ITGS Online

‘hanging out the dirty linen’ to delve into the ethics of IT’s role in society.

The complexity of Packet Tracer

Packet Tracers is a visualisation of a network created by Cisco Systems. This is a simulation of a network that allows users to create a network which imitates real life networks. I used a video that helped me understand how to use it. Creating A Simple LAN using Packet Tracer This is a video showed […]

Databases Social and Ethical Implications and Discussion Databases! Public Databases! Oh no! Security and Integrity affect databases in general, as the databases all depend on accurate data. The most up-to-date data could be the difference between having to spend time in jail – or not. Duplicate names, lack of updating, are just some reasons why […]

Climate Change Blog Post Simulations use models to predict all possible outcomes and scenarios based off existing data. They are used to predict events that are impossible to execute, expensive or dangerous. After playing with two different climate change models, I have raised some questions over the reliability and integrity of climate models to correctly […]

Good day! The internet and the world wide web has not only brought us so many delightful and useful tools and information, but has brought a gust of never-ending dangers such as deep fakes and identity theft. This blog will be focused on voice replication. Voice replication is where samples of voice are taken from […]

What is the Red Queen Effect?

Delving deeper into the thoughtful book “Liars and Outliers” by Bruce Schneier, this time we move onto the Natural History of Security where Schneier takes us through the course of history, informing us about the origins of security and how its development has affected modern day’s society. Beginning the chapter he begins with “Security is […]

You are not a Gadget, by Jaron Lanier is an analysation of how humans ultimately interact with and study technology, and how we as humans are impacted by the way that we interact with the technology. In the last half of the book, Lanier revisits the claims he had previously discussed in the earlier chapters of […]

In the first part of the novel You Are Not a Gadget by Jaron Lanier, Lanier targeted on what he calls ‘cybernetic totalism‘, which is the theory of the things like the Singularity, when people upload themselves to the internet. He also presented his concern that the web 2.0 and social networking may be a cause of […]

You survived a half term – you have enjoyed a weeks holiday and forgot everything about school.Oops – did you forget that you had a paper 2 assignment to do and the feedback for you was waiting on your GDOC – well all but Kiki, Final Prison Fish and Rabbit Eater did forget apparently! So […]

In April a man from Ohio was charged by a grand jury on identify theft charges. However this had nothing with stolen credit cards or anything like that. Apparently the suspect stole a South Carolina man’s identity to gain access of $300,000 in medical treatment at Ohio State University’s Wexner Medical Centre. According to Kirsten Hallam, […]

While I suppose a title seems overly melodramatic, it actually does describe the occasion, a carnage. Lets have a look at the post op report in an even more dramatic manner! Dossier: The Mission: To sucessfully defend wiki-leaks in a debate with another school. The Date: 29-11-2010, 1130 hours The Location: Cisco Systems, [REDACTED] The […]

« Previous Entries  Next Page »

Archives

Translate