Skip to main content

Home/ Groups/ Globaltech
Alex Lenk

The science and technology of air traffic control | Ars Technica - 6 views

  •  
    Da Woon November 1st  Describe the IT system
  •  
    This article tells us the air traffic controller (ATC) which helps us to have safe fly. ATC has access to sophisticated radar systems that provide an overview of the airspace they control, and they have communication tools to coordinate flight paths with the air crew. When the aircraft travel at higher speed than common modes of transport, the time available for pilots to react to a dangerous situation can be quite short. And ATC helps to aircraft approaching an airfield carefully and it checks the weather conditions for prevent pilots can't see other aircraft. ATC uses radar systems positioned at ATC facility to get a real time overview of the aircraft flying in the airspace they control. Many types of radar equipment are served for traffic on the ground. Primary Surveillance Radars (PSR) - The radar sends a directed pulse into the atmosphere, and when that pulse encounters an object it gets reflected back to the radar station. The bearing of the object with respect to the radar station and its approximate distance can be calculated by this. The radar is typically enclosed in a dome to protect it from adverse weather. Secondary Surveillance Radars (SSR) - the Secondary Surveillance Radar listens for messages from the aircraft's transponder. The radar rotates about the vertical axis, but transmits a specific signal on 1030 MHz. This signal is subsequently received by the aircraft's onboard transponder, which responds with a reply on 1090 MHz. SSR Modes - There are different modes of interrogation that compliant transponders respond to. A - The transponder responds with its squawk code, a unique identifier for the aircraft assigned by ATC comprising of four octal numbers. This code enables ATC to differentiate between the various aircraft being monitored, though it can also be used to discretely communicate the existence of an emergency situation onboard the aircraft. C - the transponder responds with the aircraft's pressure altitude, which is the altitude ab
anonymous

How Google could have made the Web secure and failed -- again | Common Sense Tech - CNE... - 1 views

  •  
    Describe IT Jason Oct 4
  •  
    Google have transfer you automatically to its "encrypted" service, one designed to prevent potential "eavesdropping" on your searches. Google have use SSL( secure socket layer) to protect your search. Is can also be use when you are logging on to your bank account online. Google have introduce the SSL search, with the SSL search you can do your searches on Google with more secure and you are in private so no one can see what are you searching. Before Google URL was HTTP/www.google.com but now it is HTTPS/www.google.com. Its secure now. Google have use SSL to help protect your data from unwanted access. So what you are connected to internet café, local hotspots or hotel your data will be secure. But Google is not responsible for any viruses you get over the internet searches. The SSL will only protect your personal information.
Rot Homkrathok

Plurality short film - 2 views

http://m.youtube.com/index?&desktop_uri=%2F

started by Rot Homkrathok on 24 Sep 13 no follow-up yet
anonymous

Data Brokers | Visual.ly - 1 views

  •  
    Summary Rot Oct 4
  •  
    * Customizability, highlighting parts required, bookmarking necessary 'pages' * Choice of chapters (relevant material) * Saves room in backpacks (less back strain), it's also lighter * Digital textbooks can't be lost, and if the E-reader is lost it can simply be replaced, the material is also digitized and can't be lost * Easy access and distribution, if everyone has their own E-reader, the material can simply be shared. * Students are more receptive to digitized learning material
anonymous

Control these large smart appliances with your iPhone | Appliances - CNET Reviews - 1 views

  •  
    Describe IT Dawoon Oct 2
  •  
    Most smart appliances have an accompanying application. Those applications are available on iOS and android. (Samsung's washer and dryer application is working on only iOS and Samsung's Galaxy mobile devices, not the rest of the Android devices.) There are some examples of using iOS to control the smart appliances 1. LG Smart ThinQ LFX31995ST LG Smart ThinQ app will tell you the internal temperatures of both the refrigerator and freezer, and whether it's on energy-saving mode or not. You can make grocery lists and automatically update your inventory once you've checked an item off the list. Also, you can search for recipes on the fridge based on what your fridge has in stock. 2. Whirlpool WRL767SIAM Side-by-Side Refrigerator with 6th Sense Live it transmits information directly to the free app on your smart device. Whirlpool's app can let you know, if the refrigerator door is open or if there has been a power outage. Whirlpool has also enabled this refrigerator to connect to the smart grid if it's available in your area, which will let you monitor energy usage through its app. 3. GE Profile PT9550SFSS Built-In Double Convection Wall Oven The game-change app turns your phone into a remote control for the oven. You can set the temperature, mode, and time for both ovens independently and turn them on with app. 4. LG Smart ThinQ LRE3027ST oven Smart ThinQ app will allow you to search for recipes and then cue up the cook time and temperature accordingly, but you still have to manually press start on the oven itself. LG app allows you to run diagnostics on the range to make sure that everything is running as it should be. 5. LG Smart ThinQ WT6001HV Washer/Smart ThinQ DLEX6001V Electric Dryer LG's Smart ThinQ washing machine features a gorgeous touch screen and connects to LG's Smart ThinQ app via your smartphone or tablet. It doesn't have a smart-grid function like some other washer/dryer apps, but it's otherwise similar in that it lets you check your wash cycle
anonymous

BBC News - US NSA and UK GCHQ 'can spy on smartphones' - 1 views

  •  
    summary jab
  •  
    On the September 8 article on "US NSA and UK GCHQ' can spy on smartphone" state that NSA (US National Security Agency) and British GCHQ have joint together and have cracked the smartphones such as IPhone, Blackberries and Android devices. The article said that this was a revelation by Edward Snowden who has been welcomed by Germany. This is why on Saturday; thousands of demonstrators in Berlin demand the NSA to stop monitory internet users. As Der Spiegel said, NSA and GCHQ have been able to read smartphone users contacts and lists of who had been called. This disclosure has ignited a heat of debate in Germany.
anonymous

Google's Schmidt: technology can create jobs - Sep. 9, 2013 - 2 views

  •  
    summary
Alex Lenk

BBC NEWS | Technology | Supermarket of the future - 2 views

  •  
    Jean October 10th  Describe the IT system by watching the video Answer here
  •  
    Basically just watch the video... ok lets start 1. The apps used in the supermarket needs to be downloaded by the clients before use. 2. Enter the store and open your apps from your mobile. 3. Pick the goods you want and scan the code off the bar code (using your cell phone) 4. The list of goods you buy will be store into your cell phone. 5. After scanning click the finish shopping button on your apps and the cell phone will generate a big bar-code which mix all the code you scan into one master-code. (like mixing salad after you put vegetables in) 6. Go to the paying counter and insert the master-code into the paying machine. 7. The machine will tell you how much to pay and client pay by cash, credit card and etc, Extra ( you can play stepping on fish in the supermarket for fun) Oh and there is a useless robot roaming around also.
Alex Lenk

Electronic Brain Helps Cut Credit Card Fraud : NPR - 1 views

shared by Alex Lenk on 08 Oct 13 - Cached
  •  
    Da Woon October 10 Brief Article Analysis Answer here.
  •  
    1. Identify the area of impact the scenario relates to. Business and employment, home and leisure 2. Identify the main stakeholders to the IT system. in this article, the credit card user and credit card companies are the main stakeholder 3. Identify and describe one ITGS social/ethical concern in the article. In this article, the social/ethical concern is integrity. In this article, it tells that Credit Card Company uses neural networks to keep track of every purchase people make and sorts them into patterns and categories. If people changed their purchasing pattern, the credit card calls you and ask you about did you really buy it. So, if we buy the computer first time, we changed our purchase pattern, so we are losing our integrity to Credit Card Company. So we are really hard to use our own credit card. 4. Describe ITGS terminology and systems. Transaction - Electronic funds transfer, the electronic exchange or transfer of money from one account to another Software - any set of machine-readable instructions that directs a computer's processor to perform specific operations. Hardware - the collection of physical elements that comprise a electrical device system 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. The one solution in this social/ethical concern would be making a password then using that password with signature to prove our identity when we purchase the product which is not in our pattern such as put our password on our mobile device when we purchasing product with transaction. So we don't need to get the call from Credit Card Company when we purchase the product which is not in our purchasing pattern. Also we can using biometrics on our digital device to prove that we purchase that product when we using transaction to purchase the product.
Alex Lenk

Smartphones all the rage, says St George | The Australian - 2 views

  •  
    Rot October 15th Brief Article Analysis
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify the main stakeholders to the IT system. St George Bank, the customers who use their services, 3. Identify and describe one ITGS social/ethical concern in the article. Reliability, the company and the customers depend on the new paying system developed by the company to perform reliably. 4. Describe ITGS terminology and systems. Applications: A piece of software that serves an auxiliary function for your electronic device IT: Short for information technology Internet: A large online server that stores information. Online: Being connected to a network. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
Alex Lenk

Take it easy, driver, Mr McGoogle's at the wheel - 1 views

  •  
    Jean  November 1st BAA
Alex Lenk

BBC News - Police crackdown on fake shopping sites - 1 views

  •  
    Alex October 30th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment. 2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products. 3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites. 4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
jasonkerr

Robot teachers invade South Korean classrooms - 0 views

  •  
    AI Rot describe the IT system Answer here :)
  •  
    * Telepresence: technologies which allow a person to feel as if they were present, to give the appearance of being present, or to have an effect, via telerobotics, at a place other than their true location. * voice recognition: Conversion of spoken words into text. * Robots: a machine capable of carrying out a complex series of actions automatically,
jasonkerr

Kibot the robot entertains kids, spies on them - 0 views

  •  
    AI Rock Summary Answer here :)
  •  
    Korean children, already fast becoming a robot-friendly lot, have a new companion in Kibot, a monkey-faced bot that can read fairy tales, sing songs, take pictures, and make video calls via a display embedded in its tummy. It is like a robot that will keep children accompany, Kibot, which runs on a rechargeable battery and is manufactured by iRiver, has plenty of other tricks up its sensor-enabled sleeves, too. It responds to gestures, like pats, by turning and pleasantly saying, "It feels good." When it encounters an obstacle, it can change direction to avoid it. It can take pictures and record and play back customized voices. It even serves as a language tutor for Korean and English. About the only things it doesn't do, seemingly, are scratch its head and swing from branch to branch.
jasonkerr

http://edition.cnn.com/2010/TECH/innovation/10/22/south.korea.robot.teachers/index.html - 0 views

Rot Describe the IT system

itgs

started by jasonkerr on 16 Oct 13 no follow-up yet
Alex Lenk

Twitter Lurches Toward Social E-Commerce | Wired Business | Wired.com - 1 views

  •  
    Rock October 28th  Describe the IT systems
  •  
    The article is talking about how customer can link their American Express card with the the customer their twitter account. People who sync their American express card with their twitter account can simply order or buy product by tweeting. 1. User have to sync their American Express card with their Twitter account, account information will be kept secret. 2. After account had been establish, User can access store that are involve with Twitter campaign. 3. If user find any tempting product, they can simply tweet it or go buy it directly from the store and get discount 4. Product price will be charged to user's American express card and deliver to user address
« First ‹ Previous 321 - 340 Next › Last »
Showing 20 items per page