theft of online user's data from its PlayStation video game network. The theft involved 77 million user information. Sony is now hiring various outside firms to investigate on the matter, and try to find the offenders to this hacking. Cyber-security detectives from Guidance Software and consultants from Robert Half International Inc's subsidiary Protviti were brought in to help with the clean-up. 2.Describe the issues. Issues from this includes the reliability and integrity, as well as the security of Sony's protection system and online user's sensitive information which include credit card numbers as well as passwords. The reliability is the reliability of Sony's software. It might have failed to function properly, thus being a loop hole of the hackers to get through. The integrity is keep users' data complete and unaltered without their permission by the hackers. There is also a privacy issue because user's sensitive data was stolen.
  •  
    1.2_security 2.1_online_bus 3.7_databases 3.6_multimedia_digital_media
chaemin Nam

Lessons learned from Android security issues | www.mass360.com - 0 views

  •  
    Mobile device security requires persistence, diligence and, of course, common sense. In recent months, iOS and Android security have been hot topics of discussion in response to major breaches that impacted both operating systems this summer. their data breaches a legitimate but avoidable threat. In addition, software updates a necessity
Chut Sanghiran

iPad gives voice to kids with autism - 5 views

  •  
    Explain how can Ipads help Handicapped kids?
  •  
    Health and Education Hardware, Software, Personal and Public Communications,
  •  
    May 21
anonymous

Big Data's Impact in the World - NYTimes.com - 9 views

  •  
    Explain why becoming a data consultant might be a good career choice. Why is data measurement considered to be the modern equivalent of the microscope? How has data-driven decision making improved productivity? How is Big Data transforming the way social networks function? all feb 21 max
  •  
    Explain why becoming a data consultant might be a good career choice. Basically, their jobs are to help businesses make sense of an explosion of data Web traffic and social network comments as well as software and sensors that monitor shipments, suppliers and customers. So, since a great number of people have used the Internet frequently, their jobs are needed to people because as much as people use the Internet, the data will be increased and people need other people who can manage such things. Why is data measurement considered to be the modern equivalent of the microscope? The reason is that there is countless data sensor around the world. The sensors can measure and communicate location, movement, vibration, temperature, humidity, even chemical changes in the air. How has data-driven decision making improved productivity? Data-driven decision making has improved productivity because people collect as much as data they can before deciding. As people doing that, they can predict preference of consumers from the Internet. It is very useful because people don't have to spend much time on consumers' preference also, a small amount of money and time will be spent. How is Big Data transforming the way social networks function? Social networks websites such as Facebook and Twitter and Search engines like Google and Answer.com make profit with their users' data. Many companies will buy the users' data from Facebook, Google, Answer.com and Twitter. That's a way to earn money for social network websites.
Dawoon Jung

Patch issued for Java loopholes - 1 views

  •  
    Oracle has issued a patch for loopholes in its Java program that was being actively abused by cyber-thieves. The software giant took the unusual step of issuing the patch well before the usual date for security updates. The patch closes loopholes that together left users of almost every operating system vulnerable to infection by viruses.
  •  
    What is Java used for ????????
Silawat Rock

Eye-controlled Gaze TV unveiled by Haier and Tobii - 0 views

  •  
    Haier's Gaze TV uses technology developed by Tobii, a Swedish firm which already offers eye-tracking technology for computers.Users control the set by staring at the top or bottom of the screen to activate a user-interface.
anonymous

BBC News - Worm steals 45,000 Facebook passwords, researchers say - 8 views

  •  
    Explain the ways these networks are being hacked. How could you know if your facebook account had been hacked? all jan 17 jang
  •  
    Explain the ways these networks are being hacked. It is explained in the article that these networks are being hacked by using the stole credentials to log into the user's Facebook account. When the hackers logs into the Facebook account, it is used to transmit malicious links to other people such as friends. Friends would be a trustworthy person so the link would be visited. This would increase the speed of the malware's speed. Also, some users use the same password for many accounts which can be used by ill-intentioned people on the web. How could you know if your facebook account had been hacked? For you to know if your Facebook account had been hacked, users should run an anti-virus software to check and get rid of any malware that is hacking your account.
anonymous

Great Debate: Should any Internet freedom ever be sacrificed to fight piracy? | ZDNet - 10 views

  •  
    Agree or disagree? all feb 10 soobin
  •  
    Agree Agree to some extent. Internet freedom can be sacrificed only to a certain extent to fight piracy. Getting rid of internet freedom is basically the same thing as shutting out the communication lines of the world. The source of the reason why piracy is done is mainly due to the fact that people can't afford the items that they wish to use, or need to use, because they are ridiculously overpriced. These industries don't think that way because they want profit, however, if piracy was stopped, then no one will buy their products anyways because they still can't afford it. Popularity of the product will decrease, and the marketing of the product basically just failed. We need to compromise something so that piracy is decreased until there is no more. But suddenly stopping everything in one shot with something like SOPA isn't the way to go. Disagree I disagree. The internet should be free and open. We need to educate people not to download pirated software, movies and music. Doing so is the same as stealing from a shop, which most people would not do. Most people would be prepared to pay small amount for the right to download these things. If governments try to remove websites, it is the same as censorship which sometimes happens in dictatorships but should not happen in free societies. We really need freedom for the internet, so that we can easily share our own ideas, and thoughts. Unlike China, where people can't even talk gossip about governments, which is a basic human right. But China is still very famous for internet piracy. The United States should not have the power to prevent freedom of internet because they are not the world's police force. They should not have the power to dictate what happens in the rest of the world. That's why internet freedom should not be sacrificed.
anonymous

BBC News - Hackers outwit online banking identity security systems - 9 views

  •  
    Describe the kinds of attacks. Explain the security measures. all feb 9 kevin
  •  
    Describe the kinds of attacks. - First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages. Explain the security measures. - Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
anonymous

BBC News - Firms 'ill prepared for IT failure' - 9 views

  •  
    Explain 2 solutions. all nov 28 kuni
  •  
    The most common causes of data loss and downtime are hardware failure, power outage and software malfunction. One solution is to regularly back up data (daily) and make sure that the computer has a recovery system enabled. The second solution is to plug every computer into a UPS (uninterruptable power supply) in case of power outage.
Alex Lenk

Silence trolls with flattery - 1 views

  •  
    Alex
  •  
    This article talks about many reviews of devices and software using. The new release of the Amazon kindle and the new kindle fire release in November. A kindle enables you to read for pleasure and it has about 8 weeks of battery. It is only designed for reading. It also talks about reviews of the Windows 8 PC tablet and what trolls are.
Alex Lenk

Smartphones all the rage, says St George | The Australian - 2 views

  •  
    Rot October 15th Brief Article Analysis
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify the main stakeholders to the IT system. St George Bank, the customers who use their services, 3. Identify and describe one ITGS social/ethical concern in the article. Reliability, the company and the customers depend on the new paying system developed by the company to perform reliably. 4. Describe ITGS terminology and systems. Applications: A piece of software that serves an auxiliary function for your electronic device IT: Short for information technology Internet: A large online server that stores information. Online: Being connected to a network. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
Alex Lenk

Electronic Brain Helps Cut Credit Card Fraud : NPR - 1 views

shared by Alex Lenk on 08 Oct 13 - Cached
  •  
    Da Woon October 10 Brief Article Analysis Answer here.
  •  
    1. Identify the area of impact the scenario relates to. Business and employment, home and leisure 2. Identify the main stakeholders to the IT system. in this article, the credit card user and credit card companies are the main stakeholder 3. Identify and describe one ITGS social/ethical concern in the article. In this article, the social/ethical concern is integrity. In this article, it tells that Credit Card Company uses neural networks to keep track of every purchase people make and sorts them into patterns and categories. If people changed their purchasing pattern, the credit card calls you and ask you about did you really buy it. So, if we buy the computer first time, we changed our purchase pattern, so we are losing our integrity to Credit Card Company. So we are really hard to use our own credit card. 4. Describe ITGS terminology and systems. Transaction - Electronic funds transfer, the electronic exchange or transfer of money from one account to another Software - any set of machine-readable instructions that directs a computer's processor to perform specific operations. Hardware - the collection of physical elements that comprise a electrical device system 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. The one solution in this social/ethical concern would be making a password then using that password with signature to prove our identity when we purchase the product which is not in our pattern such as put our password on our mobile device when we purchasing product with transaction. So we don't need to get the call from Credit Card Company when we purchase the product which is not in our purchasing pattern. Also we can using biometrics on our digital device to prove that we purchase that product when we using transaction to purchase the product.
Alex Lenk

Seeing That Ad on Every Site? You're Right. It's Tracking You. - NYTimes.com - 0 views

  •  
    Smile October 28th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business, Home and leisure, 2. Identify the main stakeholders to the IT system. The main stakeholders of the Internet users and the internet advertisement provider (such as Google) 3. Identify and describe one ITGS social/ethical concern in the article. A social/ ethical concern in this article is privacy. This article refer to advertisement stalking you around and show up in every site that you are in. The concern is privacy because of the tracking of ads on the users. The IT systems uses cookie to track the user. For example if a user open a commercial website such as ebay and amazon the clicking into a certain product will place a cookie onto your web browser. The next time the user open the web browser, the ads will track you around. The companies that it target marketing which shows users the product that they are interest in at the right time. However is it ok for this ads to track the users around? 4. Describe ITGS terminology and systems. Web browser: a software application for retrieving, presenting and traversing information resources on the World Wide Web. Cookie: Computing a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server. 5.Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. One solution that can help solve this problem is to install an adsblocker. Advertisement blockers will block the advertisement from showing on the web browsers. However the cookie is still in your computer. Some web browsers or operating system allow the user to delete the cookie on your computer.
anonymous

Bangkok Post : Virtual mall opens its doors - 3 views

  •  
    brief dec 2 cream
  •  
    Bangkok Post: Virtual mall opens its doors www.bangkokpost.com/...virtual-mall-opens-its-doors 1. Identify the area of impact the scenario relates to. Digital citizenship and people + machines / Home and leisure 2. Identify the main stakeholders to the IT system. Broadband technologies, 3D shopping, people individuals online shopping / Designer Companies, Online Shoppers, Ubermall 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. The ITGS terminology and systems is concerned to the virtual 3D online shopping. The site will allow shoppers to build new relationships by chatting with sellers and fellow customers. online 3D virtual world promoting businesses and tourist attractions that represent the country's "creative economy" policy. The new online shopping has opened in Thailand and it is likely 3D virtual mall. Shoppers can fill up their currency at anytime on the Internet by that currency software. 5. If possible, describe a solution to the concern (issue). The issue in this article is that this action will increase the economic issue and the business can increase their amount of products. " The company is also expanding its presence to Facebook, at apps.facebook. com/taraddotcom, in an effort to bring together its merchants and offer them the chance to sell their products through the world's most popular social network, in what is described as the first example of "social commerce" in Asia. However, there should be some security for payment online, which means that the site must be more secured in term of policy.
  •  
    1.2 Security 1.11 People and machines 2.5 Home and leisure 3.4 Internet 3.6 Multimedia/digital media
anonymous

The Survival Station - 51 Free Tools to Stay Informed and Invisible on the Internet - 1 views

  •  
    How could this help you? march 17 jenny
  •  
    1.3_privacy_anonymity 2.5_home_leisure 3.2 _software
  •  
    How would this help you? These tools could help us by providing us with at least some more sense of security that what we barely have left now. Because we are often on the Internet, we are exposed to the danger of being seen and tracked by others. These tools help us stay invisible and informed. The use of encryption is used as well as proxies to hide user IP addresses. The free tools are basically for us to be aware of what is being tracked of our online activity, and how we can prevent it with the software.
anonymous

WikiLeaks Julian Assange Arrested in London: Is it a Conspiracy? - 4 views

  •  
    High cholesterol milk Feb 8 Who is Julian? What is wikileaks? Describe cyber attacks. How did politics impact wikileaks? How did wikileaks fight back?
  •  
     Who is Julian? - Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.  What is WikiLeaks? - WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.  Describe cyber attacks - A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.  How did politics impact WikiLeaks? - Protect citizens from knowing the secrets about politics - They keep find track on information -  How did WikiLeaks fight back? - Protesting way back Julian being treated (Letting attacks to each other)
  •  
    1.5 Intellectual property 1.9 Policies 2.6 Politics and government 3.5 Personal and public communications
‹ Previous 21 - 40 of 53 Next ›
Showing 20 items per page