Skip to main content

Home/ ITGSopedia/ Group items tagged HTML

Rss Feed Group items tagged

Mark Brookes

How will data retention laws cope with the internet of things? - 0 views

  •  
    "How will data retention laws cope with the internet of things?"
Barbara Stefanics

Community College Open Textbook Collaborative - 0 views

  •  
    Electronic books in IT created under creative commons
Sandra Stark

In China, a Labor Movement Aided by Modern Technology - NYTimes.com - 0 views

  •  
    It is labor revolt by text message and video upload, underwritten by the Chinese government.
Mahmud Shihab

Taking the Mystery Out of Web Anonymity - NYTimes.com - 0 views

  •  
    "The Internet affords anonymity to its users, but it is also behind the explosion of cybercrime that has swept across the Web."
Barbara Stefanics

Soldier Leaked Google Attack Investigation Details, Hacker says - Tech Talk - CBS News - 0 views

  •  
    "An Army analyst jailed for allegedly leaking a video of a controversial Iraq air strike also allegedly leaked classified information about a U.S. investigation into cyberattacks on Google that originated in China"
Madeleine Brookes

Margaret Gould Stewart: How YouTube thinks about copyright | Video on TED.com - 0 views

  •  
    Margaret Gould Stewart, YouTube's head of user experience, talks about how the ubiquitous video site works with copyright holders and creators to foster (at the best of times) a creative ecosystem where everybody wins.
Madeleine Brookes

Tor: anonymity online - 0 views

  •  
    Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens. (Note: sometimes ITGS students need to be able to access sites that are sometimes blocked)
Sandra Stark

Image file formats - TIF, JPG, PNG, GIF - 3 views

  •  
    "Image File Formats - TIF, JPG, PNG, GIF Which to use?"
  •  
    Image File Formats - TIF, JPG, PNG, GIF Which to use?
Barbara Stefanics

A Global Graveyard for Dead Computers in Ghana - Slide Show - NYTimes.com - 1 views

  •  
    "In Agbogbloshie, a slum in Accra, the (capital of Ghana, adults and children tear away at computers from abroad (to get at the precious metals inside. Left, David Akore, 18, and other foragers."
« First ‹ Previous 161 - 180 of 577 Next › Last »
Showing 20 items per page