Skip to main content

Home/ Groups/ Globaltech
anonymous

KeepMeOut - 2 views

shared by anonymous on 04 Feb 11 - Cached
  •  
    Try this if it helps
anonymous

flowchart2.png (1490×1188) - 1 views

  •  
    how to procrastinate
anonymous

Gawker Hack Exposes Ridiculous Password Habits - PCWorld - 4 views

  •  
    What kinds of passwords do people use? Check Slate.com, which has created a handy tool to search the database for your username or e-mail address. What is Farhad Manjoo's advice on creating a superstrong password?
anonymous

Asia computer market has room for both tablets and laptops - 5 views

  •  
    Why might some people want to use tablets? dec 2 nat
  •  
    Why might some people want to use tablets? They are lighter and easier to carry around than PCs and easier to control because it is touch screen so you don't need a mouse to control the cursor, and just touch the screen. It may not be good for typing up documents, but they are easy for online searches as you don't need to sit down, open the laptop and search, but just do it on the spot.
anonymous

France24 - New funding for Viewdle, which lets smartphones 'see' - 1 views

  •  
    brief dec 2 kuninari
  • ...1 more comment...
  •  
    1.11 2.5 home and leisure / 2.5_digital_entertainment 2.5_social_networking 3.1,3.2,3.3,3.4,3.5
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is people and security on the machine. 2. Identify the main stakeholders to the IT system. The main stakeholder is security 3. Describe one ITGS social/ethical concern in the article. The concern is about the people and machines were there are problem with the recognitions on people 4. Describe ITGS terminology and systems. public transfer information systems is the information that will justify the people who is using on account to find whether people is using account on their own or using other person's account. 5. If possible, describe a solution to the concern (issue). It might need some more technology to fix the problem on recognitions that people can be use on other account or people can't use it even they are on their own account. They should be able to find the difference on fake also, like people using photo on other person to log in to their account.
  •  
    Kuni, you're suppose to upload your answers IN class. Just remember that for next time.
anonymous

Bangkok Post : The cloud has been around for a while - 0 views

  •  
    summary about the cloud soo nov 22
  •  
    1. The cloud has been around for a while  Summary about the cloud Many people are doing their own business everywhere around the world and they need something that can communicate with their customers, workers, and many other people. We call these communicating systems as Clouding. For example, currently there is phone call, emails and messaging systems are examples of clouding system. When people are using clouding system, they have to care about backup system to protect their files from losing. To have good clouding system, people need connection of Internet to send or receive their emails with cell phones or laptops. Then people should have their free email accounts like G-mail or Yahoo. Theses free email accounts allow large attachments and people can access theses emails everywhere. Unfortunately, business user who has Google or Yahoo accounts with their company name should pay a small annual fee. These systems are all cloud. People are using clouding computing already.
anonymous

20 Things I Learned About Browsers and the Web - 8 views

Azman Fadhilah

On Computers for 11/01/2010 - 0 views

  •  
    Gmail tips summary Basically, Gmail gives you a plenty of space to storage for example 7 gigabytes for free, which is already a lot. Even though you are running out of the space. You are able to get more spaces for just $5 per year, is quite cheap. What is so good about Gmail? The most useful feature is that you can link your other email account, AOL, Yahoo, or Hotmail right away to your Gmail, which means you do need to open up many email to check your Inbox. a) You can set up filters to skip the Inbox and go right to the folder or a trash can. b) If you happen to find some information that is quite old, Gmail uses GooGle search engine to allow you to find it easily. c) Gmail offers " canned message" You can set up a filter so that a certain type of email always gets a canned response.
anonymous

On Computers » SKYPE YOUR FACEBOOK FRIENDS - 2 views

  •  
    fyi dec 2
anonymous

On Computers » FACEBOOK DOWNLOADER - 1 views

  •  
    fyi dec 2
anonymous

Technology Live: Latest Tech News and Gadgets - USATODAY.com - 0 views

  •  
    fyi dec 2
anonymous

On Computers » BACKUP, AND THEN WHAT? - 1 views

  •  
    Describe the IT systems. Az nov 22
  •  
    The IT system in this article is software that lets you restore your whole system back on the old or new computer in case your computer dies. But first, you need a "bootable disk". If your computer won't start, insert the bootable disk and the operating system will find it and start up. Second, you need to backup your computer to an external hard drive or DVD before it died. Then, you can use this software called "Acronis True Image Home 2011" that put Windows and all your programs, files and settings, onto a different computer without any hardware conflicts. True Image also comes with a "Try and Decide" mode where you can try any program that is stored on your external hard drive and decide whether you want to keep it on your new computer. Acronis True Image Home also comes with online backup, which is free for 2gb and it makes a bootable disk for you.
anonymous

Google Jumps Into Fashion E-Commerce - WSJ.com - 2 views

  •  
    brief nat nov 22
  •  
    1. Identify the area of impact the scenario relates to. Business, leisure 2. Identify the main stakeholders to the IT system. Google Inc., users in the US. 3. Identify one ITGS social/ethical concern in the article. Security. 4. Describe ITGS terminology and systems. Boutiques.com : It is like amazon or ebay, and it directs shoppers to site where it can be purchased. Merchants pay them if the shopper buy the goods or click on it to learn more about it. 5. If possible, describe a solution to the concern (issue). Because it is on the internet, attention has to be paid to the issue of security. If any users buy anything, they would need to pay online by their credit cards, and some may feel reluctant to give credit card information online. To diminish this issue, Google will have to ensure a secure system where datas of each customers are kept safe and not misused.
Azman Fadhilah

Bangkok Post : The rise of the digital spies - 1 views

  •  
    1. Identify the area of impact the scenario relates to. Business and employment, Politics and Government 2. Identify the main stakeholders to the IT system. Politicians, Large Business owners, Victims 3. Identify one ITGS social/ethical concern in the article Surveillance / Privacy 4. Describe ITGS terminology and systems. The main IT system in this situation is the use of the evolving hardware that is customized to best fit the various situations that need to infiltrate a certain amount of security. The new spy devices today are integrated into everyday devices such as pens and glasses so that it is hard to track and sensor while going through security checks. 5. If possible, describe a solution to the concern (issue). Having the government and users agree to sign contracts which only allow certain amounts of digital spy equipment to be produced, and while shipment, if any equipment was found to be not authorized and legitimate to pay a large amount of fine to prevent further disuse of the equipment. Since most of the devices require some sort of signaling in order to spy, having new security checks based on lens reflection as well as machine signal waves can increase security because it would be easier to sensor such devices.
Azman Fadhilah

Bangkok Post : Every breath you take ... - 0 views

  •  
    1. The area of impact that the scenario relates to the Prgivacies that people can visit to the other people's profiles and view histories to find what the other person done in the past. 2. This is related to the Databases where Google stores the information on profile and history that what they had done. It is also related to surveillance 3. There is the problem with the privacy and anonymity that people can have access to the other persons profile to see their actions in the past. Most companies do this in career test for finding some inappropriate action that the person has done. 4.The database is a collection of information stored in an organized form in a computer. Program helps keep track of corporate passengers 5. For sollution, it might be helpfult to use proxy to get away from google tracking accounts.
Azman Fadhilah

Lithium battery danger on planes sparks debate - Travel - News - msnbc.com - 0 views

  •  
    Why are batteries environmentally hazardous? Because lithium batteries contain metal that will spontaneously ignite if exposed to air. Also, the negative and positive poles on some lithium batteries are close together, leading more easily to short circuit which can cause fire. Explain the issue of safety versus cost. The issue of safety here is that if the lithium batteries are improperly package, damage or have manufacturing defects, they can short circuit and ignite. Overheated lithium batteries can blow the lids off steel shipping containers and damage a plane. Once a battery catches fire, the heat can set off other batteries. Obama administration proposed rules but they are opposed by many because they say the rules would cost them hundreds of millions of dollars in added packaging, paperwork and training for employees. It will also mean delays in getting medical equipment to patients and would drive up the cost of shipments.
« First ‹ Previous 481 - 498 of 498
Showing 20 items per page