Skip to main content

Home/ Globaltech/ Group items tagged use

Rss Feed Group items tagged

anonymous

Libya turns off the Internet and the Massacres begin | ZDNet - 3 views

  • Now, though, realizing that they could no longer hide their abuses from a world a Twitter tweet away, the new model autocracies, such as Libya and Bahrain have realized that they need to cut their Internet links before bringing out the guns.
  • As in Bahrain, Libya’s Internet is essentially owned and controlled by the government through a telecommunication company Libya Telecom & Technology
  • Mobile phone services in Libya are also under the control of the government. So far though the government doesn’t seem to have cut international phone services off-perhaps because that’s harder to do without cutting off local telephone service.
  • ...1 more annotation...
  • “Should Libya block Internet traffic, as Egypt did, it will not affect http://bit.ly or any .ly domain.”
  •  
    Brief analysis march 1 natsuno
  •  
    Identify the area of impact the scenario relates to. Politics and government Identify the main stakeholders to the IT system. Libyan government, Libyan citizens, Libyan telecommunication company (Libya Telcom & Technology) 3. Identify one ITGS social/ethical concern in the article. Surveillance 4. Describe ITGS terminology and systems. Internet : a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange Bit.ly : URL shortening is a technique on the World Wide Web where a provider makes a web page available under a very short URL in addition to the original address. Top level domain : A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name. 5. If possible, describe a solution to the concern (issue). It is hard to suggest a solution basically because it is the government's decision to shut down the internet. Therefore the only way to solve this issue is to discourage dictatorship in Libya. Main reason for the shut down of the internet was the cooperation of Libya Telecom & Technology which is owned by the dictator's son.
anonymous

http://venturebeat.com/2011/02/20/arab-revolts-another-good-week-for-social-media-a-bad... - 1 views

  • The protests have been spurred by extensive use of social media such as Facebook and Twitter, which are seeing their moment in the sun as the tools of revolution
  • They’re unleashing movements for peace, democracy and freedom in a region of the world that seemed like it was content to live without them
  • It shows that the power of the network effect can work in political revolutions just as it does in other parts of our lives. Social media has become like the lever that opens the doors that stand in the way of freedom
  • ...1 more annotation...
  • “triumphalism about the recent events in the Middle East is premature. The contest is still in its early stages, and the new age of internet-driven democratization will endure only if we learn to counter the sophisticated measures now being developed to quash it
  •  
    To what extent do you think social media opens the door to freedom? march 1
anonymous

Blogs Wane as the Young Drift to Sites Like Twitter - NYTimes.com - 7 views

  •  
    Go to each link in the article and describe it. march 3 Nat
  •  
    Facebook : It is the world's largest social network site, which was founded in 2004 by Mark Zuckerberg. It has become a very developed source on the internet, where users can like, share, comment on something without leaving the web page that they were at. There are approximately 500 million users worldwide. Twitter : Twitter is a social networking site that was started up by a group of 10 people called Obvious, and it has become popular for its simplicity of "micro-blogging" where a twitterer or tweeter sends short messages called tweets, within 140 characters, and are shared with people that follow you, and to the public. Pew Research Center- It is a research center for the people and the press, and it is an independent, non-partisan public opinion research organization that studies attitudes toward politics, the press and public policy issues. Huffington post : Huffington post is a news website that began in 2005, and it has become the most heavily visited news web sites in the country. BlogHer : is a group blog, online community, and refers to an annual blogging conference for woman.  Lisa Stone, Elisa Camahort Page and Jory Des Jardins founded BlogHer in 2005 in response to the question, "Where are all the women bloggers?" Tumblr : Tumblr was founded in 2007 by David Krap, and it is a social networking site that allows user to post text, images, videos ,links, quotes and audio, which can be reblogged by other users who follow your blog. Google : Google was founded in 1998, and is known as the world's most popular internet search engine. Google hosts and develops a number of internet-based services and products,and generates profit primarily from advertising through its AdWords program, which has helped them earn huge profits for their company. LiveJournal : LiveJournal is a virtual community where Internet users can keep a blog, journal or a diary. LiveJournal is also the name of the free and open source server software that was desig
anonymous

Nokia at the crossroads: Blazing platforms | The Economist - 1 views

  •  
    Explain: As microprocessors become more powerful, mobile phones are changing into hand-held computers. As a result, most of their value is now in software and data services. This is where America, in particular Silicon Valley, is hard to beat. Companies like Apple and Google know how to build overarching technology platforms. And the Valley boasts an unparalleled ecosystem of entrepreneurs, venture capitalists and software developers who regularly spawn innovative services. march 29 cream
  •  
    It is all about microprocessor and how powerful it is. According to this article, it concerns with Nokia mobile phones as the company develop so much on hardware, which lack in software nowadays. In the other hand, Apple provides a really good with software, because they are mostly useful and impressive. So, now it is quite hard for Nokia to fight against this advance of Apple.
anonymous

Facebook Questions defers to the crowd - CSMonitor.com - 0 views

  •  
    Would you find this app useful? march 31
anonymous

Take a Photo of Yourself Every Day With Everyday - PCWorld Business Center - 1 views

  •  
    Cool app for the more narcissistic of us.
Natsuno Yoshida

IBM supercomputer wins first Jeopardy dust up - Computerworld - 1 views

  •  
    Explain how Watson can mimic human intelligence. Watson mimics human intelligence by going through the same process humans do in order to find an answer. Watsons can comprehend clues and pieces of information, analyze the information that is given, and come up with an answer to the problem. Explain the ways that computers can rival a human in answering questions. Computers are systematic machines. Humans, can also be, but in a less precise manner. Thus, computers that are given the same amount of information, and have access to a lot of background knowledge can possibly rival humans in answering questions because of the systems' advantage of sorting out pieces of information and analyzing it digitally. Humans depends on their brains, and not knowing whether they really do, or how much they analyze the data correctly or not. A computer's digital system can come up with a number of possibilities precisely and thus calculate the best conclusion to the question. Explain the ways AI can impact personal lives. With the help of AI, human needed jobs such as diagnosing problems and illness, self-service centers, and information center tasks can be given to the AIs. Also, this can enhance humans personal lives by offering the humans an extra helping hand, that isn't as emotional as humans, and can be just as effective as well as useful, albeit the cost will be very high. Why was Jeopardy a good challenge? Jeopardy is a good challenge because of the structure of the Jeopardy game itself. The game itself only provides sly clues, riddles mixed with sarcasm and irony. Humans can detect such facts in the clues, but for a machine, as well as the system to be able to recognize these clues as well as reading in between the words to understand the meaning for an answer is a challenge. The system would have to be taught the same way humans are taught to notice such abnormalities of the hints. This is harder to teach an AI since it doesn't follow the same path of instruction
anonymous

Web Browser Privacy Check - 8 views

  •  
    Try it. Explain the purpose of this site. What does *) mean? all aug 30 Az
  •  
    Explain the purpose of this site. The purpose of this site is to inform users what security related information is exposed by the web browser to any website that the users visited. This website can also be used to judge how effectively your identity is hidden if you are accessing the site via a proxy or a VPN. What does *) mean? The items marked with the asterisk will be most likely to be recorded by web servers.
anonymous

IPhone Users in South Korea Sue Apple for Collecting Data Without Consent - Bloomberg - 3 views

  •  
    Brief Aug 24 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Government 2. Identify the main stakeholders to the IT system. Apple, Google, iOS device users 3. Identify one ITGS social/ethical concern in the article. Privacy, Anonymity 4. Describe ITGS terminology and systems. iPhone smartphone - Apple's iPhone smartphone that includes various smart features such as receiving e-mail, and application, more than just the average phone. Location recognition - the feature on the iPhone that allows the users to be recognized by their location near wifi hubs. Apple was ordered to encrypt location data of people using iPhones to address privacy concerns but the users claim that the device secretly collected information of the users' whereabouts. 5. If possible, describe a solution to the concern (issue). A solution to the privacy issue would be for users to turn off the location-recognition features on their iPhones so that Apple doesn't have access to your phone. Apple needs to be more careful with their data collection process, as well as encrypting the data so there is no breach of privacy of its users, or completely get rid of the whole system itself.
anonymous

BBC News - British Gas installs smart meters - 19 views

  •  
    brief all sept 5 woo
  •  
    1. Identify the area of impact the scenario relates to. Home and Leisure, Environment, Business 2. Identify the main stakeholders to the IT system. People, British Gas, UK Customers 3. Identify one ITGS social/ethical concern in the article. Reliability and Integrity 4. Describe ITGS terminology and systems. - Smart meter: an electronic device which enables users to monitor the cost of their electricity and gas consumption in real time, and eventually see how much power individual appliances are using. - Smart phones and Tablets - Devices that include smart features such as reading e-mails and featuring applications for users. Both smart phones and tablets today can feature touch screens, without needing a physical keyboard to operate the various actions. - GPRS: General Packet Radio Services (GPRS) is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. 5. If possible, describe a solution to the concern (issue). The concern that might rise from this case is that the devices, that are about to be installed on million homes, may not as effective as people have estimated. The reliability of the device depends on the device itself and the production company.
anonymous

BBC News - Facebook works with Websense to add phishing safety net - 12 views

  •  
    brief all oct 10 nat
  •  
    1. Identify the area of impact the scenario relates to. Home, business 2. Identify the main stakeholders to the IT system. Facebook, Websesnse, Facebook users, Malicious web developers 3. Identify one ITGS social/ethical concern in the article. Reliability 4. Describe ITGS terminology and systems. URL: llows all resources on the internet to be located in a uniform manner. A URL is a website address that has all the pertinent information for finding the exact location attached to it. (E.g.WWW.facebook.com) Database-driven: Web pages that store information in their database. Phishing: Tricking Internet users into providing personal data for malicious or fraudulent use.
anonymous

Yes, your iPhone is tracking you -- the question's why - Computerworld - 3 views

  •  
    Why are iphones tracking people? april 28' cream
  •  
    Why are iphones tracking people? This is the issue of storing user's location data in unencrypted file. The file, named "consolidated.db," is an unencrypted SQLite database that can be found in the devices' file systems and in the iOS backup files created and updated by iTunes every time an iPhone or 3G iPad is synced. Since, we know that Apple is actually collecting location and some information on iphone that's why iphone is not safe at all. Although the file isn't immediately accessible on the device itself, it can be accessed on a jailbroken device via the iTunes-generated backup file. It also could potentially be accessed using other tools that allow you to explore an iOS device's file system while it's attached to a computer.
anonymous

iPhone Tracking Only Tip Of Security Iceberg -- InformationWeek - 1 views

  •  
    Explain what the following means: Miriam Wugmeister, chair of the global privacy practice at law firm Morrison & Foerster, echoes that assessment and stresses than employers should make it clear to employees that they can't expect privacy using corporate devices. While she observes that allowing employees to backup personal devices containing corporate data on a home computer could pose an e-discovery problem in the event of litigation, she also says there are good technical solutions that allow corporate IT administrators to create sandboxes that segregate personal and corporate communications. april 28 woo
  •  
    incomplete
anonymous

Sony suffers second major user data theft | Reuters - 1 views

  •  
    Explain what happened. Describe the issues. May 9 jen
  •  
    1.Explain what happened. Sony suffered a hack on their PC games network, which lead to theft of online user's data from its PlayStation video game network. The theft involved 77 million user information. Sony is now hiring various outside firms to investigate on the matter, and try to find the offenders to this hacking. Cyber-security detectives from Guidance Software and consultants from Robert Half International Inc's subsidiary Protviti were brought in to help with the clean-up. 2.Describe the issues. Issues from this includes the reliability and integrity, as well as the security of Sony's protection system and online user's sensitive information which include credit card numbers as well as passwords. The reliability is the reliability of Sony's software. It might have failed to function properly, thus being a loop hole of the hackers to get through. The integrity is keep users' data complete and unaltered without their permission by the hackers. There is also a privacy issue because user's sensitive data was stolen.
  •  
    1.2_security 2.1_online_bus 3.7_databases 3.6_multimedia_digital_media
anonymous

Magid on Tech: How Sony users can protect themselves in wake of security breach - San J... - 2 views

  •  
    List and explain each of the ways suggested to provide protection from this type of security breach. May 9 nat
  •  
    List and explain each of the ways suggested to provide protection from this type of security breach. Change the password. This is very crucial, if you've used the same password for every other accounts, because it means that anyone can open any account that belongs to you. An easy way to make a complicated password that's fairly easy to remember, is to create a meaningful sentence and take the initials. 'I was born on July 30th 1994' = Iwboj3094 Check your credit reports. This allows you to check and activities that is carried out with your credit card. You can also set your fraud alert. Don't get deceived by e-mails that looks official, because it may be a phishing site.
anonymous

'Anti-Facebook' Overwhelmed With Responses After Public Launch - The Hollywood Reporter - 14 views

  • our editor recommends
  • exploitive nature of the existing paradigm
  • difference between Facebook and Unthink
  •  
    Explain: -exploitive nature of the existing paradigm -difference between Facebook and Unthink Summarize the TechCrunch article. all nov 1 avik
  •  
    Unthink is a brand new social networking site where you can customize anything you want however way we want it to be. There are no arbitrary changes that will happen. It also aims to expose all the "evils" of Facebook and other social networking sites, since they have access and can use our information as and when they'd like. Unthink has branded itself as the 'anti-Facebook' and has gotten an amazing response on the day of its inauguration. Unthink is still in its beta stages. There are a few differences: - * Unthink allows you to make changes to your privacy settings, which are better compared to Facebook. There are no arbitrary changes that will happen on Unthink. * Unthink also allows for migration of accounts from an existing Facebook account. * We can also isolate the advertisements and group them accordingly as we want. Our interest and liking of particular brands may also be rewarded with discounts and offers.
kentsugeno

Ebay urges users to change passwords - 0 views

  •  
    Ebay has asked users to change their passwords following a cyberattack that compromised one of its databases. The auction site said that the database contained encrypted passwords and other non-financial information. The US firm added that it had no evidence of there being unauthorised activity on its members' accounts.
anonymous

Food & Beverage News: Top News - Surveillance tools or technologies that help in delive... - 10 views

  •  
    Identify the scenario. Define surveillance. List how CCTV is used. Describe the benefit of GPS. How does GPS work? How do you compress a video? Describe lossy compression.
« First ‹ Previous 161 - 179 of 179
Showing 20 items per page