SlideShare a Scribd company logo
1 of 18
Republic of the Philippines Laguna State Polytechnic University Siniloan, Laguna First Periodical Examination Presented by: ● Olaivar, Gionna Marie L. ● Dizon, Jevilyn B. ● Castro, Eloisa Frances V.
IT Related News 1
Windows XP Piracy Badgering Set To Begin
Microsoft this week plans to update the Windows Genuine Advantage anti-piracy mechanism for Windows XP Professional, which the software giant claims is the most oft-pirated version of Windows. After the update, WGA notifications for XP will be the same as they are for Windows Vista service pack 1, said Alex Kochis, senior product manager in the Windows Genuine Advantage group, in a Tuesday blog post.
That means users whose copies of XP fail validation will see a black background the next time they log in. Although users will be free to switch to their background of choice, the black screen will return every 60 minutes until they validate their copy, and they'll also see a watermark with a logo that reads "Ask For Genuine Microsoft Software."
According to Kochis, this will make it easier for XP users to install and stay up to date with the latest release of WGA notifications. "Our research has clearly shown that customers value the ability of Windows to alert them when they may have software that is not genuine, but they also want the ability to stay up to date with the least effort required on their part," he wrote.
WGA is designed to combat piracy by installing software on users' PCs that periodically checks to see if their version of Windows is authentic before allowing them to download updates. However, WGA has been a source of frustration for many users since it was launched in 2005, due to several incidents in which genuine users have been mistakenly identified as pirates.
Prior to the release of Vista service pack 1, Vista copies that failed WGA validation would enter a reduced functionality mode in which certain features were disabled, but Microsoft changed to the black screen nagging approach when it released Vista SP1.  SOURCE: http://www.crn.in/Software-002Sept008-Windows-XP-Piracy-Badgering-Set-To-Begin.aspx
IT Related News 2
Adobe Embarks on Antipiracy Drive
Adobe India has decided an aggressive campaign to curb piracy. The campaign, which targets both end users and businesses in India that are using and profiting from pirated Adobe software, began in New Delhi with a number of enforcement activities whereby hundreds of unlicensed copies of Adobe products were siezed.  
"The campaign will be a combination of education and enforcement measures. We will educate customers about the risks associated with using pirated software as it is often corrupt, can breach personal and business information security, and even interrupt business continuity as businesses recover from the damages. We will work alongside local governments and agencies to identify resellers, businesses and end-users who produce, distribute and sell unauthorized copies of Adobe software," said Sandeep Mehrotra, director of sales at Adobe India.
According to the recent survey released by piracy watchdog, Business Software Alliance (BSA), 69 percent of PC software was obtained illegally in 2007. Additionally, an IDC economic impact study  released in January of this year found that reducing PC software piracy in India by ten percentage over a period of four years could generate an additional 44,000 new jobs, $3.1 billion in economic growth, and $200 million in tax revenues.  Source: http://www.crn.in/Security-007Aug008-Adobe-Embarks-on-Antipiracy-Drive.aspx
IT Related News 3
Imation Launches  Memorex Mice
Imation India has launched the Memorex range of uni-retractable laser mouse. Priced at Rs 600, the mouse is available in green, blue and white and features a patented retractable mechanism that pulls or hides cables ensuring less clutter. It also features optical laser technology that ensures precise cursor control with no mouse ball to clean. The three button mice are ergonomically designed so that both left-handed and right-handed find it easy to use and also has a scroll wheel for better navigation.  The peripheral has 1,600 dpi resolution, and have both USB and PS/2 connectors.  Source: http://www.crn.in/Hardware-001Sept008-Imation-Launches-Memorex-Mice.aspx
End of Presentation
Thank you!

More Related Content

What's hot

Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
Creating the Internet of YOUR Things. Global Azure Bootcamp 2018Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
Creating the Internet of YOUR Things. Global Azure Bootcamp 2018"Darren "Doc"" Robinson
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentMark Szewczul, CISSP
 
Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Barcoding, Inc.
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyMobile Labs
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung at Work
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESijmnct
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devicesijmnct
 
Samsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung at Work
 
Internet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureInternet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureCisco Services
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Getting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMGetting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMWSO2
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 IDG Connect
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014Felipe Lamus
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictionsPrayukth K V
 

What's hot (18)

Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
Creating the Internet of YOUR Things. Global Azure Bootcamp 2018Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
Samsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise Mobility
 
Internet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureInternet of Everything: Retail’s Future
Internet of Everything: Retail’s Future
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Getting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMGetting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMM
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictions
 

Viewers also liked (14)

Santillana Del Mar.
Santillana Del Mar.Santillana Del Mar.
Santillana Del Mar.
 
Vision Empresarial
Vision EmpresarialVision Empresarial
Vision Empresarial
 
432 Dizi
432 Dizi432 Dizi
432 Dizi
 
CarmuÑoz
CarmuÑozCarmuÑoz
CarmuÑoz
 
Movimiento
MovimientoMovimiento
Movimiento
 
Tu Fotografa 1
Tu Fotografa 1Tu Fotografa 1
Tu Fotografa 1
 
You Needed Me
You Needed MeYou Needed Me
You Needed Me
 
Segurança Pessoal
Segurança PessoalSegurança Pessoal
Segurança Pessoal
 
As 10 Maiores Obras Olímpicas
As 10 Maiores Obras OlímpicasAs 10 Maiores Obras Olímpicas
As 10 Maiores Obras Olímpicas
 
Presentazione Cl1^ Sentiero Azzurro
Presentazione Cl1^ Sentiero AzzurroPresentazione Cl1^ Sentiero Azzurro
Presentazione Cl1^ Sentiero Azzurro
 
Business Process Mapping
Business Process MappingBusiness Process Mapping
Business Process Mapping
 
Summer 2008 Conference Overview
Summer 2008 Conference OverviewSummer 2008 Conference Overview
Summer 2008 Conference Overview
 
Vacaciones de Invierno de 1B
Vacaciones de Invierno de 1BVacaciones de Invierno de 1B
Vacaciones de Invierno de 1B
 
Charla Congreso Facultad De TecnologìA MéDica
Charla Congreso Facultad De TecnologìA MéDicaCharla Congreso Facultad De TecnologìA MéDica
Charla Congreso Facultad De TecnologìA MéDica
 

Similar to Group1 First Periodical Exam

INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...Black Duck by Synopsys
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk ManagementBlack Duck by Synopsys
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engFitira
 
The History of Bug Bounty Programs
The History of Bug Bounty ProgramsThe History of Bug Bounty Programs
The History of Bug Bounty ProgramsCobalt
 
Tech series: Windows Azure Media Services
Tech series: Windows Azure Media ServicesTech series: Windows Azure Media Services
Tech series: Windows Azure Media ServicesJuan Pablo
 
Session 12-newsbytes
Session 12-newsbytesSession 12-newsbytes
Session 12-newsbytesTechnocratz
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetAndre Muscat
 
Fingrene væk fra F12
Fingrene væk fra F12Fingrene væk fra F12
Fingrene væk fra F12Microsoft
 
Build 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewBuild 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewWindows Developer
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing ScamOpen Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing ScamBlack Duck by Synopsys
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfaradhana9856
 

Similar to Group1 First Periodical Exam (20)

INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 eng
 
Windows7sins
Windows7sinsWindows7sins
Windows7sins
 
The History of Bug Bounty Programs
The History of Bug Bounty ProgramsThe History of Bug Bounty Programs
The History of Bug Bounty Programs
 
Tech series: Windows Azure Media Services
Tech series: Windows Azure Media ServicesTech series: Windows Azure Media Services
Tech series: Windows Azure Media Services
 
Adware
AdwareAdware
Adware
 
Adware
AdwareAdware
Adware
 
Session 12-newsbytes
Session 12-newsbytesSession 12-newsbytes
Session 12-newsbytes
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business Datasheet
 
Fingrene væk fra F12
Fingrene væk fra F12Fingrene væk fra F12
Fingrene væk fra F12
 
Build 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewBuild 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overview
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing ScamOpen Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Group1 First Periodical Exam

  • 1. Republic of the Philippines Laguna State Polytechnic University Siniloan, Laguna First Periodical Examination Presented by: ● Olaivar, Gionna Marie L. ● Dizon, Jevilyn B. ● Castro, Eloisa Frances V.
  • 3. Windows XP Piracy Badgering Set To Begin
  • 4. Microsoft this week plans to update the Windows Genuine Advantage anti-piracy mechanism for Windows XP Professional, which the software giant claims is the most oft-pirated version of Windows. After the update, WGA notifications for XP will be the same as they are for Windows Vista service pack 1, said Alex Kochis, senior product manager in the Windows Genuine Advantage group, in a Tuesday blog post.
  • 5. That means users whose copies of XP fail validation will see a black background the next time they log in. Although users will be free to switch to their background of choice, the black screen will return every 60 minutes until they validate their copy, and they'll also see a watermark with a logo that reads "Ask For Genuine Microsoft Software."
  • 6. According to Kochis, this will make it easier for XP users to install and stay up to date with the latest release of WGA notifications. "Our research has clearly shown that customers value the ability of Windows to alert them when they may have software that is not genuine, but they also want the ability to stay up to date with the least effort required on their part," he wrote.
  • 7. WGA is designed to combat piracy by installing software on users' PCs that periodically checks to see if their version of Windows is authentic before allowing them to download updates. However, WGA has been a source of frustration for many users since it was launched in 2005, due to several incidents in which genuine users have been mistakenly identified as pirates.
  • 8. Prior to the release of Vista service pack 1, Vista copies that failed WGA validation would enter a reduced functionality mode in which certain features were disabled, but Microsoft changed to the black screen nagging approach when it released Vista SP1. SOURCE: http://www.crn.in/Software-002Sept008-Windows-XP-Piracy-Badgering-Set-To-Begin.aspx
  • 10. Adobe Embarks on Antipiracy Drive
  • 11. Adobe India has decided an aggressive campaign to curb piracy. The campaign, which targets both end users and businesses in India that are using and profiting from pirated Adobe software, began in New Delhi with a number of enforcement activities whereby hundreds of unlicensed copies of Adobe products were siezed.  
  • 12. "The campaign will be a combination of education and enforcement measures. We will educate customers about the risks associated with using pirated software as it is often corrupt, can breach personal and business information security, and even interrupt business continuity as businesses recover from the damages. We will work alongside local governments and agencies to identify resellers, businesses and end-users who produce, distribute and sell unauthorized copies of Adobe software," said Sandeep Mehrotra, director of sales at Adobe India.
  • 13. According to the recent survey released by piracy watchdog, Business Software Alliance (BSA), 69 percent of PC software was obtained illegally in 2007. Additionally, an IDC economic impact study  released in January of this year found that reducing PC software piracy in India by ten percentage over a period of four years could generate an additional 44,000 new jobs, $3.1 billion in economic growth, and $200 million in tax revenues. Source: http://www.crn.in/Security-007Aug008-Adobe-Embarks-on-Antipiracy-Drive.aspx
  • 15. Imation Launches Memorex Mice
  • 16. Imation India has launched the Memorex range of uni-retractable laser mouse. Priced at Rs 600, the mouse is available in green, blue and white and features a patented retractable mechanism that pulls or hides cables ensuring less clutter. It also features optical laser technology that ensures precise cursor control with no mouse ball to clean. The three button mice are ergonomically designed so that both left-handed and right-handed find it easy to use and also has a scroll wheel for better navigation. The peripheral has 1,600 dpi resolution, and have both USB and PS/2 connectors. Source: http://www.crn.in/Hardware-001Sept008-Imation-Launches-Memorex-Mice.aspx