Skip to main content

Home/ Groups/ Globaltech
kuninari

How the Cloud Democratizes and Complicates Disaster Recovery | PCWorld Business Center - 4 views

  •  
    What is DR? What is problem with Laissez-Faire DR? What are the advantages and disadvantages using cloud on DR? all April 26 Martin
  •  
    What is DR? - Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions What is problem with Laissez-Faire DR? - The problem with Laissez-Faire DR is data loss Laissez-Faire DR can't do anything when you data are hacked What are the advantages and disadvantages using cloud on DR? - One of the advantages of using cloud on DR is it is easy to access. You just need a computer to access your data. - Disadvantage for using cloud on DR is lack of back up. When you lose your data, your data can be lost.
Tick Kanjanamaneeroj

Tablets expected to become preferred computing device | Apple - CNET News - 4 views

  •  
    Why do people prefer tablet more than PC ? What advantages of tablet that PCs don't have?
  •  
    Selected Article Tablet is becoming more and more popular so it is important for us to know the advantages of this device that a Laptop doesn't have and why is is so popular among users.
anonymous

Facebook tightens grip on user ID data - Yahoo! News - 4 views

  •  
    analysis Az dec 2
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment- Online business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Applications, Internet, UID, network, web, software developers, policy, analytics services, 3rd parties' applications. 3. Describe one ITGS social/ethical concern in the article. Privacy is the concern in this article because some software developers behind outside applications popular in the online community were "inadvertently" sharing user identification numbers. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder which is the Ad networks is sharing identifying information about users with advertising and Internet tracking companies. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Facebook (IT system) modified its policy to forbid user identification data from leaving third-party applications and for such information to remain confidential if used by analytics services connected to programs (privacy). 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The problem here is that all of the 10 most popular applications on Facebook were transmitting unique user ID numbers to outside companies which violates Facebook's policy: data received from Facebook, including UIDs, cannot be shared with data brokers and ad networks. 7. Evaluate one solution that addresses the problem identified. Facebook user should have a choice on whether or not to allow applications to get their UID. Facebook should also tighten their policy and make it harder for Ad networks to share UID with third party applications.
anonymous

http://www.theregister.co.uk/2011/04/21/amazon_web_services_outages_spans_zones/ - 4 views

  •  
    brief april 28 jen
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. Amazon and companies using Amazon's cloud service 3. Identify one ITGS social/ethical concern in the article Reliability 4. Describe ITGS terminology and systems. The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones. Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud. Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers. Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance. http://aws.amazon.com/ 5. If possible, describe a solution to the concern (issue). A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
anonymous

Libya turns off the Internet and the Massacres begin | ZDNet - 3 views

  • Now, though, realizing that they could no longer hide their abuses from a world a Twitter tweet away, the new model autocracies, such as Libya and Bahrain have realized that they need to cut their Internet links before bringing out the guns.
  • As in Bahrain, Libya’s Internet is essentially owned and controlled by the government through a telecommunication company Libya Telecom & Technology
  • Mobile phone services in Libya are also under the control of the government. So far though the government doesn’t seem to have cut international phone services off-perhaps because that’s harder to do without cutting off local telephone service.
  • ...1 more annotation...
  • “Should Libya block Internet traffic, as Egypt did, it will not affect http://bit.ly or any .ly domain.”
  •  
    Brief analysis march 1 natsuno
  •  
    Identify the area of impact the scenario relates to. Politics and government Identify the main stakeholders to the IT system. Libyan government, Libyan citizens, Libyan telecommunication company (Libya Telcom & Technology) 3. Identify one ITGS social/ethical concern in the article. Surveillance 4. Describe ITGS terminology and systems. Internet : a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange Bit.ly : URL shortening is a technique on the World Wide Web where a provider makes a web page available under a very short URL in addition to the original address. Top level domain : A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name. 5. If possible, describe a solution to the concern (issue). It is hard to suggest a solution basically because it is the government's decision to shut down the internet. Therefore the only way to solve this issue is to discourage dictatorship in Libya. Main reason for the shut down of the internet was the cooperation of Libya Telecom & Technology which is owned by the dictator's son.
anonymous

Don't Pay for Technology: 25 Freebies for Students - 3 views

  •  
    What might you use? march 25 soo
  •  
    I might use Adobe Buzzword, BibMe and 4 shared. For example Adobe Buzzword is helping me to write document on desktop therefore I can prepare my report or essay perfectly with free cost. BibMe is making citations in MLA format automatically so I don't have to spend my time writing and sort out about citation formatting. 4 shared is good program which gives all users free 5 GB of storage. So that I can save my work and I don't have to bring my USB all the time and if there is internet access, I can access to the internet and work on my work which saved in 4 shared.
anonymous

Wolverton: Customers had more faith in Sony than it deserved - San Jose Mercury News - 3 views

  •  
    Are any corporate databases and networks safe? Should consumers be wary about providing personal data online? How valuable is data stored online? May 11 soo
  •  
    Are any corporate databases and networks safe? According to the article, they mentioned that no corporation databases are not completely safe and secure enough to protect personal information. There are too much false which makes network perfectly safe. It is very large storage and contains a lot of personal information. If the network is too big, they can't manage the network well and all the weaknesses will occur. The hackers will aim to hack the corporate databases because it has a lot of information therefore; it is not actually very safe. Should consumers be wary about providing personal data online? Yes, consumers should be wary about providing personal data online, because all services that store the online data are all under risk of being hacked, and the data compromised. Once the sensitive information is compromised, the user is more vulnerable to scam attacks through e-mails, as well as have their bank accounts or other user accounts online hacked. consumers should be a warning to be wary about providing personal data online because no corporate networks are frequently attacked by hackers and no matter how diligently their administrators work to protect them or how many protections are put n place, no network is perfectly secure. Even Sony' security systems are not perfect at all. Therefore, people have to be wary about providing personal data online How valuable is data stored online? Data stored online is very valuable, especially sensitive information such as ID numbers and bank/credit card numbers. Other personal data such as names, passwords, and security question answers are useful for hackers, and can be easily used for impersonation on other sites to hack into user accounts for further bad intentions.
  •  
    1. ITGS 2. Security 3. Sony 4. Database 5. Network 6. Digital net networking
anonymous

Book Review - The Net Delusion - By Evgeny Morozov - NYTimes.com - 3 views

  • the ­asocial pursuit of profit is what drives social media
  • more capricious technology” than radio or television
  • capricious technology” than radio or television. Neither radio nor TV has “keyword-based filtering,” which allows regimes to use URLs and text to identify and suppress dangerous Web sites, or, like marketers, to collect information on the people who visit them
  • ...5 more annotations...
  • “Technology changes all the time,” he writes, “human nature hardly ever.”
  • Mass journalism and democracy are inextricably entwined
  • The Net Delusion
  • Against the Machine: How the Web Is Reshaping Culture and Commerce — and Why It Matters
  • For more on “The Net Delusion,”
  •  
    Feb 22 Does the Net allow more freedom or does is it a tool for governments and business to control us? Jenny
  •  
    1.7_surveillance 2.6_pol_gov 3.4_internet
  •  
    Does the Net allow more freedom or is it a tool for governments and businesses to control us? The Net allows both. The users can roam freely to their discretion where and what they want to put onto the web. It is just a matter of a country censoring the content, or the user self-censoring what is to be put on the web. Also, the governments and businesses both can use the Net to their advantage. The government can learn and find out various information of various individuals and trends of the public through the Net's social networking websites and other portal that have discussion between citizens themselves. Business are able to keep track of trends to see what is happening, such as the stock prices to what people like to eat, listen to, what they like to use. Thus the businesses are able to stay in business a little easier through knowing the information from the web. The businesses can also advertise themselves through the net, and that way, it is actually faster than having actual offline campaigns and advertisement. Therefore, the net can allow us both. We are free to use it more than let it control us. It's just a matter of fact that higher class society, social ranking, or economic status-ed has more chances to controlling the net due to their connections with the higher ups. Yet, censorship and surveillance is everywhere, and thus doesn't allow absolute freedom.
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
anonymous

Doodle: easy scheduling - 3 views

  •  
    Who wants to try this out? diigo administration asap cream nat
anonymous

Best content in IB ITGS | Diigo - Groups - 3 views

  •  
    Links for ITGS articles
anonymous

Glassboard. Private group sharing done right. - 3 views

anonymous

http://www.deathandtaxesmag.com/48941/obama-kill-switch-what-if-theres-a-war-in-america/ - 3 views

  •  
    Feb 4 Why shouldn't America allow a kill switch? Az
  •  
    Because shutting down the internet means shutting down their ability to communicate freely which is inhumane, corrupt, and immoral. The impact on the economy alone would be reason to never implement such measure.
anonymous

Foxconn: Robots don't complain or die | The Economist - 3 views

  •  
    Summary m12 nov 2 jenny
  •  
    Foxconn's employment ways have come to light. With suicide cases of their workers jumping out of the window. Foxconn say that they will be replacing a large amount of human labor with robots by 2012. And that they will move the workers up the value chain beyond basic manufacture working to increase productivity and innovation. However, it's for sure that some workers will be losing their jobs. Because of China's economic development, the costs are increasing, and whether or not they will be able to maintain a cheap "China price." Some may consider moving to other Asian countries for cheaper labor. However, Germany's Mittelstand firm that has a highly automated manufacturing system is just as competitive with China, but it isn't worried. Chinese authorities will continuously monitor the situation of how China will come to develop similarly to the West.
anonymous

AppleInsider | Georgia state senator hopes to replace schoolbooks with iPads - 3 views

  •  
    Is this a good or bad idea? Feb 14 Alec
  •  
    I believe that this is a good idea because the children will get an ipad for $500 and also the text books included this will cut down on the price of schooling because instead of having to pay more money for books. Also this will give the children more up to date knowledge on current events because they will get updates from around the world everyday.
anonymous

Egypt's Internet Block Aims at Social Media - PCWorld - 3 views

  •  
    aNt Feb 4 Why did Egypt block the internet? How has the internet supported civil disobedience? What does it mean when the US says social media is a fundamental right?
  •  
    Why did Egypt block the internet? To shut down communications within the people of Egypt to stop them from organizing protests against the government using social networks as a tool of communication. How has the internet supported civil disobedience? Many of the protests were organised with the use of social networks such as Facebook and Twitter, which helped everyone to organise the protest with people they didn't know. What does it mean when the US says social media is a fundamental right? US is saying that social media is a fundamental right, therefore should not be blocked or shut down, because it has become an important source of communication, and people have the right to know what's going on in the world.
anonymous

Moods on Twitter Follow Biological Rhythms, Study Finds - NYTimes.com - 3 views

  • The new analysis suggests that our moods are driven in part by a shared underlying biological rhythm that transcends culture and environment.
  •  
    Who is reading our tweets? Interesting info. m12 october 10 jenny
  •  
    Who is reading our tweets? Sociologists at Cornell University, as well as research teams around the world are ready our tweets to see the change in biological patterns in the days of the week, as well as the hours of the day.
anonymous

How Egypt pulled its Internet plug - Computerworld - 3 views

  •  
    Sue Describe BGP. How does the BGP affect ISPs? Feb 4
  •  
     Describe BGP - BGP is the border gateway protocol, the protocol at the core of the internet's routing mechanism. BGP performs interdomain routing in Transmission-Control Protocol/Internet Protocol (TCP/IP) networks. BGP is an exterior gateway protocol (EGP), which means that it performs routing between multiple autonomous systems or domains and exchanges routing and reachability information with other BGP systems. - Control the pathways  How does the BGP affect ISPs? - BGP glues all ISPs and their large customers together to form the Internet. Besides traditional routing, BGP also supports routing for new IP services such as Multiprotocol Label Switching Virtual Private Network (MPLS VPN). - Without BGP information provided by Egyptian networks, the rest of the world has no way to connect with the country's ISPs or its Web sites. Nor do its citizens have a way to reach sites or services beyond its boundaries. - "The Egyptian government has instructed the ISPs whether state owned or sate licensed, to withdraw their BGP announcements that tell other routers how to reach those ISPs" -
anonymous

Home - The home of Spybot-S&D! - 3 views

  •  
    Azman - Is this any good?
  •  
    I don't think so. The site looks very unprofessional and it doesn't look legitimate at all. A company that is not well known rates most of the awards that they won. It could be pretty good software but since it's free, there will be downsides and restrictions to it; and users need to be careful when installing freeware.
« First ‹ Previous 121 - 140 Next › Last »
Showing 20 items per page