Skip to main content

Home/ Globaltech/ Group items tagged systems

Rss Feed Group items tagged

anonymous

BBC - Newsbeat - HULC exoskeleton system ready for soldier tests - 16 views

  •  
    brief all sept 29 champ
  •  
    1. Identify the area of impact the scenario relates to. Business, government 2. Identify the main stakeholders to the IT system. US soldiers, US Department of Defense(Military), HULC project manager, Lokheed Martin, US Army's Natick Soldier Research Center 3. Indentify on ITGS social/ethical concern in the article. Reliability, People and machines 4. Describe ITGS terminology and systems. Robotic: The technology developed to combine software, mechanical manipulators, sensors, controllers and computers to provide programmable automation. The use of automated machines to replace human effort, although they may not perform. HULC (Human Universal Load Carrier) allows soldiers to carry weights of up to 200lbs (91kg) with little effort and is designed to reduce the strain of carrying heavy equipment which means soldiers can fight in the war very efficiently. Exoskeleton: outer layer that help covers, supports and protect the soldier body.
anonymous

Hackers steal SSL certificates for CIA, MI6, Mossad - Computerworld - 13 views

  •  
    brief all sept 7 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Goverment 2. Identify the main stakeholders to the IT system. Mozilla, Google, DigiNotar, CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter, and Microsoft's Windows 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. SSL- Secure socket layer certificates used for transmitting private documents via the Internet. It creates an encrypted connection between your web server and you web browser that will protect transmitted private information from eavesdropping, data tampering, or message forgery. Man in the Middle- is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DigiNotar= DigiNotar is registered by the OPTA as a CSP that delivers qualified certificates that comply with the Dutch act on electronic signatures with respect to the European directive on electronic signatures. Sinces 2004 DigiNotar has entered the PKI hierarchy of the Dutch Government: PKIoverheid. This allows DigiNotar as Certificate Services Provider (CSP) to issue certificates complying with PKIoverheid specifications to government organisations. HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. 5. If possible, describe a solution to the concern (issue). Increase the security of the data for issuing a digital certificate to websites, and have updates of digital certificate periodically to check whether or not it has been compromised. Delete mo
anonymous

Bangkok Post : The power of preparedness - 0 views

  •  
    Describe the IT systems that could improve emergency warning systems and explain how they would work. April 28 alec
  •  
    incomplete
anonymous

BBC News - Can a phone replace the doctor in Kenya? - 7 views

  •  
    Describe the relationship of the main stakeholders to the IT system. Discuss at least one problem that relates to the impact of the social/ethical issue. nov 28 test
anonymous

BBC News - Hackers outwit online banking identity security systems - 9 views

  •  
    Describe the kinds of attacks. Explain the security measures. all feb 9 kevin
  •  
    Describe the kinds of attacks. - First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages. Explain the security measures. - Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
anonymous

BBC News - Firms 'ill prepared for IT failure' - 9 views

  •  
    Explain 2 solutions. all nov 28 kuni
  •  
    The most common causes of data loss and downtime are hardware failure, power outage and software malfunction. One solution is to regularly back up data (daily) and make sure that the computer has a recovery system enabled. The second solution is to plug every computer into a UPS (uninterruptable power supply) in case of power outage.
anonymous

PayPal Debuts Its Newest Hardware, Beacon, A Bluetooth LE Enabled Device For Hands-Free... - 6 views

  •  
    summary yongkyu
  • ...2 more comments...
  •  
    describe the IT systems
  •  
    One of David Marcus's biggest challenges when taking on the role of President of PayPal was extending the platform into point of sale, and making it easier to pay with PayPal than swiping your credit card. But changing consumer behavior is an enormously difficult task. PayPal played with geo-location leveraging GPS and Wi-Fi for iOS and Android. These technologies are what powers Square's hands free payment system 'Pay with Square. But they found that it ended up being a poor experience for the consumer because it sucked the batter life out of their phones. PayPal also warns that it is aware of the potential privacy issues so PayPal Beacon won't constantly track your location unlike other technologies. If you enter a store and decline to check in, or just ignore the prompt entirely, no information is transmitted to PayPal or the merchant. PayPal has also said that there will be no ads served via the platform. As evidenced by PayPal latest app update from last week, the company is making a big bet on creating an in-store experience for both consumers and retailers. It's ambitious to say the least because not only does the payments company have to change the behavior of the consumer (from just swiping a card) but it also has to convince retailers and the 100 million plus PayPal users that it is worth it. Marcus says that providing a frictionless experience for both parties will be the key to success when changing behavior.
  •  
    Describe IT. Alex Oct 4
  •  
    Bluetooth Low Energy: Allows connected devices to communicate with each other while keeping the energy consumption of the devices at a very low level. The transaction should take place without GPS, other apps running, or even without a phone signal. PayPal Beacon: A small hardware device that runs on its own Wi-Fi, plugs into an outlet and serves as a beacon to other devices. It updates itself and the storekeeper doesn't have to touch it at all. It will track your location according to privacy issues. It is completely up to you whether you accept or decline Beacon when you enter the store. A hands free check in payment device.
Alex Lenk

BBC NEWS | Technology | Supermarket of the future - 2 views

  •  
    Jean October 10th  Describe the IT system by watching the video Answer here
  •  
    Basically just watch the video... ok lets start 1. The apps used in the supermarket needs to be downloaded by the clients before use. 2. Enter the store and open your apps from your mobile. 3. Pick the goods you want and scan the code off the bar code (using your cell phone) 4. The list of goods you buy will be store into your cell phone. 5. After scanning click the finish shopping button on your apps and the cell phone will generate a big bar-code which mix all the code you scan into one master-code. (like mixing salad after you put vegetables in) 6. Go to the paying counter and insert the master-code into the paying machine. 7. The machine will tell you how much to pay and client pay by cash, credit card and etc, Extra ( you can play stepping on fish in the supermarket for fun) Oh and there is a useless robot roaming around also.
Alex Lenk

BBC News - Police crackdown on fake shopping sites - 1 views

  •  
    Alex October 30th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment. 2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products. 3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites. 4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
Alex Lenk

Twitter Lurches Toward Social E-Commerce | Wired Business | Wired.com - 1 views

  •  
    Rock October 28th  Describe the IT systems
  •  
    The article is talking about how customer can link their American Express card with the the customer their twitter account. People who sync their American express card with their twitter account can simply order or buy product by tweeting. 1. User have to sync their American Express card with their Twitter account, account information will be kept secret. 2. After account had been establish, User can access store that are involve with Twitter campaign. 3. If user find any tempting product, they can simply tweet it or go buy it directly from the store and get discount 4. Product price will be charged to user's American express card and deliver to user address
Alex Lenk

Singapore Airlines to launch inflight Internet in May? - Flights | hotels | frequent fl... - 3 views

  •  
    Chae Min November 5th  Describe the IT
  •  
    The IT system is in this article is internet access in flight at 30,000 feet. The Singapore airlines now provide internet for any digital device (such as tablet or laptop). The internet is provided by the self contained telecoms system on board each plain. It get the signal from satellite. Currently over 20 airlines using this WiFI and 3G signal thought to inmarsat's swift broadband satellite network.
anonymous

http://www.eweek.com/c/a/Security/WikiLeaks-Hit-With-DoS-Attack-Before-Documents-Leaked... - 9 views

  •  
    brief dec 9 cream
  •  
    WikiLeaks Hit with DoS Attack Before Documents Leaked 1. Identify the area of impact the scenario relates to. Politics and Employment 2. Identify the main stakeholders to the IT system. WikiLeaks, Government, users 3. Identify one ITGS social/ethical concern in the article Privacy 4. Describe ITGS terminology and systems. Wikileaks is simply a website that spread the hidden news to the public so it is like a non-profit website. They spread the news throughout the Internet. WikiLeaks knew and predicted such DoS attacks, they have been switching various IP address in order to keep running the website. 5. If possible, describe a solution to the concern (issue). Users need to use encryption for preventing hackers. Using secure private network in order to protect your private network or make it even more authorized. Using firewall to protect your computer form unauthorized access
  •  
    1.3 Privacy and anonymity 2.6 Politics and government 3.5 Personal and public communications
anonymous

On Computers » SOLAR NETWORKS - 6 views

  •  
    Describe the IT system. What problem does it solve? dec 7 Alec
  •  
    1.13 home and leisure 2.5 _IT_managed_home_networks 2.5_digital_entertainment 2.5_social_networking 3.3 3.4
  •  
    The IT system in this is wireless repeaters they simply repeat the wireless signal that the router sends out so that a larger area can be covered by a single signal. It solves the problem of having to spend money for more routers and also having to constantly change your signal when you move around a large area like a park because you would lose one signal while gaining another. =D
anonymous

http://www.macobserver.com/tmo/article/japanese_publishers_cry_foul_on_pirated_app_stor... - 6 views

  •  
    brief march 23 woo
  •  
    1. Identify the area of impact the scenario relates to. - Business and employment 2. Identify the main stakeholders to the IT system. - JBPA, The Japanese Magazine Publishers Association, the Electronic Book Publishers Association of Japan, the Digital Comic Association, Apple. 3. Identify one ITGS social/ethical concern in the article - Intellectual property 4. Describe ITGS terminology and systems. - Apps: Apps is an abbreviation for application. An app is a piece of software. It can run on the Internet, on your computer, or on your phone or other electronic device. - Copyright: a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. The App Store is some kind of a database for iPhone, iPod touch, and iPad created by apple that allows users to browse, download and install app on their devices. Applications in an app store can vary in cost, from free downloads to quite costly ones, depending on who developed the application and its purpose. Software Apps, E-books that are sold through the app store are pirated. This software is basically electronic books, similar to real life books, where its contents are stored online. This Japanese copyright infringement is done through software that is uploaded through the internet that can be downloaded for a price. However, the payment is delivered to the offender, not the original person who owns the contents' rights. These pirated apps are Chinese -based language apps which plays a role in delaying the notice of the copyright infringement. 5. If possible, describe a solution to the concern (issue). Illegal distribution of copyrighted property should be banned. However, the massive infringe of the law is common in China. There should be more strict policy and laws in national level to reduce the number of these issues, such as measurement and specified steps of installing and removing application to satisfy companies wor
Woogyeong Jung

The changing landscape of online fraud: Long life spam | The Economist - 2 views

  •  
    article analysis march 25 soobin
  •  
    1. Identify the area of impact the scenario relates to. -- Leisure, Business 2.Identify all ITGS terminology and phrases (IT and Social/Ethical) -- Twitter, Trojan, Facebook, E-mail spamming, Botnet, messaging service, social inbox, spam, e-mail, networks, online-security firms, junk e-mails, blacklisted addresses, output, domain names, .cn, internet registrars, fraud, web-hosting, cybercrime, hard drives. 3.Describe one ITGS social/ethical concern in the article. --Security is a concern in this article where users and spam is concerned. The security of the users' sensitive information is at risk when users click on spam links no matter from what source, from e-mails (which are decreasing now) to Twitter tweet links. By clicking onto these harmful links, users set free spam that can infiltrate the user's hard drive in search for sensitive information for example bank account numbers. 4.Describe the relationship of the main stakeholders to the IT system. ---The main stakeholder will be hackers and people who are using e-mail and social networking. The relationships between them are, normally hackers used spam mail to spend virus or hack their computer with Trojan horse, but as the email security develop hackers slowly moved to social network which is Facebook, and other many programs. They know that people are currently using social networking a lot and their privacy is open and they could easily get people's email too. Therefore by using Koobface, they could hack people's computer and information 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. -- The problem with the security is that the security of the users of their personal and public communications are at risk where spam is concerned. Spam is nowadays being planted in almost every corner of the internet, no matter where, in order to try and trick users into clicking on the harmful links in order to spread malware, such as Trojans. Spam is comm
anonymous

How Egypt pulled its Internet plug - Computerworld - 3 views

  •  
    Sue Describe BGP. How does the BGP affect ISPs? Feb 4
  •  
     Describe BGP - BGP is the border gateway protocol, the protocol at the core of the internet's routing mechanism. BGP performs interdomain routing in Transmission-Control Protocol/Internet Protocol (TCP/IP) networks. BGP is an exterior gateway protocol (EGP), which means that it performs routing between multiple autonomous systems or domains and exchanges routing and reachability information with other BGP systems. - Control the pathways  How does the BGP affect ISPs? - BGP glues all ISPs and their large customers together to form the Internet. Besides traditional routing, BGP also supports routing for new IP services such as Multiprotocol Label Switching Virtual Private Network (MPLS VPN). - Without BGP information provided by Egyptian networks, the rest of the world has no way to connect with the country's ISPs or its Web sites. Nor do its citizens have a way to reach sites or services beyond its boundaries. - "The Egyptian government has instructed the ISPs whether state owned or sate licensed, to withdraw their BGP announcements that tell other routers how to reach those ISPs" -
anonymous

Why Did Newspapers Take So Long to Copy Groupon? - BusinessWeek - 3 views

  •  
    brief analysis Make sure to describe major terms, like groupon and livingsocial. march 7 woo
  •  
    1. Identify the area of impact the scenario relates to. Business, E-commerce 2. Identify the main stakeholders to the IT system. Online Newspaper companies, newspaper subscribers 3. Identify one ITGS social/ethical concern in the article. Globalization 4. Describe ITGS terminology and systems. - Groupon: a deal-of-the-day website that is localized to major geographic markets worldwide. Launched in November 2008, the first market for Groupon was Chicago. - LivingSocial: an international social buying company based in Washington, D.C. They specialize in daily deals offered in cities across the United States, as well as in Canada, Europe and Australia. - TimeLiimited: is a service just like Groupon, which emails its readers on special offers for travel and living terms The New York Times newspapers are going to start using the internet, and connection of the companies to its subscribers for a fee to their advantage, even though there is a slim chance now. It is the spread of public communication of news, the latest trends, and discounts to events and merchandise while connecting directly to personal communication means of its subscribers (through their e-mails). 5. If possible, describe a solution to the concern (issue). Straightforward copying Groupon is not the answer for the success online. The New York times might be able to have a chance against Groupon and LivingSocial, but these two big groups have already topped the business of connecting companies with deals to its customers and subscribers for a fee. The companies should be able to manage connection between merchants and their customers. The New York Times would have to come up with special deals that appeal to users, such as a subscription discount, so on, and so forth to grab customers' attention from Goupon and LivingSocial to the New York Time's TimesLimited. The process involves sending people e-mail offers and discounts from companies and service providers, then charging a fee for
anonymous

Internet blackouts: Reaching for the kill switch | The Economist - 2 views

  • cost Egypt as much as $90m
  • enforced closure of the internet can backfire
  • crudely disconnecting cables risks outrage elsewhere
  • ...2 more annotations...
  • And cutting international cables leaves a country’s internal connections intact
  • Egypt’s blackout had plenty of chinks
  •  
    What were the chinks in the blackout? What are problems with cutting national and international cables? Explain the possible financial impact of blackouts. How can a blackout backfire? march 11 kuni
  •  
    What were the chinks in the blackout? Many people abroad offered the Egyptians internet though the terrestrial phone system, which was basically a dial-up system. Moreover, Google and Twitter launched a service where users can voicemail their tweets, which is then converted into text, to publish their tweets online. What are problems with cutting national and international cables? It will cost a lot in budget and maybe some damage too, because it is complex and expensive to build and run a kill switch. Explain the possible financial impact of blackouts. The financial, impacts the finance of the blackouts are that money transactions and deposits are affected by the suddenly cut line, which may cause problems to both local individuals as well as large companies that are trying to seal a business deal between each other. An intergovernmental think-tank in paris predicts that the cost of damage in Egypt for its network shutdowns was around $90million. Also, other international countries that are trying to invest in the country that has a blackout are most likely to rethink their decision, and take their investing plans to another more stable country. This affects the country as the whole since they will be losing investors in their country. This would also affect the economy as rates change, the amount of people (tourists) flowing in and out of the country including business groups. How can a blackout backfire? A blackout can backfire its government because it can cause the citizens to view the government's act in a bad way. Cutting of connections will people will stop trusting its government, and would want to overthrow their leader/government. Moreover, This is somewhat a loss for the government. They wouldn't want their citizens to go up against them. Thus, citizens play a major role on how a blackout can backfire. The cutting internet doesn't help at all.
anonymous

BBC News - Bionic hand for 'elective amputation' patient - 13 views

  •  
    brief all sept 29 tik
  •  
    1. Identify the area of impact the scenario to. - Business, Health 2. Identify the main stakeholders to IT system. - the elective amputation patient. The people that are unable to use their hand. 3. Identify on ITGS social/ethical concern in the article. - People and machines. 4. Describe ITGS terminology and system. - Bionic: Artificial body part. The application of biology engineering. - Sensor: The device that use to record that something is present. 5. If possible, describe a solution to the concern. - The problem that this bionic hand got is that the patient may not feel like the bionic hands can replace their real hands, and the solution is that in the future that the technology is better so they can make the bionic hand better.
anonymous

BBC News - British Gas installs smart meters - 19 views

  •  
    brief all sept 5 woo
  •  
    1. Identify the area of impact the scenario relates to. Home and Leisure, Environment, Business 2. Identify the main stakeholders to the IT system. People, British Gas, UK Customers 3. Identify one ITGS social/ethical concern in the article. Reliability and Integrity 4. Describe ITGS terminology and systems. - Smart meter: an electronic device which enables users to monitor the cost of their electricity and gas consumption in real time, and eventually see how much power individual appliances are using. - Smart phones and Tablets - Devices that include smart features such as reading e-mails and featuring applications for users. Both smart phones and tablets today can feature touch screens, without needing a physical keyboard to operate the various actions. - GPRS: General Packet Radio Services (GPRS) is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. 5. If possible, describe a solution to the concern (issue). The concern that might rise from this case is that the devices, that are about to be installed on million homes, may not as effective as people have estimated. The reliability of the device depends on the device itself and the production company.
« First ‹ Previous 41 - 60 of 99 Next › Last »
Showing 20 items per page