Skip to main content

Home/ ITGS-SIS/ Group items tagged IT

Rss Feed Group items tagged

dec_burke

Robbins v. Lower Merion School District - Wikipedia, the free encyclopedia - 4 views

  • Covert surveillance capability
  •  
    Covert surveillance capability The school loaded each student's computer with LANrev's remote activation and tracking software. This included the now-discontinued "TheftTrack".[17][25][26][27] While TheftTrack was not enabled by default on the software, the program allowed the school district to elect to activate it, and to enable whichever of TheftTrack's surveillance options the school desired.[8] The school elected to enable TheftTrack to allow school district employees to secretly and remotely activate a tiny camera webcam embedded in the student's laptop, above the laptop's screen.[17][25][26][27] That allowed school officials to secretly take photos through the webcam, of whatever was in front of it and in its line of sight, and send the photos to the school's server.[8][17] The system snapped and sent a new photo every 15 minutes when the laptop was on, and TheftTrack was activated, though school employees could adjust the timeframe to as low as one-minute intervals.[8][28][29] LANrev disabled the webcams for all other uses (e.g., students were unable to use Photo Booth or video chat), so most students mistakenly believed that their webcams did not work at all.[30] In addition, TheftTrack allowed school officials to take screenshots (pictures of whatever was on the laptop's screen), and send them to the school's server.[8][17] Furthermore, a locating device would record the laptop's Internet (IP) address, enabling district technicians to discover which city the laptop was located and its internet service provider. (A subpoena to the provider would be required to pinpoint the exact location.) [29] In addition, LANrev allowed school officials to take snapshots of instant messages, web browsing, music playlists, and written compositions.[17][31] After sending the image to the school's server, the laptop was programmed to erase the "sent" file created on the laptop. That way, there would not be any trace by which students might realize that they were being watche
Conan Cheng

Ways to Watch BBC iPlayer Abroad - 1 views

  • iPlayer service by checking the physical location of the Internet provider you are using to connect to the Net
    • dec_burke
       
      How does this work? What are the technical terms. (CT)
    • ChunTing Yip
       
      The iPlayer service is able to detect you're IP address or ISP through your network and track down your location. As every area has a different IP, it would be easy to locate. There are IP locaters that allow systems to track physical locations around the world.  Unless you use a proxy server, it would be harder to track down your physical location, as it has no direct route back to your computer.
  • f you've got access to a PC back in the United Kingdom you can make a virtual private network tunnel back to that PC and connect to the iPlayer web site thru that PC, this can cause it to look like you are in the United Kingdom.
    • dec_burke
       
      How does this work? Use some technical terms to describe. (WK)
  • Firstly should you pick substitute or VPN options,
    • dec_burke
       
      What is substitute? What is VPN? Use technical terms. (Conan)
    • Conan Cheng
       
      A VPN is a private network that uses a public network to connect remote sites or users together. A key feature of a VPN is its ability to work over both private networks as well as public networks like the Internet. 
    • Conan Cheng
       
      TOR and Foxyproxy are examples of alternatives for VPN. TOR(The Onion Router), is an online anonymity system keeping user's internet activities from being monitored. Foxyproxy is a a firefox plugin that allows you to add proxies, keeping your ip hidden when you use it. 
  • ...1 more annotation...
  • so it is reallly a bargain for those among us who need to watch iPlayer abroad!
    • dec_burke
       
      Who are the stakeholders and how are they affected by this technology? (WL)
    • jawwanling
       
      The stakeholders would be the users of BBC iPlayer. Though they are users of BBC iPlayer, but they only can watch the TV at restricted areas. If they want to have access to BBC abroad they would have to search through the internet for TOR or Foxyproxy to provide them with a VPN. This may cause BBC iPlayer to slow down as there are many free users who are using the website too, therefore users of BBC iPlayer may not be able to watch the TV consistently.
dec_burke

BBC News - Government IT use must change: Institute for Government - 0 views

  • Flexible approach The government has already said it is seeking significant savings in its annual spending on IT - and will announce on Wednesday that both the Treasury and Cabinet Office will have to approve IT contracts worth more than £5m.
Conan Cheng

ROAR - LanSchool assists teachers in classroom management and computer monitoring - 8 views

  • LanSchool
    • dec_burke
       
      How does it work and what can it do?
    • ChunTing Yip
       
      As long as the students computers are connected to the teachers network, the program will allow teachers to send, share and monitor contents of the students, share a student's screen with the class and direct students to particular websites and programs. Teachers can also send individual notes to a students' screens, decreasing class interruptions.
    • jawwanling
       
      When the students attend a class, they will sign onto the teacher channels. By signing onto the teacher's channel, it allows teachers to monitor their students using their laptops during class time. Teachers can also control the student's screen, share a screen with the class etc.
    • Wei Kang Chay
       
      This program allows teachers to view and control students' computers when they are logged into the teacher's channels during lessons. This program would only work when they are connected to the school's network.
    • Conan Cheng
       
      When the students are in a classroom to attend a particular class, the program designed will be allow the teacher in charge to view every students computer screen as the students connect to the network. 
  • LanSchool students download the software onto their computer,
    • dec_burke
       
      can you for see any problems with this?
    • ChunTing Yip
       
      Since the program allows the teacher to access and control the student computer, theres a possibility that the teacher access students files on their computer while they're away.
    • ChunTing Yip
       
      A bit related to invasion of privacy.
    • Wei Kang Chay
       
      This allows teachers to view student's personal details/files without consent, when they are logged into their channel.
    • Conan Cheng
       
      This might lead to privacy problems due to the lack of security in the program. When the students connect to the teacher's computer, the teacher will have full access of the student's computer.
  • When students leave the class, they sign off of the channel, disabling the teacher from viewing the student’s screen.
    • dec_burke
       
      how does this work
    • jawwanling
       
      when the student's laptop is not within a certain range from the teacher's channel, students are automatically sign off of that channel (not sure if this is done by network or just the connection between the teacher's computer and the student's computer)
    • Wei Kang Chay
       
      The program would stop broadcasting the student's screen as soon as they leave the "channel". The program would use the school network to proxy the two computers and once the student has logged off the "channel", the program stops the connection
    • ChunTing Yip
       
      In order to run LanSchool students download the software onto their computer. When students leave the class, they sign off of the channel, disabling the teacher from viewing the student's screen. Since they leave the class, their computers would either be on standby or switch off mode, therefore the network accessibilty on the students computer would be switched off as well, therefore disabling connection with the network, and disabling the teacher from viewing the students screen.
    • Conan Cheng
       
      When the student leaves the network or exit the channel that they signed in to in order for the teachers to view their screens, the teachers will be able to access or view the students screen afterwards. Once the connection is lost, the program disables the connection between the 2 parties. 
Wei Kang Chay

Technology - 3 views

  • accelerometers
    • jawwanling
       
      An accelerometer is an electromechanical device that will measure acceleration forces.
  • gyroscopes
    • ChunTing Yip
       
      A device to provide stability or measuring/maintaining orientation.
    • ChunTing Yip
       
      consists of a spinning mass(a disk or wheel), mounted on a base so that its axis can turn freely in one or more rotations.
  • torque sensor
    • Wei Kang Chay
       
      A transducer that converts mechanical energy into electrical energy. It works by turning a metal shaft inside/protuding from the sensor. When the metal shaft is turned, the metal ring around it will apply a magnetic current.
Declan Burke

With the wave of a hand, Intel wants to do away with passwords - Yahoo! News UK - 2 views

  • A device using the technology would use built-in accelerometers to detect when a user puts it down, and would then log its owner off to keep unauthorized people from getting in
  • requires new software and biometric sensors built into consumer devices, but does not require the development of any new kinds of chips
  • Kissinger keeps promise to attend match
  •  
    "New monkey species found in Africa"
dec_burke

How will the national identity card work? - 2 views

  • For the smart card technology to work, it must be backed up by fingerprint and eye-scanners in banks, shops, estate agents, hotels, and public services such as hospitals. To check your identity they in turn must have 24hr access to the National Identity Register (NIR). Every time the card is used, information about when, where, and how it was used is stored on the database in the form of an audit log.
mobilityinfotech

Online taxi booking: Convenient and affordable - 2 views

  •  
    Online taxi booking software provides a seamless and efficient way to book rides with just a few taps on your device. It offers unmatched convenience by allowing users to schedule rides anytime, anywhere, while also providing transparency in pricing and availability. The software ensures affordability by offering competitive rates, promotional discounts, and efficient route planning. This combination of convenience and cost-effectiveness makes it an essential tool for modern transportation.
mobilityinfotech

Taxi Dispatch Software: Reducing Single-Occupancy Commute Impact - 1 views

  •  
    Examines the financial and environmental impacts of single-occupancy commutes in India. It highlights how taxi dispatch software can help reduce these effects by optimizing ride-sharing and improving vehicle utilization. By streamlining fleet management, such software reduces traffic congestion and lowers fuel consumption. The piece also explores how adopting such technologies can cut down on emissions, benefiting both commuters and the environment. Lastly, it suggests that taxi dispatch systems are key to promoting sustainable urban transportation solutions.
mobilityinfotech

Shuttle Software: Seamless Integration for Efficient Workflows - 1 views

  •  
    Shuttle Software enhances productivity by simplifying task management and system integration. It offers real-time collaboration tools, streamlining communication across teams. With robust data syncing capabilities, it ensures smooth operations. The intuitive interface makes adoption easy for all users. Shuttle is designed to improve efficiency and drive business success.
dec_burke

Taxi Driver: PICOS - 1 views

  • In case of overbookings, they delegate the orders to other taxi companies with which they have established trusted business relationships. Collaboration is also established for longer distance trips to find, for most of the time, a fare for both directions.
  • This trust implies that the car company will not misuse this information nor share it freely with others.
1 - 20 of 28 Next ›
Showing 20 items per page