Skip to main content

Home/ Groups/ StJulians_ITGS
Fiche Galinha

Microsoft attacks OpenOffice. [VIDEO] - 2 views

  • Microsoft attacks OpenOffice.
The Zhan

BBC News | Whiteboard projector safety fears - 2 views

  • Interactive whiteboards have been heralded as devices that will enhance education and be a major plank in the government's drive for new technology in schools. But the BBC has learnt that while millions of pounds have been spent on them, very little attention has been paid to a potential threat to the eyesight of teachers and children.
  • Documents from the Health and Safety Executive, obtained by the BBC under the Freedom of Information Act, say users "should make sure that direct beam viewing of the optical output from this equipment is both controlled and restricted to no more than a few tens of seconds at a time".
  • A straw poll of teaching representatives in Wiltshire shows only a small number have been told how to use whiteboards safely
  • ...2 more annotations...
  • "It's very difficult to avoid the beam because if you are standing in front and demonstrating a point to the class you immediately want to turn round to know that they are aware of what you are saying, rather than ducking out of the beam. You want to stay there and face the class."
  • 250,000 whiteboards in the UK used on a daily basis
  •  
    Interactive whiteboards have been heralded as devices that will enhance education and be a major plank in the government's drive for new technology in schools. But the BBC has learnt that while millions of pounds have been spent on them, very little attention has been paid to a potential threat to the eyesight of teachers and children
  •  
    That's a very good point. Most teachers never think about that.
  •  
    I had better wear some shades in future.
Mr Brooke

BBC News - Change to 'Bios' will make for PCs that boot in seconds - 2 views

  •  
    "Change to 'Bios' will make for PCs that boot in seconds"
The Zhan

Legislation in Portugal - cybercrime - 2 views

  •  
    Some of the points are: 3. information falsitication The intention to cause errors in juridical relations by introducing, modifying, deleting or suppressing data or by producing non-genuine documents can lead to a fine of 120 to 600 days, or 5 years of jail. 4. Damage relative to programs or data Whoever does not have legal permission or the administrator's consent to delete, alter and impossibilitate utilisation of programs or data, will be punished with up to 3 years in jail or a fine. 5. electronic sabotage Whoever does not have legal permission or the administrator's consent to obstruct, interrupt of gravely disrupt the functioning of an information system through introduction of, alteration of, damaging of, or suppression of programs and data will be punished with up to 5 years in jail or a 600-day fine. 6. Ilegitimate access Whoever does not have legal permission or the administrator's consent and tries to access an IT system will be punished with up to 1 year in jail or a 120-day fine. Punishments also true for users who produce, sell or distribute a set of executable instructions destined to cause the aforementioned unauthorised actions. 7.Ilegitimate interception Whoever does not have legal permission or the administrator's consent and tries to intercept the transmission of data  will be punished with 3 years of jail.
Mr Brooke

Stuxnet worm is the 'work of a national government agency' | Technology | guardian.co.uk - 2 views

  •  
    "Stuxnet worm is the 'work of a national government agency' Malware believed to be targeting Iran's Bushehr nuclear power plant may have been created by Israeli hackers"
Mr Brooke

Skilled robots set to infiltrate schools and military - The National - 2 views

  •  
    As technology is increasing, robots are becoming more and more used in our society. This has impacted our world in many ways such as more machinery is being used in order to produce goods. This can lead to unemployment since less people are required to work in this industries as machines have taken the role. "The latest version of Honda's Asimo robot is reported to be able to distinguish between the voices of three different people spoken at once by using a combination of face recognition and sound analysis" By this quote taken from this article, we can see that robots are starting to resemble more to humans such that they can now distinguish between voices of three different people spoken at once. This is a social and ethical issue since machines such as robots are taking the role of human beings. The question is, for how long more is technology going to continue to increase? Are human beings on their way to extinction?
  •  
    As the article states, there are numerous robots that could perform tasks such as serving drinks (Asimo), teaching psychology (Nao), and replacing infantry (Petman). There is a danger of becoming overly dependent on technology. As we have discussed in class, the inherent characteristics of computers are that they will only do what they programmed to, regardless of the identity and intentions of the user. Also, both the computer and the user (if not equipped with appropriate technical know-how) become very vulnerable if the system malfunctions in a way that was not predicted. In tasks too dangerous to be directly undertaken by human beings, such as operating valves at the Fukushima Daiichi nuclear power plant, robotics become essential. Companies need to strike a balance between commercialisation and what is truly necessary for the benfit of humanity.
  •  
    In the field of medicine, robotic surgery is becoming increasingly popular: http://futureoftech.msnbc.msn.com/_news/2012/01/13/10150612-robot-surgeons-may-get-upgraded
benjon hamal

BBC News - Hollywood goes to war on pirates - 2 views

  •  
    add those tags Benjon!
Ines Simon

Apple's Siri curses out 12-year-old - 2 views

  •  
    Someone reportedly tampers with a demo iPhone 4S so that when a 12-year-old boy picks it up and asks Siri a question, she is not amused or amusing. She tells him to 'Shut the f*** up.' Read this blog post by Chris Matyszczyk on Technically Incorrect.
  •  
    The main social and ethical issues are integrity of the system, security, and people and machines. Although I do not own an iPhone 4S, I would imagine it the product had been hacked and its set-up instructions had been reprogrammed by a user who is extremely knowledgeable on issues such as encryption and programming know-how. Perhaps because the iPhone referred to in the news story was a "demonstration" version, I suppose its encryption levels are not as powerful as the real product (Apple would have to invest less money in manufacturing). However, there is a much simpler explanation, according to "MacTrast" (http://www.mactrast.com/2011/12/siri-tells-twelve-year-old-to-shut-the-fck-up-after-pranksters-tamper-with-display-iphone/): Simply changing the name in the contact card by verbalising it (asking Siri "Call me (insert ridiculous statement here)") allows the user to tamper with the phrase voiced by Siri, without having to deal with complicated encryption or validation processes. This means the system itself is integral and works correctly, but the given primary contact's nickname is has been inappropriately altered. To solve this problem, the company should enforce the security of its demo versions of the Siri for iPhone 4S by impossibilitating a deliberate change of contact names and redistribute them across retailers.
Fiche Galinha

Droid R2-D2 Hands-On - Gear Preview at IGN - 2 views

  • Droid R2-D2 Hands-On
  •  
    "Droid R2-D2 Hands-On"
The Game

ICAO | About ICAO - 2 views

  •  
    International Civil Aviation Organization This relates to RFID e-passports.
  •  
    Good find. Nice to back this discussion up with some hard facts about policy.
Mr Brooke

X-raying you without permission - 2 views

  •  
    "X-raying you without permission"
Morten Nielsen

Lines Are Drawn on Legislation Against Internet Piracy - NYTimes.com - 2 views

  • “It’s really robbery — it’s theft —
  • Those goods include not just movies shot surreptitiously in a theater with a jiggly hand-held video camera, the companies argue, but dangerously flawed pharmaceuticals, faulty brake pads and defective smoke alarms, to name a few categories of illegally copied goods.
  • “Unfortunately,” Mr. Erickson said, “the amendment also creates new problems in other places and fails to correct some of the original concerns we have raised since the start of the debate.
  • ...5 more annotations...
  • “That’s because they’ve made large profits by promoting rogue sites to U.S. consumers,” Mr. Smith said in a statement.
  • Now, however, two bills, broadly supported on both sides of the political aisle, aim to cut off the oxygen for foreign pirate sites by taking aim at American search engines like Google and Yahoo, payment processors like PayPal and ad servers that allow the pirates to function.
  • at least 15 lobbying firms to fight the bills
  • Naturally the howls of protest have been loud and lavishly financed, not only from Silicon Valley companies but also from public-interest groups, free-speech advocates and even venture capital investors
  • while setting a bad example of American censorship.
Jorge F1

Israeli hacker retaliates to credit card hacking - 2 views

  •  
    An Israeli hacker has published details of hundreds of Saudi credit cards online and is threatening to post more in revenge for acts by Arab hackers.
  • ...1 more comment...
  •  
    One of the main social and ethical issues in this article is surly privacy. Privacy has been a main issue for our society, not only about credit card details, yet also other personal information. As technology is increasing, the less privacy we have as there are more ways in obtaining this information. And in this case, as technology is increasing, hackers are also as there are easier and more ways in order to get the information they want. There are various ways the hacker can get access to these thousands of credit card numbers, here is one step-by-step of one of the ways of how this IT system works: Firstly, the hacker (or hackers) go around lots of banks and put a small video camera pointing to the bank machine keypad. This video camera is well hidden so that people cannot see them. When someone goes to the machine, they put their credit card number and this analogue information converts to digital information and is recorded in the memory in the video camera. After a few hours/days, the hackers remove the video cameras and upload the data in the memory card via a USB cable and save the data on their servers. The hackers then watch the video and record the credit card numbers on a paper/other computer. With this information, they can obtain more personal information such as names, phone numbers, post codes etc with specialized programs. Finally, when they have all the information they have, they post the personal information including the credit card numbers, on the internet. Yet, in order to maintain the hacker anonymous and not being able to be found via the IP address, he uses another proxy server when uploading this information on the internet. There are also other ways to get the credit card information such as: - Intercepting emails containing passwords - Popups infected by viruses - Spyware - Spam - Keyloggers etc. Some possible solutions for this issue is: - When typing your credit card number in the bank machine keypad, hide the keypad coveri
  •  
    Well yes, I agree with Ines. This is to some extent about privacy. However, I doubt that they obtained that much information by use of cameras in banks. I'd find it much more likely if they have obtained the data from a database in the private sector. I do not think privacy is the most important issue here though. By far and large the most important issue in the article - is how cyber warfare could start to affect the conflict in the Middle East. We've seen how valuable the Internet was in the Arab Spring. The cyber warfare is going to be, and to some extent I imagine, is already an essential tool for the different factions in the Middle East. As this was a breach in the private sector, the security there must be improved with f.ex. stronger firewalls.They must improve their security, if not they are sure to lose money because of the reliability issue.
  •  
    I agree with you, Morten. However, I gave one example of how it would be possible to obtain the credit card numbers, where I gave in the end more examples of how it would be possible to do so.
Mr Brooke

BBC News - Soldier Andrew Garthwaite to get bionic arm controlled by mind - 2 views

  •  
    Criterion B . Describe, step by step, how the IT system works. 1. Surgically implanted nerves are connected to electrodes placed on the chest area. 2.The nerves prompt electrical signals from the brain to the electrodes. 3. The electrical signals are then interpreted by a micro-processor, into natural movements. More information on how bionic arms work: http://thetartan.org/2008/9/22/scitech/howthingswork
  •  
    Outline how this IT system works: Essentially, this system consists of hardware (electrodes) that replace the nerves going to and from the brain. Electrodes are connected to the chest muscles which control 6 motors that move the prosthetic joints. When the mind sends a message through the nerves to move a muscle in the arm, the signal causes a muscle in the chest to contract, which activates a certain electrode to tell a motor to move a part of the bionic arm. A more detailed account of how mind-controlled bionics works is here: http://science.howstuffworks.com/bionic-arm.htm This story is a prime example of how IT is being used to radically develop medical research and treatments.
  •  
    The main social and ethical issue in this article is People and Machines. This new bionic arm which is controlled by the mind is an important development, in this technology, now allowing people who have had to have limbs amputated to have new arms/legs that they can control as they would their original arms/legs. However, due to the fact that it is very new and expensive technology to develop, although it points to the future, at the moment almost no one that would need a bioninc arm would be able to afford it. This means that although it is an essential step forward, at the moment it will not be something that can help the majority of people who most need it. As well as this, the bionic arm, although it is controlled by the mind, it will never be as fluid and will never work as intuitively as your arm.
The Game

Designer puts 96 cores on single chip - CNET News - 2 views

  •  
    we have a record
  •  
    50Gflops......impressive!
Tranny Franny

BBC News - Blackberry launches Playbook rival to iPad - 2 views

  •  
    (This article affects 2.5_digital_entertainment) Although the Playbook has various appealing features such as dual HD cameras on the front and on the rear of the tablet and flash compatibilty, it is still entering a highly competitive market. It has been over a year since the playbook's release and it is clear that Apple's iPad continues at the top of the market. Here is a good comparison between both tablets: http://www.techdigest.tv/2011/06/blackberry_play_8.html
  •  
    I agree with Jorge. By lauching this Playbook, Blackberry is surely entering a highly competitive market where not only Apple has lauched a similar product (iPad) yet also Samsung is also in the market for similar products. However, this Playbook has something that Apple doesn't; software for flash. Also, this Playbook is smaller than the Apple's iPad. This can be an advantage such that it would be easier to carry around, yet also a disadvantage since the screen would be smaller so people can't see things so well as on the iPad.
The Game

Salt Water Motor - 2 views

  •  
    this is quite old, but hardly anyone knows about it. wow
  •  
    Interesting but the IT aspect eludes me.
The Zhan

Data Mining - 1 views

  •  
    The mechanics of data mining.
Mr Brooke

Data Mining: What is Data Mining? - 1 views

  •  
    A description of the mechanics of data mining.
Tranny Franny

BBC News - Adidas websites go offline after hacking cyber-attack - 1 views

  •  
    This article refers to the security of the network of various high-profile companies (Adidas, Sony), and the privacy of the consumers. To solve the issue of security, companies should tighten up their security for example, by incorporatibg Secure Sockets Layer protection (SSL) and https network protection. In the past, "sophisticated" has referred to Advanced Persistent Threat (APT) attacks. Defending against APTs was one of the tasks involved in a recent EU-US joint test of cyber attack readiness. http://www.itpro.co.uk/637204/cyber-attack-drives-adidas-websites-offline The companies should also be more cautious of their surroundings by monitorning IP traffic and access to the website. Losing personal and/or sensitive data and having it in the wrong hands could cause serious consequences. (http://www.filetransferplanet.com/cyber-attack-forces-adidas-offline/) This personal information could then be passed on to third party companies who can take advantage of information like address and phone numbers to conduct surveys or distribute advertisements. This would cause widespread discotent due to the invasion of the consumers' privacy.
« First ‹ Previous 101 - 120 Next › Last »
Showing 20 items per page