Airport Security and New Technologies

The biometric software application can uniquely identify or verify an individual using a comparison and analysis of features based on the contours of a person’s face and behavior. This software can compare it with information in the database for subsequent identification. The author’s thesis aims to identify the benefits of...

Information Systems Development Methods

Abstraction In this method, the process of defining and analyzing data requirements to support the business process of an organization is known as data modeling. All data is stored in a model called concept model which has data definitions. It is implemented using logical models. There are different data models...

The Security of Data in Information Technology Areas

Introduction The field of information technology has been faced with many challenges in its development. However, the security of data is arguably the main challenge in the whole industry. Every new product has to include an aspect of security to attract customers. This paper looks at the security of data...

Regulation and Taxation of VoIP in the USA

Introduction VoIP (Voice over Internet Protocol) refers to the technology that enables the transmission of voices through data networks. As the name suggests, VoIP transmissions are carried out using IP (Internet Protocol). The increasing ubiquity of IP voice services in the United States has raised concerns due to unequal regulatory...

Cyber Crime : Issues and Threats

Introduction Developments in technology have come with both advantages and disadvantages. The close association of technology and crime is neither new nor young. Over time, the potential to create harm through the supposed advantage of technologies has grown exponentially especially on the lines that exploit chains of trust of people...

Google Search Reliability as a Research Tool

Google Search is a universal information search tool used by millions of people. Many scholars agree that Google Search is also a useful research tool (Miller and Record, 2017). But this tool has drawbacks and limitations, which should be considered when searching through Google Search. Moreover, awareness when using search...

WebMD Website Evaluation with Harris’s Tools

Introduction With the advent of the internet, there are so many websites online, some have authentic information while others do not. It is important to have the know-how of collecting authentic information from a website. This paper analyzes the website www.webmd.com with website evaluation tools provided by Prof. Robert Harris....

The Radio Frequency IDentification Revolution

Introduction RFID is fast taking shape as manifested by the recent media blitz and newspaper articles about the technology. Not many people are able to distinguish the different categories and benefits that the technology brings. It is the purpose of this paper to highlight on the history, uses and benefits...

Information Security: Law and Policy

Introduction Organizations cannot function effectively without data. In the 21st century, most organizations such as educational institutions, businesses and government agencies depend on modern information systems in undertaking their transactions (Whitman & Mattord, 2011, p. 40). As a result, protecting the data, either held by the firms or data that...

Desktop Migration Proposal Windows 7 to Windows 8.1

Introduction This proposal covers upgrading from Windows 7 to Windows 8.1. Currently, HACKM, LLC has around 5000 desktops/laptops that run Windows 7. In addition, many employees will also be connected to tablet computers. Apart from migration to Windows 8.1, the company also strives for efficient and optimal use of Windows...

Airport Autonomous Control (ACUGOTA) Program Implementation

The current level of technology development allows the creation of many technological solutions aimed at ensuring human safety. One of the directions in this area is replacing humans with autonomous robots controlled by an operator. Thus, a person can be protected from working in a hazardous environment, and the likelihood...

Computer Technology and Business Needs

Introduction Business needs and accounting operations have a great effect on the profitability of a business. Many organizations have integrated computer systems in their businesses to help them in accounting operations and meeting the business needs. However, integration of computer systems in a business is not enough. The most important...

Modern Computers: Changes Within Our Current Technological World

Modern Computers and Their Functions in Human Lives The use of computers changes human life considerably in different ways. People discover more ways on how to improve their work, communication, and calculations. Within a short period of time, a computer becomes an integral part of this life, and there is...

Titanium Diboride Materials Selection Paper

Introduction Titanium Diboride is a hard compound that consists of Titanium and Boron. Titanium Diboride is useful in designing various products (Huber, 3000). One such product is a capacitor. Apart from capacitors, Titanium Diboride is used in the making of extremely hard materials such as army wares and ceramic cutting...

Site Review About New Technologies

Summary description of its structure and purpose The site PCMAG.COM has rather interesting and clear structure with the help of which it is possible to identify the purpose set by the site developers. Looking at the main page of the site, the visitor is free to choose any interesting for...

Penguin Sleuth, a Forensic Software Tool

Introduction Computer security and data safety have become the stepping stone for most organizations and individuals. In general data protection and informational safety require increased attention and awareness of the users. Forensic software may be used for various aims, however, the key functionality range is closely linked with data safety,...

BSC: IT Governance Frameworks

The Balanced Scorecard or BSC is performance management and IT governance tool, which is used to evaluate the companys efficiency and identify those aspects which need modification or improvement (Kaplan & Norton, 1996). It helps to develop the policies of the enterprise according to the vision and the initial goals....

Unauthorized Intrusion Into a Database: The Strategies for an Emergency

The companies, which specialize in the development of software solutions, have to attach great importance to business continuity planning because they are exposed to many internal and external threats, for example, the failure of hardware, virus attacks, power cuts, mistakes of the personnel and so forth. Each of these threats...

Environmental Ethics. Technology and Values

The term “Anthropocene” was coined to refer to the era in which human beings became the main driver of environmental change. While scientists argue about whether a new geological era should be officially distinguished in the history of the Earth, the atmosphere is rapidly changing. An increase in the level...

Technology Integration Into Studies

Introduction There are several barrier related to technology integration into studies. This literature review explores different aspects related to factors that affect technology integration into studies as well as the appropriate measures that need to be considered to address these underlying issues. This section has been put into four sections....

CT Scanners and Techniques

Quoting the words of Jakub Mochon, CT product manager at Siemens Medical Solutions, let us state that “the U.S. health system is very dependent on CT”, it is absolutely evident (Dargan, 2009/2010, p.30). According to the data provided by McCollough et. al., the usage of CT scans has increased dramatically....

Treadle Pump Technology: A Potential Improvement

Introduction Science is the marvel of the present world and modern technologies are an application of science to fulfill man’s long-cherished dreams to control and manipulate the forces of nature for his relevance. But at the same time, it is also very true that the blessings of science depend upon...

Computer Crimes against Businesses

Introduction: Facts of the case On February 06, 2014, Ioan Leusca and Dezso Gyapias were charged in a U.S. Federal Court for stealing customer data from automated teller machines (ATMs). The two men had used data acquired from the ATMs to steal from bank customers in Connecticut, New Jersey and...

The Occupational Safety and Health Administration: Engineering Ethics

The issue touches on the ethics and legality of OSHA to change the levels allowed for benzene exposure in the workplace after the publication of a new report that reveals the number of deaths caused in places where the level of benzene was above 10ppm yet the required amount was...

How PayPal Works: Guide for Users

PayPal, an online money transfer service established in 1998, has since become the primary form of money transfers, overtaking the traditional system of money orders and checks. With a total income of $7.9 billion, the service allows users to deposit, withdraw, and transfer funds with 26 different currencies globally. Peter...

Issues on Internet: Privacy and Freedom of Speech

The Internet has never been popular than now. With a rapidly growing user base, the internet has become a household thing that is used by almost everyone in the house for activities such as entertainment, shopping, education, and socializing. While the Internet itself is a blessing for anybody who uses...

Evaluating Performance of Public Construction Projects in Abuja, Nigeria

Introduction In the context of public construction projects in Abuja Nigeria, project success can only be realized when stakeholder performance is evaluated against a performance evaluation framework. A performance evaluation framework provides well established and evaluated standard measures against which the performance of project stakeholders can be measured to evaluate...

Digital Video Evolution and Its Implementation in Australia

Introduction In the 21st century, the technological environment is under influence of high degree of robustness (Barry, Atul & Arun 1). This has had a great impact on various sectors of the economy. Amongst the technological sectors that have undergone revolution with a high magnitude, is the information communication technology...

Internet Communication Engineering

Introduction The past few decades have witnessed a dramatic increase in the number of internet users. This upward trend has been accompanied by an almost parallel increase in the process of streaming, which is a data transferring technique which enables users to process data continuously without interruptions in the form...

Environmental & Economic Benefit Analysis of Methane Capture for Energy Generation

Due to globalization, there is greater demand for electricity, as most of the productive activities require energy power. Globalization has brought people, institutions, and governments of various nations together. Through globalization, international trade and capital investments have been conducted internationally through the help of information technology (Ehrfeld 210). The interaction...

Wellbore Stability Explanations

What is Finite element analysis via (FLAC)? And how is it done? Finite element analysis (FEA) could run in 2D or 3D and is used for geotechnical applications in the determination of tunnels, deep foundations, slope stability, seepage analysis, soil structural analysis, and capacity for earth retaining structures (Lee, Y.S....

Global Positioning System and Its Applications

Garmin defines the Global Positioning System or GPS as a satellite based navigation system that is made up of a group of 24 satellites that have been placed into orbit by the United States Department of Defense (Garmin 1). Originally, the Global Positioning System was referred to as Navstar Global...

Operational and Strategic Need for XYZ IT Project

Introduction The Xyz Company is a business organization offering its clients textile products and services within the major category of textile industries. In XYZ organization, communication is a very crucial activity for the growth and development of the company. Since the inception of xyz, communication has been a matter of...

Self-Certifying Names Which Have Been Used by Various System Designs

Introduction Contemporary computing and Information Technology has seen the surge of various forms networking projects to provide especially the cyber landscape with highly advanced features that its infrastructure have not been naturally supporting. Critical challenges in the aspects of naming, addressing as well as mobility and security among other aspects...

Hybrid Energy Harvesting System

Energy harvesting can be described as a process of deriving energy from external sources, such as the sun, thermal power, and the wind. This method of capturing and storing energy is considered safe for the environment, and therefore, is a promising innovation. The energy harvesting systems are the technology used...

Verizon Company’s Information System Proposal

Introduction Verizon is a telecommunication company in America providing services for wired and wireless communications beads on third-generation technology (Verizon, 2011a). The organization is innovative in the telecommunication sector and it provides video and broadband communications and other modes of entertainment through an advanced fiber-optic network. The organization is committed...

Safety Management Systems in Aviation

Bogdane, R., Gorbacovs, O., Sestakovs, V., & Arandas, I. (2019). Development of a model for assessing the level of flight safety in an airline using concept of risk. Procedia Computer Science, 149, 365-374.  The authors consider the current state of the SMS in aviation, suggesting general approaches such as a...

How Light Emitting Diodes Work

Introduction Light-emitting diode, usually called LED, is used in a variety of electrical devices They send out signals from remote controls, figure out the numbers on digital clocks, signal you when your electrical devices are turned on, and lights up watches. When put together, they can form large pictures on...

Association of Computer Machinery Code of Ethics: Professionalism

Introduction The Association of Computer Machinery (ACM) code consists of 24 imperatives that are formulated as statements of personal responsibility. It comprises most of the issues that professionals are likely to encounter. The ACM code outlines how software engineers should conduct themselves ethically in their profession, and while relating to...

Information Technology: Code of Ethics

The foremost thesis presented by these authors can be formulated as follows: the way in which codes of ethics help to advance the cause of an organization is not as much concerned with promoting the freedom of innovation, as it is concerned with controlling the actions of the employees. According...

How Does the Digital Divide Affect Low-Income Communities?

Introduction When first introduced in the second half of the 20th century, personal computers were expensive and of interest mostly for business users. However, Moore’s law has been proving itself accurate and today computing is cheap. Despite economic advancements and unprecedented increases in global GDP, only half of the worldwide...

Cryptography System for B Manufacturing Company

Encryption The security of data and information of the B manufacturing is paramount. The computer network represents one area that is vulnerable to security compromise, which might be detrimental to the prosperity of the company. Therefore, it is would be useful to encrypt data or information Schneier, 2001) that is...

Microprocessor: Terminology and Analysis

Introduction A microprocessor, commonly referred to as the Central Processing Unit (CPU), a central place where all data processing is done, is a gadget that distinguishes only binary code as numbers and ascertains basing on the orders by employing assemblage languages. This piece of writing is a detailed explanation of...

Comparative Study on Technological Failures

Institutions of higher learning are increasingly using technology to aid in the learning process. However, this vital resource is prone to constant failures that slow down the learning process. In addressing this problem, Hitch (2002) and Wepner (2004), present similar and diverse ways of dealing with this predicament. Hitch (2002,...

Social Networks Security: Ethical Issues and Practicies

Introduction Social networks have been having privacy issues; in the case of Beacon and Facebook, Facebook had made it possible for people to share their private life with others using Beacon; the launch had been done in December 2007. When the program was launched, it seemed to facilitate business and...

Web: Ready for Assistive Technology or Not

Abstract This research paper’s major purpose is to discuss and research accessibility issues in relation to websites. The paper questions whether enough is being done to make websites suitable for people with disabilities and from that look at what could be done to improve the area going forward. Do individuals/...

Using an Interrupt Function in a C Program

The code fragments that must be included in an interrupt system include the following: 1. Code that covers or uncovers interrupts. This can be achieved through setting the 1 and X bits in the CCR, thus executing the command: ORCC #%00010000. 2. Code that defines system vectors that handles interrupts,...

Aviation: Airport Security Control Evaluation

Airport Operator Security Responsibilities The business of securing a commercial airport is, ideally, a shared responsibility between the airport operator and the Transportation Security Administration (TSA). Before the September 11 attack, every aspect of airport security was the responsibility of the airport operator, except for passenger screening. Since, September 11,...

Electronic Medical Record Keeping

Concepts Raised by the Case Study Among the paramount concepts learnt in class that are evident in this case is the issue of responsibility. For Google to convince the populace that it can effectively handle their medical records, it must take the responsibility to guarantee secrecy of medical records. The...

Cooperation in Mobile Ad Hoc Networks

Literature review Mobile ad hoc networks are typified by wireless multi-hop channels that are connected to mobile nodes, which “do not rely on a pre-existing infrastructure [1]”. In the recent past, the field of mobile ad hoc networking has attracted a great deal of attention from many scholars as a...

Encryption: Corporate Security Technological Solution

Encryption refers to a system that programs a plain readable text into a non-readable status for security purposes. The sender uses an encryption system to send the data, such that the receiver will have to use a key to retrieve the data to a readable form again. The major use...

Cybersecurity: The Current War of Today

Summary Within the last two years, a series of events have happened that are characterized with internet hacking. Some of these activities include spying on google documents, Western companies, spying on Iran’s nuclear sites using Israeli created Stuxnet and spying on US secret cables by wikkiliks. Cybersecurity laws in the...

Denial of Service Attacks and Countermeasures

Introduction Online threats remain a reality for today’s businesses, especially those relying on the internet. Active and passive attack incidents are escalating every day and network administrators are having a daunting task of detecting, controlling or minimizing the effects of such attacks. Stewart, Tittel and Chapple concur in that one...

The Problem of Application of Technologies in Education

Technologies have become an integral part of modern life. Digitalization could be noticed in medicine, building, and transportation, to name but a few areas affected by this process. Still, the implementation of new technological facilities and ways of schooling based on them is a highly disputable topic. In the present...

Efficiency of Online Teaching Strategies

Introduction Modern education experiences an influx of innovations in the manner of conveying information. The advancements of technology have allowed using the Internet for distance learning. However, to ensure the adequate efficiency of online learning, appropriate teaching strategies should be implemented. The recent pandemic has restricted many traditional venues for...

Jet Fuel Quality. Aviation Fuel

Introduction Jet fuel refers to a form of aviation fuel, made up of a mixture of a great amount of various hydrocarbons, which is manufactured for use by aircrafts. It is crucial that the fuel used in a jet be of the required quality because contaminants can be detrimental not...

Program Design and Implementation

The course concerned ‘Program Design and Implementation’ at my workplace provided me with keen ideas on the various design strategies and the methods for implementing them. The knowledge that I acquired from the lessons helped me to develop good designing and programming skills. I’ve been working in the Program Design...

Reliability of Computers in Stock Exchange Market

Computer trading in the stock exchange market has come to replace floor trading which is much slower. Orders are currently being processed much faster and the system is deemed to be more efficient. This system is observed to respond in milliseconds as compared to a slower rate if it were...

Computational Engineering for Automobile Applications

Introduction Processes involving mixing have been associated with chemical-manufacture processes often and have been known to be very instrumental to successes recorded in operating combustion-driven systems. Presently, several computational-fluid-dynamics (CFDs) who are engaged with processing chemicals in industries have to be capable of adopting the usage of simulations for validating...

Is There a Place for Ethics in IT?

Introduction The field of ethics is a very important one which can be viewed as universal in its applications and practice. However, many individuals do not believe that ethical practices are universally applicable in all areas of operation, and therefore, some of them end up associating more of their applications...

Crisis Management & Emergency Response Planning

Introduction Boeing is currently one of the leading manufacturers of aircraft, satellites, rockets, rotorcraft and missiles in the world today. Companies in the aviation industry can also hire or lease airplanes from this organisation. This corporation’s diversification strategy and business model explain why it continues to compete directly with Airbus....

Business Intelligence Implementation in a Company

Business Intelligence is typically a broad grouping or category of diverse applications and technologies allied to gathering, analyzing, storing as well as offering access to essential data to aid the enterprise end users makes sound business verdicts. Hence, BI aspects encompass such features as query, reporting, decision support systems, online...

Large Scale Software Development

Introduction This report provides information regarding the Resource Scheduling project. The Resource Scheduling project is useful for a consultant company that provides resources of different types to various companies for a particular duration. An example of a company that would require this kind of software is an IT consultant company....

Artificial Neural Networks

In the given magazine article, I would like to provide a simpler and plainer explanation of artificial neural networks to the general public by describing their current state of development. The target audience is comprised of individuals who are not educated and trained in the specified field, but willing to...

Using of Digital Information and Visual Media in the Educational Process

Response 1 I agree with Danielle on the topic of using visual media, such as animations and images, in the educational process. A teacher must implement this method of conducting knowledge when interacting with younger generations. Barry et al. (2015) state that students “are willing to merge their online presence...

The Role of Calibration and Independent Monitoring in Decontamination Processes

Calibration is an important practice that ensures instruments meet their desired standards of operation. To make sure that this obligation is met, standardization bodies have to be set up to check conformity and compliance with the set standards. Therefore, the role of calibration goes hand in hand with the duty...

Marketing: Aviation Product Liability

Introduction Liability is the responsibility that is borne by a party. It is a common term in the insurance business. Aviation product liability deals with the responsibility, mostly financial, that is borne by a party as a result of injury or damage resulting from the products that are used in...

The Need of Cybersecurity in Healthcare Industry

Introduction The purpose of this point paper is to explain the importance of implementing cybersecurity strategies for healthcare organizations that currently adopt information technologies based on the case of ransomware attacks. Our intention is to sell the technological tools for telemedicine services, as well as provide guidance on the ways...

Artificial Intelligence in Business Administration Changes

Technology is transforming many fields of study by introducing new tools and possibilities for people to communicate, collect data, and use it to test hypotheses. Business administration is not an exception, with more non-technology oriented companies adopting artificial intelligence (AI). This paper will examine how artificial AI is transforming business...

Parallel Programming Analysis

Performance requirements are important to consider when developing a solution. It is unacceptable to have a web service that takes several seconds to reply to a simple request. Therefore, the developer should consider the available methods of improving the performance of their code. Chapter 12 discusses parallel programming, which is...

System Management Within Automobile

Introduction The objective of the essay is to give a brief account of the recent technologies with their respective architectures that can be used in the upgrade of an automobile computer system which enables home system management, or feature upgrades with the onboard system. The important software practices and techniques...

Ethical Issues in CCTV and Biometrics Technologies

Introduction Security is an issue of major concern to society. Increased cases of insecurity the world over have motivated creativity in crime prevention. CCTV and Biometric technology are some of the innovative applications in crime prevention technology in use today. In spite of the popularity of these technologies, there has...

The Ransomware Attack on Cruise Line and Its Customers

In the automated world that is highly dependent on the Internet, it is becoming easier to access personal information. Hackers use sophisticated techniques to breach the systems of big industrial firms and impose threats on businesses. The estimated financial loss for companies for 2015-2016 caused by cybercrimes accounts for about...

Radio Frequency Identification Technology

Radio Frequency Identification (RFID) is a currently accessible technology that makes auto-identification of different objects possible. In other words, it is a system, also known as Auto-ID, that relies on the exchange of data without contact communication. As it comes from its name, the technology works on radio frequency, where...

Impact of COVID-19 on the Airline Industry

Introduction Today, the world passes through the hard times because of the pandemic of coronavirus that affects all spheres of human activity. COVID-19, its extremely virulent nature, and the absence of vaccine preconditioned the need for severe restrictive measures to avoid multiple contacts between people and stop the spread of...

Agile Domain: Problem Detection and Resolution

The process of engineering of software is one that requires a lot of knowledge and includes the process of gathering, designing, actual development, testing for functionality, use and maintenance. It is rear to find a team which constitutes of members who have all the required knowledge to meet the requirements...

Hiring Hackers as IT Security Guards: Advantages and Disadvantages

Globalization and advancement in technology has changed the corporate world as companies are pressurized to go digital. For instance, businesses transactions are being conducted over the internet alongside other digital platforms (Cross & Shinder 96). This has led to a growing outcry in the corporate world owing to the rise...

General Understanding of It and Is Concepts

Whether one should purchase or build an information system (IS) is a decision that requires specialized expertise to make. For the upper-management, the outcome of both decisions may be the same, but the cost, risk time and labor requirement may differ greatly. Furthermore, the problem for which system acquisition is...

Strategies for Adequate Technical Support

Introduction Helpdesk is a company’s technical link meant to avail support to the end users. Today, most firms consider the helpdesk as one of the integral part of a management due to its responsibilities to deliver support services, whenever a client or employee makes an enquiry or an urgent call...

iPhone 12 Mini: Apple’s Smartphone Evolution

Introduction The iPhone is arguably one of the most competitive smartphone brands in the world today. The producing company, Apple, has within the past 13 years designed and delivered superior phones to different customers across the globe. Within this period, the technology giant has succeeded in releasing and marketing a...

Artificial Intelligence in the Working Process

Introduction Artificial Intelligence has become a part of the ordinary life of a human in the 21st century. People buy smart houses, cars that drive on their own, and computers that can solve some problems faster than a person. It is claimed that AI has affected many spheres, including the...

Mechanical Failures Spark Nuclear Melt-Down in Three Mile Island Power Plan

Introduction Modern human civilization is built on and continues to be principally dependent on large quantities of energy to sustain it. While fossil fuels and hydroelectric plants have been the primary source of energy for men since the 19th century, these traditional sources have been stretched to the limit and...

Denial of Service Attack on Twitter

Introduction One of the epic inventions related to computers is the internet which has led to a transformation of the world in as far as communication is concerned. The internet via websites presents a crucial front for the achievement of the objectives of most organizations and individuals. As such, it...

Analysis of Operating Systems

Operating system is a master program that controls the functioning of the computer hardware. It is an interface linking the user and the hardware. The main functions of an operating system include coordinating input and output devices, controlling the use of the backing storage, integrating the user and computer communication,...

Utilization of Solar Energy for Thermal Desalination

The Rationale Industrial-scale desalination plants cannot be scaled down for use in remote areas due to the complexity of the technology. Therefore, the need for scaled-down desalination plants to meet specific consumer needs for clean water particularly in remote desert and semi-desert areas cannot be overemphasized. That reinforces the need...

Agile Methods: Benefits and Drawbacks of Agile Software Development

Introduction Software engineering is the activity aimed at developing software programmes and applications appropriate for those programmes with regard to compatibility and usability of programmes by different audience including software developers and ordinary customers/users that purchase and upload these applications for personal use only. Every time a specific programme should...

Artificial Intelligence. Unmanned Mission Communications

Introduction The growth of human knowledge in the field of Artificial Intelligence (AI) has led to advancement in the development and deployment of unmanned autonomous systems. There are multiple examples of unmanned autonomous systems and perform a wide range of activities depending on the medium of operation. Some examples include...

F-16 Unmanned Drone and Data Search

The initiative regarding the production of an unmanned drone for collecting data seems to be a profitable endeavor. However, there are specific issues that should be considered in this direction in order to ensure the correspondence of the project to the international regulations regarding information processing and storage (Lin et...

Information Technology and Systems. Development. Use for Enterprises

Introduction Information technology and systems is the study of the designing, developing, supporting or the taking control (management) of the information that relates to computer systems. It revolves around and includes computer hardware and software applications. This encompasses the ability to control all activities electronically in an organisation. The system...

Learning About SQL Server Databases

What is a database? According to the video series, “SQL Server 2005 Express Edition for Beginners,” a database is defined as a computer file that is optimized to store up data in a structured manner. The way in which data is stored in a database is well organized and ensures...

Self-Control and Rational Choice in Internet Abuses at Work

The article conveys the idea that the employee’s time spent on the Internet should be appropriately controlled for the company’s informational security (IS). Personal Internet use takes up 60-80 % of the time staff spends on websites not related to work. Time waste on personal activities is qualified as a...

The Project Scheduling and Budget

In order to successfully conduct a project, every involved side must know what to do, when to do, and what is the expected outcome. By expanding on the idea by giving it a rigorous structure for its realization, the success of such a design will be guaranteed. This paper aims...

International Federation of Consulting Engineers

Introduction International Federation of Consulting Engineers or Federation Internationale Des Ingenieurs Conseils (FIDIC) according to French is a global professional body of engineers, which started in 1913. Belgium, Switzerland, and France are the three countries that came together and started FIDIC as an independent body of consulting engineers. The FIDIC...

UPS Flight 1354 Crash, August 2013

Executive Summary This report highlights the underlying reasons for the 2013 UPS flight 1354 crash at Birmingham-Shuttlesworth International Airport, Alabama. The accident happened when the flight crew failed to manage the aircraft during descent. It fell short of the runway during a non-precision landing approach and crashed at the end...

What is a UAS Pieces Map

The best ideal module for the design effort for independent control is writing an intricate algorithm with the capacity to effectively direct the Unmanned Aerial Vehicle (UAV) past barriers. The component will autonomously guide the UAV through a pre-planned track according to the mission. The current project uses a limited...

Net Neutrality – A Free Internet

Net neutrality regulations are critical to the openness and innovation of the Internet. It is a concept that has been built into the creation of the Internet since its foundations almost 30 years ago. Without net neutrality, major internet service providers (ISP) the likes of Verizon and Comcast would be...

Advances in Autonomous and Automatic Systems

Introduction In the twenty-first century, technological progress is concentrated in the field of semi-automatic and automatic innovations. It can be seen everywhere in both the private and military sectors. This is why it is essential to know the latest advances in this scientific area. This paper aims to review academic...

Aircraft Solutions Company’s Security Assessment

Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services and to meet cost, quality, and schedule requirements....

Paired Programming Analysis

Executive Summary In the engineering of software, the software methodology applied plays a significant role in the final product of the process. For example, in a traditional linear model software is created following a set of steps and changes are often difficult and costly to implement. The pressure created by...

Safety Management System (SMS) in Aviation

First, Safety Management System (SMS) is directly related to the provision of safety to the staff that is largely founded on the adherence to and advocating of the established standards by the personnel themselves. Hence, the human factor will be integrated by the related activities of your workers who –...

History and Benefits of Artificial General Intelligence

Introduction Artificial Intelligence is a broad-based division of computer science specializing in the development of intelligent machines with the ability to perform tasks requiring human intellect. It is a science with many disciplines, approaches, and programmable functions and a capability to learn, reason, solve problems, and make decisions. This paper...

Intel Pentium 4 Development

Introduction The world of computing has been the most dynamic revolution in the recent times; it has attracted a number of microchip manufactures to come up with the most sophisticated Integrated Circuitry ever witnessed in the world. With increase in the number of computer users, there has been a great...

Metropolitan Area Networks: Operating Models

Introduction In the current world of technology, the internet and computing are increasingly finding use in daily activities. Together with the need to access and share information, networking has come to be a very important instrument to achieve this purpose. Networking can be described as the practice of connecting computing...

Database Management and Machine Learning

A database is computerized system of information with the ability to search and process data (Vermaat et al. 556). Data is the collection of texts, images, audio, video, and other items presented in the form of records in the database. Data along with a database management system and applications are...

Loops in Java Programming: FOR, WHILE, and DO…WHILE

Java offers three basic types of loops: FOR, WHILE, and DO…WHILE. Their fundamental function is executing a block of code repeatedly, based on a Boolean condition (Farrell, 2014). However, they differ in how they evaluate their conditional expression (Farrell, 2014). A WHILE loop evaluates its conditional expression before executing, therefore,...

Rhetorical Analysis: Google Analytics App

Audience The genre selected for the present analysis is a knowledge base article. The chosen source is a support page for Google’s Analytics application (“How can we help you?” n.d.). The intended audience is represented by the users of the Google Analytics app, which means the people who want to...

Wireless and Mobile Network and Phone Security Issues

The contemporary world is characterized by an increased use of wireless communication. Such communication entails the use of smart phones and iPods in our daily communications. The use of wireless communication has become very essential which has greatly enhanced sharing of information greatly. Security of the information transmitted over wireless...

The Boeing Company: Current Performance

The Boeing Company, similar to other large aircraft manufacturers, is experiencing an economic decline due to the combination of recent events. Examining the company’s financial performance from 2015 to 2019, one can see a gradual increase in revenue from 2015 to 2018, followed by a steep decrease between 2018 and...

Information Assurance and the Role of Time

Cyber security and information assurance refer to steps taken to protect networks and computer systems from being disrupted as well as preventing unauthorized access (Sara, 2008). Cyber security and information assurance aim at providing three things: integrity, confidentiality and availability (Knapp, 2009). Integrity is enhanced through ensuring that users are...

Consistency Management in Requirements Modeling

Introduction There has been an increase in the use of the Unified Modeling Language in many contexts; it is used in application domain, methodology, and platform. For this reason, there has been more concern for customized consistency. There has been little support for customizations that are specific safe for the...

Engineering: Power Management Techniques for Energy Efficiency

Introduction In many engineering applications, there is a need for efficiency. Power management is an elemental strategy for improving efficiency. The idea is to reduce power consumption to the least possible value while ensuring performance is okay. In the design of digital logic, power scaling is a major way to...

Unmanned Control Aerial Systems Review

Introduction Unmanned vehicles have grown in popularity, especially because of their versatility in use. These autonomous vehicles are used in multiple areas such as monitoring disaster areas, an inspection of projects and infrastructure, military operations, and spraying of agricultural chemicals, among others. The unmanned vehicles are also equipped with cameras,...

Emerging Technologies: Intelligence Building

The growing concerns about the emerging threats to security mean that intuitions have to upgrade their security system to include intelligence gathering system based on information technology. In this hospital security as well as information technology officers concerned with security issues do want to upgrade and include intelligent building IT...

The Facets of Globalization in Internet Security

Introduction Globalization is a process beneficial in numerous ways as it supports economic growth and assists in accessing and creating opportunities – the Internet is possibly both one of its most visible facets and a driving force. Web security is one of the issues on which the effects of globalization...

A Planned Change Success of It Projects

Introduction A planned change is a change executed systematically in tandem with organization’s future goals and expectations. It ensures an organization moves steadily in its processes of implementing a given solution. In IT project management, change refers to project management process, where the perceived change facets to a project are...

Number of Clusters in K-Means Clustering

Abstract This paper investigates the number of Clusters in K-Means Clustering and analyzes the methods used in numbering. The purpose is to obtain the correct number of clusters in a given document with the least number of errors and achieve an accurate number of clusters. A comparison of the different...

Development and Launch of an Information Technology Product

Introduction Framers Company is in the process of launching a new product. One of the objectives is to provide customers with low prices within a limited time. The company also aims at producing a product that is unique in the market and one that will fulfill the needs of the...

Concepts of Windows XP

Introduction For a computer to operate, it requires an operating system. Windows XP constitutes one of the many operating systems whose manufacturer is Microsoft Corporation. Windows XP is applicable in a variety of computers ranging from laptops, personal computers and desktops. The emergence of windows XP in the market from...

Internet Privacy and Privacy Issues

Internet Privacy has become one of the most commonplace issues in contemporary society. Even though internet connectivity enables many people to interact and share information, privacy issues have remained a big problem for Internet users. Internet-related crimes, such as fraud and cyberstalking, have been on the verge of increasing, hence...

Virtual Machines Overview and Analysis

Virtual machines are often called virtual computers because that is what they are. A virtual machine emulates a computer and can run an operating system and a collection of applications, just like any physical computer would. However, while it provides the exact same functionality, it is not based directly on...

Management Information Systems

EMC EMC was first created in 1979 before starting as an information systems infrastructure, dealing in both software and hardware in 1981. With several partnerships, acquisitions, and a series of new research and development projects in various countries including Singapore, and tapping on cheap Chinese labor, the company grew further...

Technology Integration, the Use of Technology

It is common knowledge that learning and teaching can be enhanced by the use of technology. Additionally, the new generation of tech-savvy students have high demands about the use of educational technology. Thus, it is critical that school leaders promote the use of technology on all levels of education. In...

Business Intelligence System Development to Deliver Analytics

Introduction The Business Intelligence system is integrated with analytical systems that provide the function answers to various business needs. The analytical systems that should be contained in the BI should be highly developed, performance-based, tightly integrated, and readily available for use in analytical and warehouse purposes. Examples of software that...

The Generation of Electricity and Cogeneration

Summary Industrial plants in the United States are unlikely to stop using fossil fuels because the amount of power acquired from other sources is still inadequate. The fact that wind and solar photovoltaic (PV) energy are in short supply has compelled environmentally-conscious organizations to seek different means of mitigating the...

Database Privacy Issues

Introduction The rapid advancement in the use of information technology has also resulted in increased usage of databases for the storage of Information. Newer technologies such as data mining use the stored data in such a way that not only permits quick access to deeply buried information but they also...

Digital Transformation: Social Effects

The paper represents research proposals aimed at revealing core social trends connected with digital transformation in the world and the USA in particular. Key threats for society are mentioned, including digital divide, and methodology is proposed to deepen the current knowledge and understanding of social implications of digital transformation in...

The Erie Company Department of Public Works: The Project

Project Scope The Erie Company Department of Public Works — Division of Highways seeks proposals from consultants for professional engineering services for design, construction, administration, and construction inspection services for the Dona Street extension. The extension will be located west of NYS Route 5 for a distance of approximately 1,550...

Object-Oriented and Database Management Systems Tradeoffs

Introduction Database Management Systems (DBMS) is a major requirement in any organizational setup, and one of the most popular DBMS is the Relational Database Management Systems (RDBMS). It is formatively one of the most significant landmarks made towards understanding the hypothetical and technological framework of a database. Although it has...

Second Life Program for Virtual Nursing Education

All spheres of modern life are influenced by the technical innovations, developed for the last ten years. Medical care is not the exception. Different types of medical equipment are used during curing for many years. The innovations in the educational sphere have come later. Today the software and other innovations...

Information System Development Methods

Introduction Information system development methodologies can be defined as a set of procedures and techniques aided with the necessary documentation that is used to design and implement a new information system or update an existing information system (Blanchard & Fabrycky, 2006). The methods of development are usually based on a...

Critical Literature Review of Digital Signature

Abstract The literature review is on the digital signature and the opinions of different writers who have written on this topic. There have been some articles written on the topic of digital signature, a problem on cryptography needs to be solved, there are different companies and organizations that continuously use...

The Technology of Self-Driving Cars

Nowadays, autonomous vehicles no longer seem unusual, and their introduction for widespread use is not that far off. Nevertheless, cars operating at higher levels of autonomy require certain infrastructure, and their successful operation depends on a variety of factors, including climate and road traffic. A number of technologies that autonomous...

Ways of Designing Human-Computer Interaction

Introduction In the book by Shneiderman and Plaisant (2010), designing Human-Computer Interaction (HCI) is the science of studying and structuring interaction between users and the devices or machines such as computers. It’s a process that requires proper planning, incorporates numerous fields of disciplines such as the study of computer science,...

High Performance Flash Memory Solid State Disk

Performance evaluation of i/o workloads Flash-based solid state disks (SSD) is a performance based data storage technology that optimizes the use of flash-based technology to implement its data storage capabilities compared with mechanically available data storage technologies (Park & Shen, 1). Technically, the promise for better performance of the SSD...

Cybercrime Legislation in the UAE, the US and the EU

Introduction After many inventions or technology development, threats are also involved in many ways. New technologies give us latest types of crime which directly or indirectly harm us. Computer is the main source of the online data library. It not only gives us our required information, but when we download...

Mobile Computing: The Future of Business

Introduction The changes in technology force companies to reevaluate business models to remain profitable and competitive in a market. Mobile technologies use has become part of daily life for most people around the world as a way of sharing information. A study conducted by Pew Research Center (2019) revealed that...

The Great Robot Race

Introduction The thought of fully unmanned ground vehicles fascinates everyone with an interest in robotics and automation technologies. Governments, corporations, and individuals have been pursuing various technologies that could see the dream of self-driven robots taking over critical roles, such as warfare in rough terrains and dangerous environments. Emerging technologies...

Southwest Airlines From the Management Perspective

The success of any business organization depends on its leaders’ willingness to apply appropriate models and theories, empower their followers, and make strategic decisions depending on the forces experienced in the sector. Managers need to utilize their competencies to support all core functions and ensure that every partner is involved...

Conficker Worm – A Worm That Affects Microsoft Windows

Conficker, which is also referred to as Downup, Downadup and Kido, is a worm that affects Microsoft Windows operating system which was discovered at first in November 2008. It checks for defects in the Windows software to designate computers and connect them into a virtual machine which can be dominated...

Information Systems Strategic Planning

Introduction Strategic planning is not a concept that is uniquely applied to the field of information technology. In modern times, every segment of life and every undertaking that is successful must utilize the advantages availed by strategic planning. To state simply, strategic planning is about the careful organization of the...

Information Systems in Different Industries

Introduction Information systems can bridge what was once an unbridgeable gap between service and a customer by making information available to previously unreachable populations. Current information technology can greatly assist service industries like hotel chains or airlines in making information readily available to previously unreachable populations. In most countries the...

Could Artificial Intelligence ‘End Mankind’ or Is It All Alarmist Nonsense?

Introduction Not so long ago, the concept of artificial intelligence (AI) was in the earliest stages of its conception and was only pondered over in science fiction. In fact, the alarmist trends in some parts of contemporary global society owe their existence to the early sci-fi novels addressing the ostensibly...

System Software: Analysis of Various Types of System Software

Since I began working, I have interacted with various types of system software. I have found it very interesting working on different types of BIOS and device firmware, operating systems, utility systems, and operating software. Over time, I have been able to set up several websites using different server operating...

Achieving the Optimal Process. Software Development

Introduction The software development industry is fast growing as user requirements change-requiring applications that can address these requirements. As the costs of development rises in developed countries, a new source of labour market is emerging to provide labour for development of such applications at reduced costs. This is achieved through...

Cloud Computing Overview and Analysis

Cloud computing technology has become one of the fastest-growing areas of the IT market in recent years. Businesses choose cloud services to reduce costs, improve internal interaction, streamline operations, help with faster decision-making, and ensure more flexibility. When choosing appropriate cloud technology, companies need to consider cloud deployment models and...

Media’s Effects on the Human Brain

Introduction This topic involves studying the effects of the continued use of digital media on the human brain. The issue presented is becoming more urgent every year since the usage of digital technologies and social networks has an increasing impact on human life. Almost half of the world’s population uses...

The Relationships Between Technology Progress and Communication

Technology has been evolving at a very fast rate in the 21st century. Previously, it took several days or weeks for the news or messages to reach people in remote places. However, technology has brought a revolution in the way people communicate and transact businesses. The medical profession has benefited...

The Charleston Sofa Super Store Fire

A fire that occurred on June 18, 2007, in Charleston, South Carolina, was one of the most tragic events that lead to mass deaths of firefighters in the United States. Nine people died that day; they were all experienced firefighters between the ages of 27 and 56. Even though several...

The Installation of a Hardware Firewall

Execution of business processes in the 21st century has been faced with a lot of challenges like insecurity and conviviality. Due to this a lot of organizations have employed information technology mechanisms to protect their information infrastructure from being accessed by unauthorized persons and also to check authentication (Neumann, 5)....