ITGS Online

‘hanging out the dirty linen’ to delve into the ethics of IT’s role in society.

Climate Change Blog Post Simulations use models to predict all possible outcomes and scenarios based off existing data. They are used to predict events that are impossible to execute, expensive or dangerous. After playing with two different climate change models, I have raised some questions over the reliability and integrity of climate models to correctly […]

Good day! The internet and the world wide web has not only brought us so many delightful and useful tools and information, but has brought a gust of never-ending dangers such as deep fakes and identity theft. This blog will be focused on voice replication. Voice replication is where samples of voice are taken from […]

What is the Red Queen Effect?

Delving deeper into the thoughtful book “Liars and Outliers” by Bruce Schneier, this time we move onto the Natural History of Security where Schneier takes us through the course of history, informing us about the origins of security and how its development has affected modern day’s society. Beginning the chapter he begins with “Security is […]

You are not a Gadget, by Jaron Lanier is an analysation of how humans ultimately interact with and study technology, and how we as humans are impacted by the way that we interact with the technology. In the last half of the book, Lanier revisits the claims he had previously discussed in the earlier chapters of […]

In the first part of the novel You Are Not a Gadget by Jaron Lanier, Lanier targeted on what he calls ‘cybernetic totalism‘, which is the theory of the things like the Singularity, when people upload themselves to the internet. He also presented his concern that the web 2.0 and social networking may be a cause of […]

You survived a half term – you have enjoyed a weeks holiday and forgot everything about school.Oops – did you forget that you had a paper 2 assignment to do and the feedback for you was waiting on your GDOC – well all but Kiki, Final Prison Fish and Rabbit Eater did forget apparently! So […]

In April a man from Ohio was charged by a grand jury on identify theft charges. However this had nothing with stolen credit cards or anything like that. Apparently the suspect stole a South Carolina man’s identity to gain access of $300,000 in medical treatment at Ohio State University’s Wexner Medical Centre. According to Kirsten Hallam, […]

While I suppose a title seems overly melodramatic, it actually does describe the occasion, a carnage. Lets have a look at the post op report in an even more dramatic manner! Dossier: The Mission: To sucessfully defend wiki-leaks in a debate with another school. The Date: 29-11-2010, 1130 hours The Location: Cisco Systems, [REDACTED] The […]

Conferencing is serious business. Businesses love to save money, which seems logical enough. Especially in large corporations such as Cisco Systems, a huge amount is spent on flights for representatives to meet other representatives in different countries. Not only is this expensive, it’s not a fantastic solution to helping nature. However, the annual costs have […]

E-Commerce Notes

These are my notes on e-commerce, taken from Computer Confluence, pages 509 to 529…

« Previous Entries  Next Page »

Archives

Translate