Skip to main content

Home/ Globaltech/ Group items tagged software

Rss Feed Group items tagged

anonymous

Home - The home of Spybot-S&D! - 3 views

  •  
    Azman - Is this any good?
  •  
    I don't think so. The site looks very unprofessional and it doesn't look legitimate at all. A company that is not well known rates most of the awards that they won. It could be pretty good software but since it's free, there will be downsides and restrictions to it; and users need to be careful when installing freeware.
anonymous

Bangkok Post : It's a small world - 4 views

  •  
    brief analysis march 3 Jen
  • ...1 more comment...
  •  
    business and leisure
  •  
    1.11_people_machines 2.5_social_networking 3.4_internet 3.5_per_public_com
  •  
    1. Identify the area of impact the scenario relates to. Business, Leisure 2. Identify the main stakeholders to the IT system. IT users, mainly the ones who access social networking sites through mobile devices smart phone/tablet users, the business companies. 3. Identify one ITGS social/ethical concern in the article. The digital Divide and the Equality of Access / Globalization and Cultural Diversity 4. Describe ITGS terminology and systems. The tablets that offer internet as well as phone features play an important role in making the system work. The tablets offer a larger screen for the access compared to mobile phones, and it is challenging business companies and sites to remake their site into different various resolutions to fit all the new screen sizes. This affects the software of the program as well as the use of internet to connect to these sites. These sites offer personal and public communications through sites like Facebook. Social Networking - the grouping of individuals who have joined together to form a virtual community or neighborhood subdivision. Smart Phone: the "smart" mobile device that offers more advanced connectivity than the normal contemporary feature phone. 5. If possible, describe a solution to the concern (issue). Users around Thailand are now being more connected online besides the rural areas where cable TV have a larger impact. Having governmental or commercial groups to try and build signal towers as well as spread the awareness of the use of mobile phones and decreases who uses the internet, and who doesn't.
anonymous

Maximum PC | 30 Useful (and Unknown) Web Apps You Need to Bookmark - Page 2 - 1 views

  •  
    apps Anything good? may 19 woo
  •  
    1. Anything good? - ConvertCenter - Good for calculation checks while doing labs and conversions. - Aviary - An alternative to having to install photoshop which takes a long time and takes up space. - Wolfram|Alpha - Useful for math. - Floorplanner - I'm a nerd so there'll come a time I'm bored and play with it. - Drumbot - Something to keep me entertained. - Remember The Milk - To help organize my homework and schedules if I use it. - Zoho - Feels more like Microsoft word, feels like an alternative to Google docs.
  •  
    Tags: 3.2 Software
anonymous

BBC News - Facebook profile access 'leaked' claims Symantec - 3 views

  •  
    brief may 17 soo
  •  
    - Identify the area of impact the scenario relates to Home and Leisure, Business and e-commerce - Identify the main stakeholders to the IT system People who are using Facebook, Facebook Company and Application Company - Identify one ITGS social/ethical concern in the article Security, Privacy - Describe ITGS terminology and systems  Facebook Application= Apps on Facebook.com are web apps that are loaded in the context of Facebook. You can build your app using any language or tool chain that supports web programming, such as PHP, Python, Java or C#.Apps on Facebook.com are loaded into a Canvas Page. A Canvas Page is quite literally a blank canvas within Facebook on which to run your app. You populate the Canvas Page by providing a Canvas URL that contains the HTML, JavaScript and CSS that make up your app.  http://developers.facebook.com/docs/guides/canvas/  Symantec= Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.  http://kb.iu.edu/data/agzf.html - If possible, describe a solution to the concern (Issues) Facebook should enhance the security systems and authentication systems. User's personal information was leaked because they didn't work hard to manage transferring user's account to application systems. Therefore, it is better to enhance and put more effort to the transferring process.
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
anonymous

BBC - Newsbeat - HULC exoskeleton system ready for soldier tests - 16 views

  •  
    brief all sept 29 champ
  •  
    1. Identify the area of impact the scenario relates to. Business, government 2. Identify the main stakeholders to the IT system. US soldiers, US Department of Defense(Military), HULC project manager, Lokheed Martin, US Army's Natick Soldier Research Center 3. Indentify on ITGS social/ethical concern in the article. Reliability, People and machines 4. Describe ITGS terminology and systems. Robotic: The technology developed to combine software, mechanical manipulators, sensors, controllers and computers to provide programmable automation. The use of automated machines to replace human effort, although they may not perform. HULC (Human Universal Load Carrier) allows soldiers to carry weights of up to 200lbs (91kg) with little effort and is designed to reduce the strain of carrying heavy equipment which means soldiers can fight in the war very efficiently. Exoskeleton: outer layer that help covers, supports and protect the soldier body.
anonymous

KeePass Password Safe - 2 views

anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

Amazon Malfunction Raises Doubts About Cloud Computing - NYTimes.com - 2 views

  •  
    Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. Why is the cloud model gaining popularity? List the problems that companies reported. april 28 az
  •  
    1) Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. One of the issues is that Amazon need to reconsider the contracts that cover cloud services such as how much to pay for backup and recovery services, including paying extra for data centers in different locations. The reason for this is because small businesses are less apt to pay for extensive backup and recovery services. The second issue would be many companies are relying too much on remote computers that are beyond their control. So they need to reconsider that also. The technical problem that interrupted computer services provided by Amazon told its customers and users that there may be a reliability problem with Amazon's service in online computing in the cloud. Companies and businesses operation network now revolves a lot around these remote network systems, so this also affects how companies will reconsider their use of exporting their files and data as opposed to keeping them within the company walls. 2) Why is the cloud model gaining popularity? Because owning a data center is high maintenance and therefore expensive. By using the cloud model, companies are avoiding the costs and headaches of running their own data centers. They just simply tap in, over the Web, to computer processing and storage without owning the actual machines or operating software. Businesses can also save their time by outsourcing to the cloud to save having to keep track of running their own data centers. 3) List the problems that companies reported. ( Unable to access data Service interruptions Sites being shut down
anonymous

Bangkok Post : Happy ever after - 0 views

  •  
    Az and Woo: Read article and try evernote with your phone and computer and tablet, etc., and see if it syncs. May 9
  •  
    Yes it syncs :D
  •  
    tags: 3.2 Software
anonymous

Corporate computing: Online reputations in the dirt | The Economist - 2 views

  •  
    Explain the issues that are in common with both Amazon and Sony? Explain the reasons that cloud computing will continue to grow? What could have prevented Sony from getting hacked? Describe: Rambo architecture Chaos monkey Explain the reason that data centers for cloud computing need backups? may 9 woo
  • ...1 more comment...
  •  
    incomplete
  •  
    1. Explain the issues that are in common with both Amazon and Sony? Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people. 2. Explain the reasons that cloud computing will continue to grow? Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself. 3. What could have prevented Sony from getting hacked? Sony could have increased its protection system, as well as create random simulations in orde
  •  
    Tags: 1.1 Reliability and integrity 1.2 Security 3.3 Network
anonymous

BBC News - Chemicals and defence firms targeted by hacking attack - 3 views

  •  
    Explain the type of attack and possible security measures to prevent it. m12 nov 8 jenny
  •  
    The type of attack was a phishing attack that involved sending e-mails that had attachments, that when opened, will install a Trojan horse code into the person's computer. From there, the Trojan horse will be able to locate and copy files to another part of the computer system where they will be extracted back to the hacker who performed the attack. Possible Security Measures to Prevent it: Don't open e-mail attachments unless you know they are from a trusted source, especially attachments containing extensions .exe, .ink, and .vbs. Always have your security software up to date. http://sync.sympatico.ca/how-to/computing/how_to_prevent_a_trojan_horse_infection/a1487f14 Customize your firewall settings for your browser to filter out content. (Default is usually all, but choose to "limit" your connection so that it limits the connection to possible attackers).
« First ‹ Previous 41 - 53 of 53
Showing 20 items per page