Skip to main content

Home/ Groups/ Globaltech
Alex Lenk

Scanning plan aims to help robots in the home - 2 views

  •  
    What can robots be used for to recognize objects in everyday life? In your House? Outside?
anonymous

'Anti-Facebook' Overwhelmed With Responses After Public Launch - The Hollywood Reporter - 14 views

  • our editor recommends
  • exploitive nature of the existing paradigm
  • difference between Facebook and Unthink
  •  
    Explain: -exploitive nature of the existing paradigm -difference between Facebook and Unthink Summarize the TechCrunch article. all nov 1 avik
  •  
    Unthink is a brand new social networking site where you can customize anything you want however way we want it to be. There are no arbitrary changes that will happen. It also aims to expose all the "evils" of Facebook and other social networking sites, since they have access and can use our information as and when they'd like. Unthink has branded itself as the 'anti-Facebook' and has gotten an amazing response on the day of its inauguration. Unthink is still in its beta stages. There are a few differences: - * Unthink allows you to make changes to your privacy settings, which are better compared to Facebook. There are no arbitrary changes that will happen on Unthink. * Unthink also allows for migration of accounts from an existing Facebook account. * We can also isolate the advertisements and group them accordingly as we want. Our interest and liking of particular brands may also be rewarded with discounts and offers.
anonymous

Google Keeps Searches Fresh With Algorithm Update | News & Opinion | PCMag.com - 14 views

  •  
    Why did Google improve its search algorithm? all nov 9 Kong
  •  
    Google improved its search algorithm so they can stay up-to-date. Since that information is travels very fast with the internet, Google will need to keep the information on their search engine fresh. Its new algorithm update will prioritize most recent news about the current events, latest sports results, and most recent information.
anonymous

48 NASA Laptops Stolen in Two Years: A Case for Better Encryption Practices | PCWorld B... - 14 views

  •  
    Explain the problem and solution. How should you Choose a Laptop for Your Small Business? How can you Recover a Lost Phone, Tablet, or Laptop? How can you Stop Laptop Theft? all march 13 Kevin
anonymous

BBC News - Bionic hand for 'elective amputation' patient - 13 views

  •  
    brief all sept 29 tik
  •  
    1. Identify the area of impact the scenario to. - Business, Health 2. Identify the main stakeholders to IT system. - the elective amputation patient. The people that are unable to use their hand. 3. Identify on ITGS social/ethical concern in the article. - People and machines. 4. Describe ITGS terminology and system. - Bionic: Artificial body part. The application of biology engineering. - Sensor: The device that use to record that something is present. 5. If possible, describe a solution to the concern. - The problem that this bionic hand got is that the patient may not feel like the bionic hands can replace their real hands, and the solution is that in the future that the technology is better so they can make the bionic hand better.
anonymous

Hackers steal SSL certificates for CIA, MI6, Mossad - Computerworld - 13 views

  •  
    brief all sept 7 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Goverment 2. Identify the main stakeholders to the IT system. Mozilla, Google, DigiNotar, CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter, and Microsoft's Windows 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. SSL- Secure socket layer certificates used for transmitting private documents via the Internet. It creates an encrypted connection between your web server and you web browser that will protect transmitted private information from eavesdropping, data tampering, or message forgery. Man in the Middle- is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DigiNotar= DigiNotar is registered by the OPTA as a CSP that delivers qualified certificates that comply with the Dutch act on electronic signatures with respect to the European directive on electronic signatures. Sinces 2004 DigiNotar has entered the PKI hierarchy of the Dutch Government: PKIoverheid. This allows DigiNotar as Certificate Services Provider (CSP) to issue certificates complying with PKIoverheid specifications to government organisations. HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. 5. If possible, describe a solution to the concern (issue). Increase the security of the data for issuing a digital certificate to websites, and have updates of digital certificate periodically to check whether or not it has been compromised. Delete mo
Dawoon Jung

Patch issued for Java loopholes - 1 views

  •  
    Oracle has issued a patch for loopholes in its Java program that was being actively abused by cyber-thieves. The software giant took the unusual step of issuing the patch well before the usual date for security updates. The patch closes loopholes that together left users of almost every operating system vulnerable to infection by viruses.
  •  
    What is Java used for ????????
anonymous

BBC News - Facebook works with Websense to add phishing safety net - 12 views

  •  
    brief all oct 10 nat
  •  
    1. Identify the area of impact the scenario relates to. Home, business 2. Identify the main stakeholders to the IT system. Facebook, Websesnse, Facebook users, Malicious web developers 3. Identify one ITGS social/ethical concern in the article. Reliability 4. Describe ITGS terminology and systems. URL: llows all resources on the internet to be located in a uniform manner. A URL is a website address that has all the pertinent information for finding the exact location attached to it. (E.g.WWW.facebook.com) Database-driven: Web pages that store information in their database. Phishing: Tricking Internet users into providing personal data for malicious or fraudulent use.
anonymous

Court says ISPs can't be forced to monitor illegal downloads - 12 views

  •  
    summary all nov 28 alec
  •  
    BRUSSLES can't block users from downloading illegally because that would breach the EU rules. SABAM asked the court in Belgian to force scarlet to install a device to prevent users from downloading copyrighted work. Scarlet then had to install the device. The EU made a statement that that internet providers should have to install a filtering system. The ruling of that made the BEUC (consumer organization) get authorities thinking of a fairer way to provide legal downloads. Monique Goyens said that there is no point in trying to catch individual people for file sharing because there are so many it would be impossible to stop. EU - European Union SABAM - Belgian Society of Authors, Composers and Publishers BEUC - European Union Consumers Organisation
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
Chut Sanghiran

BBC News - The 'eye-tech' future of vision - 7 views

  •  
    What are the benefits of this technology? What are the disadvantages?
  •  
    We selected this Article, because it's essential to be up to date these centuries. This kind of technology would be useful in many types of ways. This future technology piece may be able to lead us to the next generation of technology.
  •  
    In case the video does not work. http://www.youtube.com/watch?v=pzLrRUuaMe4
anonymous

Twitter tired? Fatigued with Facebook? Try a new network - 11 views

  •  
    Would you try a new network? all feb 10 nat
  •  
    Personally I wouldn't try new networks, unless I have friends there. A lot of my friends are focused on Facebook, and I don't mind sharing my content with people I am friends with, as I usually decline requests from strangers, and are friends with people who I actually know or have mutual friends. However, I wouldn't mind giving Pinterest a go, as I think it sounds interesting, and also it sounds like Tumblr, which I like a lot, because we can share images with people with the same interest.
anonymous

BBC News - Web economy in G20 set to double by 2016, Google says - 11 views

  •  
    Why is this important to you? all feb 3 martin
  •  
    This is important to be for several reasons. First reason is that as the technology developes, i get the higher quality of technology.Second reason is that, the number of Internet and smart phone users will increase. In 2016, half of the population on the earth will use internet and smasrt phones. i will need to follow them.that way i can join with people globally.
Jang Han

BBC News - 3D images of tissue may help spot and treat cancer - 7 views

  •  
    Describe how 3D images helps the treatment of cancer. Who will benefit from this new technology?
  •  
    We assume that this article is very important to the society. This Article demonstrates how technology can cure diseases that never can be cured in the previous time. It also will show how necessary the society needs the technology.
anonymous

Google Declines To Remove Police Brutality Videos, Still Complies With 63% Of Gov't Tak... - 10 views

  • lethal to the YouTube brand
  • legitimate takedown requests
  • Transparency Report
  •  
    Explain the meaning of the following: -lethal to the YouTube brand -legitimate takedown requests -Transparency Report all oct 31 soo
  •  
    Q1. Explain the meaning of the following: - Lethal to the YouTube brand The Lethal to the YouTube brand means that making less valuable of YouTube site. They are forcing YouTube to erase videos, which makes brand YouTube will feel shameful of. - Legitimate takedown requests The Legitimate takedown requests are from government. The government asks to erase all the post that are illegal in YouTube. - Transparency report The Transparency report is showing that why government and other agencies are requesting YouTube to remove all the reports that are inappropriate.
anonymous

Good to Know - Google - 10 views

  •  
    Presentations M13 starting feb 9
anonymous

Smarter ways to pay | Bangkok Post: tech - 10 views

  • charge it to their credit cards simply by saying their names.
  • Starbucks is also investing $25 million (about 787 million baht) in Square as part of its latest round of financing, which values the company at $3.25 billion, and Howard Schultz, Starbucks' chief executive, will join Square's board. Starbucks has offered its own mobile payment app since last year and processes more than a million payments a week. Customers will continue to be able to use it, but they will also be able to use Pay With Square, Square's cellphone app, which eliminates even having to take the phone out of your pocket or sign a receipt.
  • At first, Starbucks customers will need to show the merchant a barcode on their phones. But when Starbucks uses Square's full GPS technology, the customer's phone will automatically notify the store that the customer has entered, and the customer's name and photo will pop up on the cashier's screen. The customer will give the merchant his or her name, Starbucks will match the photo and the payment will be complete.
  • ...3 more annotations...
  • challenge
  • Square, which was introduced in 2010, is one of many businesses _ like Google, PayPal, Sprint and Microsoft and start-ups like Scvngr and GoPago _ that are trying to offer mobile payments. But they have been slow to catch on as they require the cooperation of many players, including retailers, credit card firms, banks, phone carriers and phone makers.
  • compelling, safe and convenient experience for shoppers
  •  
    Article Analysis
anonymous

Correction: Facebook-Privacy Q&A story - The Washington Post - 10 views

  •  
    How does Facebook use the information people share to make money? Describe the issues that Facebook should address. all Dec 6 cream
  •  
    How does Facebook use the information people share to make money? Facebook uses the information people share to make money by using the data to give to advertising companies, which in turn, pay Facebook for the data they receive so that they can target Facebook users with more individualized advertising. The advertising business can choose who they want ads to be shown to, customized to be relevant to the person's personal interests and likes. The more ads that users see on Facebook, the more money Facebook earns from the advertising company. Therefore, the exposure of the information people share to advertising companies, in order to place these advertisements, earn them money. Describe the issues that Facebook should address. Issues that Facebook should address include: Privacy - The privacy of users' and their data should be kept private, and the issue needs to be addressed where other online companies target the user data, where the user clicks to see pages, and their online activity even though the user may not be online. Reliability - The reliability of Facebook's security system should also be addressed. Facebook needs to address how users are aware or unaware of how their data is being shared through their friends' apps, or shared to advertising companies. Also, users would need to be reassured that their data isn't distributed to other third party companies.
anonymous

Bangkok Post : Galaxy Tab taps enterprise market - 6 views

  •  
    Define enterprise market. Describe 3 examples of increasing the productivity and efficiency of employees. dec 2 nat
  •  
    Define enterprise market. A different market to the consumer market, for an example, to companies and businesses so that they can use it for their business. Describe 3 examples of increasing the productivity and efficiency of employees. Car insurance - If there is an road accident, the insurance company can take pictures and send information through the tablet, without going back to the company to tell the information. Auto business - Customers can look at e-catalogs, where they can see the models easily because it is touch sensitive.
‹ Previous 21 - 40 Next › Last »
Showing 20 items per page