The creation and use of social media has, for better or worse, become one of the defining characteristics of Generation-Z, or the Millennials. According to Pew Research, roughly 90% of young adults between the ages of 18-29 use social media. According to Link Humans, the average number of accounts run by an individual user is five (Link Humans). Those are significant numbers, and those numbers correlate to a larger shift in the way we communicate with each other and in the way we participate and…
Spyware is computer software that collects personal information about a user or a company without their consent or knowledge. It monitors the user’s cyberspace activity and records keystrokes as they type. It communicates recorded activities such as your social security, files, usernames, passwords and account numbers. The spyware transmits that information to another computer, usually for advertising purposes. The transmittance of this information can lead to identity theft. If you download…
Tim Berners-Lee is a name unfamiliar to most. He is the inventor of perhaps one of the greatest innovations of our time that we use frequently and on a daily basis; the World Wide Web (Internet). When Tim Berners-Lee first visualized the concept of the World Wide Web, he had a pretty solid plan for how he wanted it to work. His vision for social change and individual creativity far exceeded his own expectations. Berners-Lee’s overall intention for the development of the Web was to advance…
system. • Interconnection devices are a physical piece of hardware used to connect the users to a network they are connected to, some examples of these interconnection devices are: o Routers – These devices uses protocols such as ICMP (Internet Control Message) Protocols, using these protocols, routers will search and determine the best path between the two hosts to send data packets back and forth. o Switches – While routers send data packets, switches filter these data packets and then send…
1. Background Illuminate Creative hires one student to work on this project. The Company intends to develop a new application for business which provides a safety methodology for their users. The idea is, whenever a costumer feels that they are in a cause of worry or inconvenience, they just need to preset emergency list from mobile contacts with a timer or on a right away settings to push a single button. By doing so, the application will immediately notify the predefined emergency contacts…
3.3 Technical Specifications HTML5 : Hyper Text Market Up Language is used to design a web page.HTML5 is the latest version in HTML5 which adds many new semantic features.HTML5 is readable by humans and understood by computer devices.HTML5 has many new syntactic elements like <video>, <audio>, <canvas>. Other new elements in HTML5 include <main>, <section>, <article>, <header>, <footer>, <aside>, <nav> and <figure>. CSS3 : CSS…
Management Protocol (SNMP) -enabled devices. Intelligent notifications - alerts that can be configure so that there is a response to a specific network scenarios through a page, e-mail, call or text in a network administrator. 2.4 PROTOCOLS AND STANDARDS A network protocol is a set of formats and conventions for data transmission or in other words a standardized set of rules and conventions which all devices have to comply to be able to connect with a network. Network protocols include…
With the onslaught of hacking and breaches in privacy by groups ranging from hacker cults to the NSA, individuals and corporations must take steps to protect themselves and their data to prevent any further damage. The impacts of coordinated hacking attacks are widespread and can affect any online services: ranging from PayPal to Sony’s PlayStation Network. A team of hackers, especially one with global support such as Anonymous advocate a policy called “hacktivism”. The concept of hacktivism…
How is RFID technology related to Wal-Mart’s business model? How does it benefit suppliers? Wal-Mart’s basic business model is “low cost.” RFID promises to reduce supply chain costs and improve the availability of items on store shelves. The world’s biggest retail chain wants RFID readers installed at store receiving docks to record the arrival of pallets and cases of goods. Software uses sales data from its point-of-sale systems and the RFID data about the number of cases brought out to…
The Importance of Cybersecurity for the Future December 25th, 2014, a DDoS attack lands on major companies Sony and Microsoft. The result? Their servers were shut down for time varied on ranging from twenty-four hours to a few weeks. A DDoS is a distributed denial of service attack, and it is illegal. These attack are meant to take down companies’ servers. All of this could have been prevented if these companies focused more on their security rather than their profits. The group responsible for…