Consistency Management in Requirements Modeling

Introduction There has been an increase in the use of the Unified Modeling Language in many contexts; it is used in application domain, methodology, and platform. For this reason, there has been more concern for customized consistency. There has been little support for customizations that are specific safe for the...

Engineering: Power Management Techniques for Energy Efficiency

Introduction In many engineering applications, there is a need for efficiency. Power management is an elemental strategy for improving efficiency. The idea is to reduce power consumption to the least possible value while ensuring performance is okay. In the design of digital logic, power scaling is a major way to...

Unmanned Control Aerial Systems Review

Introduction Unmanned vehicles have grown in popularity, especially because of their versatility in use. These autonomous vehicles are used in multiple areas such as monitoring disaster areas, an inspection of projects and infrastructure, military operations, and spraying of agricultural chemicals, among others. The unmanned vehicles are also equipped with cameras,...

Emerging Technologies: Intelligence Building

The growing concerns about the emerging threats to security mean that intuitions have to upgrade their security system to include intelligence gathering system based on information technology. In this hospital security as well as information technology officers concerned with security issues do want to upgrade and include intelligent building IT...

The Facets of Globalization in Internet Security

Introduction Globalization is a process beneficial in numerous ways as it supports economic growth and assists in accessing and creating opportunities – the Internet is possibly both one of its most visible facets and a driving force. Web security is one of the issues on which the effects of globalization...

A Planned Change Success of It Projects

Introduction A planned change is a change executed systematically in tandem with organization’s future goals and expectations. It ensures an organization moves steadily in its processes of implementing a given solution. In IT project management, change refers to project management process, where the perceived change facets to a project are...

Number of Clusters in K-Means Clustering

Abstract This paper investigates the number of Clusters in K-Means Clustering and analyzes the methods used in numbering. The purpose is to obtain the correct number of clusters in a given document with the least number of errors and achieve an accurate number of clusters. A comparison of the different...

Development and Launch of an Information Technology Product

Introduction Framers Company is in the process of launching a new product. One of the objectives is to provide customers with low prices within a limited time. The company also aims at producing a product that is unique in the market and one that will fulfill the needs of the...

Virtual Machines Overview and Analysis

Virtual machines are often called virtual computers because that is what they are. A virtual machine emulates a computer and can run an operating system and a collection of applications, just like any physical computer would. However, while it provides the exact same functionality, it is not based directly on...

Technology Integration, the Use of Technology

It is common knowledge that learning and teaching can be enhanced by the use of technology. Additionally, the new generation of tech-savvy students have high demands about the use of educational technology. Thus, it is critical that school leaders promote the use of technology on all levels of education. In...

Business Intelligence System Development to Deliver Analytics

Introduction The Business Intelligence system is integrated with analytical systems that provide the function answers to various business needs. The analytical systems that should be contained in the BI should be highly developed, performance-based, tightly integrated, and readily available for use in analytical and warehouse purposes. Examples of software that...

Socio-Technical Issues and IT Project Success or Failure

Introduction Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of the internet. These two entities have virtually transformed the world as far as information processing and communication is concerned. Organizations have extensively employed the use of computer...

Online Learning Technologies

Introduction Education is of great importance to the society and because of this; individuals and governments have invested significant amounts of money in its development. Innovations in Information Technology have enabled great advances to be made in education through online learning. This form of learning is able to overcome problems...

The Generation of Electricity and Cogeneration

Summary Industrial plants in the United States are unlikely to stop using fossil fuels because the amount of power acquired from other sources is still inadequate. The fact that wind and solar photovoltaic (PV) energy are in short supply has compelled environmentally-conscious organizations to seek different means of mitigating the...

Database Privacy Issues

Introduction The rapid advancement in the use of information technology has also resulted in increased usage of databases for the storage of Information. Newer technologies such as data mining use the stored data in such a way that not only permits quick access to deeply buried information but they also...

The Erie Company Department of Public Works: The Project

Project Scope The Erie Company Department of Public Works — Division of Highways seeks proposals from consultants for professional engineering services for design, construction, administration, and construction inspection services for the Dona Street extension. The extension will be located west of NYS Route 5 for a distance of approximately 1,550...

Object-Oriented and Database Management Systems Tradeoffs

Introduction Database Management Systems (DBMS) is a major requirement in any organizational setup, and one of the most popular DBMS is the Relational Database Management Systems (RDBMS). It is formatively one of the most significant landmarks made towards understanding the hypothetical and technological framework of a database. Although it has...

Second Life Program for Virtual Nursing Education

All spheres of modern life are influenced by the technical innovations, developed for the last ten years. Medical care is not the exception. Different types of medical equipment are used during curing for many years. The innovations in the educational sphere have come later. Today the software and other innovations...

Information System Development Methods

Introduction Information system development methodologies can be defined as a set of procedures and techniques aided with the necessary documentation that is used to design and implement a new information system or update an existing information system (Blanchard & Fabrycky, 2006). The methods of development are usually based on a...

Ways of Designing Human-Computer Interaction

Introduction In the book by Shneiderman and Plaisant (2010), designing Human-Computer Interaction (HCI) is the science of studying and structuring interaction between users and the devices or machines such as computers. It’s a process that requires proper planning, incorporates numerous fields of disciplines such as the study of computer science,...

High Performance Flash Memory Solid State Disk

Performance evaluation of i/o workloads Flash-based solid state disks (SSD) is a performance based data storage technology that optimizes the use of flash-based technology to implement its data storage capabilities compared with mechanically available data storage technologies (Park & Shen, 1). Technically, the promise for better performance of the SSD...

Cybercrime Legislation in the UAE, the US and the EU

Introduction After many inventions or technology development, threats are also involved in many ways. New technologies give us latest types of crime which directly or indirectly harm us. Computer is the main source of the online data library. It not only gives us our required information, but when we download...

Southwest Airlines From the Management Perspective

The success of any business organization depends on its leaders’ willingness to apply appropriate models and theories, empower their followers, and make strategic decisions depending on the forces experienced in the sector. Managers need to utilize their competencies to support all core functions and ensure that every partner is involved...

Conficker Worm – A Worm That Affects Microsoft Windows

Conficker, which is also referred to as Downup, Downadup and Kido, is a worm that affects Microsoft Windows operating system which was discovered at first in November 2008. It checks for defects in the Windows software to designate computers and connect them into a virtual machine which can be dominated...

Information Systems Strategic Planning

Introduction Strategic planning is not a concept that is uniquely applied to the field of information technology. In modern times, every segment of life and every undertaking that is successful must utilize the advantages availed by strategic planning. To state simply, strategic planning is about the careful organization of the...

System Software: Analysis of Various Types of System Software

Since I began working, I have interacted with various types of system software. I have found it very interesting working on different types of BIOS and device firmware, operating systems, utility systems, and operating software. Over time, I have been able to set up several websites using different server operating...

Achieving the Optimal Process. Software Development

Introduction The software development industry is fast growing as user requirements change-requiring applications that can address these requirements. As the costs of development rises in developed countries, a new source of labour market is emerging to provide labour for development of such applications at reduced costs. This is achieved through...

Cloud Computing Overview and Analysis

Cloud computing technology has become one of the fastest-growing areas of the IT market in recent years. Businesses choose cloud services to reduce costs, improve internal interaction, streamline operations, help with faster decision-making, and ensure more flexibility. When choosing appropriate cloud technology, companies need to consider cloud deployment models and...

The Relationships Between Technology Progress and Communication

Technology has been evolving at a very fast rate in the 21st century. Previously, it took several days or weeks for the news or messages to reach people in remote places. However, technology has brought a revolution in the way people communicate and transact businesses. The medical profession has benefited...

The Charleston Sofa Super Store Fire

A fire that occurred on June 18, 2007, in Charleston, South Carolina, was one of the most tragic events that lead to mass deaths of firefighters in the United States. Nine people died that day; they were all experienced firefighters between the ages of 27 and 56. Even though several...

The Internet Growth and Problems That It Faced

Introduction The internet is an interconnection of millions of computer and other devices through wired networks and wireless networks. Several decades ago, the network had only a few number of computers connected. Today the internet is one of the largest phenomena in the world. The internet has become a core...

The Installation of a Hardware Firewall

Execution of business processes in the 21st century has been faced with a lot of challenges like insecurity and conviviality. Due to this a lot of organizations have employed information technology mechanisms to protect their information infrastructure from being accessed by unauthorized persons and also to check authentication (Neumann, 5)....

Simplifying the Structure of Logic Gates and the Performance of Computers

Advantage of logic gates There are several advantages of logic gates on computer operations and performances. First, the logic gates are faster, consume much less power, and are much smaller in size ( Nationmaster 1). The logic gates are cascadable. This gives the advantage of enabling the circuit construction, where...

IF and SWITCH Structures in Java

In Java, statements can be executed conditionally through IF…ELSE and SWITCH structures. The IF statement evaluates a Boolean expression; if true, an associated block of code is executed; otherwise, the following ELSE block is executed (Farrell, 2014). Common mistakes when writing an IF…ELSE statements include errors in syntax, such as...

Hacktivism & Cyberterrorism vs Government Response

Description Hacktivism is the use of technology or computer system for social or political motivations or to promote a certain agenda. One prominent example of hacktivism was Aaron Swartz who broke into the MITs computer system in 2013 and downloaded thousands of academic journals and articles, later published online as...

“The Formula for a Richer World?” by McCloskey

Quotation: In order to show the magnitude of changes, McCloskey (2016) writes that “People moved from tents and mud huts to split-levels and city condominiums, from waterborne diseases to 80-year life spans, from ignorance to literacy” (p. 499). The technique that appealed to me: After giving the statistics numbers regarding...

Intrusion Detection System: Description and Analysis

Abstract Data breaches pose the most significant threat to many companies, especially those doing business in the digital space. In this regard, Intrusion Detection Systems draw special attention from scholars, IT experts, and business leaders since their functions are directly related to monitoring network traffic and identifying malicious activity or...

Cybersecurity Threats to the Non-Executive Director

Introduction Cybersecurity takes up an indispensable place in the security management of each company. Frequently the reasons for the system hacking become non-executive directors, who lack knowledge on the topic of cybersecurity, therefore possessing high risks to the enterprise. Luckily, many preventive and defensive strategies are created in order to...

Proactive Safety Management System in Aviation

Safety management has become an essential topic in aviation to better assess risks and prevent accidents. Poor risk management practices contribute mainly to aviation accidents, most of which are often catastrophic. This raises concerns about profound ways of managing risks following the established standards to make informed decisions. Pilots must...

Cybercrime Legislation in the UAE, US and India

Abstract Various countries depending on their sizes adopt suitable information systems that help make sensible managerial frameworks. These information systems are vital in ensuring efficiency within the various organizations in respective through proper storage and access of data. As a result, gains are made both in terms of country reputation...

Network Design in Business Organizations

Introduction Network design refers to a process that involves topological design, synthesis of network, and network realization. The main reason behind network design is to ensure that the business acquires a network that meets its business model. Many organizations are now focusing their attention towards designing information system network that...

Precision Machinery Literature Evaluation

Venkatesh, V. C. (2007). Precision Engineering. New York: Tata McGraw-Hill. The idea of precision engineering is outlined in the book due to the concepts of multi-dimensional approach when talking about the industrial growth in post-industrial society. In this respect, special attention is grabbed in the book to precision machinery, as...

Top-Down Parsing: A Computer Algorithm

Top-down parsing was introduced in the 1970s, and it remains a widespread strategy that has also become the basis for newer and more sophisticated algorithms. The top-down strategy was preferred during an extended period of time due to its comparative simplicity, usability, and an opportunity to customize. As the term...

Modern Telecommunications System in Business Setting

Introduction In general telecommunication systems are the different ways in which the information is passed from one place to another covering a certain distance. The message passed may be verbal or written. The mode of communication used depends on several factors such as the urgency of the message, the magnitude...

Data Quality Evaluation Plan

Introduction This is an elaborate plan on data quality evaluation for GlaxoSmithKline plc (GSK). This is a multinational pharmaceutical company with headquarters in London. There are issues in master data management as a result of two firms merging in 2000; Glaxo Wellcome merged with SmithKline Beecham Company. These two companies...

The Seamus Company: Developement of the Mobile Application

Abstract The Seamus company is seeking a vendor on a hire basis to develop a technology-enhanced interactive learning solution to improve one of the processes. This paper will focus on process enhancements and learning modules. The proposed solution is a comprehensive mobile application that combines grammar exercises for curriculum reinforcement,...

A Report on the Cyber Attack at Czech Hospital

One of the major COVID-19 testing laboratories in the Czech Republic has recently faced an obscure cyberattack in March 2020. The representative of the Brno University Hospital, Pavel Zara, claimed that the situation is still in progress and there is no detailed information available on the incident. A cyberattack hit...

Biotechnology: Impact on Biological Warfare and Biodefense

Biotechnology is the act of using animals, plants and microorganisms to create products or perform certain tasks. Biotechnology has applications in four main industrial areas, which include; crop production and agriculture, health care, non-food uses of crops and other products (like vegetable oils, biofuels and biodegradable plastics) and finally in...

Online Disinformation and Homeland Security

Noticing and Articulating the Problem The world is confronting an increasing flow of disinformation within cyberspace. Examples incorporate the spread of cyber-rumors by social media bots during French elections within the Macron Leaks attack or the partisan messages during Brexit in the United Kingdom. Thus, the growing threat of conspiracy...

Electroencephalography Waves to Control Musical Instrument Digital Interface

Introduction This paper investigates current trends in turning the brain waves into music, through surveying the literature on the methods of turning Electroencephalography (EEG) waves into Musical Instrument Digital Interface (MIDI) music. The effects of the music on the human body are well known and documented, where different types of...

An Innovative Robotics Era: Review

AI-powered technologies have been implemented in the retail sector for long decades, but a truly innovative robotics era is yet to come. From vending machines to a robot barista serving drinks, the use of automation devices corresponds to fast-changing market demands and aims to enhance customer experience and improve a...

Biometrics in Regards to Computer and Internet Security

Introduction Biometrics is a security technology that is programmed in accordance of individuals’ body characteristics such as finger prints or eye retina to mention but a few. Its relevance is becoming an interesting topic in regards to computer and internet security. According to Bolle and Ratha (2004, p.6) the first...

Unspoken Words Recognition Using EEG

Introduction The idea of human-machine communication has always been of interest to mankind. The recent technological developments prove that the use of specific low-end systems and EEG can allow recognizing unspoken speech and thus make direct communication without actually uttering words possible. In this respect, the impact of personal peculiarities...

Electronic Books: The Future of Education

Introduction Marc Prensky claims that electronic books are more useful and efficient than paper ones. The process of education would become more interesting and modern with the use of new technologies. He puts forward the idea that “colleges and universities should ban nonelectronic books” (Prensky 1). Improving the learning process...

Drone Warfare: Benefits Versus Costs

It seems reasonable to state that waging war has always been an expensive undertaking. What is more, with the flow of time, weapons, armory, and other military equipment – as well as expenses on army maintenance – have become pricier. It is not surprising that recent technical progress provides the...

Office Information Systems

Introduction At the beginning of the 21st century, information systems and information technology penetrated all spheres of life. Information systems make routine work fast and simple, and support complex operations and performance deficiencies. In dentistry, information systems support daily operations and simplify routine work and data storage facilities (Eaton and...

Drones: Interface Design Features

The number of unmanned systems in the world is regularly increasing. Today, this diversity includes “self-managed” planes, vehicles, drones, seagoing ships, and spacecraft. Each designed device solves unique problems, hence the variety of interfaces for control and monitoring (Howard, 2013). There is no need to create machine functionality that will...

Video HTTP Streaming: Work Principles and Usage

Introduction Communicating video content may take a variety of forms. These may include a point-to-point communication and broadcast method in addition to the multicast method. To communicate video efficiently in a fraction of the initial downloading time, streaming video is an important requirement. HTTP streaming Video HTTP streaming is an...

Information Systems and Project Management Performance

Introduction The article chosen for analysis was written by an Information Systems (IS) management professor with tremendous experience in the field. It is known as “The relations of requirements uncertainty and stakeholder perception gaps to project management performance” by James Jiang, Shelly Wu, Gary Klein and Liang, T.P for the...

Securing VoIP Networks and Management Mechanisms

Introduction The VoIP problem was identified after carrying out a thorough assessment of the company’s communication systems. The analysis of the problem showed that the company’s VoIP network and infrastructure was prone to denial-of-service attacks (DoS) that affected the quality of the calls. The company’s Internet Protocol infrastructure is made...

European Technological Developments and Its Effects

There is no doubt that the Industrial Revolution dramatically changed the daily life of European people and later on the whole world. However, there are two opposing views concerning its effect on the general population. Some people say that the technological progress led to greater affluence and the rise in...

Engineering Design and CAD Relations

The Creative Process of Generating new Ideas In engineering design, engineers have to come up with new ideas because if they stick to the same old styles people will become bored with their designs. Besides that, they have to update their skills by finding ways of applying ideas from other...

Voice Over Internet Protocol: Technology Introduction

Introduction The principles of IP telephony are based on transferring the voice using the Internet Protocol, which is currently considered the most perspective and used protocol for data transfer over the networks. The world market for IP telephony is actively developing and currently, VoIP (Voice-over-IP) technology is supported by almost...

Biomass and Energy Crops and Technology

Abstract Biomass energy is extracted from living or dead plant matter. This type of energy has an advantage over fossil fuel because it is a renewable energy source while fossil fuel is not. Majorly, biomass energy is used to produce electricity and heat. In this regard, plant matter even in...

Information and Communication Impact on Innovation

Awazu, Y, Baloh, P, Desouza, KC, Wecht, CH, Kim, J & Jha, S 2009, ‘information-communication technologies open up innovation’, Technology Management, p. 51. The article under analysis explores the effect of information and communication technologies on innovation processes and difficulties connected with the development of these technologies. The article starts with...

Sub Networking: Definition and Role

A subnet is an individually identifiable part of a particular Internet Protocol network. Subnetting is achieved by dividing the computer networks into groups of computers that manifest a distinct, selected IP address routing prefix. Subnetting is important when dealing with many connections of computers in large networks. These large connections...

Radio Frequency Identification and the Impact on Society

Introduction Radio frequency identification is a tracking technique that utilizes radio waves to identify and locate items within a specified area. The items could be living things such as human beings and animals or could also be objects in the form of products. Typically a tag also referred to a...

Fire Hazards: Prevention and Protection

Introduction Fire hazards can pose a significant danger to the production and human lives that are essential to diminish through fire prevention control. The inspection of the amount of extinguishers and acetone in welding and molding shops in the project safeguards the space from potential danger. The welding shop faced...

“Googling Your Date” Article by Martha Irvine

In the past, dating suggested sharing intimate time with one’s partner, but the rules have changed. Today, it is possible to search for information about a potential lover online before becoming acquainted in person. The result of this search may vary from positive, such as similar taste in music, to...

Soldering in a Lead-Free Environment

History and applications of lead-based alloys Lead never occurs free in nature but in a compound known as lead sulphide (Galena). The ancient Egyptians used Galena in eye paintings because of its metallic look that served to attract the attention of ancient metal workers. Extraction of lead from its ore...

Lazarus Island: Disaster Systems Analysis and Design

Interview Notes This paper aims to develop a web-based emergency management system for the government of Lazarus Island. In particular, this system will be used at the response stage of disaster management, and its key purposes will be to help coordinate the relief efforts of various governmental and non-governmental organizations....

The Feasibility of Light Fidelity Replacing WiFi

Background WIFI’s reliance on radio frequencies for data transmission has two significant limitations. First, the amount of data that can be transferred at a time is limited; and second, radiofrequency resources are constrained, which might lower WIFI capacity to transmit data in the future. One of the solutions to this...

Symbol Resulted From the Modern Digital World

Symbol Meaning(s): This symbol is new to society since it has been created as a result of the emergence of new digital technology. It looks like an upside-down drop with a circle in it. Its appearance resembles a hot air balloon or a pin that travelers put on the world...

Australian Securities and Investments Commission

Identifying strategic issues and options of the organization requires close analysis of its external and internal macroenvironments. The scope of this assignment covers detailed analysis of Australian Securities and Investments Commission (ASIC), its current problems, and areas for growth. Prior to deriving insights regarding ASIC’s strategic issues and options, it...

Electronic Medical Records Analysis

Technology is an irreplaceable part of numerous life spheres, and medicine is not an exception. Electronic medical records (EMRs), electronic health records (EHRs), and others are essential parts of clinical information systems in the United States. For example, the EHR is a continuous record of patient health information that is...

Radio Frequency Identification Technology Concepts

Introduction Identification and authentication are the most important requirements of any security system. Electronic systems such as computers and communication devices have some sort of identification and authentication capabilities. Radio Frequency Identification (RIFD) technology is a form of Real Time Location System (RTLS) that uses an object known as RFID...

Labor Relations in the Airline Industry

The core components of labor relations in the airline industry are, in the first place, the participants of these relations, such as workers and management. Workers in the airline industry are occupied in such professions as flight attendants, pilots, and machinists (Bodie, 2019). Another core component of labor relations is...

IPhone X by Apple Inc.: Articles Review

The iPhone X is one of the smartphones innovated and designed by Apple Inc. and it was released in 2017. The device delivered new features that lacked in its predecessors, such as the Face ID and OLED screen. It uses Apple A11 bionic system and delivers a slate form factor...

Analysis of Zero Trust Architecture System

Executive Summary Zero Trust Architecture is an innovative way of providing cybersecurity, which is beneficial for companies who have confidential information and, at the same time, outsource employees who do not work from the office computers. It is focused on protecting diverse resources such as databases, network accounts, and different...

Object-Oriented vs Procedural Programming Paradigms

Procedural programming and Object-oriented programming (OOP) are two paradigms in programming. They are fundamentally different in how they approach problem-solving and organizing programs. Under procedural programming, a program is organized as a step-by-step instruction to solve a problem. The instructions are executed linearly, but they can include elements that control...

Technology Development: Indonesian Film Industry in 2010-2020

The film industry in Indonesia has been growing during the last several decades. One of the significant factors that influence this sector is technology development. The emergence of new internet technologies has made video content accessible to mass audiences, providing entertainment and education. However, the implication of new technologies has...

Email System Upgrade: Project Scope Statement

Project Objective To upgrade the existing email system by January 15th, 2011, in such a way that it becomes: one system with a capacity of 2500 users, replacing the existing 5 systems and making it capable of both LAN and remote (Wi-Fi) access; install new standards and protocols, reconfigure the...

Effective Problem-Solving Using Digital Media

Introduction Digital Media in Problem-Solving Advanced Data Collection Engaging the Target Audience Gaining Competitive Advantage Creating Solution-Based Content Hiring Professional Staff Adaptive Marketing Environment Simplified Estimation Algorithms Conclusion References Baglione, S., Tucci, L., & Woock, P. (2020). Invasive job hiring practices and social media data usage knowledge on job intentions....

Metropolitan Police Service: Identity Management Solution

Introduction With the nature of the information handled by Metropolitan Police and the number of staff authorized to access this information, there is a great need for the institution to ensure that every staff has access only to the information he or she is authorized to access. Identity and access...

Programmable Controller Applications

Introduction Programmable controller applications refer to digital computers that are designed for the automation of electrochemical processes. They are mainly used in different industries and machines for purposes such as packaging. PCAs differ from general-purpose computers in that they are designed to accept multiple inputs and output arrangements, temperature ranges,...

Facts From Fiction and From the Internet

Being on the Internet requires a lot of critical thinking and the ability to discern fact from fiction. With the abundance of information that is thrown at Internet users from every corner of every site, the range of false data is huge, and taking this information for granted may cost...

Alternative Methods in Safety Management in Engineering

Introduction “Safety of the workers and the users of a facility is one of the most essential aspects for any engineering work.” (Skibniewski, 1983) Fault or failure in a completed project can lead to huge costs in terms of repairs and accidents. The defects may also cause unnecessary delays or...

Simultaneous Usage of Double 3 via Tapbooth Share

Introduction Social media platforms provide an immense opportunity for people to share their experiences with the world. TapBooth has numerous features that allow its users to improve their experience while taking photos and posting them on the most popular platforms (“Help,” n.d.). However, I would like to focus on the...

Software Project Management, the Completion of the WBS

A project is a temporary establishment, intended for the creation of unique products and services. “Temporary”, implies that every project has a beginning, and inevitably an ending point, reached when the established objectives are completed. “Unique”, on the other hand, means that the created products or services sufficiently differ from...

Situational Awareness in Unmanned Missions

Situational awareness is crucial in carrying out unmanned missions, which is why any opportunity to improve it deserves careful consideration. The majority of opportunities to enhance situational awareness belong to its first stage, which is the perception of the needed data. Research indicates that it is the most error-prone component...

Basic Technical Definition of Virtual Reality

It is quite easy to provide a basic technical definition of Virtual Reality. It is a three-dimensional environment generated by a computer with which an individual can interact. What is more, a person using special tools like VR headsets and controllers can manipulate objects stimulated by computers and perform some...

Information Technology Infrastructure Library

Introduction Information Technology Infrastructure Library is the collection of practices that should be adopted for better and improved information technology services, information technology operations, and concepts. In literal terms, it is a collection of books that was developed by the British Government. The figure that is shown is a collection...

Unmanned Surface Vessels and Aerial Vehicles Caharcteristics

Surface Vessels Wave Glider is an unmanned marine system (UMS) unmanned surface vehicle with full autonomous capability. It is produced by Liquid Robotics, a wholly-owned subsidiary of The Boeing Company (“Wave glider,” 2019). Ten feet long, it employs wave energy to propel itself forward with complimentary use of stored solar...

Object Code Optimization Technique

ompiler optimization is important in computing, as it enhances the performance and operation of executable computer programs. The process of optimization may involve either the minimization or maximization of certain attributes or aspects of the execution process. The essence of compiler optimization is to hasten the execution process by minimizing...

Project-Based Learning for the Holistic Development of Engineering Students

Though theoretical knowledge is essential, there is a growing belief that while teaching applied sciences, particularly engineering, a great emphasis should be put on the development of students practical skills. Therefore, some courses and curriculums need to be revised to improve the current state of education in this sphere. Many...

Aviation Industry and Safety Management Systems

Safety management systems (SMSs) are an essential component of the aviation industry. Throughout the history of aviation, safety measures evolved from crew resource management aimed at improving communication between the crew members to the contemporary SMSs (Petitt, 2017). In order to continuously develop and improve the existing SMSs, sufficient information...

Getting Your Information: Google Search Features

The search formulated as Stress site: Nature.com provides links to numerous publications about stress on the website of the scholarly journal Nature. These publications mainly focus on either high levels of stress found in contemporary society or the neural mechanisms involved (“Stress,” 2020). The search reveals that stress occupies a...

The Sensors in Fault Detection

Fault Monitoring and Condition monitoring In the field of control engineering, fault detection and isolation and condition monitoring have happened to be among the most important topics. As a result, this paper intends to identify these two phenomena and how they are incorporated in the field of automotive engineering. To...

Artificial Intelligence and How It Affects Hospitality

Introduction The history of artificial intelligence as a new scientific direction begins in the middle of the 20th century. By this time, many prerequisites had already been formed for its origin, where among philosophers, there have long been disputes about the nature of men and the process of knowing the...

Online Learning During the Pandemic

Today’s rapid shift in the traditional patterns of social lifestyle caused by the COVID-19 pandemic outbreak has resulted in the necessity to define possible approaches to living a full-scale life while respecting the need for social distancing. Thus, one of the major challenges in the context was to define the...

Artificial Intelligence: Its Potential and Use

Introduction Artificial intelligence (AI) refers to the development of machines that simulate human intelligence, both in action and thought. It is a revolutionary branch of computer science that applies multiple approaches. Examples of AI technologies widely used today include planning, speech recognition, learning, and problem-solving. AI is common in the...

The Benefits and Negative Effects of Technological Advances

Technological progress has created numerous benefits, improving the quality of human life. What is known for a fact is that technological progress is unstoppable and inevitable as humanity has been using the results of technology for so long that it is hard to imagine the life without it. However, the...

PHP and MySQL Systems Design

Advantages of PHP Provides increased ability to control the content on a page. A web page is developed using HTML tags that allow us to control specific attributes and content. Static web pages do not contain dynamic content and limit functionality of the website, hence the need to include programs...

The Growth and Development of Computer Crimes

Introduction The invention of computers basically as a vital communication tool has revolutionized man’s lifestyle in a big way. It has made the world today to become too small and be referred to as a “global village”. This new development has led to emergence of a new wave of crime...

Social Engineering and Cybercriminals

Social engineering refers to a wide range of psychological maneuvering of misleading people to reveal confidential information and imperil its security. There are numerous forms of manipulations, which hackers use to make their victims disclose personal details. Moreover, cybercriminals follow a set of specific social norms within their subculture. This...

Autonomous Solutions Incorporation: Mobius Technology

The unmanned ground vehicle (UGV) is a means of transportation on the ground, which can work without a person on board. This type of transport offers a profitable solution for many previously problematic areas of human activity. In places where it is hard or threatening for a person to work...

Situational Awareness of Unmanned Aircraft Systems Operators

Unmanned Aircraft Systems (UAS) operators stand for remote pilots of autonomous observation aircraft, such as drones, for example, that collect intelligence information. Space Systems operators functions include support of the space-related missions via air traffic controller. The current paper provides a comparison of situational awareness experienced by these two operators,...

Movie Review: Electromagnetic Spectrum

Electromagnetic waves of different lengths and frequencies are used for different purposes based on their characteristics and capabilities. The contemporary world technology utilizes the whole spectrum of electromagnetic waves from the longest radio waves to the shortest Gamma rays. Due to these waves’ capabilities to spread over long distances and...

Fully Autonomous Underwater Vehicles Competition

Robosub is incredible international competition for mainly student teams seeking to demonstrate their technical success in developing fully autonomous submersibles that showcase the skills of modern devices. It should be recognized that the unique feature of the competition entirely affects the final design, which should have an unmanned device: according...

The Flower Fairy Tale: Flower Shop Automation

The Flower Fairy Tale focuses on supplying custom and designer bouquets, which means that there is additional stress on the importance of the product being assembled by hand. This eliminates the option which would imply using robots or any other form of mechanical assistance in the production process. However, business...

The Application of Nano-Particles

Introduction Nanoparticles, also identified as ultrafine particles, refer to matter particles with a diameter of between 1 and 100 nm (nanometers). They have specific characteristics such as their inner structure, shape, surface characteristics, and size, which render them different from other materials, including spatial confinement, high surface energy, and various...

Modeling of a Network: Deployment and Implementation of IP (VoIP)

Abstract Efficient communication has been identified as a potential tool to enhance organisation agility. Many businesses have benefited from efficient communication systems in order to enhance their competitive advantages. Meanwhile, organisation depends on the real time communication to enhance organisational decision-making. Thus, this proposal discusses modelling of a network deployment...

Computer Supported Cooperative Work and Google Wave

Since the invention of the internet protocol, communication has astronomically advanced creating new possibilities that did not exist before. Computer Supported Cooperative Work (C.S.C.W) is a technology that seeks to use computer systems to allow, coordinate and monitor collaborative group work. Developed recently, Google Wave is a web service technology...

Canadian Radio-Television and Telecommunications Commission Hearing

The 2020 public hearing held by the CRTC (Canadian Radio-television and Telecommunications Commission) makes part of a comprehensive review of mobile wireless services. In his opening remarks, Ian Scott, the CEO and chairperson of the CRTC, stated that between 2016 and 2018, providers had made a lot of progress. They...

DBR Technology: Data Networks

One of the important aspects that Information technology has brought forward is telecommunications. Communication networks play an increasing important role in an ever shrinking business world. Organizations, big or small, used these networks to exchange information even beyond geographical boundaries. Through research, new communication standards are developed on regular basis...

Performance in Safety Management Systems (SMS)

Study Design The study will employ a cross-sectional research design in examining regulations and technologies employed in the aviation industry to provide a high level of performance in safety management systems (SMS). This research design is appropriate because it is easy to implement, promotes data collection from a representative sample,...

Google Chrome OS Description

Introduction Chrome OS refers to a Google-designed, open-source operating system based on Gentoo Linux. The aforementioned technology is derived from the Chromium OS–free software. It also utilizes the Google Chrome browser as its primary or main user interface (Hachman, 2019). Chrome OS stores user data/information and applications in the cloud,...

The Development of New Technologies: Wireless Hacking Techniques

With the rapid development of new technologies, the safety of personal data is expected to increase. However, no matter how secure a wireless network is, there are some special tools and methods that allow certain people to crack it. Despite the fact that there is a great number of solutions...

The Information Transmission Through the Internet

Introduction The rapid development of computer technologies has fastered the process of the information transmission through the Internet. Nowadays, we cannot imagine our life without internet communication since it is closely connected with many spheres of our life. Thus, internet serves as a universal source of the electronic database that...

Symmetric and Asymmetric Encryption Algorithms

Cryptographic Basis of Encryption Encryption is the process of converting data into a coded format for security and confidentiality purposes. This process is achieved by passing data through a predetermined set of mathematical formulae known as encryption algorithms. The most commonly used techniques of data encryption include symmetric and asymmetric...

Cybercrime: Categories and Challenges

Introduction The development of digital technologies and innovations that brought humankind to the era of the Internet has introduced multiple changes of various character in every part of life. One of them is the appearance and constant transformation of a new category of crime associated with computers and communication technologies...

The Concept of Crawler Search Engine

Search engine crawlers, commonly identified as robots, spiders, or bots, are programs or scripts that methodically and spontaneously browse webpages. Crawling relates to the discovery procedure whereby search engines dispatch a group of robots – spiders or crawlers to locate updated and new content (Amudha & Phil, 2017). Bots, for...

Big Data in Human Relationships

Nowadays, people surf the web for pictures of cats much more often than for sketches of atomic bombs. The Internet became a vast database, and it was created to make fast access to this data open to everyone (Cukier, 2014). However, the web is becoming more and more commercialized: people...

Programming: Personal Development Plans

Over this course, I have learned much about Java and programming in general, particularly the object-oriented programming (OOP) paradigm. As it draws to a close, I understand that the concepts of inheritance and polymorphism are complex and challenging to master. Although I understand their application and utility, I still have...

Application Whitelisting: Advantages, Disadvantages and Issues Surrounding Its Use

Introduction Application whitelisting is a security technique that restricts applications or components that can be executed within an organization to a list of specifically approved (whitelisted) ones. Components in this case refers to libraries, configureation files, or other similar elements (Sedgewick, et al., 2015). Thus, only known “good” activity is...

Business Continuity and Disaster Recovery

Data loss is the center of focus of business continuity and disaster recovery (BC/DR), as this is the lifeblood of business operations today. Any business threatening IT-related disaster resulting in significant loss of data is risky for companies of any size. As a result, backing up information is essential to...

Steve Jobs: A Tech Genius Who Was a Renowned Story Teller

The topic of this paper is Steve Job’s use of the tools of fiction in his product launches. His success, to a great extent, was a result of his artistic approach to presentations. Bill Gates stated once, describing Job’s public speaking skills: “He’s even a bit nervous because it’s a...

The Just-in-Time Compilation Inventory System

A JIT inventory is a management strategy that ensures the production schedules go hand in hand with the suppliers’ raw material orders. Also called lean manufacturing, JIT inventory aims to eliminate any form of waste and maximize efficiency (Voss & Robinson, 2019). Through a JIT system, a company reduces the...

Why Technostress Is Harmful to Psychological Well-Being and Ways to Reduce It

Constant access to the Internet and the need to always be connected create optimum conditions for technostress. People, on the one hand, get tired of continuous messages, e-mails, and notifications monitoring. On the other hand, they are afraid to lose sight of something interesting or important, which is called the...

The Dangers of Biting on a Phish

Online security has continually caused a significant challenge to individuals and organizations due to fraudulent activities such as phishing. Phishing refers to deceitful cybercrime where individuals attempt to obtain secure information such as passwords, usernames, and PIN numbers by disguising themselves as legitimate institutions or persons (Aleroud & Zhou, 2017)....

Developing a Self-Starting Microcontroller System

Preliminary The suitable memory available in the MC68HC12B32 system is 32 kbs of read-only memory (ROM). The ROM array is arranged in a 16-bit configuration and may read as bytes, aligned words or uneven words. A bus cycle represents access time for byte and aligned word access whereas, for uneven...

Record Breaking X-37B Unmanned Space Plane

Introduction USA-240 is the third spaceflight of the U.S. Air Force’s X-37 experiment program to ascertain the technological reliability and reusability of unmanned spacecraft in orbital missions. The secretive flight, which logged 675 days orbiting the earth, marked the first re-flight of the agile space shuttle specially designed to withstand...

Raising Employee Cybersecurity Awareness

Cybersecurity, or the protection of computer systems and networks from malicious actions, is an essential concern for any modern organization. Data theft and other disruptive activities can cause extensive financial and reputational damage, sometimes forcing businesses to shut down completely. Employers can implement a variety of countermeasures to stop such...

Sifers-Grayson Company: Cybersecurity Incident

Contact Information for the Incident Reporter and Handler Name: Role: After Action Reporting Assistant Organizational unit (e.g., agency, department, division, team) and affiliation: Sifers-Grayson, Engineering department, After Action Reporting division, Blue Team Email address: blueteam.afteraction@sifersgrayson.com Phone number: (555)-121-12-48 Location (e.g., mailing address, office room number): Engineering department, Room E-12. Incident...

Technological Development: Unmanned Aircraft Systems

Introduction The incredible speed of technological development makes the unmanned industry one of the most fast developing. Unmanned aircraft systems (UAS) are now used in traffic management, cargo transportations, and even mining, to name but a few spheres of application of pilotless technologies. The most critical issue in sensing, perception,...

The Practical Application of Robotics in Health Care

With the rapid growth of modern society and the wide range of technological advancements, people have more opportunities to access challenging procedures, especially in the field of medicine. Technological progress in robotics and artificial intelligence provides countless future prospects for addressing current healthcare issues. Some of these challenges include population...

Visually Impaired People: Challenges within Assistive Application Software

Introduction The development of digital technologies over the last decades helped a number of different categories of people gain access to information that they, previously, would not have been able to obtain. Modern technologies strive to reach disadvantaged in these aspects – assistive applications vary greatly, covering different conditions, among...

Data Market Regulation: Issues and Concerns

Introduction The issue of data market regulation has now become a controversial topic. On the one hand, some companies use data to make intelligent decisions that led to a revolution in the internet economy. On the other hand, sellers that provide data to organizations create an unsecured market situation in...

Project Management Software and Tools Comparison

Introduction It is widely known that with the development in information technologies came great opportunities for improving company management. However, due to the lack of knowledge and the immense diversity of software solutions that are excellent at some things but so good at others, potential clients usually feel perplexed and...

Agile Software Development Process

Agile software development involves an iterative process of creating software where different developers and designers work with the client to ensure that business goals and vision are met. It provides an early and continuous development of software, allowing teams to gather feedback and make changes to suit the dynamic requirements....

Information Systems, Enabling Technology or Strategic Weapon?

Introduction Numerous studies have revealed that business transformation is an essential tool for business organizations to enhance competitive measures, business capability, and modern business techniques. Organizations need transformation irrespective of business sectors and geographical location, business transformation not only enhance the quality of business, but it also improves overall business...

Microsoft Excel: Data Analysis Using Spreadsheet

Microsoft Excel is an essential software to all organizations regardless of the industry under which they operate. They can be embedded in various functions performed by each department ranging from assigning tasks to accounting. As a finance officer, Microsoft Excel is vital in conducting basic financial accounting. Spreadsheets are giant...

Role of the Medical Equipment in the Development of a New Research Project

Summary The provision of the lab and medical equipment plays an important role in the development of a new research project, the improvement of medical services, and the enhancement of academic facilities. Even if researchers and administrators establish clear goals and milestones in their work, there is a need for...

Sensor Technologies of Unmanned Maritime Systems for Search and Rescue

Unmanned Maritime Systems (UMS), when used for search and rescue, require specialized applications and approaches to be used as people’s safety is the crucial point to consider while operating. The chosen system includes the integrated components for assisted rescue and crewless search operations and is called the ICARUS project. Its...

How to Prevent Leakage of Patient Health Information

After having researched the Privacy Rights Clearinghouse database, I selected three different cases. The first incident of an insider breach type happened on May 25, 2017, at White Blossom Care Center, San Jose, California. One of the former employees improperly accessed residents’ data at the time of the employment. Inappropriately...

Balance Between Customization and Standardization

How Technology has changed the Balance between Customization and Standardization The ever-changing technological landscape has significantly affected the balance between customization and standardization in various aspects. At the outset, organizations have not only been forced to change their patterns of work but also the structure of workgroups, authority, and managerial...

Emerging Network Security Technologies

Introduction The research will mainly deal with finding out a convenient network security technology that will suit corporation business operations. One of the network security concepts includes authentication, once a user is authenticated (allowed access to a computer) a stateful firewall puts in place administrative policies. Firewall security is the...

Mobile Apps for Diabetes Mellitus Patients Research

Research on mobile medical apps for diabetes mellitus (DM) patients Intent to analyze commercially available apps available for DM patients Apps have outcomes published in the literature, received FDA or CE Mark approval Apps intend to support blood glucose (BG) and DM self-management 14 mobile medical apps identified: smartphone-based and...

Critical Path Analysis and Project Management

Critical path analysis (CPA) is used to determine the critical and non-critical activities related to the business processes or plans and the amount of float involved in each activity. As such, the result of this method identifies the critical path, which includes the sequence of essential steps that incorporate a...