Why might some people want to use tablets?
They are lighter and easier to carry around than PCs and easier to control because it is touch screen so you don't need a mouse to control the cursor, and just touch the screen. It may not be good for typing up documents, but they are easy for online searches as you don't need to sit down, open the laptop and search, but just do it on the spot.
1. Describe the IT terms.
Patented - Granted and protected by rights. A patent is a set of exclusive rights granted by a state, national government, to the inventor for a limited period of time in exchange for a public disclosure of the invention.
http://www.whatspatented.com/http://arstechnica.com/gadgets/
Cloud-based - software systems that based on the cloud (internet)
Voice recognition system- computer technology that uses audio input to enter data instead of a keyboard input. Audio input is carried through a connected microphone. The Software is designed to recognize words or phrases with an internal database. The program would then match the audio signature of speech with corresponding data in the database.
http://www.wisegeek.com/what-is-voice-recognition.htm
Cloud-based voice recognition - The voice recognition software the is important to virtual reality since it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. The audio signals are converted to electrical signals, and then transformed into coding patterns to which meanings have been assigned.
Automated voicemail - Automatic voicemail system that stores voice messages.
Goog-411 - an automated information service that uses voice recognition to find information for what the caller is asking for on local businesses. This also has a feature to send the information to the caller's phone via text messaging. Goog-411 has provided a foundation for Voice Search (search Google by speaking instead of typing, Voice Input (filling in any text field on Andriod by speaking), and Voice Actions (Controlling Android phones with voice commands).
http://arstechnica.com/business/news/2007/04/google-rolls-out-free-411-service.ars
Android - Google's mobile operating system (a modified Linux Kernal system). This is the software stack for mobile devices that include the operating system as well as the middleware along with key apps.
http://code.goo
Summarise:
Facebook is one of the biggest social network that is used by millions of users worldwide, but recently it has been getting complaints about its security and privacy. Therefore, Facebook is clarifying their policy on User Identification Data, because third party companies are not allowed to share the UIDs it collects to ad networks. Facebook modified its policy to forbid UIDs from leaving third-party applications and for such information to remain confidential. Ad networks had to sign a policy deal to make sure that they delete any information they obtain. Any who break this policy get placed on moratoriums, and will be observed, so that they don't do it again. Not only were the small developers effected, but also big companies such as Zynga were also caught transmitting some information.
Identify the area of impact the scenario relates to.
Business
Identify the main stakeholders to the IT system.
Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google
3. Identify one ITGS social/ethical concern in the article.
Privacy and anonymity
4. Describe ITGS terminology and systems.
IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
Sources : http://en.wikipedia.org/wiki/IP_address
iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV.
Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers.
5. If possible, describe a solution to the concern (issue).
There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.
What does it mean to leverage social networks?
To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising.
Define digimarketing.
Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online.
Explain the mistakes marketers make with social networking.
Marketers are not using the 'social' side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers.
Like for example via Twitter, some marketers try to take advantage of the 'Twitter trend', and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users.
1. Identify the area of impact the scenario relates to.
Business, Leisure
2. Identify the main stakeholders to the IT system.
IT users, mainly the ones who access social networking sites through mobile devices smart phone/tablet users, the business companies.
3. Identify one ITGS social/ethical concern in the article.
The digital Divide and the Equality of Access / Globalization and Cultural Diversity
4. Describe ITGS terminology and systems.
The tablets that offer internet as well as phone features play an important role in making the system work. The tablets offer a larger screen for the access compared to mobile phones, and it is challenging business companies and sites to remake their site into different various resolutions to fit all the new screen sizes. This affects the software of the program as well as the use of internet to connect to these sites. These sites offer personal and public communications through sites like Facebook.
Social Networking - the grouping of individuals who have joined together to form a virtual community or neighborhood subdivision.
Smart Phone: the "smart" mobile device that offers more advanced connectivity than the normal contemporary feature phone.
5. If possible, describe a solution to the concern (issue).
Users around Thailand are now being more connected online besides the rural areas where cable TV have a larger impact. Having governmental or commercial groups to try and build signal towers as well as spread the awareness of the use of mobile phones and decreases who uses the internet, and who doesn't.
"To deliver data analytics at the speed of thought – faster than you can type
– you have to change the interface because it moves so fast," Ellison bragged.
"Before you finish asking a question, it can guess and give you the answer."
Currently many people are using social networking to express their thoughts and emotions. The most well known social networkings are Facebook and Twitter. Many people in the world post their status, most posts are not significant but some have valuable information. This posts are representing nation's mood. So some companies like DataSift and Gnip are using Twitter as data plaforms. These companies are colleting all the information from the Twitter. When people updates their status, these companies collect all the information from the status which contains some feedback about companies' products. This brings good effects to company however, others raised question of privacy concerns. The companies are not ask and get information to individuals, most of the users raised question about individual privacy.
Who is Julian?
- Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.
What is WikiLeaks?
- WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.
Describe cyber attacks
- A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.
How did politics impact WikiLeaks?
- Protect citizens from knowing the secrets about politics
- They keep find track on information
-
How did WikiLeaks fight back?
- Protesting way back Julian being treated (Letting attacks to each other)
Google operated a crisis response page and a "Speak to Tweet" service that
allowed Egyptians to communicate online via voice telephone in the face of the
internet blackout.
Others, like net activist group Telecomix, were monitoring
amateur radio channels and provided virtual private networks and proxies to
Egyptian activists who required online anonymity.
The people used voice telephone to communicate with each other while the net was down.
Amateur radio channels and virtual private networks and proxies were provided and used by Egyptian activists in order to communicate with each other.
What kinds of passwords do people use?
Check Slate.com, which has created a handy tool to search the database for your username or e-mail address.
What is Farhad Manjoo's advice on creating a superstrong password?
1. Building Quality Back Links to Your Website - the way to a better ranking is to have quality websites link to yours. Such as websites in you niche or social media websites. If your site has these types of links search engines are more likely to give you website a higher ranking.
2. Anchor Text in Back Links - using anchor text also gets you a higher ranking, for example: if you use the URL www.sourcelinemedia.com - then the search engine only sees the site domain as part of its rankings. If you use anchor text such as Website Marketing and Design then search engines will rank you higher for anyone that searches for website marketing or website design.
3. On Page Optimization - Using key words helps to optimize your websites hits during a search. For example a site that has many key words relating to the information in its articles is more likely to get a hit on a search because the words relate to what they are searching. For example if you search Social Networking sites like Facebook, Twitter, and Tumblr would come up as the top few hits.
What evidence does Google present for Chinese government censorship?
How does this impact the Jasmine revolution?
Describe LinkedIn.
Why was LinkedIn disrupted?
What are the 7 International Safe Harbor Privacy Principles?
Explain the major criticism of this system (International...)?
Explain "self-censorship is a non-negotiable legal requirement".
Explain "China's political elite have a love hate relationship with the internet".
march 25
woo
1. What evidence does Google present for Chinese government censorship?
Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government.
2. How does this impact the Jasmine revolution?
The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly.
3. Describe LinkedIn.
LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection.
4. Why was LinkedIn disrupted?
LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
Suggest ways to prevent pop-up windows.
Why do travelers are seem to be a good target for hackers?
How did the hackers hack travelers' laptop?
What are the solutions to this attack?
How does the SSL secure the connection?