Skip to main content

Home/ Globaltech/ Group items tagged why

Rss Feed Group items tagged

anonymous

Asia computer market has room for both tablets and laptops - 5 views

  •  
    Why might some people want to use tablets? dec 2 nat
  •  
    Why might some people want to use tablets? They are lighter and easier to carry around than PCs and easier to control because it is touch screen so you don't need a mouse to control the cursor, and just touch the screen. It may not be good for typing up documents, but they are easy for online searches as you don't need to sit down, open the laptop and search, but just do it on the spot.
anonymous

Canada regulator to reconsider Internet ruling | Reuters - 1 views

  •  
    Why would a government want to limit downloads? Feb 10 Soo
anonymous

Egypt's Internet Block Aims at Social Media - PCWorld - 3 views

  •  
    aNt Feb 4 Why did Egypt block the internet? How has the internet supported civil disobedience? What does it mean when the US says social media is a fundamental right?
  •  
    Why did Egypt block the internet? To shut down communications within the people of Egypt to stop them from organizing protests against the government using social networks as a tool of communication. How has the internet supported civil disobedience? Many of the protests were organised with the use of social networks such as Facebook and Twitter, which helped everyone to organise the protest with people they didn't know. What does it mean when the US says social media is a fundamental right? US is saying that social media is a fundamental right, therefore should not be blocked or shut down, because it has become an important source of communication, and people have the right to know what's going on in the world.
anonymous

IBM's Watson's ability to converse is a huge advance for AI research - Computerworld - 3 views

  •  
    Define: Artificial intelligence Turing test Why is a Jeopardy-playing computer considered such a huge advance in AI. Kuni Feb 22
  •  
    Define: Artificial intelligence- the branch of computer science that deal with writing computer programs that can solve problems creatively; "workers in AI hope to imitate or duplicate intelligence in computers and robots" Turing test- The Turing test is a proposal for a test of a machine's ability to demonstrate intelligence. It proceeds as follows: a human judge engages in a natural language conversation with one human and one machine, each of which tries to appear human. All participants are placed in isolated locations. Why is a Jeopardy-playing computer considered such a huge advance in AI? Because Jeopardy represents a next generation on AI that advancements in artificial intelligence and natural language processing that overcome the formidable challenge of conveying the same information in many different ways. The supercomputer owes that significance to its ability to deliver more than calculations and documents. This kind of ability makes this machine more equipped than any before it to systematize "thoughts" and converse.
anonymous

Bangkok Post : Cloud services open up business opportunities - 1 views

  •  
    What does cloud computing deal with? Describe each of the characteristics cloud services must have. Explain horizontal and vertical services. Define each layer of services. Explain the infrastructure capability terms. Why is bandwidth important? march 17 cream
  •  
    What does cloud computing deal with? Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications. Describe each of the characteristics cloud services must have. Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them. Fstandard user interface - Web browsers to have access to the cloud services. Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human. Fservice metering - The Charge of the usage of the cloud services. Faccess over the internet - The medium of having access to the internet, as well as other places over the internet. Explain horizontal and vertical services. Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example. Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used. Define each layer of services. Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere. Why is bandwidth important? Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
  •  
    1.5 Intellectual property 2.5 Home and leisure 3.3 Networks 3.4 Internet 3.7 Databases
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
anonymous

BBC News - Cyber security plan proposed by White House - 1 views

  •  
    Explain what the cyber security plan is designed to do. Why is this a critical issue? May 17 alec
  •  
    It is designed to stop the U.S.A. from being attacked cyberly like from hackers, criminals, and spies. It is a critical issue because if someone hacked the united states then they would be able yo launch missiles and begin a war that never should have been started also they could gain access to information that should be secret and not shared with the world.
anonymous

http://gigaom.com/2011/08/10/how-social-search-is-changing-the-search-industry-2/ - 2 views

  •  
    Explain why Google considers the information created in social networks to be so important. M12 Sept 1 nat
  •  
    Basically, what people do on social networks are; like people's statuses, comment on others' pictures, retweet others' statuses and etc. This can help companies like Google determine what the user might be interested in, as these activities on social networks sites reflect the users' behaviour online. Moreover, we tend to show to other users what you are interested in, (like liking fan pages)therefore a lot of the information companies like Google can get out from these websites are accurate. They can then put sites that they might take interest in at the top (first page), which may be more efficient for the user looking for that information, and the website itself.
anonymous

BBC News - GlobalSign stops secure certificates after hack claim - 3 views

  •  
    Explain what it means to stop secure certificates and why it was done. M12 sept 13 Kuni
  •  
    To stop secure certificates means to temporarily stop issuing authentication certificates to secure websites because the certificates have been compromised meaning that people's personal confidential information has been stolen. It was done to investigate the claims of a hacker that he had issued false certificates. It was suggested that personal emails in Iran and government emails in Holland had been compromised, probably for political reasons.
anonymous

10 reasons NOT to buy an Android and why I'm waiting for the iPhone 5 | ZDNet - 2 views

  •  
    Android problems and iOS
anonymous

Amazon Malfunction Raises Doubts About Cloud Computing - NYTimes.com - 2 views

  •  
    Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. Why is the cloud model gaining popularity? List the problems that companies reported. april 28 az
  •  
    1) Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. One of the issues is that Amazon need to reconsider the contracts that cover cloud services such as how much to pay for backup and recovery services, including paying extra for data centers in different locations. The reason for this is because small businesses are less apt to pay for extensive backup and recovery services. The second issue would be many companies are relying too much on remote computers that are beyond their control. So they need to reconsider that also. The technical problem that interrupted computer services provided by Amazon told its customers and users that there may be a reliability problem with Amazon's service in online computing in the cloud. Companies and businesses operation network now revolves a lot around these remote network systems, so this also affects how companies will reconsider their use of exporting their files and data as opposed to keeping them within the company walls. 2) Why is the cloud model gaining popularity? Because owning a data center is high maintenance and therefore expensive. By using the cloud model, companies are avoiding the costs and headaches of running their own data centers. They just simply tap in, over the Web, to computer processing and storage without owning the actual machines or operating software. Businesses can also save their time by outsourcing to the cloud to save having to keep track of running their own data centers. 3) List the problems that companies reported. ( Unable to access data Service interruptions Sites being shut down
anonymous

SV 150: Searchable database of Silicon Valley's top 150 companies for 2014 - SiliconVal... - 7 views

  •  
    Why is so much tech centered in Silicon Valley? Kohei
John Roy Schulte

Cut your family's cell phone bill - 5 views

  •  
    What are the 3 ways to reduce your cell phone bill? Why should this be important for our future?
Max Seol

Key Iranian oil terminal 'hacked' - 6 views

  •  
    Iran has been forced to disconnect key oil facilities after suffering a malware attack on Sunday, say reports. The computer virus is believed to have hit the internal computer systems at Iran's oil ministry and its national oil company. Equipment on the Kharg island and at other Iranian oil plants has been disconnected from the net as a precaution.
  •  
    Why is it a serious problem?
  •  
    Selected Article Oil is one of the valuable resources in the world so it is important for us to know how can this happen and how serious it is.
Max Seol

Millions of Americans ignore Facebook's privacy controls - 6 views

shared by Max Seol on 15 May 12 - No Cached
  •  
    NEW YORK (CNNMoney) -- As Facebook barrels toward its IPO, one of its biggest lightening-rod issues -- privacy -- is drawing a fresh spotlight. A Consumer Reports study released this week estimates that 13 million American Facebook users have never set or simply don't know about the site's privacy controls.
  •  
    What consequences will happen seriously? Why should people follow Facebook's privacy controls?
  •  
    Home Communications May 21
John Roy Schulte

Twitter fights court order for user's data - CNN.com - 1 views

  •  
    Why is this a crucial situation?
  •  
    Business Internet
kittinat chitpluem

15 Current Technologies A Child Born Today Will Never Use - 6 views

  •  
    1. Of the 15 current technologies that we presently use today, what do you think will be the first 5 to be obsolete or outdated 2 years from now, and why? 2. If the technologies in the future to come will be faster and better, does it necessarily mean that our future life will be easier and better?
  •  
    Home Hardware May 21
Yonghyeon Shin

FBI warns travelers of pop-up window cyber-attacks - CNN.com - 4 views

  •  
    How does the attack work? Suggest ways to prevent pop-up windows.
  • ...1 more comment...
  •  
    Suggest ways to prevent pop-up windows. Why do travelers are seem to be a good target for hackers? How did the hackers hack travelers' laptop? What are the solutions to this attack? How does the SSL secure the connection?
  •  
    Leisure, Business Internet
  •  
    May 23
anonymous

Privacy controversy over Path for iPhone, iPad should be a wake-up call - The Washingto... - 10 views

  •  
    Explain the issue with Path. Evaluate Apple's solution.  Should services such as Path take or hold our data? all feb 21 johnroy
  •  
    Explain the issue with Path. When you take apps by log in from your iOS device then it would take you personal information and put it into the Apple server. It does this without permission of the user. The reason why is doing this to locate the user where you are at and your friends. Evaluate Apple's solution. Their solution is just to add new feature so you would be aware that apps would take your private information and put into the main server apple server. When you're downloading or getting apps you need to approve that they get you privacy information. Should services such as Path take or hold our data? I believe that they shouldn't because it's hard to trust large companies. The information that they have could be sold to other person that interest about your privacy. Another possible solution is that the data that is stored could be hacked anytime and when this occurrence happens. The hacker can sell my privacy to someone or he directly knows where I live, what's my name and etc.
‹ Previous 21 - 40 of 62 Next › Last »
Showing 20 items per page