Skip to main content

Home/ StJulians_ITGS/ Group items tagged second

Rss Feed Group items tagged

Mr Brooke

BBC News - Change to 'Bios' will make for PCs that boot in seconds - 2 views

  •  
    "Change to 'Bios' will make for PCs that boot in seconds"
The Zhan

Freedom of information vital for promoting cultural diversity - 1 views

  • “Free speech and media freedom are an inseparable part of the United Nations’ mission for peace, human development and a better world,” Under-Secretary-General for Communications and Public Information Kiyo Akasaka told a global seminar on linguistic diversity, globalization and development in Alexandria, Egypt, on Sunday.
  • “But around the world, we see Governments and those who wield power use many different ways to obstruct it. The Internet and digital media are becoming a new battleground for information.”
  • He cited the impressive pace of innovation and growth in new information and communications technologies (ICTs): by the end of 2010, there will be an estimated 5.3 billion mobile cell phone users; access to mobile networks is now available to 90 per cent of the world population and 80 per cent of people living in rural areas. Moreover, the total number of text messages sent globally has tripled in the past three years, from 1.8 trillion to a staggering 6.1 trillion, that is 200,000 text messages sent every second, and the number of Internet users has doubled between 2005 and 2010, when it will surpass the 2 billion mark, of which 1.2 billion will be in developing countries.
  • ...3 more annotations...
  • But the digital divide remains, he warned, with 71 per cent of the population of developed countries online, compared to only 21 per cent in developing countries, and by the end of this year, Internet users in Africa will reach 9.6 per cent, far behind the world average of 30 per cent. For millions of people in poorer countries, downloading a high-quality movie can take one-and-a-half days compared to five minutes somewhere else.
  • All this increased connectivity and the role media and institutions can play in protecting and promoting cultural and linguistic diversity and ensuring its use for the greater good require two elements, Mr. Akasaka stressed.
  • “First, is the need to find ways to provide information to all people,” he said. “And second, is the need to ensure that the information that is conveyed – the substance – is diverse, pluralistic, and tolerant. Member States, the private sector, UNESCO and the United Nations are all working to bring information and communication assets and services to communities around the world.
  •  
    Statements of a UN official stressing the importance of the freedom of information for globalisation.
Mr Brooke

Face recognition: In the future, can you remain anonymous? - Jan. 13, 2012 - 3 views

    • Mr Brooke
       
      I love the fact that the opt in can be as simple as "walking into a store"
  •  
    The social and ethical issues presented by this article is on privacy and anonymity.
  • ...2 more comments...
  •  
    Describe, step by step, how the IT system works. An example of a face recognition and detection technology is the iPhone app that can snap a photo of a person and within seconds display their name, date of birth and social security number. 1. A good quality, well-lit photograph of the person is taken. 2. The image is sent to a server where a database of images is located. 3. The images in the database are downloaded from publicly available sources (any database containing faces and names), such as facebook, twitter or LinkedIn profiles. 4. According to the information available in that profile, such as date and location of higher education stydy, other data can be inferred (date and state of birth). 5. This data is inserted into an algorithm developed to predict the social security number. All of this still within the database. 6. The biometric features of the iPhone photograph is compared to those of the image in the database 7. If they match, the information about that person is returned from the server to the iPhone: name, date of birth, state, social security nr. What are the flaws within this system? Explain the relationship between the IT system (facial recognition iPhone app) and the social/ethical (privacy and anonymity) "The technology to analyse faces in improving so quickly that unpredictable (...) inferrences from that information have become possible." - Alessandro Acquisti, professor of IT and public policy at Carnegie Mellon University's Heinz College The app is a proof-of-concept of how our privacy can be easily breached on a widespread basis (as one walks into a store or protests in a convention)
  •  
    This article raises the issue of privacy and anonymity. This article shows how there is a possibility that in the near future, as long as the technology continues to develop at this rate, all of our personal data will be stored on a database along with an image of our faces. The fact that a person can be recognized at any moment anywhere means that people will start to be monitored and everything they do will be recorded. This completely strips people from their privacy, much like the Big Brother situation that is described in George Orwell's "1984". This technology can, however, bring certain advantages as through the constant monitoring of people, people involved in criminal acts will be identified with much more ease and therefore crime levels are sure to decrease. However, this can also raise an issue of reliability, as although it is a very small percentage of it happening, there can be the case where the camera misidentifies someone, and in a case of crime, that could lead to an innocent person being conviected for a crime they did not commit. And although at the end of the article "Wear a mask," is said by John Verdi, senior counsel of the Electronic Privacy Information Center as a joke, if the tecnhology continues to develop, we might find ourselves in the ridiculous situation where the only way to ever remain anonymous is to in fact wear a mask.
  •  
    We could all just replace our eyes. http://www.youtube.com/watch?v=kx9IEP8pmiI&feature=related In the above clip we see an example of what might happen if facial recognition ever reaches the level portrayed in Minority Report. As the protagonist walks into the store, an AI asks him how he felt about his last purchase at the shop, information obtained by scanning the protagonist's eyes and searching for what he has bought. This brings up the issue of privacy, as has correctly been mentioned above, as third-party companies will be able to access databases with data concerning what people purchase, how much they spend and where they are.
Fiche Galinha

BBC News - O2 apology for disclosing mobile phone numbers online - 3 views

  •  
    25 January 2012 Last updated at 12:23 ET O2 has apologised for a technical problem which caused users' phone numbers to be disclosed when using its mobile data. The company said it normally only passed numbers to "trusted partners". A problem during routine maintenance meant that from 10 January numbers could have been seen by other websites.
  • ...5 more comments...
  •  
    Well, the main problem in this story is the privacy of the O2 users in my opinion. The issue is the fact that they've let(intentional or not) websites gain the user's phone number. Even though they "investigated, identified and fixed it this afternoon" - it is still rather disconcerting that it happened. It might have a been an isolated problem, but that does not change the fact that their personal information was shared without their consent. But I may be overreacting, as of now there is no knowing how many will be affected. However, one would expect that there some are legal obligations in terms of notifing the offended costumer and the authorities - this does not seem to be the case in a lot of EU countries. Including the UK as far as I can tell. Last year there was talk of creating data breach notification laws in the EU - but from what I gather has not passed yet.
  •  
    This article writes about the EU data protection act - I guess I was right, there are no laws universal EU law at the moment. http://www.pcworld.com/businesscenter/article/248566/eus_data_protection_proposals_likely_to_include_24hour_breach_notification.html It says that the EU should have made an announcement today about it.
  •  
    http://www.bbc.co.uk/news/magazine-15730499 How much privacy can smartphone owners expect?
  •  
    How much privacy can anyone except these days? It is no only owners of smartphones. Our generation is literally throwing away our privacy. Smartphones, facebook - it seems to be that most mainstream technology items lessen our privacy nowadays. http://www.theatlantic.com/technology/archive/2012/01/use-google-time-to-get-real-about-protecting-your-digital-self/251981/#.TyBIy3wo_AA "Google's decided to integrate the data it has about you, which means you better think about the digital tracks you're leaving. "
  •  
    I agree with Morten and Isy. Privacy is decreasing by the second. Technology is increasing rapidly and many people like these new technologies, such as using smartphones, social networks etc. Yet, are they aware of all these drawbacks? Privacy is lacking, and many people believe that we don't even have privacy anymore since data can be accessed much easily now that technology has evolved. Here's a video about how a smartphone can cause privacy issues. http://www.youtube.com/watch?v=N2vARzvWxwY&feature=fvst With one click on a person's picture, people may obtain their location, where they live and other personal information. This is a cause of technology rising so much in the past years, which has lead to all these privacy issues. People should start to be more aware of this situation, that by only a picture on the internet people can obtain personal information that can lead to severe issues. One of the solutions for this issue could be to turn off the location service on their smartphone in order to not be able to be tracked where hackers can see the exact place where a person is.
  •  
    As mentioned above the the issue concerned about in this article is privacy as peoples information (mobile phone numbers) are displayed on websites without their consent. Obviously the fact of having others know personal information may leave people concerned, however they must be aware that their personal information is spread all over the internet. From pictures on facebook to a gmail/youtube accounts peoples names, adresses and surnames are most likely known by some companies. Google and Facebook holds personal information that belongs to each one of us. What companies like such do to profit from this is sell a list of names, adresses and emails to third party which will then have means of communication with us to advertise their products and this is responsible for some of the spam we receive. The solution for this specific scenario of mobile phones isn't very clear, although it has been fixed no way of how it could of been prevented was suggested. Perhaps a the server could be shut down while it was under maintenance and another one should've been running in the meanwhile. Clearly the issue here had nothing to do with the mobile phone users and there was nothing they could have done as they were unnaware of the situation. I personally believe that privacy does not exist on the internet. It someone wishes to have privacy then the safest way to go do so is to not use/be connected to the internet. http://www.dailyfinance.com/2011/09/30/when-it-comes-to-cell-phone-privacy-youre-an-open-book/ Shows how mobile phones can cause privacy issues and how police officers now have gadgets that allows then to see everything that a person has done in their mobile phone, this clearly violates peoples privacy.
  •  
    I would just like to mention that I posted this, not fiche galinha -.- diigo is trolling me.
Jorge F1

BBC News - Trendnet security cam flaw exposes video feeds on net - 8 views

  • "We first became aware of this on 12 January," said Zak Wood, Trendnet's director of global marketing.
  •  
    SO scary!!!!!! After reading this shocking article I'll probably start covering my security cameras while I'm at home! A main social and ethical issue is SURELY privacy. I think that many people aren't aware that security is coming to bits by the second, privacy isn't what it was some years ago. And, in my opinion, it's the technology's fault. Even though computers, internet, phones etc have become useful, society's becoming too much dependent to technology and this is an issue as technology will continue to increase even more, meaning that society's privacy will continue to decrease even more. Can't we even have privacy at home?
  •  
    To some extent I agree with you Ines. But technology isn't all bad. Yes, we are losing privacy at a rapid pace. But these cameras provided us with security. Well, they would have if it wasn't for the breach in Trendnet's security they would have provided people with security. Our world has become much dependent on social networking etc. We do not have as much privacy as one would like, but this is not solely the technology fault in my opinion. It is as much human nature, the drive to have 15 minutes of fame. Just my two cents anyway : )
  •  
    The IT system in focus is the Trendnet home security camera. Here is how real-time, live video broadcasting works. This information originally referred to IP based cameras, which essentially work the same way. Image: http://www.ipcctv.com/images/learnMore/Single-Camera.gif The camera is installed and ran "The camera turns video & audio into binary data The camera connects to your the and transmits this data onto the network This data can then be viewed on a PC; on the local network, or over the internet." The remote viewer inputs the Internet addresses which link to the video streams and is able to see footage. source: http://www.ipcctv.com/article.php?xArt=13
The Zhan

Bosses switch on antisocial network - 2 views

  • 'It's about informing you where you stand in relation to other people rather than a manager having to come over and talk to you about it
  • Some companies are introducing internal social networks to try to encourage staff to talk to their colleagues rather than escape into the ether
  •  
    Rather than blocking access to Facebook and Twitter, a growing of employers are monitoring what proportion of the working day individuals spend on them.
  •  
    State and Describe the main Social and Ethical issues that relates to this article: The main social and ethical issue that relates to this article is surveillance. In this article, it is suggested that workers in an office space would have the time they spend on a social network being monitored and controlled. This survaillence of how the workers spend their time on the computer seems somewhat appropriate in my opinion. What this is doing is it's reaching a compromise for the workers, by still letting them access these social networks, while limiting how long they can access it for daily so as to ensure that they focus as much on their work. Although it could be question whether it's ethical to monitor people's computer, what this is doing is avoiding measures such as a boss visually monitoring everyone's computer behind their backs,which raises a much bigger surveillance issue. The second suggestion of an internal and local social network that would only include people in the workplace is also a good option that attempts to keep the workers focused on the workplace and to ecourage communication between workers, rather than getting distracted with life outside the workplace. This is also, in my opinion an excellent suggestion as it offers an alternative to simply blocking social networks, which raises an issue in terms of how ethical it is to simply restrict someone from visiting a website, which could be seen as censorship.
Tranny Franny

How RFID Works - 4 views

  •  
    How RFID Works
  • ...1 more comment...
  •  
    first one you found on google eh?
  •  
    No not really it was the second.. didnt really enjoy the first one.
  •  
    Nice brief summary. Edson found you out though!
benjon hamal

Razer Launches Mechanical Gaming Keyboard | Hardware Canucks - 2 views

  •  
    Cool this will allow me to use Ebon Blade Banner, Darkmender's Tincture, Hodir's Horn, Essence of Ice, and Raelorasz's Spear, 2 nano seconds quicker than the other n00bs. LEEEEROY!!!111!!!
  •  
    oh yeh and please use the correct tags.
  •  
    sir you got every single thing right there. It's scary.
The Zhan

BBC News | Whiteboard projector safety fears - 2 views

  • Interactive whiteboards have been heralded as devices that will enhance education and be a major plank in the government's drive for new technology in schools. But the BBC has learnt that while millions of pounds have been spent on them, very little attention has been paid to a potential threat to the eyesight of teachers and children.
  • Documents from the Health and Safety Executive, obtained by the BBC under the Freedom of Information Act, say users "should make sure that direct beam viewing of the optical output from this equipment is both controlled and restricted to no more than a few tens of seconds at a time".
  • A straw poll of teaching representatives in Wiltshire shows only a small number have been told how to use whiteboards safely
  • ...2 more annotations...
  • "It's very difficult to avoid the beam because if you are standing in front and demonstrating a point to the class you immediately want to turn round to know that they are aware of what you are saying, rather than ducking out of the beam. You want to stay there and face the class."
  • 250,000 whiteboards in the UK used on a daily basis
  •  
    Interactive whiteboards have been heralded as devices that will enhance education and be a major plank in the government's drive for new technology in schools. But the BBC has learnt that while millions of pounds have been spent on them, very little attention has been paid to a potential threat to the eyesight of teachers and children
  •  
    That's a very good point. Most teachers never think about that.
  •  
    I had better wear some shades in future.
1 - 13 of 13
Showing 20 items per page