Skip to main content

Home/ Groups/ Globaltech
anonymous

http://venturebeat.com/2011/02/20/arab-revolts-another-good-week-for-social-media-a-bad... - 1 views

  • The protests have been spurred by extensive use of social media such as Facebook and Twitter, which are seeing their moment in the sun as the tools of revolution
  • They’re unleashing movements for peace, democracy and freedom in a region of the world that seemed like it was content to live without them
  • It shows that the power of the network effect can work in political revolutions just as it does in other parts of our lives. Social media has become like the lever that opens the doors that stand in the way of freedom
  • ...1 more annotation...
  • “triumphalism about the recent events in the Middle East is premature. The contest is still in its early stages, and the new age of internet-driven democratization will endure only if we learn to counter the sophisticated measures now being developed to quash it
  •  
    To what extent do you think social media opens the door to freedom? march 1
HyoJeon Jang

BBC News - European watchdog warns Acta could threaten rights - 1 views

  •  
    What is Acta?
anonymous

Top 10 Google Products You Forgot All About - 1 views

  •  
    Which would you use? march 17 kuni
  •  
    I would use Google Sketchup, because this is one of the applications that I have on my computer. Google Sketchup is a software with which you can make a 3D model easily. Compared to the other 3D modeling software, Google Sketchup is easier to use. It has some tutorials for beginners, and you will find out how easy it is to create 3D model like a kid making a tower of blocks. Also, if you buy it, you will be able to convert it to a file that can be used for other 3D modeling software and modding games. I would use Google Trends just to see what's trending and Flight simulator in Google earth sounds pretty fun for when you're bored. I would use ; Google Page Creator, Flight simulator in Google Earth, and SketchUp. I would use the fight simulator, because it looks fun, and SketchUp mainly because I've always wanted to do some sort of graphics design on the computer. -In my opinion I would like to use Google SketchUp, and Google Book Search. First of all Google Sketch Up is helping me to make 3-D model. This is very useful in art class because when we have something like installations, we need some sketch of location and installation therefore by this program, I can draw 3-D installation and see how it looks like therefore this program is very useful for me. Also For the Google Book Search, this is kind of digital library which I can find book very easily and efficiently. I can see the books by this program also I can upload by own books which I can scan it. Therefore it might be very useful when I have something like writing essays. I would use Google Page creator. It enables to me create a page where I can find snippets of web pages, quotes, and images all over the web.
John Roy Schulte

Twitter fights court order for user's data - CNN.com - 1 views

  •  
    Why is this a crucial situation?
  •  
    Business Internet
anonymous

France24 - New funding for Viewdle, which lets smartphones 'see' - 1 views

  •  
    brief dec 2 kuninari
  • ...1 more comment...
  •  
    1.11 2.5 home and leisure / 2.5_digital_entertainment 2.5_social_networking 3.1,3.2,3.3,3.4,3.5
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is people and security on the machine. 2. Identify the main stakeholders to the IT system. The main stakeholder is security 3. Describe one ITGS social/ethical concern in the article. The concern is about the people and machines were there are problem with the recognitions on people 4. Describe ITGS terminology and systems. public transfer information systems is the information that will justify the people who is using on account to find whether people is using account on their own or using other person's account. 5. If possible, describe a solution to the concern (issue). It might need some more technology to fix the problem on recognitions that people can be use on other account or people can't use it even they are on their own account. They should be able to find the difference on fake also, like people using photo on other person to log in to their account.
  •  
    Kuni, you're suppose to upload your answers IN class. Just remember that for next time.
Yonghyeon Shin

Privacy controls to be adopted by mobile phone operators - 1 views

  •  
    How does this program help users to protect your mobile phone? give us detail examples and provide specific reasons. 26 April Kuninari
  •  
    How does this program help users to protect their mobile phone? Give us detail examples and provide specific reasons. These guidelines (it's NOT a program) will help customers decide what data phone companies can collect about them. Customers will be able to allow or refuse phone companies from passing on personal data to other companies. These guidelines protect the customer, not the mobile phone. An example of an app which currently shares information without permission from the customer is "Girls Around Me" app.
anonymous

How to use MSCONFIG in Windows 7: NetSquirrel.com - 1 views

  •  
    How to use MSCONFIG in Windows 7 Here is how to use MSCONFIG in Windows 7 to disable some of the unnecessary programs that automatically load on start-up. Disabling these programs will help your computer boot faster and crash less."
alec crosson

http://www.govtech.com/public-safety/Next-Generation-911-Take-Off-GT.html - 1 views

What are the advantages to being able to text 911? What are the possible flaws in the system? all April 26 Kong

started by alec crosson on 15 Apr 12 no follow-up yet
anonymous

On Computers » FACEBOOK DOWNLOADER - 1 views

  •  
    fyi dec 2
anonymous

On Computers » BACKUP, AND THEN WHAT? - 1 views

  •  
    Describe the IT systems. Az nov 22
  •  
    The IT system in this article is software that lets you restore your whole system back on the old or new computer in case your computer dies. But first, you need a "bootable disk". If your computer won't start, insert the bootable disk and the operating system will find it and start up. Second, you need to backup your computer to an external hard drive or DVD before it died. Then, you can use this software called "Acronis True Image Home 2011" that put Windows and all your programs, files and settings, onto a different computer without any hardware conflicts. True Image also comes with a "Try and Decide" mode where you can try any program that is stored on your external hard drive and decide whether you want to keep it on your new computer. Acronis True Image Home also comes with online backup, which is free for 2gb and it makes a bootable disk for you.
Woogyeong Jung

http://www.bangkokpost.com/mail/207851/ - 1 views

  •  
    brief analysis march 23 azman
  •  
    Identify the area of impact the scenario relates to. Health Identify the main stakeholders to the IT system. Patients, Brain Computer Interface, Tridi Identify one ITGS social/ethical concern in the article. Reliability Describe ITGS terminology and systems. BCI- Brain Computer Interface recognizes brain signals and uses them to control electrical or communication devices and can even assist in repairing human cognitive or sensory-motor functions. The technology use sensors to detect brain activity and amplify signals, which can then be processed into messages or commands to aid decision-making. If possible, describe a solution to the concern (issue). The reliability of the IT systems may be a concerned because the IT system may not be able to handle the different kind of disability, because there are many different kinds of disability. Moreover, the current concerns are that the users' lack of strengths. A possible solution for the system is to experiment the system to different people with different needs, so that it can handle different kind of people and their specific needs. A possible solution for the users, is to train them so that they can use the systems for a long time without getting exhausted, because the purpose of the BCI is to be able to use for a long term.
anonymous

Bangkok Post : Privacy a double-edged sword - 1 views

  •  
    What are the basic advantages and disadvantages of encryption? Alec nov 22
  •  
    incomplete
anonymous

Social Media News and Web Tips - Mashable - The Social Media Guide - 1 views

  •  
    What is mashable about? march 23 woo
  •  
    Mashable is the top source for news in social and digital media, technology and web culture started by Pete Cashmore back in July 05. With more than 40 million monthly page views, Mashable is the most prolific news site reporting breaking web news, providing analysis of trends, reviewing new websites and services, and offering social media resources and guides. The site contains various news update blogs in the social media, tech & Gadegets, business & marketing, areas as well as video mobile, dev & design, media, social good, and startups categories.
anonymous

The Survival Station - 51 Free Tools to Stay Informed and Invisible on the Internet - 1 views

  •  
    How could this help you? march 17 jenny
  •  
    1.3_privacy_anonymity 2.5_home_leisure 3.2 _software
  •  
    How would this help you? These tools could help us by providing us with at least some more sense of security that what we barely have left now. Because we are often on the Internet, we are exposed to the danger of being seen and tracked by others. These tools help us stay invisible and informed. The use of encryption is used as well as proxies to hide user IP addresses. The free tools are basically for us to be aware of what is being tracked of our online activity, and how we can prevent it with the software.
anonymous

100+ Google Tricks That Will Save You Time in School - Eternal Code - 1 views

  •  
    fyi march 17
Tick Kanjanamaneeroj

A Conversation With My 12 Year Old Self: 20th Anniversary Edition - YouTube - 1 views

anonymous

iPhone Tracking Only Tip Of Security Iceberg -- InformationWeek - 1 views

  •  
    Explain what the following means: Miriam Wugmeister, chair of the global privacy practice at law firm Morrison & Foerster, echoes that assessment and stresses than employers should make it clear to employees that they can't expect privacy using corporate devices. While she observes that allowing employees to backup personal devices containing corporate data on a home computer could pose an e-discovery problem in the event of litigation, she also says there are good technical solutions that allow corporate IT administrators to create sandboxes that segregate personal and corporate communications. april 28 woo
  •  
    incomplete
anonymous

Couchbase Offers NoSQL for IPhone | PCWorld Business Center - 1 views

  •  
    Explain: NoSQL non-relational database Explain the advantages of CouchDB's noSQL . May 9 soo
  •  
     Explain  NoSQL= NoSQL is a category of database engines that do not support the SQL (Structured Query Language) in order to achieve performance or reliability features that are incompatible with the flexibility of SQL. - http://stackoverflow.com/questions/4154635/what-is-nosql-what-is-purpose-of-nosql-where-can-i-get-sufficient-material-on-n  Non-relational database= a non-relational database developed by Damien Katz, now the chief technology officer for Couchbase. The company claims that Mobile Couchbase is the first non-relational, or NoSQL database, built for iOS. - http://stackoverflow.com/questions/202819/what-is-an-example-of-a-non-relational-database-where-how-are-they-used  Explain the advantages of CouchDB's noSQL - CouchDB and noSQL architecture has a number of advantages that make it attractive to iPhone applications developers, the company asserts. - CouchDB= Efficient use of working memory, Amount of storage space (takes up relatively minimal, under 20 megabytes download size limit imposed by many people CouchDB's NoSQL has advantages such as its synchronization capabilities with minimal coding. Data can be automatically synchronized across a network. The app can store data created on the phone itself, all the while also synchronizing the same data with a cloud service or a data center. The storage space taken up by CouchDB's NoSQL has efficient use of working memory. When it is embed in an app, it can still keep the app to be under the 20 mb download limit, and doesn't drain the battery.
  •  
    1. ITGS 2. NoSQL 3. iPhone 4. Network 5. Database
« First ‹ Previous 201 - 220 Next › Last »
Showing 20 items per page