The Panic Button: High-Tech Protection for Human Rights Investigators | The Rundown New... - 0 views
-
A non-profit out of California has created software for human rights workers that is designed to secretly store data about human rights violation abuses in the country where they are located. There is talk about it already being used in the Middle-East recently. The software includes a 'panic button' that a human rights worker could use that would instantly delete all the files on the computer about government violations. The data is then stored in the cloud and accessable only with a password and secret 'key.' This is a great example of nonprofits working together to fight enormous challenges, with human rights being one of the most dangerous and exhaustive areas of work in the non-profit sector.
How Jargon Can Damage Nonprofit Work - 0 views
-
These topic seem are important on how its educated us about what technology does to the nonprofit or government. some of the things they Author point out were impactful, innovation, and tranformative all these words were used for the change a technolgy could do to the alter the nonprofit or government programs. i think that it useful to have these technology that support our ideas about negative impact that could damage nonprofit work in some ways.
New York State Pursues Delinquent Taxes With Analytics Tool - 1 views
-
This article shows how governmental agencies are using technology tools to help gather the taxes that people have failed to pay in the past. This technology tool analyzes the data that has been collected about an individual and uses that to compare the different ways of going about collecting the past due taxes. Using this analyzing tool allows the government to spend less resources trying to collect the taxes and also has proven to increase the amount of past taxes that are collected.
Using technology to alleviate poverty - 1 views
Cellebrite - Mobile Forensics and Data transfer solutions - UFED Physical Pro - 1 views
-
The Cellebrite UFED Physical Pro is a high-end, all-in-one solution for logical and physical extraction. The UFED Physical Pro expands your current device capabilities to extract deleted mobile device data, user passwords, file system dumps, and physical extraction from GPS devices.
-
From the company product brochure for "UFED Physical Pro": 'THE COMPLETE MOBILE FORENSICS SOLUTION Cellebrite's UFED addresses the growing need for fast, comprehensive mobile forensic capabilities. An add-on module for advanced extraction and analysis of evidence Physical Pro enables the basic UFED system with physical data extraction, file system dump and reconstruction, and password extraction. UFED Physical Pro enables recovery of invaluable evidential information that isn't accessible by logical extraction methods alone. In use by military, law enforcement, governments, and intelligence agencies across the world, UFED Physical Pro allows users to rapidly extract a wide variety of data types in a forensically sound process from both phone and SIM memory. Extracting data in a forensic manner and presenting it with the integrity of the data intact ensures that the evidence will be admissible in court.
-
Online .pdf Brochure Description of 'extraction device' continued (notice the GPS and mapping capability also): AT A GLANCE * Complete extraction of existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags * Powerful search, reconstruction, and analysis of the phone hex dump that can be used for intelligence gathering, investigative research, and as legal evidence in court * Expanded coverage for GPS devices, with mapping of GPS locations on Google Maps and visualization of GPS locations on Google Earth * Unrivaled phone coverage and compatibility * Fast, intuitive extraction process source: http://www.cellebrite.com/images/stories/brochures/UFED%20Physical%20Pro%20Brochure%20%20ENGLISH.pdf
Your iPhone Is Tracking Your Every Move - 0 views
-
Researchers have discovered that the iPhone is keeping track of where you go and storing that information in a file that is stored - unencrypted and unprotected - on any machine with which you synchronize your phone. It is not clear why Apple is collecting this data. Data scientists Alasdair Allan and Pete Warden came across the file - "consolidated.db"
Mayor Bloomberg Announces Use of Quick Response (QR) Codes on Permits - 2 views
-
Simple use by New York city of QR codes on building permits to provide links to additional information.
-
Wow. Just think, I didn't even know what QR codes were a few weeks ago. I really see them blooming in the next few years (Ha!Bloomberg/ Blooming!). I scanned one from a Meijers grocery coupon and got a 10 second commercial sent back to me.
-
Very progressive! Excellent use for that specific labeling technology --- especially in a high density population area where a construction project could be a big hassle. This would make it easy for the public passerby to find out more about it, and perhaps a target completion date. Plus, you are certain the contractor has a legal permit from the city of New York for the work they are doing.
Google Public Data Explorer - 1 views
Recovery.gov - Tracking the Money - 0 views
TERA ( sms phone application ) - 1 views
This is an interesting new breakthrough in technology available to select non-profit institutions worldwide. An innovation in phone communication (dubbed TERA) allows a relief-aid agency to intera...
A Girl's Nude Photo, and Altered Lives - 0 views
-
At first I had no intentions of using this article as a bookmark, however, after I got to reading it I realized the implications it has in regards to public administration. As technology advances and becomes more prominent within society people are finding more uses for it for personal and emotional gains. As more technology is available, it is more likely that children will have access to these also. This article describes the schools and law enforcemenets efforts to combat the problems that technology can bring to our society. This article also suggests public policy involved in these types of cases and can also spark ideas into ways that policy can become better and more fine tuned to fit the needs of our society today.
Smart Phones and Government/Nonprofit Communications. New Report from Pew - 0 views
-
Did you know? FUN statistics. * 35% of mobile local news consumers feel they can have a big impact on their community (vs. 27% of other adults) * 65% feel it is easier today than five years ago to keep up with information about their community (vs. 47% of nonmobile connectors) * 51% use six or more different sources or platforms monthly to get local news and information (vs. 21%) * 75% use social network sites (vs. 42%) * 15% use Twitter (vs. 4%)
Court Likely to Uphold Constitutionality of 'Nude' Airport Scanners | Threat Level | Wi... - 0 views
-
Airline passengers in the United States understand they will be treated as suspected terrorists when going through airport security checkpoints. Yet nearly a decade after the Sept. 11, 2001 terror attacks, airport security has become a lot more invasive with the rollout of the so-called "advanced imaging technology" scanners, paid for with $1 billion in stimulus funds. The scanners - now deployed at about 78 airports - use either millimeter wave or backscatter technology to create a virtual picture of the traveler's naked body. The image is then viewed by a screener with the Transportation Security Agency iin a sequestered room away from the checkpoint.
Google says China blocking its email services - 0 views
-
It's amazing how often these countries try to limit the use of the internet. This article explains why China might be altering the services provided by GMAIL and also explains how they are doing so. By investigating these types of circumstances perhaps we could gain a better insight as to why they would do this and also let us be able to take this information and relate it with out foreign affairs missions.
‹ Previous
21 - 40 of 62
Next ›
Last »
Showing 20▼ items per page