Skip to main content

Home/ ITGS-SIS/ Group items tagged on

Rss Feed Group items tagged

dec_burke

Robbins v. Lower Merion School District - Wikipedia, the free encyclopedia - 4 views

  • Covert surveillance capability
  •  
    Covert surveillance capability The school loaded each student's computer with LANrev's remote activation and tracking software. This included the now-discontinued "TheftTrack".[17][25][26][27] While TheftTrack was not enabled by default on the software, the program allowed the school district to elect to activate it, and to enable whichever of TheftTrack's surveillance options the school desired.[8] The school elected to enable TheftTrack to allow school district employees to secretly and remotely activate a tiny camera webcam embedded in the student's laptop, above the laptop's screen.[17][25][26][27] That allowed school officials to secretly take photos through the webcam, of whatever was in front of it and in its line of sight, and send the photos to the school's server.[8][17] The system snapped and sent a new photo every 15 minutes when the laptop was on, and TheftTrack was activated, though school employees could adjust the timeframe to as low as one-minute intervals.[8][28][29] LANrev disabled the webcams for all other uses (e.g., students were unable to use Photo Booth or video chat), so most students mistakenly believed that their webcams did not work at all.[30] In addition, TheftTrack allowed school officials to take screenshots (pictures of whatever was on the laptop's screen), and send them to the school's server.[8][17] Furthermore, a locating device would record the laptop's Internet (IP) address, enabling district technicians to discover which city the laptop was located and its internet service provider. (A subpoena to the provider would be required to pinpoint the exact location.) [29] In addition, LANrev allowed school officials to take snapshots of instant messages, web browsing, music playlists, and written compositions.[17][31] After sending the image to the school's server, the laptop was programmed to erase the "sent" file created on the laptop. That way, there would not be any trace by which students might realize that they were being watche
dec_burke

Add-On gives power and nuance to 'Do Not Track' (Wired UK) - 2 views

  • Do Not Call list
  • prevented from tracking visitors
  • a signal sent by your browser to a website.
  • ...5 more annotations...
  • import lists of tracking sites you want to block entirely
  • imports IE9's Tracker Protection List and builds on Firefox's Do Not Track header, which comes as a simple on or off setting. When turned on, every time you visit a website, Firefox sends a simple standardised message that says "Don't track me."
  • create a whitelist of websites that the user doesn't mind being tracked by. So, for instance, if you are fine with the personalisation at Nytimes.com, you could choose to have your browser not send the anti-tracking header to that site.
  • building on the online ad industry's preferred method of letting users opt out of tracking, which is cookies.
  • by using the Network Advertising Initiative page, but those cookies aren't permanent and if you clear your cookies, the opt-out disappears. Abine's tool makes them permanent and keeps the anti-tracking cookies, even if you clear other cookies.
Conan Cheng

ROAR - LanSchool assists teachers in classroom management and computer monitoring - 8 views

  • LanSchool
    • dec_burke
       
      How does it work and what can it do?
    • ChunTing Yip
       
      As long as the students computers are connected to the teachers network, the program will allow teachers to send, share and monitor contents of the students, share a student's screen with the class and direct students to particular websites and programs. Teachers can also send individual notes to a students' screens, decreasing class interruptions.
    • jawwanling
       
      When the students attend a class, they will sign onto the teacher channels. By signing onto the teacher's channel, it allows teachers to monitor their students using their laptops during class time. Teachers can also control the student's screen, share a screen with the class etc.
    • Wei Kang Chay
       
      This program allows teachers to view and control students' computers when they are logged into the teacher's channels during lessons. This program would only work when they are connected to the school's network.
    • Conan Cheng
       
      When the students are in a classroom to attend a particular class, the program designed will be allow the teacher in charge to view every students computer screen as the students connect to the network. 
  • LanSchool students download the software onto their computer,
    • dec_burke
       
      can you for see any problems with this?
    • ChunTing Yip
       
      Since the program allows the teacher to access and control the student computer, theres a possibility that the teacher access students files on their computer while they're away.
    • ChunTing Yip
       
      A bit related to invasion of privacy.
    • Wei Kang Chay
       
      This allows teachers to view student's personal details/files without consent, when they are logged into their channel.
    • Conan Cheng
       
      This might lead to privacy problems due to the lack of security in the program. When the students connect to the teacher's computer, the teacher will have full access of the student's computer.
  • When students leave the class, they sign off of the channel, disabling the teacher from viewing the student’s screen.
    • dec_burke
       
      how does this work
    • jawwanling
       
      when the student's laptop is not within a certain range from the teacher's channel, students are automatically sign off of that channel (not sure if this is done by network or just the connection between the teacher's computer and the student's computer)
    • Wei Kang Chay
       
      The program would stop broadcasting the student's screen as soon as they leave the "channel". The program would use the school network to proxy the two computers and once the student has logged off the "channel", the program stops the connection
    • ChunTing Yip
       
      In order to run LanSchool students download the software onto their computer. When students leave the class, they sign off of the channel, disabling the teacher from viewing the student's screen. Since they leave the class, their computers would either be on standby or switch off mode, therefore the network accessibilty on the students computer would be switched off as well, therefore disabling connection with the network, and disabling the teacher from viewing the students screen.
    • Conan Cheng
       
      When the student leaves the network or exit the channel that they signed in to in order for the teachers to view their screens, the teachers will be able to access or view the students screen afterwards. Once the connection is lost, the program disables the connection between the 2 parties. 
dec_burke

London Riots: BlackBerry Messenger Used More than Facebook or Twitter - 4 views

  • iOS or Android smartphones
  • police and media attention was drawn to a particular post on the Facebook page
    • dec_burke
       
      How come the police could access all this information and not what was on BBM?
  • tweet from rioters describing their deeds and where they were headed next. Some posted pictures of looting and burning police cars
  • ...1 more annotation...
  • got its hands on BBM messages directing rioters
    • dec_burke
       
      How did a newspaper manage to do what the police and government couldn't?
ChunTing Yip

BBC NEWS | UK | Company loses data on criminals - 2 views

  •  
    Loss on criminal data. over 90000 criminals and prisoners.
Declan Burke

Data Centers Waste Vast Amounts of Energy, Belying Industry Image - NYTimes.com - 1 views

  • McKinsey & Company analyzed energy use by data centers and found that, on average, they were using only 6 percent to 12 percent of the electricity powering their servers to perform computations. The rest was essentially used to keep servers idling and ready in case of a surge in activity that could slow or crash their operations.
  • To guard against a power failure, they further rely on banks of generators that emit diesel exhaust.
  • Even running electricity at full throttle has not been enough to satisfy the industry. In addition to generators, most large data centers contain banks of huge, spinning flywheels or thousands of lead-acid batteries — many of them similar to automobile batteries
dec_burke

First fleet of AutoTAXI-equipped "flying taxis" rolls out onto Hong Kong streets - 0 views

  • The AutoTAXI platform features interactive terminals mounted on the dashboard for driver access and on seat backs for passengers. Driver-centric services include job dispatch, Global Positioning System (GPS) navigation, black box, taxi alarm monitoring service and speeding alert. For passengers, the multimedia platform gives access to coupons, news, entertainment, real time location
dec_burke

Auracle Geospatial Science, Inc. (AGS) Remote Sensing and Geospatial Intelligence News ... - 4 views

  • Figure 4 illustrates a satellite remote sensing process as applied to agricultural monitoring processes. The sun (A) emits electromagnetic energy (B) to plants (C). A portion of the electromagnetic energy is transmitted through the leaves. The sensor on the satellite detects the reflected energy (D). The data is then transmitted to the ground station (E). The data is analyzed (F) and displayed on field maps (G).
dec_burke

da Vinci® Surgery - Glossary - 1 views

  • Stereo or binocular vision created by two optical channels, as in two eyes. Three-dimensional vision blends the separate images seen by each eye into one composite image, which gives us the ability to perceive depth and judge distances.
  • A movable, rotating joint, as in the human wrist or as in da Vinci’s patented EndoWrist® instruments
  • A 3-dimensional conformal radiation therapy (3D-CRT) uses sophisticated computer software to conform or shape the distribution of radiation beams to the 3-dimensional shape of the diseased prostate, sparing damage to normal tissue in the vicinity of treatment.
  • ...3 more annotations...
  • A small tubular lens device, usually attached to a video monitor, and video camera, and used to visualize the inside of the body.
  • Minimally invasive surgery (also known as MIS, minimal access, keyhole surgery, laparoscopic, or endoscopic surgery) is intended to eliminate the most physically and emotionally traumatic elements of conventional open surgery, including pain and lengthy recovery. Advances in MIS allow surgeons access to affected tissues and organs through very small incisions.
  • Surgery performed using the assistance of robotic technologies. Existing systems like da Vinci are designed to provide surgeons with enhanced capabilities rather than designed to operate on their own.
Wei Kang Chay

Technology - 3 views

  • accelerometers
    • jawwanling
       
      An accelerometer is an electromechanical device that will measure acceleration forces.
  • gyroscopes
    • ChunTing Yip
       
      A device to provide stability or measuring/maintaining orientation.
    • ChunTing Yip
       
      consists of a spinning mass(a disk or wheel), mounted on a base so that its axis can turn freely in one or more rotations.
  • torque sensor
    • Wei Kang Chay
       
      A transducer that converts mechanical energy into electrical energy. It works by turning a metal shaft inside/protuding from the sensor. When the metal shaft is turned, the metal ring around it will apply a magnetic current.
dec_burke

Computer-Brain Interfaces Making Big Leaps - NYTimes.com - 0 views

  •  
    more on brain upload
dec_burke

BBC News - Government IT use must change: Institute for Government - 0 views

  • Flexible approach The government has already said it is seeking significant savings in its annual spending on IT - and will announce on Wednesday that both the Treasury and Cabinet Office will have to approve IT contracts worth more than £5m.
dec_burke

BBC News - Cyber criminals find new targets on unsuspecting sites - 0 views

  • The proportion of websites secretly harbouring malware has reached one in 3,000 according to security firm Kaspersky. It found a surge in the number of web-based attacks in 2010, with more than 580 million incidents detected.
Wei Kang Chay

Hackers wage global 'cyberwar' in defense of WikiLeaks - CSMonitor.com - 2 views

  •  
    Cyberwarfare waged on companies in the defense of Wiki Leaks founder Julian Assange.
dec_burke

US credit cards outdated, less useful abroad, as 'chip and PIN' cards catch on - 1 views

  • Smart card transactions can be quicker, because the terminal and card communicate with each other -- the terminal verifying that the card is authentic and vice versa -- instead of the terminal having to communicate via Internet or wireless with the card issuer to verify that the card is real and hasn't been reported lost or stolen, says Randy Vanderhoof, executive director of the Smart Card Alliance, a nonprofit organization that works to promote the adoption of smart card technology.
  • Also, when a card leaves the cardholder's physical presence, it can be compromised, using a hand-held information-stealing device called a skimmer,
  • in which information is encoded into a magnetic stripe on the back of the card, and the newer so-called smart cards, which contain a computer chip that holds information.
  • ...1 more annotation...
  • So-called card cloning also can be easier with magnetic stripe cards. Vanderhoof says: "With chip-and-PIN, it's nearly impossible to create a fake card."   
dec_burke

Revenue to use aerial photos for house tax - Independent.ie - 0 views

  • Aerial maps and GPS-style systems will measure "the distance from each property to a series of amenities and services".
  • Each of the buildings in the database has a unique identification, and the system can specify the use of around 90pc of buildings in the country – if they are, for example, a newsagents, school, takeaway or office block.
  • The spokeswoman said the GeoDirectory "provides information on property location and type; and spatially derived data that indicate relative distances of all residential properties from a series of key amenities and services including transport, health, education and emergency services".
  • ...1 more annotation...
  • those who deviate from the provided estimates face the prospects of checks, inspections and challenges.
1 - 20 of 41 Next › Last »
Showing 20 items per page