Skip to main content

Home/ ITGS-SIS/ Group items tagged information

Rss Feed Group items tagged

Conan Cheng

Hackers release vast amounts of US police information - Telegraph - 0 views

  •  
    Hackers release vast amounts of US police information.
dec_burke

Robbins v. Lower Merion School District - Wikipedia, the free encyclopedia - 4 views

  • Covert surveillance capability
  •  
    Covert surveillance capability The school loaded each student's computer with LANrev's remote activation and tracking software. This included the now-discontinued "TheftTrack".[17][25][26][27] While TheftTrack was not enabled by default on the software, the program allowed the school district to elect to activate it, and to enable whichever of TheftTrack's surveillance options the school desired.[8] The school elected to enable TheftTrack to allow school district employees to secretly and remotely activate a tiny camera webcam embedded in the student's laptop, above the laptop's screen.[17][25][26][27] That allowed school officials to secretly take photos through the webcam, of whatever was in front of it and in its line of sight, and send the photos to the school's server.[8][17] The system snapped and sent a new photo every 15 minutes when the laptop was on, and TheftTrack was activated, though school employees could adjust the timeframe to as low as one-minute intervals.[8][28][29] LANrev disabled the webcams for all other uses (e.g., students were unable to use Photo Booth or video chat), so most students mistakenly believed that their webcams did not work at all.[30] In addition, TheftTrack allowed school officials to take screenshots (pictures of whatever was on the laptop's screen), and send them to the school's server.[8][17] Furthermore, a locating device would record the laptop's Internet (IP) address, enabling district technicians to discover which city the laptop was located and its internet service provider. (A subpoena to the provider would be required to pinpoint the exact location.) [29] In addition, LANrev allowed school officials to take snapshots of instant messages, web browsing, music playlists, and written compositions.[17][31] After sending the image to the school's server, the laptop was programmed to erase the "sent" file created on the laptop. That way, there would not be any trace by which students might realize that they were being watche
dec_burke

Sino Group of Hotels Selects MICROS OPERA Customer Information System -- HONG KONG, Jun... - 2 views

  • MICROS OPERA
  • customer relationship management.
    • dec_burke
       
      CRM
  • expandable modules
  • ...7 more annotations...
  • effective and easy deployment,
  • real time
  • powerful database
  • centrally-hosted in the MICROS Singapore Data Center
  • loyalty program
    • dec_burke
       
      % discount Frequent customers fast check in club card club lounge special benefits
  • customer loyalty
  • OPERA Property Management System
dec_burke

US credit cards outdated, less useful abroad, as 'chip and PIN' cards catch on - 1 views

  • Smart card transactions can be quicker, because the terminal and card communicate with each other -- the terminal verifying that the card is authentic and vice versa -- instead of the terminal having to communicate via Internet or wireless with the card issuer to verify that the card is real and hasn't been reported lost or stolen, says Randy Vanderhoof, executive director of the Smart Card Alliance, a nonprofit organization that works to promote the adoption of smart card technology.
  • Also, when a card leaves the cardholder's physical presence, it can be compromised, using a hand-held information-stealing device called a skimmer,
  • in which information is encoded into a magnetic stripe on the back of the card, and the newer so-called smart cards, which contain a computer chip that holds information.
  • ...1 more annotation...
  • So-called card cloning also can be easier with magnetic stripe cards. Vanderhoof says: "With chip-and-PIN, it's nearly impossible to create a fake card."   
dec_burke

Locked Up Learning | Technology helps reform prison education service - 2 views

dec_burke

You May Soon Be Able to Download Information Directly to Your Brain | RELEVANT Magazine - 0 views

  •  
    From Adrian
dec_burke

Taxi Driver: PICOS - 1 views

  • In case of overbookings, they delegate the orders to other taxi companies with which they have established trusted business relationships. Collaboration is also established for longer distance trips to find, for most of the time, a fare for both directions.
  • This trust implies that the car company will not misuse this information nor share it freely with others.
dec_burke

Revenue to use aerial photos for house tax - Independent.ie - 0 views

  • Aerial maps and GPS-style systems will measure "the distance from each property to a series of amenities and services".
  • Each of the buildings in the database has a unique identification, and the system can specify the use of around 90pc of buildings in the country – if they are, for example, a newsagents, school, takeaway or office block.
  • The spokeswoman said the GeoDirectory "provides information on property location and type; and spatially derived data that indicate relative distances of all residential properties from a series of key amenities and services including transport, health, education and emergency services".
  • ...1 more annotation...
  • those who deviate from the provided estimates face the prospects of checks, inspections and challenges.
dec_burke

Gantt Charts - Project Management Tools from MindTools.com - 4 views

  • Figure 1. Gantt Chart Example: Planning a custom-written computer project Task Earliest start Length Type Dependent on... A. High level analysis Week 0 1 week Sequential B. Selection of hardware platform Week 1 1 day Sequential A C. Installation and commissioning of hardware Week 1.2 2 weeks Parallel B D. Detailed analysis of core modules Week 1 2 weeks Sequential A E. Detailed analysis of supporting modules Week 3 2 weeks Sequential D F. Programming of core modules Week 3 2 weeks Sequential D G. Programming of supporting modules Week 5 3 weeks Sequential E H. Quality assurance of core modules Week 5 1 week Sequential F I. Quality assurance of supporting modules Week 8 1 week Sequential G J. Core module training Week 6 1 day Parallel C,H K. Development and QA of accounting reporting Week 5 1 week Parallel E L. Development and QA of management reporting Week 5 1 week Parallel E M. Development of Management Information System Week 6 1 week Sequential L N. Detailed training Week 9 1 week Sequential I, J, K, M
dec_burke

Hong Kong Identity Card - Wikipedia, the free encyclopedia - 1 views

  • The new cards contain an embedded microchip, which stores the bearer's information electronically.
dec_burke

BBC News - ID cards inevitable, says ex-minister Lord West - 8 views

  • The cards were designed to hold personal biometric data on an encrypted chip, including name, a photograph and fingerprints.
  • The supporting National Identity Register was designed to hold up to 50 pieces of information.
  • The ID-card scheme was launched in October 2009 but cancelled 16 months later and the database destroyed.
dec_burke

London Riots: BlackBerry Messenger Used More than Facebook or Twitter - 4 views

  • iOS or Android smartphones
  • police and media attention was drawn to a particular post on the Facebook page
    • dec_burke
       
      How come the police could access all this information and not what was on BBM?
  • tweet from rioters describing their deeds and where they were headed next. Some posted pictures of looting and burning police cars
  • ...1 more annotation...
  • got its hands on BBM messages directing rioters
    • dec_burke
       
      How did a newspaper manage to do what the police and government couldn't?
dec_burke

How will the national identity card work? - 2 views

  • For the smart card technology to work, it must be backed up by fingerprint and eye-scanners in banks, shops, estate agents, hotels, and public services such as hospitals. To check your identity they in turn must have 24hr access to the National Identity Register (NIR). Every time the card is used, information about when, where, and how it was used is stored on the database in the form of an audit log.
dec_burke

BP loses laptop with Gulf residents' claims data - CBS News - 2 views

  • The laptop was password-protected, but the information was not encrypted
dec_burke

BBC News - Jeremy Hunt urges web firms to join anti-piracy drive - 1 views

  • "Without a court order, any copyright owner can already use our removals process to inform us of copyright infringing content and have it removed from Google Search," the firm said in a statement.
    • dec_burke
       
      what do you think about this persons idea?
1 - 19 of 19
Showing 20 items per page