Skip to main content

Home/ Globaltech/ Group items tagged wifi

Rss Feed Group items tagged

anonymous

BBC News - 'Europe's biggest' free wi-fi zone set for London - 8 views

  •  
    Describe 3 benefits and 1 issue with this system. all jan 17 champ
  •  
    3 Benefits 1. Tourists came London to see the Olympics, they can share updated news and pictures with friends by using free WiFi connection 2. Free WiFi connection may reduce communicating cost because overseas calls are very expensive. 3. London will become a world-class city by providing fast, reliable, and free WiFI connection for people. 1 Issue The disadvantage is that if so many people use WiFi, malware can be easily spread through the signal. It may be difficult to find out who cause it.
anonymous

Electronic Security a Worry in an Age of Digital Espionage - NYTimes.com - 10 views

  •  
    List the precautions Mr. Lieberthal takes when visiting China. Define digital espionage. Why is it easy to steal information remotely? How was the US Chamber of Commerce hacked? Explain the reason for thwarting the cybertheft of trade secrets. all feb 16 soo paulo
  •  
    List the precautions Mr. Lieberthal takes when visiting China. * He leaves his cellphone and laptop at home. * He brings "loaner" devices. * He erases information before and after the trip. * He disables Bluetooth and Wifi. * He turns off his phone, and takes the battery out. * He only connects to the internet through an encrypted password protected channel. * He copies and pastes his password from a USB. Define digital espionage. Digital Espionage - The spying on digital information including corporate secrets and government secrets. These secrets are stored as digital data, and can be spied on and stolen. Why is it easy to steal information remotely? Because digital devices today are mostly connected to an internet network, and through this network, information can be stolen remotely if the hacker is able to hack into the system. Smart phones and digital personal devices are very common today. These devices are connected into workplace networks and carry information around. Hackers are able to hack into these devices and get onto the corporate network and steal information. How was the US Chamber of Commerce hacked? The US Chamber of Commerce was hacked through four of their employees, Asia policy experts' devices who travelled frequently to China. The Chamber's office digital devices including its printer and thermostat had a connection to an internet address in China. Through these remote connections to the digital devices, China could penetrate the inside information of the Chamber. Explain the reason for thwarting the cybertheft of trade secrets. Thwarting the cybertheft of trade secrets is to the benefit of the owner of those trade secrets. If cybertheft of trade secrets is not prevented, then other corporations would be able to use stolen trade information to their benefit, and possibly come out with the same product with slight modifications in order to gain more profit from other companies' ideas. This would also ruin the product
Alex Lenk

Singapore Airlines to launch inflight Internet in May? - Flights | hotels | frequent fl... - 3 views

  •  
    Chae Min November 5th  Describe the IT
  •  
    The IT system is in this article is internet access in flight at 30,000 feet. The Singapore airlines now provide internet for any digital device (such as tablet or laptop). The internet is provided by the self contained telecoms system on board each plain. It get the signal from satellite. Currently over 20 airlines using this WiFI and 3G signal thought to inmarsat's swift broadband satellite network.
anonymous

BBC News - Mobile phones could soon be 'powered by walking' - 7 views

  •  
    Explain the problem and solution. august 30 all alec
  •  
    The device is designed to absorb and feed on micro droplets of water. However if someone were to step in a large puddle of water the device could be over loaded and burnout. Also with the problem of how to transfer the energy a cable would work the best because if you use wifi or Bluetooth other devices could pick up that signal and steal the energy supply for their own use. A solution to the way power is generated it to do something similar to the Japanese train station and make the pad in the shoe absorb shockwaves from each step instead of the micro water molecules also if it were shock absorbent it could be but into a waterproof case so that it can withstand rain and puddles. Explain the purpose of this site. What does *) mean? This site tells you how secure your web browser is and what security is currently in place. *) means this information is most likely be recorded by web servers.
anonymous

IPhone Users in South Korea Sue Apple for Collecting Data Without Consent - Bloomberg - 3 views

  •  
    Brief Aug 24 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Government 2. Identify the main stakeholders to the IT system. Apple, Google, iOS device users 3. Identify one ITGS social/ethical concern in the article. Privacy, Anonymity 4. Describe ITGS terminology and systems. iPhone smartphone - Apple's iPhone smartphone that includes various smart features such as receiving e-mail, and application, more than just the average phone. Location recognition - the feature on the iPhone that allows the users to be recognized by their location near wifi hubs. Apple was ordered to encrypt location data of people using iPhones to address privacy concerns but the users claim that the device secretly collected information of the users' whereabouts. 5. If possible, describe a solution to the concern (issue). A solution to the privacy issue would be for users to turn off the location-recognition features on their iPhones so that Apple doesn't have access to your phone. Apple needs to be more careful with their data collection process, as well as encrypting the data so there is no breach of privacy of its users, or completely get rid of the whole system itself.
anonymous

BBC News - Free wi-fi in central London promotion launched - 8 views

  •  
    Explain possible security problems with this plan and possible solutions. all nov 8 woo
1 - 6 of 6
Showing 20 items per page