ITGS Online

‘hanging out the dirty linen’ to delve into the ethics of IT’s role in society.

The Internet has grown drastically over the past few years and most of us wouldn’t know what to do now without it. I have grown in a world where technology is used every day and where we are surrounded by it. Both my parents are quite tech-savvy and technology was used often at home but […]

bouncymaps phetsimulations (Links to open the Bouncy Maps and PhET infographics are above) Computer models and simulations can challenge our learning but they can also really help us understand and visualize things in a clearer way. Bouncy Maps and PhET simulations are quite different but they are both very successful in getting their points across. […]

Before streaming media, people would own DVDs and CDs and this is how you would watch movies or listen to music. You owned your DVDs and you could watch them and lend them to anyone whenever you wished, just as long as you didn’t copy them or do anything illegal with them. But CDs and […]

Hello! This we are going to talk about MOOCs (Massive Open Online Courses), where I have attempted to design a MOOC that will be at least 50 % successful. I have created a document outlining my targeted audience, the content that will be available, the features of my MOOC (GEARNING), and the policies and standards […]

The complexity of Packet Tracer

Packet Tracers is a visualisation of a network created by Cisco Systems. This is a simulation of a network that allows users to create a network which imitates real life networks. I used a video that helped me understand how to use it. Creating A Simple LAN using Packet Tracer This is a video showed […]

Databases Social and Ethical Implications and Discussion Databases! Public Databases! Oh no! Security and Integrity affect databases in general, as the databases all depend on accurate data. The most up-to-date data could be the difference between having to spend time in jail – or not. Duplicate names, lack of updating, are just some reasons why […]

Climate Change Blog Post Simulations use models to predict all possible outcomes and scenarios based off existing data. They are used to predict events that are impossible to execute, expensive or dangerous. After playing with two different climate change models, I have raised some questions over the reliability and integrity of climate models to correctly […]

Good day! The internet and the world wide web has not only brought us so many delightful and useful tools and information, but has brought a gust of never-ending dangers such as deep fakes and identity theft. This blog will be focused on voice replication. Voice replication is where samples of voice are taken from […]

What is the Red Queen Effect?

Delving deeper into the thoughtful book “Liars and Outliers” by Bruce Schneier, this time we move onto the Natural History of Security where Schneier takes us through the course of history, informing us about the origins of security and how its development has affected modern day’s society. Beginning the chapter he begins with “Security is […]

You are not a Gadget, by Jaron Lanier is an analysation of how humans ultimately interact with and study technology, and how we as humans are impacted by the way that we interact with the technology. In the last half of the book, Lanier revisits the claims he had previously discussed in the earlier chapters of […]

« Previous Entries  Next Page »