Data Quality Evaluation Plan

Introduction This is an elaborate plan on data quality evaluation for GlaxoSmithKline plc (GSK). This is a multinational pharmaceutical company with headquarters in London. There are issues in master data management as a result of two firms merging in 2000; Glaxo Wellcome merged with SmithKline Beecham Company. These two companies...

The Seamus Company: Developement of the Mobile Application

Abstract The Seamus company is seeking a vendor on a hire basis to develop a technology-enhanced interactive learning solution to improve one of the processes. This paper will focus on process enhancements and learning modules. The proposed solution is a comprehensive mobile application that combines grammar exercises for curriculum reinforcement,...

Unmanned Systems in Poaching Prevention

Introduction The poaching of various high-value, and often endangered wildlife is an immense conservation challenge in the contemporary environment. Conservational efforts of many African megafaunas are further hindered by a variety of socio-economical issues, including political instability, economic strife, and a highly evolving and expanding international market for illicit wildlife...

Industry and Agriculture: Use of Technology

Introduction Technological progress has skyrocketed over the past few decades, allowing for the simplification and enhancement of a variety of processes within every domain. Industry and agriculture are among the areas that have experienced a vast rise in effectiveness and performance quality due to the integration of new types of...

A Report on the Cyber Attack at Czech Hospital

One of the major COVID-19 testing laboratories in the Czech Republic has recently faced an obscure cyberattack in March 2020. The representative of the Brno University Hospital, Pavel Zara, claimed that the situation is still in progress and there is no detailed information available on the incident. A cyberattack hit...

My Telecom: Project Proposal Audit

Introduction Managing a project is one of the major challenges that one needs to face when performing in the contemporary business setting. Projects implemented in the telecommunications industry are, in turn, even more, challenging than others due to the additional need to focus on communication-related concerns and the assessment of...

The Super Smart Jacket in Use

Introduction According to the UK drink driving statistics (2010), over 3000 people are either killed or seriously injured in accidents related to drink driving. The problem with alcohol is that the more an individual consumes, the more confident he or she gets and consequently the more risks he or she...

Command, Control, and Communications Subsystem

Abstract Subsystems are evidence-based models for ensuring that competent individuals complete specific functions in a timely manner. In the identified organization, the proposed command, control, and communications (C3) framework will transform operations and guide leaders to identify new or initial technologies that have the potential to deliver positive results. The...

The Influence of Human Factors in Aviation

Abstract This paper adopts a socio-technical approach to aviation in order to examine how Human Factors (HF) influence airline operational safety and efficiency. The SHELL model is deployed to analyze the Tenerife airport disaster in order to define and present the main HF that caused it. Aviation is a complex...

Biotechnology: Impact on Biological Warfare and Biodefense

Biotechnology is the act of using animals, plants and microorganisms to create products or perform certain tasks. Biotechnology has applications in four main industrial areas, which include; crop production and agriculture, health care, non-food uses of crops and other products (like vegetable oils, biofuels and biodegradable plastics) and finally in...

Online Disinformation and Homeland Security

Noticing and Articulating the Problem The world is confronting an increasing flow of disinformation within cyberspace. Examples incorporate the spread of cyber-rumors by social media bots during French elections within the Macron Leaks attack or the partisan messages during Brexit in the United Kingdom. Thus, the growing threat of conspiracy...

Electroencephalography Waves to Control Musical Instrument Digital Interface

Introduction This paper investigates current trends in turning the brain waves into music, through surveying the literature on the methods of turning Electroencephalography (EEG) waves into Musical Instrument Digital Interface (MIDI) music. The effects of the music on the human body are well known and documented, where different types of...

Biometrics in Regards to Computer and Internet Security

Introduction Biometrics is a security technology that is programmed in accordance of individuals’ body characteristics such as finger prints or eye retina to mention but a few. Its relevance is becoming an interesting topic in regards to computer and internet security. According to Bolle and Ratha (2004, p.6) the first...

Unspoken Words Recognition Using EEG

Introduction The idea of human-machine communication has always been of interest to mankind. The recent technological developments prove that the use of specific low-end systems and EEG can allow recognizing unspoken speech and thus make direct communication without actually uttering words possible. In this respect, the impact of personal peculiarities...

Overview of Boeing E- Enabled Advantages

Boeing faced the biggest blow in 1999 when airbus, their biggest competitor delivered more airplanes than Boeing. This was then followed by a shrank down of Boeing’s earnings and a consequent laying off of 9,300 employees out of the 126,000 employees that it had. During the gulf war, there was...

Drone Warfare: Benefits Versus Costs

It seems reasonable to state that waging war has always been an expensive undertaking. What is more, with the flow of time, weapons, armory, and other military equipment – as well as expenses on army maintenance – have become pricier. It is not surprising that recent technical progress provides the...

Copyright Law – Umg Recordings, Inc. v. Mp3.com

Introduction The United States copyright law and the doctrine of fair use were enacted to reduce or prevent the use of someone’s copyrighted materials without their consent. Any person who needs to use or cite another person’s intellectual property must have due rights from the copyright owner. In case individual...

Office Information Systems

Introduction At the beginning of the 21st century, information systems and information technology penetrated all spheres of life. Information systems make routine work fast and simple, and support complex operations and performance deficiencies. In dentistry, information systems support daily operations and simplify routine work and data storage facilities (Eaton and...

Drones: Interface Design Features

The number of unmanned systems in the world is regularly increasing. Today, this diversity includes “self-managed” planes, vehicles, drones, seagoing ships, and spacecraft. Each designed device solves unique problems, hence the variety of interfaces for control and monitoring (Howard, 2013). There is no need to create machine functionality that will...

Video HTTP Streaming: Work Principles and Usage

Introduction Communicating video content may take a variety of forms. These may include a point-to-point communication and broadcast method in addition to the multicast method. To communicate video efficiently in a fraction of the initial downloading time, streaming video is an important requirement. HTTP streaming Video HTTP streaming is an...

Securing VoIP Networks and Management Mechanisms

Introduction The VoIP problem was identified after carrying out a thorough assessment of the company’s communication systems. The analysis of the problem showed that the company’s VoIP network and infrastructure was prone to denial-of-service attacks (DoS) that affected the quality of the calls. The company’s Internet Protocol infrastructure is made...

Engineering Design and CAD Relations

The Creative Process of Generating new Ideas In engineering design, engineers have to come up with new ideas because if they stick to the same old styles people will become bored with their designs. Besides that, they have to update their skills by finding ways of applying ideas from other...

Voice Over Internet Protocol: Technology Introduction

Introduction The principles of IP telephony are based on transferring the voice using the Internet Protocol, which is currently considered the most perspective and used protocol for data transfer over the networks. The world market for IP telephony is actively developing and currently, VoIP (Voice-over-IP) technology is supported by almost...

Biomass and Energy Crops and Technology

Abstract Biomass energy is extracted from living or dead plant matter. This type of energy has an advantage over fossil fuel because it is a renewable energy source while fossil fuel is not. Majorly, biomass energy is used to produce electricity and heat. In this regard, plant matter even in...

Information and Communication Impact on Innovation

Awazu, Y, Baloh, P, Desouza, KC, Wecht, CH, Kim, J & Jha, S 2009, ‘information-communication technologies open up innovation’, Technology Management, p. 51. The article under analysis explores the effect of information and communication technologies on innovation processes and difficulties connected with the development of these technologies. The article starts with...

Sub Networking: Definition and Role

A subnet is an individually identifiable part of a particular Internet Protocol network. Subnetting is achieved by dividing the computer networks into groups of computers that manifest a distinct, selected IP address routing prefix. Subnetting is important when dealing with many connections of computers in large networks. These large connections...

Radio Frequency Identification and the Impact on Society

Introduction Radio frequency identification is a tracking technique that utilizes radio waves to identify and locate items within a specified area. The items could be living things such as human beings and animals or could also be objects in the form of products. Typically a tag also referred to a...

“Googling Your Date” Article by Martha Irvine

In the past, dating suggested sharing intimate time with one’s partner, but the rules have changed. Today, it is possible to search for information about a potential lover online before becoming acquainted in person. The result of this search may vary from positive, such as similar taste in music, to...

Soldering in a Lead-Free Environment

History and applications of lead-based alloys Lead never occurs free in nature but in a compound known as lead sulphide (Galena). The ancient Egyptians used Galena in eye paintings because of its metallic look that served to attract the attention of ancient metal workers. Extraction of lead from its ore...

Impact of Social Media on Mental Health

The use of the internet for human communication and connectivity has established in society. According to Karim et al. (2020), at least 3484 people had social media account in 2019, which is an increase of 9% from 2018. Networking sites have advantages to people as they enhance interactions, entertainment, provides...

Lazarus Island: Disaster Systems Analysis and Design

Interview Notes This paper aims to develop a web-based emergency management system for the government of Lazarus Island. In particular, this system will be used at the response stage of disaster management, and its key purposes will be to help coordinate the relief efforts of various governmental and non-governmental organizations....

Telecommunication Principles: The Topic of Modulation

Introduction The topic of telecommunications system cannot be studied completely without touching on the topic of modulation, its categorization and ways of usage. Thus, modulation is the telecommunications technique used, as Gaudenzi (2007) argues, to modify the forms of television or radio waves in order to adjust the number of...

The Feasibility of Light Fidelity Replacing WiFi

Background WIFI’s reliance on radio frequencies for data transmission has two significant limitations. First, the amount of data that can be transferred at a time is limited; and second, radiofrequency resources are constrained, which might lower WIFI capacity to transmit data in the future. One of the solutions to this...

Symbol Resulted From the Modern Digital World

Symbol Meaning(s): This symbol is new to society since it has been created as a result of the emergence of new digital technology. It looks like an upside-down drop with a circle in it. Its appearance resembles a hot air balloon or a pin that travelers put on the world...

Australian Securities and Investments Commission

Identifying strategic issues and options of the organization requires close analysis of its external and internal macroenvironments. The scope of this assignment covers detailed analysis of Australian Securities and Investments Commission (ASIC), its current problems, and areas for growth. Prior to deriving insights regarding ASIC’s strategic issues and options, it...

Electronic Medical Records Analysis

Technology is an irreplaceable part of numerous life spheres, and medicine is not an exception. Electronic medical records (EMRs), electronic health records (EHRs), and others are essential parts of clinical information systems in the United States. For example, the EHR is a continuous record of patient health information that is...

Radio Frequency Identification Technology Concepts

Introduction Identification and authentication are the most important requirements of any security system. Electronic systems such as computers and communication devices have some sort of identification and authentication capabilities. Radio Frequency Identification (RIFD) technology is a form of Real Time Location System (RTLS) that uses an object known as RFID...

Labor Relations in the Airline Industry

The core components of labor relations in the airline industry are, in the first place, the participants of these relations, such as workers and management. Workers in the airline industry are occupied in such professions as flight attendants, pilots, and machinists (Bodie, 2019). Another core component of labor relations is...

IPhone X by Apple Inc.: Articles Review

The iPhone X is one of the smartphones innovated and designed by Apple Inc. and it was released in 2017. The device delivered new features that lacked in its predecessors, such as the Face ID and OLED screen. It uses Apple A11 bionic system and delivers a slate form factor...

Analysis of Zero Trust Architecture System

Executive Summary Zero Trust Architecture is an innovative way of providing cybersecurity, which is beneficial for companies who have confidential information and, at the same time, outsource employees who do not work from the office computers. It is focused on protecting diverse resources such as databases, network accounts, and different...

Object-Oriented vs Procedural Programming Paradigms

Procedural programming and Object-oriented programming (OOP) are two paradigms in programming. They are fundamentally different in how they approach problem-solving and organizing programs. Under procedural programming, a program is organized as a step-by-step instruction to solve a problem. The instructions are executed linearly, but they can include elements that control...

Technology Development: Indonesian Film Industry in 2010-2020

The film industry in Indonesia has been growing during the last several decades. One of the significant factors that influence this sector is technology development. The emergence of new internet technologies has made video content accessible to mass audiences, providing entertainment and education. However, the implication of new technologies has...

Email System Upgrade: Project Scope Statement

Project Objective To upgrade the existing email system by January 15th, 2011, in such a way that it becomes: one system with a capacity of 2500 users, replacing the existing 5 systems and making it capable of both LAN and remote (Wi-Fi) access; install new standards and protocols, reconfigure the...

Effective Problem-Solving Using Digital Media

Introduction Digital Media in Problem-Solving Advanced Data Collection Engaging the Target Audience Gaining Competitive Advantage Creating Solution-Based Content Hiring Professional Staff Adaptive Marketing Environment Simplified Estimation Algorithms Conclusion References Baglione, S., Tucci, L., & Woock, P. (2020). Invasive job hiring practices and social media data usage knowledge on job intentions....

Metropolitan Police Service: Identity Management Solution

Introduction With the nature of the information handled by Metropolitan Police and the number of staff authorized to access this information, there is a great need for the institution to ensure that every staff has access only to the information he or she is authorized to access. Identity and access...

Programmable Controller Applications

Introduction Programmable controller applications refer to digital computers that are designed for the automation of electrochemical processes. They are mainly used in different industries and machines for purposes such as packaging. PCAs differ from general-purpose computers in that they are designed to accept multiple inputs and output arrangements, temperature ranges,...

Facts From Fiction and From the Internet

Being on the Internet requires a lot of critical thinking and the ability to discern fact from fiction. With the abundance of information that is thrown at Internet users from every corner of every site, the range of false data is huge, and taking this information for granted may cost...

Alternative Methods in Safety Management in Engineering

Introduction “Safety of the workers and the users of a facility is one of the most essential aspects for any engineering work.” (Skibniewski, 1983) Fault or failure in a completed project can lead to huge costs in terms of repairs and accidents. The defects may also cause unnecessary delays or...

Business Processes and Technology

Introduction Competition in business is increasing by day. Price of goods is not just the factor that has to be overlooked while considering the overall development of business but quality of products and services to customers should also be considered. Time also plays a major role in all business activities....

Aspects of System Engineering

Introduction System engineering is generally required for the proper arrangement of the managed system and for professional risk management practices. Considering the fact, that the necessity to improve the entire performance of any system is required for the smoother decision making and problem solving processes, the system engineering practices are...

Simultaneous Usage of Double 3 via Tapbooth Share

Introduction Social media platforms provide an immense opportunity for people to share their experiences with the world. TapBooth has numerous features that allow its users to improve their experience while taking photos and posting them on the most popular platforms (“Help,” n.d.). However, I would like to focus on the...

Software Project Management, the Completion of the WBS

A project is a temporary establishment, intended for the creation of unique products and services. “Temporary”, implies that every project has a beginning, and inevitably an ending point, reached when the established objectives are completed. “Unique”, on the other hand, means that the created products or services sufficiently differ from...

Situational Awareness in Unmanned Missions

Situational awareness is crucial in carrying out unmanned missions, which is why any opportunity to improve it deserves careful consideration. The majority of opportunities to enhance situational awareness belong to its first stage, which is the perception of the needed data. Research indicates that it is the most error-prone component...

Basic Technical Definition of Virtual Reality

It is quite easy to provide a basic technical definition of Virtual Reality. It is a three-dimensional environment generated by a computer with which an individual can interact. What is more, a person using special tools like VR headsets and controllers can manipulate objects stimulated by computers and perform some...

Information Technology Infrastructure Library

Introduction Information Technology Infrastructure Library is the collection of practices that should be adopted for better and improved information technology services, information technology operations, and concepts. In literal terms, it is a collection of books that was developed by the British Government. The figure that is shown is a collection...

Unmanned Surface Vessels and Aerial Vehicles Caharcteristics

Surface Vessels Wave Glider is an unmanned marine system (UMS) unmanned surface vehicle with full autonomous capability. It is produced by Liquid Robotics, a wholly-owned subsidiary of The Boeing Company (“Wave glider,” 2019). Ten feet long, it employs wave energy to propel itself forward with complimentary use of stored solar...

Boeing 737 Max Accidents and the Company’s Reaction

Introduction The crash of two Boeing 737 Max planes was one of the most significant aircraft accidents affecting the entire world. Hundreds of people died in the two crashes, and many families are still looking for a fair solution and an apology from the company. The main reason for the...

Project-Based Learning for the Holistic Development of Engineering Students

Though theoretical knowledge is essential, there is a growing belief that while teaching applied sciences, particularly engineering, a great emphasis should be put on the development of students practical skills. Therefore, some courses and curriculums need to be revised to improve the current state of education in this sphere. Many...

Aviation Industry and Safety Management Systems

Safety management systems (SMSs) are an essential component of the aviation industry. Throughout the history of aviation, safety measures evolved from crew resource management aimed at improving communication between the crew members to the contemporary SMSs (Petitt, 2017). In order to continuously develop and improve the existing SMSs, sufficient information...

Getting Your Information: Google Search Features

The search formulated as Stress site: Nature.com provides links to numerous publications about stress on the website of the scholarly journal Nature. These publications mainly focus on either high levels of stress found in contemporary society or the neural mechanisms involved (“Stress,” 2020). The search reveals that stress occupies a...

The Sensors in Fault Detection

Fault Monitoring and Condition monitoring In the field of control engineering, fault detection and isolation and condition monitoring have happened to be among the most important topics. As a result, this paper intends to identify these two phenomena and how they are incorporated in the field of automotive engineering. To...

Artificial Intelligence and How It Affects Hospitality

Introduction The history of artificial intelligence as a new scientific direction begins in the middle of the 20th century. By this time, many prerequisites had already been formed for its origin, where among philosophers, there have long been disputes about the nature of men and the process of knowing the...

Artificial Intelligence: Its Potential and Use

Introduction Artificial intelligence (AI) refers to the development of machines that simulate human intelligence, both in action and thought. It is a revolutionary branch of computer science that applies multiple approaches. Examples of AI technologies widely used today include planning, speech recognition, learning, and problem-solving. AI is common in the...

The Benefits and Negative Effects of Technological Advances

Technological progress has created numerous benefits, improving the quality of human life. What is known for a fact is that technological progress is unstoppable and inevitable as humanity has been using the results of technology for so long that it is hard to imagine the life without it. However, the...

Why iPhone Is Superior to Android?

iPhone is superior to Android because of its design, innovative technology used to build these phones, Apple’s operating system, and the company’s excellent service. Opponents may suggest that Android phones released recently are comparable in design to those by Apple. Moreover, Apple’s devices are recognized for their uniqueness and the...

Information Systems: Critical Issues and Innovative Approaches

Abstract Technological changes are happening at so fast a rate that organizations have to constantly remodel their strategies in order to beat competition. One of the major changes that institutions have had to undergo is the installation of reliable information systems such as office automation regimens. This paper seeks to...

PHP and MySQL Systems Design

Advantages of PHP Provides increased ability to control the content on a page. A web page is developed using HTML tags that allow us to control specific attributes and content. Static web pages do not contain dynamic content and limit functionality of the website, hence the need to include programs...

Why the Internet Is Killing Us

The Internet was created for education, free transfer of information, the unification of communication, and a healthy society’s development. However, it has become a place to support anger and hatred, where people reflect their anti-social views. Numerous terrorist attacks were planned on the Internet, with the preparation and planning stages...

The Growth and Development of Computer Crimes

Introduction The invention of computers basically as a vital communication tool has revolutionized man’s lifestyle in a big way. It has made the world today to become too small and be referred to as a “global village”. This new development has led to emergence of a new wave of crime...

Social Engineering and Cybercriminals

Social engineering refers to a wide range of psychological maneuvering of misleading people to reveal confidential information and imperil its security. There are numerous forms of manipulations, which hackers use to make their victims disclose personal details. Moreover, cybercriminals follow a set of specific social norms within their subculture. This...

Autonomous Solutions Incorporation: Mobius Technology

The unmanned ground vehicle (UGV) is a means of transportation on the ground, which can work without a person on board. This type of transport offers a profitable solution for many previously problematic areas of human activity. In places where it is hard or threatening for a person to work...

Movie Review: Electromagnetic Spectrum

Electromagnetic waves of different lengths and frequencies are used for different purposes based on their characteristics and capabilities. The contemporary world technology utilizes the whole spectrum of electromagnetic waves from the longest radio waves to the shortest Gamma rays. Due to these waves’ capabilities to spread over long distances and...

Fully Autonomous Underwater Vehicles Competition

Robosub is incredible international competition for mainly student teams seeking to demonstrate their technical success in developing fully autonomous submersibles that showcase the skills of modern devices. It should be recognized that the unique feature of the competition entirely affects the final design, which should have an unmanned device: according...

The Flower Fairy Tale: Flower Shop Automation

The Flower Fairy Tale focuses on supplying custom and designer bouquets, which means that there is additional stress on the importance of the product being assembled by hand. This eliminates the option which would imply using robots or any other form of mechanical assistance in the production process. However, business...

Online Press Websites: Comparing and Contrasting

Introduction In the globalized world of rapidly evolving information technologies, designing and maintaining websites gained several forms, combining machinery and creativity. As a matter of fact, the website’s effectiveness depends on multiple undebatable factors, such as convenience, organization, and appealing design. Comparing and contrasting the websites of two prominent American...

The Application of Nano-Particles

Introduction Nanoparticles, also identified as ultrafine particles, refer to matter particles with a diameter of between 1 and 100 nm (nanometers). They have specific characteristics such as their inner structure, shape, surface characteristics, and size, which render them different from other materials, including spatial confinement, high surface energy, and various...

Modeling of a Network: Deployment and Implementation of IP (VoIP)

Abstract Efficient communication has been identified as a potential tool to enhance organisation agility. Many businesses have benefited from efficient communication systems in order to enhance their competitive advantages. Meanwhile, organisation depends on the real time communication to enhance organisational decision-making. Thus, this proposal discusses modelling of a network deployment...

Computer Supported Cooperative Work and Google Wave

Since the invention of the internet protocol, communication has astronomically advanced creating new possibilities that did not exist before. Computer Supported Cooperative Work (C.S.C.W) is a technology that seeks to use computer systems to allow, coordinate and monitor collaborative group work. Developed recently, Google Wave is a web service technology...

Canadian Radio-Television and Telecommunications Commission Hearing

The 2020 public hearing held by the CRTC (Canadian Radio-television and Telecommunications Commission) makes part of a comprehensive review of mobile wireless services. In his opening remarks, Ian Scott, the CEO and chairperson of the CRTC, stated that between 2016 and 2018, providers had made a lot of progress. They...

DBR Technology: Data Networks

One of the important aspects that Information technology has brought forward is telecommunications. Communication networks play an increasing important role in an ever shrinking business world. Organizations, big or small, used these networks to exchange information even beyond geographical boundaries. Through research, new communication standards are developed on regular basis...

Performance in Safety Management Systems (SMS)

Study Design The study will employ a cross-sectional research design in examining regulations and technologies employed in the aviation industry to provide a high level of performance in safety management systems (SMS). This research design is appropriate because it is easy to implement, promotes data collection from a representative sample,...

Google Chrome OS Description

Introduction Chrome OS refers to a Google-designed, open-source operating system based on Gentoo Linux. The aforementioned technology is derived from the Chromium OS–free software. It also utilizes the Google Chrome browser as its primary or main user interface (Hachman, 2019). Chrome OS stores user data/information and applications in the cloud,...

Computers: Macs Vs PCs

Introduction This research paper aims to describe Macs and PCs. The paper will make familiarize the reader with Macs and PCs through examples. Apart from this research paper includes comparison and contrasting of both Macs and PCs. By example There are lots to consider in mind while thinking about Mac...

The Development of New Technologies: Wireless Hacking Techniques

With the rapid development of new technologies, the safety of personal data is expected to increase. However, no matter how secure a wireless network is, there are some special tools and methods that allow certain people to crack it. Despite the fact that there is a great number of solutions...

Cybercrime: Categories and Challenges

Introduction The development of digital technologies and innovations that brought humankind to the era of the Internet has introduced multiple changes of various character in every part of life. One of them is the appearance and constant transformation of a new category of crime associated with computers and communication technologies...

The Concept of Crawler Search Engine

Search engine crawlers, commonly identified as robots, spiders, or bots, are programs or scripts that methodically and spontaneously browse webpages. Crawling relates to the discovery procedure whereby search engines dispatch a group of robots – spiders or crawlers to locate updated and new content (Amudha & Phil, 2017). Bots, for...

Big Data in Human Relationships

Nowadays, people surf the web for pictures of cats much more often than for sketches of atomic bombs. The Internet became a vast database, and it was created to make fast access to this data open to everyone (Cukier, 2014). However, the web is becoming more and more commercialized: people...

Programming: Personal Development Plans

Over this course, I have learned much about Java and programming in general, particularly the object-oriented programming (OOP) paradigm. As it draws to a close, I understand that the concepts of inheritance and polymorphism are complex and challenging to master. Although I understand their application and utility, I still have...

Voice Over Internet Protocol Description

The development of technologies allowed humanity to communicate with each other over long distances. Today, when connecting is no longer a problem, the focus has shifted to the quality and security of networking. The Voice over Internet Protocol (VoIP) was created that allows for faster and cheaper communication. Although VoIP...

Application Whitelisting: Advantages, Disadvantages and Issues Surrounding Its Use

Introduction Application whitelisting is a security technique that restricts applications or components that can be executed within an organization to a list of specifically approved (whitelisted) ones. Components in this case refers to libraries, configureation files, or other similar elements (Sedgewick, et al., 2015). Thus, only known “good” activity is...

Steve Jobs: A Tech Genius Who Was a Renowned Story Teller

The topic of this paper is Steve Job’s use of the tools of fiction in his product launches. His success, to a great extent, was a result of his artistic approach to presentations. Bill Gates stated once, describing Job’s public speaking skills: “He’s even a bit nervous because it’s a...

The Just-in-Time Compilation Inventory System

A JIT inventory is a management strategy that ensures the production schedules go hand in hand with the suppliers’ raw material orders. Also called lean manufacturing, JIT inventory aims to eliminate any form of waste and maximize efficiency (Voss & Robinson, 2019). Through a JIT system, a company reduces the...

Why Technostress Is Harmful to Psychological Well-Being and Ways to Reduce It

Constant access to the Internet and the need to always be connected create optimum conditions for technostress. People, on the one hand, get tired of continuous messages, e-mails, and notifications monitoring. On the other hand, they are afraid to lose sight of something interesting or important, which is called the...

The Dangers of Biting on a Phish

Online security has continually caused a significant challenge to individuals and organizations due to fraudulent activities such as phishing. Phishing refers to deceitful cybercrime where individuals attempt to obtain secure information such as passwords, usernames, and PIN numbers by disguising themselves as legitimate institutions or persons (Aleroud & Zhou, 2017)....

Developing a Self-Starting Microcontroller System

Preliminary The suitable memory available in the MC68HC12B32 system is 32 kbs of read-only memory (ROM). The ROM array is arranged in a 16-bit configuration and may read as bytes, aligned words or uneven words. A bus cycle represents access time for byte and aligned word access whereas, for uneven...

Record Breaking X-37B Unmanned Space Plane

Introduction USA-240 is the third spaceflight of the U.S. Air Force’s X-37 experiment program to ascertain the technological reliability and reusability of unmanned spacecraft in orbital missions. The secretive flight, which logged 675 days orbiting the earth, marked the first re-flight of the agile space shuttle specially designed to withstand...

Java as a Programming Language: Creating an App

Before a computer program can be executed, it must be created and compiled. Any text editor or IDE is used to edit the Java source code. The extension of the file should be.java, while the file name should reflect the term used in the public class line. The next step...

The Ethical Use of Surrounding Biometrics

Introduction The pace of the development of modern technology opens up many unique possibilities for ordinary people. Some electronic tools, previously only visible on the screens of science fiction films, are now found in the devices of the vast majority of users around the world. Many such systems have come...

Technological Development: Unmanned Aircraft Systems

Introduction The incredible speed of technological development makes the unmanned industry one of the most fast developing. Unmanned aircraft systems (UAS) are now used in traffic management, cargo transportations, and even mining, to name but a few spheres of application of pilotless technologies. The most critical issue in sensing, perception,...

The Practical Application of Robotics in Health Care

With the rapid growth of modern society and the wide range of technological advancements, people have more opportunities to access challenging procedures, especially in the field of medicine. Technological progress in robotics and artificial intelligence provides countless future prospects for addressing current healthcare issues. Some of these challenges include population...

Data Market Regulation: Issues and Concerns

Introduction The issue of data market regulation has now become a controversial topic. On the one hand, some companies use data to make intelligent decisions that led to a revolution in the internet economy. On the other hand, sellers that provide data to organizations create an unsecured market situation in...

Project Management Software and Tools Comparison

Introduction It is widely known that with the development in information technologies came great opportunities for improving company management. However, due to the lack of knowledge and the immense diversity of software solutions that are excellent at some things but so good at others, potential clients usually feel perplexed and...

Information Systems, Enabling Technology or Strategic Weapon?

Introduction Numerous studies have revealed that business transformation is an essential tool for business organizations to enhance competitive measures, business capability, and modern business techniques. Organizations need transformation irrespective of business sectors and geographical location, business transformation not only enhance the quality of business, but it also improves overall business...

Microsoft Excel: Data Analysis Using Spreadsheet

Microsoft Excel is an essential software to all organizations regardless of the industry under which they operate. They can be embedded in various functions performed by each department ranging from assigning tasks to accounting. As a finance officer, Microsoft Excel is vital in conducting basic financial accounting. Spreadsheets are giant...

Role of the Medical Equipment in the Development of a New Research Project

Summary The provision of the lab and medical equipment plays an important role in the development of a new research project, the improvement of medical services, and the enhancement of academic facilities. Even if researchers and administrators establish clear goals and milestones in their work, there is a need for...

Sensor Technologies of Unmanned Maritime Systems for Search and Rescue

Unmanned Maritime Systems (UMS), when used for search and rescue, require specialized applications and approaches to be used as people’s safety is the crucial point to consider while operating. The chosen system includes the integrated components for assisted rescue and crewless search operations and is called the ICARUS project. Its...

How to Prevent Leakage of Patient Health Information

After having researched the Privacy Rights Clearinghouse database, I selected three different cases. The first incident of an insider breach type happened on May 25, 2017, at White Blossom Care Center, San Jose, California. One of the former employees improperly accessed residents’ data at the time of the employment. Inappropriately...

Balance Between Customization and Standardization

How Technology has changed the Balance between Customization and Standardization The ever-changing technological landscape has significantly affected the balance between customization and standardization in various aspects. At the outset, organizations have not only been forced to change their patterns of work but also the structure of workgroups, authority, and managerial...

Emerging Network Security Technologies

Introduction The research will mainly deal with finding out a convenient network security technology that will suit corporation business operations. One of the network security concepts includes authentication, once a user is authenticated (allowed access to a computer) a stateful firewall puts in place administrative policies. Firewall security is the...

Mobile Apps for Diabetes Mellitus Patients Research

Research on mobile medical apps for diabetes mellitus (DM) patients Intent to analyze commercially available apps available for DM patients Apps have outcomes published in the literature, received FDA or CE Mark approval Apps intend to support blood glucose (BG) and DM self-management 14 mobile medical apps identified: smartphone-based and...

Critical Path Analysis and Project Management

Critical path analysis (CPA) is used to determine the critical and non-critical activities related to the business processes or plans and the amount of float involved in each activity. As such, the result of this method identifies the critical path, which includes the sequence of essential steps that incorporate a...

Discussion Data Volume Challenges

Modern unmanned ground-controlled stations (GCSs) are valuable equipment used to remotely control aircraft. One of such systems is the Desert Rotor station, a high-precision GCS that makes it possible to control flights of drones and other unmanned aerial vehicles (“Portable ground control stations,” 2019). The station is equipped with a...

Social Media, Smartphones Have Become Obsession

Smartphones have become our obsession instead of being our helpers. They attract people to use all of the apps and social networks as much as possible. Every person on the planet is dependent on his smartphone, and I am no exception to the rule. With the increase of opportunities these...

Emotional Affection Emergence to Artificial Creatures

Technology is spreading fast and integrates numerous spheres of everyday life for people of different ages, starting from kids. The contemporary world’s reality offers multiple opportunities through technological advancements, but simultaneously, hinders challenges and controversial points. The rapid emergence of various robots, including those with whom people can have intimate...

The Robots Are Coming – For as Many as 800 Million Jobs

Introduction This paper discusses the issues presented in the article called “The robots are coming – for as many as 800 million jobs”. As the technology of machine learning and artificial intelligence swiftly develops, many business owners and corporations are eagerly pondering the possible ways of automation in their operations....

Smartphone Technologies: A Central Processing Unit

Smartphones are powered by a central processing unit (CPU) which drives the device function and ultimately defines its processing power. The CPU in a device ensures that millions of transistors, memory cells, logic elements are in tune and perform in the right sequence, with the help of a crystal oscillator...

Microsoft Corporation Strategic Management

Introduction Microsoft Corporation remains one of the most competitive and profitable companies in the global computer and software industries. Microsoft’s first core competence is the presence of high-quality products that meet the needs of more customers, including Windows, Skype, Office, Visual Studio, and software applications (Lohr 2018). The key competitors...

Holography Review: Description, History, and Applications

The main features of holography Holography is the science of making holograms A method of recording an interference pattern The method is based on wavefronts diffraction Holographic devices can record three-dimensional information The result is a hologram (Shimobaba, & Ito, 2019) The main features of holograms An image received through...

Technical Synopsis – Auto-Drive

Introduction The invention of automobiles in 1886 by Karl Benz has created a new way of transporting people and goods, and now, companies such as Google and Tesla aim to develop a breakthrough – auto drive. This technology synopsis will describe the purpose and specifics of auto-drive and give details...

Mobile Technology Use for Business Applications

Mobile technologies have pervaded practically every aspect of people’s lives. As a result, business owners started utilizing the advantages of mobile applications to promote their products and services. One of the main benefits of using technologies with such an aim is the low cost of advertising. What is more, e-business...

Azure: Service Operations Management Overview

Perception of the Service The service provided by Microsoft (Azure Cloud) can be perceived as a client-centered attempt to convey the best tech for an appropriate price that would not scare customers away from the company. The operation provides consumers with an outlook on the company’s services where end-users could...

Information System in the Clinical Environment

The age of digital information makes more facilities, including medical clinics, implement technologies in their work. It gave a significant push to developing Electronic Health Record systems, which clinics use to keep patients’ health records. However, the system has a crucial disadvantage, which is the lack of interoperability. It can...

Desktop Virtualization: Benefits and Challenges

Introduction Desktop virtualization has acquired a lot of attention since the late 1990s. Proponents of virtualization claim that it is the future of computing as it can significantly optimize almost all processes associated with the use of hardware and software. However, critics of desktop virtualization state that it will lead...

The Decision on the Gazebo’s Layout

The first critical component of the decision is the time that will be necessary to construct the gazebo. The author will use the precedence diagramming method, as described by Dionisio (2018), to map out the process. The plan provided by the California Redwood Association (n.d.) features the steps of deciding...

Project Management and Supply Chain Strategies

Introduction When it comes to business processes, both nonhuman resources and employees are equally significant. That is why companies draw specific attention to dealing with these kinds of resources, and project management is a suitable option here. According to Jacobs and Chase (2014), this term stands for planning, directing, and...

“Increasing Automation in Policing” by Joh, E. E.

Introduction Modern society is at the stage of a global transition to a new technological structure associated with the digital revolution, the significance of which is determined not only by changes in technology but also by a radical restructuring of the state of public institutions. This may include forms and...

Artificial Intelligence and the Future of Nursing

Healthcare has been subject to revolutionary changes as a result of technological breakthroughs in academia and their practical implementation in hospitals. Such advancements have influenced the structure and organization of wellness care since humanoid robots were introduced to the healthcare industry. McKinsey Global Institute reports that “800 million workers worldwide...

Footprinting and Scanning the Organization: Assessment Methodology

Methodology Maintaining digital security has become increasingly more complex over the past few years due to the rise in the accessibility of tools for security breach and the development of malicious software. Therefore, creating the strategies for improving the security of a company’s information has become a crucial step in...

Information Technology: Barclays’ Business Operations

Introduction The success of business organizations depends on the established strategic plan, model, and the ability to consider the changes recorded in the industry. Many companies are currently implementing evidence-based processes that revolve around the use of information, communication, and technology (ICT). The Internet has gone further to support this...

Integration of Robots in Hotel Services

The impact of robots integrated into the process of communication with clients in hotels will be investigated in the framework of this research. The main purpose of this paper is to provide a qualified and detailed analysis of gathered data that contains interviews, quantitative study and the examination of secondary...

Current IT-Related Ethical Issue

Ethical issues in the information technology (IT) industry are, in many cases, connected to the way business entities collect and store information about website visitors. Kidder’s nine steps is a framework that can be used to analyze similar issues and find ethical solutions to them. This paper will explore the...

Data Scientist and Software Development

Introduction With the technological revolution of the 21st century, data has become an important tool in decision-making. However, to derive meaning out of raw data, it has to be analyzed – a task done by data scientists. These professionals transform data into insight, thus giving elaborate guidance for users of...

Technical Communication and Programming

Modern computer programs written in high-level programming languages are often complex to use and understand, especially for users who are not familiar with the concept of software development. In a bid to increase a program’s usability, software developers now incorporate how-to instructions and help texts known as program documentation which...

Laboratory Information System: Application Overview

General Description of the Information System This section provides a general description and of the information system. It documents the title, overall function, and the users of an information system and what they wish to do with the information system (or the information system does for them). General Description Laboratory...

The Use of Starcraft II Video Games for AI Research

In their article, Vinyals, Gaffney, and Ewalds (2017) discuss the collaboration between Blizzard Entertainment, a video game developer, and DeepMind, an AI (artificial intelligence) researcher, to use video games as a platform for AI design and testing. A base for the research environment is StarCraft II, one of the most...

Big Data Management Research

The development of communication technology allowed for the evolution of data analysis techniques, which can now incorporate not only analysis of quantifiable data, but also an examination of other types and sources of information. Text mining allows finding answers to complex questions, such as the origins of ideas or innovation,...

Responsibilities of a Technical Professional

The use of internet has created a huge chance for the population using it within the last decade. It is a prime tool of success in the recent era. Thus, it becomes important to analyze and focus on the subject of responsibilities that a technical professional must indulge while walking...

Shopping Apps Compare and Contrast

Introduction Today, to buy something, people do not have to go to the store and do not even need to visit the online store website. It is enough to download the application and make a purchase. For these reasons, online shopping is rapidly gaining popularity. A smartphone for the buyer...

Radio-Frequency Identification in Healthcare and Agriculture

In the 1970s, barcodes seemed like the height of sophisticated product tracking. However, both technological progress and market demands have developed significantly in recent years, presenting new identification and tracking opportunities. Specifically, radio-frequency identification (RFID) has gained traction due to its ability to transmit data over distance. According to the...

Cabels: Compare and Contrast Study

Unshielded Twisted Pair Unshielded twisted pair (UTP) is probably one of the most regularly used types of cabling (Khavkine, 2017). Twisted pair is a combination of insulated wires that are twisted together to form a single cable. The twisting is used to eliminate potential interference from various outside sources. Although...

Inheritance and Polymorphism in Programming

Inheritance is one of the core concepts of object-oriented programming. It allows classes to receive, or inherit, all the behaviors and attributes of other classes (Farrell, 2016). Classes that inherit from others can still have behaviors and attributes unique to them (Farrell, 2016). Therefore, inheritance is a useful technique when...

Fundraising Company for Updating College’s Computer Labs

Introduction In the modern world, electronic devices have become a crucial part of our lives. People can hardly imagine their lives without computers, smartphones, laptops, smartwatches, and other devices. Whether they are a benefit or a detriment is an open question. However, one thing is certain: they make people’s lives...

The Difference Between Data and Information

A good illustration of the difference between data and information is a website of Upwork Global Inc. available at www.upwork.com. This site represents a platform for freelance workers and employers who need to hire professionals for a one-time project or a task. The starting page explains that Upwork is a...

PC Components Are Recommended for Upgrading

How to Decide Which Components to Upgrade Type of case they have The case is usually not critical to the performance of a Personal Computer, as it is only a framework that safely and conveniently secures all of the more essential components in place. The customer may choose to upgrade...

Artificial Intelligence: Article Review

An effective thesis states the writer’s clearly defined opinion on some subject. You must tell your reader what you think. Don’t dodge the issue; present your opinion specifically and precisely. However, don’t just make your thesis an announcement of your subject matter or a description of your intentions. Poor: The...

Digital Information Systems for Businesses

In the modern world, any business regardless of its size has to use resources for storing and processing data. The practice of sending information in a physical form to a secure location is about to be entirely replaced by cloud services. They provide a more accessible way for companies to...

Real Estate Appraisal: Single- and Multi-Family Houses

Introduction An appraisal is the opinion of an expert to estimate the value of a residence. This will definitely vary from domicile to domicile with regard to the material and subject of construction and mainly not into a great deal the beautification as compared to the fabric of the structure....

Database Design – Alternative Approaches and Advanced Techniques

Investigation of Application Development Tools Just as earlier humanity witnessed the transition to self-developed data collection platforms, it is now possible to observe the development of a whole new class of tools for self-learning and data visualization. This is not necessarily a replacement for traditional analytical software suites – the...

Black Swan in Project Management

A famous example of a black swan in project management is Levi Strauss’s $5 million SAP implementation effort that led to a $200 million loss for the company. According to Flyvbjerg and Budzier (2011), the switchover led to declines in orders, and the company had to close distribution centers in...