Skip to main content

Home/ Groups/ Globaltech
anonymous

The voice behind Siri breaks his silence - Telegraph - 2 views

  •  
    for fun
anonymous

PC AI - Glossary of Terms (Subjects D-F) - 2 views

  •  
    AI glossary
anonymous

BBC NEWS | Programmes | Click - 2 views

  •  
    Ivy League education free on the web Presentation - Avik May 21
anonymous

Twitter Is a Critical Tool in Republican Campaigns - NYTimes.com - 2 views

  •  
    How is Twitter used? How effective is it? m12 feb 2 alec
anonymous

How To Block Facebook And Other Social Networks From Tracking You Online - 2 views

  •  
    more extensions to block tracking check out collusion
anonymous

Corporate computing: Online reputations in the dirt | The Economist - 2 views

  •  
    Explain the issues that are in common with both Amazon and Sony? Explain the reasons that cloud computing will continue to grow? What could have prevented Sony from getting hacked? Describe: Rambo architecture Chaos monkey Explain the reason that data centers for cloud computing need backups? may 9 woo
  • ...1 more comment...
  •  
    incomplete
  •  
    1. Explain the issues that are in common with both Amazon and Sony? Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people. 2. Explain the reasons that cloud computing will continue to grow? Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself. 3. What could have prevented Sony from getting hacked? Sony could have increased its protection system, as well as create random simulations in orde
  •  
    Tags: 1.1 Reliability and integrity 1.2 Security 3.3 Network
anonymous

On Computers » SKYPE YOUR FACEBOOK FRIENDS - 2 views

  •  
    fyi dec 2
anonymous

Magid on Tech: How Sony users can protect themselves in wake of security breach - San J... - 2 views

  •  
    List and explain each of the ways suggested to provide protection from this type of security breach. May 9 nat
  •  
    List and explain each of the ways suggested to provide protection from this type of security breach. Change the password. This is very crucial, if you've used the same password for every other accounts, because it means that anyone can open any account that belongs to you. An easy way to make a complicated password that's fairly easy to remember, is to create a meaningful sentence and take the initials. 'I was born on July 30th 1994' = Iwboj3094 Check your credit reports. This allows you to check and activities that is carried out with your credit card. You can also set your fraud alert. Don't get deceived by e-mails that looks official, because it may be a phishing site.
anonymous

Internet blackouts: Reaching for the kill switch | The Economist - 2 views

  • cost Egypt as much as $90m
  • enforced closure of the internet can backfire
  • crudely disconnecting cables risks outrage elsewhere
  • ...2 more annotations...
  • And cutting international cables leaves a country’s internal connections intact
  • Egypt’s blackout had plenty of chinks
  •  
    What were the chinks in the blackout? What are problems with cutting national and international cables? Explain the possible financial impact of blackouts. How can a blackout backfire? march 11 kuni
  •  
    What were the chinks in the blackout? Many people abroad offered the Egyptians internet though the terrestrial phone system, which was basically a dial-up system. Moreover, Google and Twitter launched a service where users can voicemail their tweets, which is then converted into text, to publish their tweets online. What are problems with cutting national and international cables? It will cost a lot in budget and maybe some damage too, because it is complex and expensive to build and run a kill switch. Explain the possible financial impact of blackouts. The financial, impacts the finance of the blackouts are that money transactions and deposits are affected by the suddenly cut line, which may cause problems to both local individuals as well as large companies that are trying to seal a business deal between each other. An intergovernmental think-tank in paris predicts that the cost of damage in Egypt for its network shutdowns was around $90million. Also, other international countries that are trying to invest in the country that has a blackout are most likely to rethink their decision, and take their investing plans to another more stable country. This affects the country as the whole since they will be losing investors in their country. This would also affect the economy as rates change, the amount of people (tourists) flowing in and out of the country including business groups. How can a blackout backfire? A blackout can backfire its government because it can cause the citizens to view the government's act in a bad way. Cutting of connections will people will stop trusting its government, and would want to overthrow their leader/government. Moreover, This is somewhat a loss for the government. They wouldn't want their citizens to go up against them. Thus, citizens play a major role on how a blackout can backfire. The cutting internet doesn't help at all.
anonymous

Amazon Malfunction Raises Doubts About Cloud Computing - NYTimes.com - 2 views

  •  
    Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. Why is the cloud model gaining popularity? List the problems that companies reported. april 28 az
  •  
    1) Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. One of the issues is that Amazon need to reconsider the contracts that cover cloud services such as how much to pay for backup and recovery services, including paying extra for data centers in different locations. The reason for this is because small businesses are less apt to pay for extensive backup and recovery services. The second issue would be many companies are relying too much on remote computers that are beyond their control. So they need to reconsider that also. The technical problem that interrupted computer services provided by Amazon told its customers and users that there may be a reliability problem with Amazon's service in online computing in the cloud. Companies and businesses operation network now revolves a lot around these remote network systems, so this also affects how companies will reconsider their use of exporting their files and data as opposed to keeping them within the company walls. 2) Why is the cloud model gaining popularity? Because owning a data center is high maintenance and therefore expensive. By using the cloud model, companies are avoiding the costs and headaches of running their own data centers. They just simply tap in, over the Web, to computer processing and storage without owning the actual machines or operating software. Businesses can also save their time by outsourcing to the cloud to save having to keep track of running their own data centers. 3) List the problems that companies reported. ( Unable to access data Service interruptions Sites being shut down
anonymous

NDTV Gadgets: Mobile and 'cloud' computing key future job skills: IBM - 2 views

  •  
    summary woo nov 22
  •  
    This article is about the potential significance of mobile and cloud computing. IBM proposes that there will be more software for Smartphone and tablets than traditional office system in 2015. They say that it is important to be able to adapt new technology, especially cloud computing, computing in which services and storage are provided over the Internet instead of in-house networks, which will eventually play a key determent in all profession in the future. IBM people claim that "A lot of companies we work with today are not only taking advantage of mobile but are putting IT (Information Technology) skills in the hands of all kinds of professionals," and predict that necessary job skills will include ability to handle software applications. Mobile and cloud computing were also ranked the hottest technology career opportunities next year, in a survey. Mobile applications sales are predicted to expand from 6.2 to 30 billion dollars by 2013.
  •  
    Tags: 2.1 Online business, 3.3 network, 3.4 Internet
anonymous

Bangkok Post : Simulation systems could help - 2 views

  •  
    Describe these IT systems: satellite imagery remote systems climate databases Explain how these systems help with forecasting. april 26 soo
  •  
     Satellite imagery Photograph of Earth or other planets made by means of artificial satellites Sources: http://en.wikipedia.org/wiki/Satellite_imagery  Remote Systems System which may be connected to by a local computer by using a modem or network Sources: http://dictionary.babylon.com/remote_system/  Climate databases Climate databases can predict risk coverage areas by simulating water flows and rain density, with geo-informatics applied to estimate how many households could face damage  Explain how these systems help with forecasting By these systems, people can find out the wind flow, geology issues easily and fast. If these systems are developing, the false information will be eliminating. Also it can help authorities evaluate damage more efficiently. Systems using satellite imagery, remote sensing, climate databases and high computing power can predict risk coverage areas by simulating water flows and rain density, with geo-informatics applied to estimate how many households could face damage.
  •  
    1. ITGS 2. Simulation 3. Systems 4. Modeling simulations 5. Database 6. computer 7. network
Tick Kanjanamaneeroj

First look: iphone 5 ()just for fun - 3 views

  •  
    just for fun
anonymous

http://www.wired.com/gadgetlab/2011/04/apple-iphone-tracking/ - 2 views

  •  
    Why were the customers spooked? Why is this a problem? Describe consolidated.db. Check this link: tracking and recording your location data. How is apple collecting geodata? Why is apple collecting geodata? Explain the problems with collecting geodata. Could law enforcement in America be able to subpoena these types of records from people's iPhones or iPads? april 26 cream
  •  
    How can iphone be hijacked? The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. How can a user tell if she is being SMS attacked? The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. Just turn off your iphone right away!
  •  
    Cream: Wrong Comment for this article. Comment again with the right answers. incomplete
anonymous

KeepMeOut - 2 views

shared by anonymous on 04 Feb 11 - Cached
  •  
    Try this if it helps
anonymous

Bangkok Post : Patient data need protection - 2 views

  •  
    Explain the issues and possible solutions. april 4 kuni
  •  
    The issue is that the increasing integration of medical devices in hospital networks can increases the risk of being attacked easily, which they hack into the network and steals information. They need to strengthen the security to get against with the possibility of virus attacks which could have a huge damage on delivering data for medication. The Public Health Ministry can play an important role as a regulator in healthcare security, as a same system with the security in the network banking.
anonymous

Bangkok Post : Medicine without borders - 2 views

  •  
    brief april 4
anonymous

China Tightens Electronic Censorship - NYTimes.com - 2 views

  • A host of evidence over the past several weeks shows that Chinese authorities are more determined than ever to police cellphone calls, electronic messages, e-mail and access to the Internet in order to smother any hint of antigovernment sentiment. In the cat-and-mouse game that characterizes electronic communications here, analysts suggest that the cat is getting bigger
  • LinkedIn, a networking platform, was blocked for a day during the height of government concerns over Internet-based calls for protests in Chinese cities a few weeks ago, he said
  • China’s censorship machine has been operating ever more efficiently since mid-2008, and restrictions once viewed as temporary — like bans on Facebook, YouTube and Twitter — are now considered permanent. Government-friendly alternatives have sprung and developed a following
  •  
    This is similar to the Google accuses China... article and will help with the answers. Describe VPN. How does a proxy work? List a proxy you find useful. When would you use a proxy? Explain: Google has "played a role in manufacturing social disorder". march 25 Azman
  •  
    Describe VPN. A VPN means virtual private network and what it does is that it send you data over the Internet in a secure connection. It travels packet over unprotected network in a secured manner. It provides you tunnel which secures your data and send it encrypted form over the Internet. How does a proxy work? By using a proxy the web browser window is then coded as part of the proxy site address and not the real website the surfer is visiting. Any information cached in the temporary folder is that of the proxy, not the users. This means the user is not traced at all and the information is kept hidden. Article Source: http://EzineArticles.com/3786946 List a proxy you find useful. Tor Trycatchme anonsafe When would you use a proxy? When you want to hide your IP from anyone. It is a good idea to use it while online shopping, accessing bank websites, and putting personal information. Explain: Google has "played a role in manufacturing social disorder". This means that Google has been the source of creating all the social disorder in the real world. Examples of these social disorders include the Libyan Protests as well as the Egypt Protests. These are named as social disorders. And Google, who feeds information to the various organizations and governments as well as provide social networking interfaces play a role in the community to communicate with each other in order to plan these social disorder events, such as the protests to overthrow the government.
anonymous

Bangkok Post : US names Baidu, PirateBay on copyright piracy list - 2 views

  • list of the world's top marketplaces for pirated and counterfeit goods
  • enabling piracy with "deep linking" searches
  • continue to work closely with brand owners and others to further enhance the level of trust and integrity in our online marketplaces
  • ...1 more annotation...
  • efforts to work with brand owners in protecting their intellectual property rights
  •  
    Identify the issue. Describe the possible solutions. march 11 jenny
  •  
    1.4_intellectual_property 2.5_digital_policing 3.4_internet
  •  
    Identify the issue Intellectual Property Rights - Piracy Describe the possible solutions Solutions that are harsh to the point of shutting down the website that hosts these download links to pirated music, videos, and other intellectual property, etc. Or censoring the pirated files on the website to be inaccessible. However, this isn't a feasible solution since it would cause massive uproar for the users who use the sites on a regular basis, which in this case may be millions of people. Policing IT malls, as well as formulating and enforcing strict laws with hard punishments for violators.
« First ‹ Previous 161 - 180 Next › Last »
Showing 20 items per page