Introduction Before 1982, passenger steamships were the sole way for travelers and mail to travel between Europe and North America. The Cunard Steamship Company’s Lusitania and Mauritania were the fastest and largest, with a gross weight of 31000 tons and a top speed of 26 knots (Felkins et al., 1998)....
Topic: Titanic
Words: 1004
Pages: 8
Modern technology companies offer users a variety of innovative products. Among them are also hardware and software, which together ensure the operation of devices. Major technology corporations, including Microsoft, Apple, and Google, also develop operating systems for both desktop and mobile devices. Currently, iOS and Android are the main products...
Topic: Apple
Words: 1402
Pages: 5
Project manager is a typical role for a team that is working on a project. The manager is responsible for the implementation of a project or idea within a certain period of time by his team using certain resources and for the quality required by the customer. Project manager is...
Topic: Tech & Engineering
Words: 1143
Pages: 4
Causes of Failure at the Denver Airport Baggage Handling System The first crucial reason that led to the failure of the project is inadequate prior planning. At the core of the problem was the managers’ inability to assess the complexity of the task since the initiation of the work. In...
Topic: Airport
Words: 430
Pages: 1
Introduction In the modern world, an increasing amount of personal data is accessed online, including various financial services and applications, and this information should be reliably protected. Websites, mobile applications and online services regularly collect user details. On the one hand, this is practical, because the sites remember logins, passwords...
Topic: Tech & Engineering
Words: 1104
Pages: 4
Introduction Condensing information to an amount as small as possible while keeping the crucial details is vital in a range of instances, including the provision of guidelines, the inclusion of data in product description in trade, and other situations of the kind. Among the tools that help to provide succinct...
Topic: Tech & Engineering
Words: 1150
Pages: 4
In the modern communication world driven by online technologies, cybersecurity is essential. Confidentiality is one of the major concepts that contribute to the security of users online as well as their personal data used in online activities. When studying networking security concepts, I learned that confidentiality is a stepping stone...
Topic: Cybersecurity
Words: 280
Pages: 1
Approaches to Project Selection Project selection methods include a range of proven and tested techniques developed based on logical explanation to choose a project and filter out any that are undesirable or have higher chances of succeeding. The current project focused on expanding the rental holdings of MSG Incorporated from...
Topic: Management
Words: 1104
Pages: 4
Information and communications technology are arguably the most dominant transformational factors in the education landscape. Many schools worldwide are increasingly embracing various technological hardware and software to enhance learning. Tablets, computers, and internet connectivity are rapidly proving to be significant and integral parts of education for students and teachers. However,...
Topic: Technology
Words: 1220
Pages: 4
Introduction Data is linked to a map using GIS (Geographic Information Systems), which combines location data (the position of items) with various types of descriptive information (the description of what they are). Science and nearly every business rely on this for mapping and analysis. GIS aids users in gaining a...
Topic: Ethics
Words: 1064
Pages: 5
Introduction Ensuring the safety of the collected data is a considerable priority for numerous corporations. Large companies aiming to preserve the integrity of their knowledge often incorporate additional protection methods against potential hacking, cautiously guarding the personal data received from the customers. As is shown in the case of the...
Topic: Cybersecurity
Words: 1724
Pages: 6
Currently, the amount of data available to businesses continues to grow at an exceptional rate due to the developments in artificial intelligence and big data. Within the last two years, approximately 90% of all existing information was generated through various digital instruments (Ruiz-Real, Uribe-Toril, Torres, & De Pablo, 2020). This...
Topic: Artificial Intelligence
Words: 848
Pages: 3
Research notes WiFi is a great invention of humanity that allows fast and almost effortless communication between users of any world and access to the Net. WiFi is, in fact, the key to the digital data environment, so any access point, whether private or public, with a password (if available)...
Topic: Tech & Engineering
Words: 908
Pages: 4
Nowadays, computer simulation training is applied in many medical spheres. They include neurosurgery, pharmacokinetics, dentistry, and many others. Live and virtual simulation technologies are getting increasingly popular in medical institutions. However, technology has both positive and negative sides. The main advantage of simulation is an opportunity to safely undertake high-risk...
Topic: Computers
Words: 284
Pages: 1
The article gives an overview analysis of the trend of big data in terms of increasing storage. Tang, Ma, and Luo (2020) mention that the growth of the Internet of Things (IoT) is accelerating the creation of quintillion bytes of data. The article indicates that big data is generated by...
Topic: Tech & Engineering
Words: 262
Pages: 1
Abstract It seems reasonable to say that the issue that SC is aspiring to resolve is related to the improvements of the technological aspect of its performance, which will advance its incomes and brand. The possible solution might be the development of a specific mobile app for learning English that...
Topic: Tech & Engineering
Words: 1795
Pages: 6
Titov, V., Uandykova, M., Litvishko, O., Kalmykova, T., Prosekov, S., & Senjyu, T. (2021). Cryptocurrency open innovation payment system: Comparative analysis of existing cryptocurrencies. Journal of Open Innovation: Technology, Market, and Complexity, 7(1), 1-13. This article examines the possibility of expanding the reach and use of cryptocurrency through the implementation...
Topic: Cryptocurrency
Words: 614
Pages: 2
Introduction Human information processing (HIM) is often referred to as a set of individual capabilities to sense and perceive information, process it, and react accordingly. It is especially important for ones working in aviation, e.g., pilots, controllers, and others, to operate information in an effective manner within the required timeframe,...
Topic: Aviation
Words: 538
Pages: 2
The United Express incident happened at the Chicago O’Hare International Airport in the United States on April 9, 2017. The airline managers offered travel vouchers to four passengers who would vacate their seats for four staff members of the company. However, no passenger accepted, and the managers randomly selected people,...
Topic: Tech & Engineering
Words: 344
Pages: 1
Introduction Nowadays, it is not easy to surprise anyone with hybrid variations of cars. They are more profitable in terms of fuel consumption than cars equipped with internal combustion engines, and at the same time, cheaper than electric vehicles. However, few people know how hybrids work in general. The purpose...
Topic: Vehicles
Words: 657
Pages: 2
Introduction NFC is near field communication, which refers to the semantic field of data transfer and payment transactions because this method itself is a form of contactless payment, which should be as reliable and secure as possible. This protocol became widespread in the mid-2000s and is widely used as a...
Topic: Communication
Words: 1398
Pages: 5
Water Source Heat Pumps and Fan Coil Unit Systems A water source heat pump is comprised of the compressor, 4-Way reversing valve, refrigerant-water heat exchanger, thermal expansion device, coil, and fan. WSHP systems are highly efficient, robust, and quiet. A WSHP system lowers overall building energy consumption by 8% when...
Topic: Tech & Engineering
Words: 676
Pages: 3
Introduction The current pandemic caused by COVID-19 is the most severe global health issue since the 1918 influenza pandemic. Since its emergence, researchers have been working feverishly to leverage a wide range of technologies to tackle the threat posed by the disease. In this regard, Internet of Things (IoT) technology...
Topic: COVID-19
Words: 2337
Pages: 8
The most promising technological innovation to help promote global food security is providing farmers with networking opportunities through mobile technologies. For example, alerting agricultural workers to changes in weather conditions or outbreaks of disease will help them adapt to changes and protect crops and livestock. This can be done through...
Topic: Food
Words: 329
Pages: 1
Introduction Reputation services show the reliability of a particular online source or specific software. The reputation parameter is calculated on the servers of a corresponding manufacturer on the Internet. To ensure the safety of user data, special algorithms for protecting against malicious programs are developed. However, in addition to standard...
Topic: Tech & Engineering
Words: 851
Pages: 3
Abstract Corporate identity thefts involving unauthorized drawing of vital client information is currently on the rise as the most prevalent type of computer crimes. Processing of large volume of personal data, without proper security protection mechanisms make organizational information base vulnerable to malicious attacks by both external and internal agents....
Topic: Computers
Words: 11099
Pages: 50
Introduction Technological advancements in the Internet of Things (IoT) or the Internet of Everything (IoE) have made businesses more actionable and viable than ever. IoT propagates the idea of sensors (physical objects) being connected anytime from anywhere through the internet. IoE further includes the interconnectedness of people, data, processes, and...
Topic: Internet
Words: 1219
Pages: 4
Introduction While cybercrime has become synonymous with web operations that lead to the latest complicated illegal activities. These are criminal activities that are carried out through the use of computers using the internet (Lakshmanan, 2019). Furthermore, nowadays, information is a goldmine and, a source of wealth that is utilized in...
Topic: Cybercrime
Words: 1187
Pages: 4
Introduction In 2017, a robot performed two dental implants on a woman in China, heralding a new era that could be characterized by the automation of dentistry. The doctors involved only supervised the operation; they did not actively participate in either of the procedures. While many people believe that robots...
Topic: Robots
Words: 1786
Pages: 6
Introduction A Rube Goldberg machine is a device that performs an effortless action in a highly complex way — usually through a long sequence of domino interactions. A competition organized by the Purdue PSPE Society of Professional Engineers is being held among the designers of these machines. The 2018 winner...
Topic: Tech & Engineering
Words: 382
Pages: 1
Java and JavaScript have as many security vulnerabilities as other programming languages. These exposures can redirect sessions, manipulate data, and modify and steal information. The security issues can affect server-side environments even though Java and JavaScript are usually viewed as client-side applications. Since the effects of Java and JavaScript vulnerabilities...
Topic: Tech & Engineering
Words: 401
Pages: 1
Definition of Expert and Decision Support Systems Expert systems (ES) are computer systems that combine computer hardware and software components and information to solve various problems in a specific restricted field. It is a branch of artificial intelligence used to emulate human logic. A decision support system (DSS) is an...
Topic: Tech & Engineering
Words: 1270
Pages: 4
The process of sieving and preparing data can be time consuming. Some of the procedures are, normalization, cleaning, transformation and selection. Missing values Data may have missing values primarily for two main reasons. The first one is that the values could miss randomly or caused by unintentional error, for example...
Topic: Tech & Engineering
Words: 1072
Pages: 4
Artificial intelligence (AI) demonstrates immense potential in terms of improving society as long it is developed and implemented properly. More specifically, humanity should consider the potential threats of AI creation without falling into a state of paranoia. This area of research has been attracting the interest of scientific, expert, and...
Topic: Artificial Intelligence
Words: 641
Pages: 2
Introduction The kernel is the primary part of any operating system and has complete control over all processes and memory. Replacing kernel code may lead to drastic outcomes, including a crash and a state, where it is impossible to restore the system. Despite these risks, antivirus designers often use kernel-mode...
Topic: Tech & Engineering
Words: 912
Pages: 3
Computer technologies, with their ability to process vast amounts of information, are proving to be extremely useful in the field of linguistics. When comparing languages, the translator uses grammar and syntax, as well as the most basic vocabulary of a given language with unchanging words. Computer technologies serve to systematically...
Topic: Computers
Words: 287
Pages: 1
Introduction There was a new mass hacker attack, the features and scale of which may indicate the onset of a new era in the field of cyber security. The victims were mainly small and medium-sized businesses, as well as local governments using the popular business email software from Microsoft Corp....
Topic: Microsoft
Words: 1142
Pages: 4
Introduction The objective of this research paper is to provide overview of the Navigational Safety Management System and Risk Assessment. The paper composes of the component functions of a navigational Safety Management System. The paper also provides the strategies to conduct a navigational risk assessment. Component functions of a navigational...
Topic: Management
Words: 904
Pages: 3
Introduction The cache is a crucial part of modern IT infrastructure. It refers to a category of components temporarily storing data to allow its faster retrieval in future requests. Central processing unit (CPU) cache, web cache, domain name system (DNS) cache, and web browser cache are all examples of caches....
Topic: Tech & Engineering
Words: 859
Pages: 3
Only recently, the term “cloud computing” had entered the modern human’s everyday use, when suddenly, more advanced types of data processing and analysis began to appear. In particular, edge computing is logical to apply to the situation when it is unreasonable to transfer an array of information to processing centers...
Topic: Tech & Engineering
Words: 352
Pages: 1
General description The General Purpose of the basic order entry system is to help support firms transact online, their clients to query items details in a catalog, order the item, and ship the item to customers. For a client to order the item, the ordering system confirms the database for...
Topic: Tech & Engineering
Words: 873
Pages: 3
Introduction FUJIFILM Medical Systems USA, Inc. Is one of the companies of Fuji Film, with more than 70 years in the field of imagery, nearly 40 years in the field of radiology, and more than $28 billion in sales, the company is the leading provider of “medical image and information...
Topic: Tech & Engineering
Words: 1109
Pages: 4
Introduction Several questions are often asked when it comes to the use of information technology to commit crimes and the possibility of deploying the same technology in detecting and apprehending people who commit cyber crimes. Computer forensics is a strategic field, especially for organizations that need to protect their information...
Topic: Computers
Words: 1729
Pages: 6
General description Domino’s Pizza is the second largest company in the United States to create pizza. The company was founded and published by two brothers (Tom and James) in the sixties. Tom and James happened to buy a machine. This machine was called Dominick’s. They managed to run their business...
Topic: Tech & Engineering
Words: 918
Pages: 3
Introduction In today’s world, technology is inseparable from people’s everyday life. Almost every person has a smartphone or a computer, and even everyday appliances are being connected to the Internet. Such technology provides new, comfortable features and makes living more convenient in many regards. However, this arrangement also creates a...
Topic: Tech & Engineering
Words: 1720
Pages: 6
Processor architectures for computers, mobile devices, and servers vary in performance and functionality. A reduced instruction set computer (RISC) and complex instruction set computer (CISC) differ in frequency and instructions in clock rates. The application of choice for the CPU architecture is a mobile device, as it is experiencing the...
Topic: Tech & Engineering
Words: 321
Pages: 1
Wellbore stability definition Wellbore stability refers to sustainability of the borehole from falling or breaking down and is achieved through use of drilling fluid programs, casing programs and efficiencies of drilling operating procedures (Simangunson et al, 2006). Wellbore stability is achieved through identification; adoption and implementation of best practices (cf....
Topic: Tech & Engineering
Words: 4341
Pages: 15
Introduction Cooling towers are heat exchange devices that remove excess heat from different components in industries and plants by making use of the concept that water evaporation creates a cooling effect. The setup can be in form of a simple heating and air-condition system in a small structure or a...
Topic: Water
Words: 925
Pages: 3
Technology innovation has transformed the modern lifestyles of individuals in many communities. I agree with Nicholas Carr that Google is making us stupid by assuming cognitive functions that facilitate effective decision-making. Activities done with hardship in the past are now easy to execute with technology invention in devices and application...
Topic: Google
Words: 306
Pages: 1
Introduction In the 21st century, there has been advancement within the technological environment as a result of development in information technology. Most organizations have integrated the use of computers within their workforce in order to increase efficiency. The learning institutions have also incorporated the use of computers as one of...
Topic: Computers
Words: 1475
Pages: 6
All the research journals included in this study, claim that integrated management of information is used across most organizations. Such organizations engage in manufacturing and other services related to management of customer relations. A number of journals indicate that when the process is automated, it uses ERP systems that are...
Topic: Tech & Engineering
Words: 596
Pages: 2
Introduction Verizon is a telecommunication company in America providing services for wired and wireless communications beads on third-generation technology (Verizon, 2011a). The organization is innovative in the telecommunication sector and it provides video and broadband communications and other modes of entertainment through an advanced fiber-optic network. The organization is committed...
Topic: Tech & Engineering
Words: 1566
Pages: 6
Introduction Modern education experiences an influx of innovations in the manner of conveying information. The advancements of technology have allowed using the Internet for distance learning. However, to ensure the adequate efficiency of online learning, appropriate teaching strategies should be implemented. The recent pandemic has restricted many traditional venues for...
Topic: Teaching
Words: 1096
Pages: 4
Introduction The present report can be opened with the help of the apt quotation by Green: “Challenger was a NASA tragedy” (par.1). NASA Shuttle Program started in the 1970s and its main aim was the creation of craft for transportation of cargo into space that would be reusable in contrast...
Topic: Disaster
Words: 2464
Pages: 8
Introduction Description The objective of our call center is to accomplish a future expansion for four locations Dallas, Denver, Chicago Headquarters, and Atlanta, and part of the programs we aim to accomplish are to offer new products to customers such as credit card protection and registration. The plan program we...
Topic: Radio
Words: 3330
Pages: 12
Executive Summary This report highlights the underlying reasons for the 2013 UPS flight 1354 crash at Birmingham-Shuttlesworth International Airport, Alabama. The accident happened when the flight crew failed to manage the aircraft during descent. It fell short of the runway during a non-precision landing approach and crashed at the end...
Topic: Aviation Accident
Words: 1654
Pages: 6
First, Safety Management System (SMS) is directly related to the provision of safety to the staff that is largely founded on the adherence to and advocating of the established standards by the personnel themselves. Hence, the human factor will be integrated by the related activities of your workers who –...
Topic: Aviation
Words: 283
Pages: 1
Internet Privacy has become one of the most commonplace issues in contemporary society. Even though internet connectivity enables many people to interact and share information, privacy issues have remained a big problem for Internet users. Internet-related crimes, such as fraud and cyberstalking, have been on the verge of increasing, hence...
Topic: Internet
Words: 541
Pages: 4
Introduction Information systems can bridge what was once an unbridgeable gap between service and a customer by making information available to previously unreachable populations. Current information technology can greatly assist service industries like hotel chains or airlines in making information readily available to previously unreachable populations. In most countries the...
Topic: Tech & Engineering
Words: 2389
Pages: 8
Abstract The world is going digital each day, hence Scientists and researchers are busy improving the old technology while subjecting business and technology into a new era of fourth generation digital technology. It all started from first generation, and then evolved to the second and third generation. At the start...
Topic: Tech & Engineering
Words: 2650
Pages: 8
Introduction We have two different types of ethics. This is the professional ethics and the human ethics. Professional ethics include ethics of a professional person like a doctor, a software engineer etc. Human ethics are the ethics which enable one to live well with the society. Ethics is very important...
Topic: Ethics
Words: 1962
Pages: 7
The article researched, “Emerging Technologies Being Incorporated in the Fire Service”, discuses eight new devices developed for the Fire Service. It summarizes these new devices without detailed description, providing an overview of the ways new technology is being integrated into firefighting equipment. These devices include three solutions for monitoring a...
Topic: Tech & Engineering
Words: 367
Pages: 1
Classes and objects are one of the key attributes in object-oriented programming (OOP). The general relation between the two can be described as “is-a”: a class describes a template for objects, while an object is a specific instance of a class (Farrell, 2014). The primary concept of this relationship is...
Topic: Programming
Words: 357
Pages: 1
Introduction Managing a project is one of the major challenges that one needs to face when performing in the contemporary business setting. Projects implemented in the telecommunications industry are, in turn, even more, challenging than others due to the additional need to focus on communication-related concerns and the assessment of...
Topic: Auditing
Words: 1175
Pages: 4
Introduction According to the UK drink driving statistics (2010), over 3000 people are either killed or seriously injured in accidents related to drink driving. The problem with alcohol is that the more an individual consumes, the more confident he or she gets and consequently the more risks he or she...
Topic: Tech & Engineering
Words: 1752
Pages: 8
Abstract Subsystems are evidence-based models for ensuring that competent individuals complete specific functions in a timely manner. In the identified organization, the proposed command, control, and communications (C3) framework will transform operations and guide leaders to identify new or initial technologies that have the potential to deliver positive results. The...
Topic: Communication
Words: 3819
Pages: 6
Introduction The United States copyright law and the doctrine of fair use were enacted to reduce or prevent the use of someone’s copyrighted materials without their consent. Any person who needs to use or cite another person’s intellectual property must have due rights from the copyright owner. In case individual...
Topic: Tech & Engineering
Words: 1644
Pages: 6
The use of the internet for human communication and connectivity has established in society. According to Karim et al. (2020), at least 3484 people had social media account in 2019, which is an increase of 9% from 2018. Networking sites have advantages to people as they enhance interactions, entertainment, provides...
Topic: Health
Words: 1193
Pages: 4
How solar panels operate A solar panel, also known as a photovoltaic panel, is an assemblage of photovoltaic cells that convert sun rays directly into electricity through a process known as the photovoltaic effect; the interconnected photovoltaic cells (or the photovoltaic module) are protected from the environment, sometimes with a...
Topic: Tech & Engineering
Words: 2578
Pages: 10
Introduction The topic of telecommunications system cannot be studied completely without touching on the topic of modulation, its categorization and ways of usage. Thus, modulation is the telecommunications technique used, as Gaudenzi (2007) argues, to modify the forms of television or radio waves in order to adjust the number of...
Topic: Telecommunications
Words: 2197
Pages: 8
Information technology (IT) has been useful in transforming different sectors of modern economies. Business entities have integrated innovation in management and operational roles for effectiveness. Similarly, academic institutions have adopted online information systems for enhancing students’ performance. Many communities practiced farming and cattle rearing as a traditional way of life....
Topic: Agriculture
Words: 888
Pages: 3
Introduction The crash of two Boeing 737 Max planes was one of the most significant aircraft accidents affecting the entire world. Hundreds of people died in the two crashes, and many families are still looking for a fair solution and an apology from the company. The main reason for the...
Topic: Boeing
Words: 2478
Pages: 9
The Internet was created for education, free transfer of information, the unification of communication, and a healthy society’s development. However, it has become a place to support anger and hatred, where people reflect their anti-social views. Numerous terrorist attacks were planned on the Internet, with the preparation and planning stages...
Topic: Internet
Words: 314
Pages: 1
Introduction In the globalized world of rapidly evolving information technologies, designing and maintaining websites gained several forms, combining machinery and creativity. As a matter of fact, the website’s effectiveness depends on multiple undebatable factors, such as convenience, organization, and appealing design. Comparing and contrasting the websites of two prominent American...
Topic: Web Technology
Words: 983
Pages: 5
In the contemporary world, interpersonal communication, overall, and dating, in particular, are changing concepts. Contrary to the traditional vision of a regular date filled with meaningful conversations, it is common to see a couple in a restaurant looking down on their phones without saying a word to each other. While...
Topic: Technology
Words: 1653
Pages: 6
Introduction Transport hubs and routes are in principle associated with particular safety concerns, as transport accidents are frequent causes of injury and death of passengers. At the same time, the airport administration is especially diligent in ensuring passenger safety. Numerous checks and security measures can cause anxiety among people, as...
Topic: Airport
Words: 999
Pages: 4
The development of technologies allowed humanity to communicate with each other over long distances. Today, when connecting is no longer a problem, the focus has shifted to the quality and security of networking. The Voice over Internet Protocol (VoIP) was created that allows for faster and cheaper communication. Although VoIP...
Topic: Internet
Words: 287
Pages: 1
Cloud storage is a service framework that transmits and stores information on remote storage networks. It is maintained, controlled, backed up, and accessible to consumers over a network, which is typically the internet. It is delivered with just-in-time capability and expenses on request and eliminates the information storage network (Yamato,...
Topic: Tech & Engineering
Words: 1144
Pages: 4
Most of these networks are genetic, worldwide web-based with a complex topology. A scale-free network is a connected network with the property that the number of links originating from a given mode exhibits a powerful law of distribution. This is network is constructed by adding nodes to the existing network...
Topic: Tech & Engineering
Words: 1244
Pages: 4
Introduction The pace of the development of modern technology opens up many unique possibilities for ordinary people. Some electronic tools, previously only visible on the screens of science fiction films, are now found in the devices of the vast majority of users around the world. Many such systems have come...
Topic: Ethics
Words: 1667
Pages: 6
Introduction This paper discusses the issues presented in the article called “The robots are coming – for as many as 800 million jobs”. As the technology of machine learning and artificial intelligence swiftly develops, many business owners and corporations are eagerly pondering the possible ways of automation in their operations....
Topic: Robots
Words: 2207
Pages: 8
Any person nowadays, spoiled by the blessing of civilization, is a proud owner of a cell phone. A cell phone is needed to respond to e-mails and messages, to read the latest posts in social networks, and, of course, to follow the news in the world of high technology. Indeed,...
Topic: IPhone
Words: 307
Pages: 1
Healthcare has been subject to revolutionary changes as a result of technological breakthroughs in academia and their practical implementation in hospitals. Such advancements have influenced the structure and organization of wellness care since humanoid robots were introduced to the healthcare industry. McKinsey Global Institute reports that “800 million workers worldwide...
Topic: Artificial Intelligence
Words: 338
Pages: 1
When deciding on the computer to purchase for my classwork, I have to consider many different factors: my finances, technical characteristics of the computer, which parameters would benefit me in my work, and many more. There are generally 4 types of computes: desktops, all-in-ones, laptops, and tablets. They each have...
Topic: Computers
Words: 394
Pages: 1
Introduction Choosing to pursue higher education online becomes more and more frequent because of its efficiency. However, some specific tools and devices are required for online learning. Online students can access their courses from any part of the world via their mobile phone, tablet, or laptop – these are the...
Topic: Literacy
Words: 680
Pages: 2
Introduction An appraisal is the opinion of an expert to estimate the value of a residence. This will definitely vary from domicile to domicile with regard to the material and subject of construction and mainly not into a great deal the beautification as compared to the fabric of the structure....
Topic: Family
Words: 3056
Pages: 6
Introduction Among the items that are actively used by people throughout their lives, coffee glasses are of particular importance. According to Nikolovska, more than three cups of coffee are drunk by an American every day. Still, to assert the essence of the problem, it is necessary to represent the entire...
Topic: Starbucks
Words: 693
Pages: 2
Introduction The aircraft industry is one of the most highly-developed brunches in the contemporary world, so a considerable number of people use it every day. With the progress of the aircraft infrastructure, launching new routes, and applying the low-cost pricing policy, the number of airport users increases with impressive rates....
Topic: Airport
Words: 1094
Pages: 4
The traditional definition of the digital divide describes it as the gap between people who have access to computers and the Internet, and those who do not (“Mapping the digital divide,” 2015). At the same time, the quality of access should also be considered as it preconditions differences in technologies’...
Topic: Technology
Words: 306
Pages: 1
The global economy is changing rapidly these days along with technological advancement. Innovations bring both opportunities and challenges for business. E-mail, voice over IP, smartphones and social networks have already revolutionized means of business communication. The progress does not seem to stop, and new technologies will be invented and implemented....
Topic: Communication
Words: 854
Pages: 3
Almost any device, piece of equipment or machinery can cause injuries or damage to property if mishandled. One of the process safety hazards that can endanger human lives and damage property for millions of dollars are pressure hazards. Michael Speegle (2012) identifies two general categories of them: “rupture of pressurized...
Topic: Management
Words: 1127
Pages: 4
Introduction Project portfolio management (PPM) is beneficial to IT professionals in several ways apart from an overall increase in efficiency of monitoring and evaluation of ongoing projects. There is normally a grey zone in the functions of PPM and the project management office (PMO). The controversy raised is normally that...
Topic: Information Management
Words: 1352
Pages: 5
Summary The articles here are addressing the future plans that Google has in venturing into new markets where it would be able to compete with other companies that are taking the internet and digital technology by storm. Apple Inc. for instance is expanding very fast having launched the iphone, iTunes...
Topic: Google
Words: 968
Pages: 3
Introduction Machine self-learning is a subfield of computer science related to the ability of computers to recognize patterns using AI without being programmed to do it. Its major goal is to identify how a computer can make data-driven predictions without reprogramming. While machine self-learning was out of the reach of...
Topic: Artificial Intelligence
Words: 1154
Pages: 4
Introduction Many vices are practiced in society, most of which have been said to be illegal. There are however some of which have been legalized and as long as a person is above the required age then he/she can participate in this vice. Gambling is one of them. Gambling is...
Topic: Gambling
Words: 1440
Pages: 14
Introduction Since time immemorial, the infrastructure system has been one of the most vulnerable elements of the state system, the primary goal of military occupation. Transportation systems nowadays are prepared to face a range of natural and manmade threats. However, even despite the development of security measures and technology, new...
Topic: Management
Words: 616
Pages: 2
Introduction Project management is based on effective structure and coordination of all stages. High value-added production processes in adaptable and flexible organizations place new demands on employees’ skills, competence, and commitment to organizational goals. The book A Guide to the Project Management underlines that the main characteristics of projects are:...
Topic: Management
Words: 2629
Pages: 8
In the recent past, a manager of almost any small organization has (and sometimes still is) able to keep track of necessary data by using a manual file system. As long as the collection of data was relatively small and an organization’s managers had few reporting requirements, the manual system...
Topic: Data Management
Words: 3753
Pages: 12
Introduction According to Beatty (1991), educational computing is a situation where computers are integrated into the learning curriculum of students in their learning institutions. In the modern world, the use of computers is viewed as a basic need and not a luxury since they have been found to lay a...
Topic: Tech & Engineering
Words: 2598
Pages: 6
Outline This paper explains the application of contextual computing in personal and professional scenarios. It is clear that there are no technical barriers for the growth of contextual computing. But the chief hindrance is the attitude of people. The other minor barriers are environment problem, government regulations…etc. The people and...
Topic: Tech & Engineering
Words: 968
Pages: 3
In the business world, the main objective of technology innovations is to ensure that there is the generation of new companies, and increment of assets and shareholders returns. This research paper will be focusing on innovation and organizational change, and disruptive technologies. Innovation and organizational change entail several activities which...
Topic: Innovation
Words: 635
Pages: 2
MIDI Vs. other technologies “MIDI (Musical Instrument Digital Interface) is a protocol designed for recording and playing back music on digital synthesizers that are supported by many makes of personal computer sound cards.” (MIDI: Definition, para.1). It is an interface between the computerized devices and electronic instruments. The interfacing can...
Topic: Software
Words: 1173
Pages: 2
Technologies are everywhere in the contemporary world. It is so due to the progress in science and all applied disciplines which provide people with more facilities in life. The world is changing due to the development of the scientific thought. That is why with the flow of time technologies became...
Topic: Tech & Engineering
Words: 565
Pages: 2
For computers to execute their functions, specific programs with specific applications are used. These programs must be executable by any computer depending on the program instruction. For easy analysis and compilation, these programs have to be in a human readable form (depending on the source code). The codes are in...
Topic: Computers
Words: 852
Pages: 3
Regardless of what many people may think, traffic safety is the most important thing when it comes to cars. Many people, who have disobeyed traffic laws, exist for the safety of everyone; have ended up dead or killing innocent people. The United States has an average of 42,000 car crash-related...
Topic: Safety
Words: 997
Pages: 2
Introduction Indeed, the future of video and audio technology looks strong, more than ever before, in virtually all spheres of life. Nowhere is this upward trend for video and audio conferencing more pronounced than in businesses (Dominick 2003). More businesses are increasingly utilizing this technology to save on time and,...
Topic: Technology
Words: 2287
Pages: 8
Had gone were the days when every activity of an organization was of the conventional type of customized computer group. Today’s organization seldom survives without the association of IT. Because the main applications such as Personnel Management System, Inventory Management, General Administration, Finance matters, Production, Sales, Distribution, Marketing, Services, Customer...
Topic: Information Technology
Words: 801
Pages: 3
Introduction Computers have become part and parcel of our day to day lives; countless people across the globe heavily depend upon computers for more reasons than one. Every individual constantly tries to com up with some solution or the other to meet his/her objectives. Computers help countless number of people...
Topic: Computers
Words: 646
Pages: 3
Introduction The Physical Security Domain discusses the importance of physical security in the protection of valuable information assets of the business enterprise. It provides protection techniques for the entire facility, from the outside perimeter to the inside office space, including the data center or server room. In the early days...
Topic: Tech & Engineering
Words: 6198
Pages: 19
Introduction As the progressively evolving phenomenon in computer science, artificial intelligence is aimed at machine learning and providing software to address the problems in a way similar to human intelligence. Artificial intelligence facilitates the process of digitization and its impact on the further development of traditional companies. High-tech leading companies...
Topic: Artificial Intelligence
Words: 1503
Pages: 5
Abstract Recently, many regulatory documents have been adopted in the field of civil aviation safety, both internationally and nationally. Moreover, there is a continuous improvement in the design of aircraft to increase the level of passenger safety. Often, this improvement can even be attributed to the level of disruptive innovations....
Topic: Boeing
Words: 3532
Pages: 12
Introduction Information systems depend on the way data is stored and retrieved for use. Without a system where information is saved and collected, a user cannot track the history of changes or utilize data that was once present in a database. To perform these actions, the concept of data warehousing...
Topic: Tech & Engineering
Words: 1409
Pages: 5
With the emergence of the technological breakthrough that has been occurring over the past few decades, the transfer of most services to the digital environment was not only necessary but also inevitable. The opportunities of the digital market had to be explored, and a vast number of companies managed to...
Topic: Uber
Words: 825
Pages: 3
The problem of data privacy is one of the most worrying topics for modern people since technology and the Internet is used in almost all areas of people’s lives. For the same reason, it is questionable if a person should use social networks and electronic devices, even though his or...
Topic: Technology
Words: 1011
Pages: 4
This picture illustrates the concept of detournement by rearranging the elements of meaning. What the sign essentially meant was to ban smoking from a gas station because it might cause major damage to self and others around. The updated version of it shifts the meaning from a simple warning to...
Topic: Internet
Words: 297
Pages: 1
Introduction The world has entered the stage of its rapid evolution under the impact of technological advances and the emergence of new devices. The high speed of digitalization resulted in the formation of a new environment characterized by the dominance of innovative solutions and attempts to increase the effectiveness of...
Topic: Innovation
Words: 1650
Pages: 6
The digital technology has greatly acquired popularity in the recent decades. The use of digital techniques for accomplishing major social activities has equally been on the rise in public utility sites such as the social network websites in the internet. A plethora of internet users has often posted information of...
Topic: Technology
Words: 689
Pages: 2
Learning As the Senior Manager for R&D at AG Barr, I had to recognize new realities in the market based on product developments. For instance, Barr had to create a wide range of product portfolio to meet specific health and wellness needs – functional and adult products; acquire brands when...
Topic: R&D
Words: 1014
Pages: 4
Abstract This paper presents an overview of wireless networking, emphasising the most popular standards: Bluetooth, Wi-Fi, WiMAX, and Cellular Networks. A review of what is needed to build a generic wireless network is provided. The literature attempts to discuss the most popular wireless technologies and their protocols. An overview of...
Topic: Radio
Words: 4499
Pages: 16
Web 2.0 is a general term used to refer to new technologies, services and applications design that allows its users to interact and personalize websites (Berube, 2011). Currently, several public libraries have adopted the technology in an attempt to renew and expand their services (Landis, 2010). With the adoption of...
Topic: Tech & Engineering
Words: 1997
Pages: 7
Introduction Personal and property security are an indispensable aspect of human life. There is a need for people to ensure they keep their property and personal information confidential. Secured property and personal privacy ensure no unauthorized access or use of applicable information and assets as well as protection against theft,...
Topic: Management
Words: 804
Pages: 3
Think of a database you have used at work or for personal use. How did it help you organize data? For someone who is only starting to explore the possibilities of the Internet, the creation of a database seems rather redundant. Indeed, even after starting their own web page, users...
Topic: Tech & Engineering
Words: 607
Pages: 2
Different Types of Evaluation Options What are the different types of evaluation options for achieving project goals for both team-based and financial analysis? According to Brown and Hyer (2010), the first evaluation type is process evaluation which is used to select the best project that delivers the best value at...
Topic: Team Leadership
Words: 914
Pages: 3
Based on the classification of IT projects in the Ross and Beath article, what kind of project is Zara’s upgrade of Point-of-Sale technology? Justify your answer. Zara’s point of sale technology can be classified as a renewal of the existing systems. The common or traditional technologies used when IT infrastructure...
Topic: Zara
Words: 1248
Pages: 4
The name of the magazine is Wired. They have a target audience that ranges from children all the way to adults. To put it simply, it is suitable for both the old as well as the young. The kinds of products sold in this magazine are mainly electronic gadgetsand electronic...
Topic: Culture
Words: 644
Pages: 2
The definition of project management and the importance to the business world In organizations, capital investments and major developments are implemented through a project; the success of a project depends on how well it has been planned for, implemented, monitored, and controlled. Project management is the process through which projects...
Topic: Management
Words: 1598
Pages: 6
What factors had made the difference between the success and failure of the Cisco ERP project? Management of resources within organizations is very critical in the financial and efficient performance of today’s biggest organizations, organizations like Cisco deal with very many variables in their day to day business activities, especially...
Topic: Tech & Engineering
Words: 1214
Pages: 4
Abstract This research project is devoted to the analysis of schedule delays and the techniques that can be used to evaluate the probable delays on the basis of the existing information regarding the parties involved in the dealings and several external factors that are typically generated by the environment. The...
Topic: Construction
Words: 3327
Pages: 12
Abstract This paper explores the advantages of a Unix-based operating system and provides relevant evidence supporting the choice. The author dwells on the peculiarities of Ubuntu and its positive sides compared to Windows 7/ XP. The deployment plan is thoroughly described, and rationale for new hardware is also presented. The...
Topic: Tech & Engineering
Words: 2488
Pages: 9
Abstract The financial services industry has been reeling from the effects of frequent cyber attacks. This problem has slowed down advancements in the financial services industry. This essay catalogs some of the causal factors when it comes to cyberattacks on financial institutions. Some of these factors include an enabling environment...
Topic: Cyber-Attack
Words: 1738
Pages: 6
Introduction According to Retford (2007), Smartphone can be defined as a gadget that enables the user to make telephone calls and has additional features that would be found on a computer such as sending and receiving of emails (p. 3). Some of the key features include operating system software that...
Topic: Smartphone
Words: 3104
Pages: 9
As a retail company for consumer goods, ABC Company is concerned with the management of data about users and products. The company has been able to embrace the use of database applications with the aim of interacting with its organizational databases, thus meeting its corporate need. The DBMS applications used...
Topic: Tech & Engineering
Words: 828
Pages: 2
Scenario This evaluation report addressed to the VP is a critical analysis of the usability of wireless charging technology developed for smart devices. It covers observations, the findings, the major problems identified, and some recommendations for products improvement. The scope of this report is on user experiences of wireless charging...
Topic: Radio
Words: 2702
Pages: 10
Technology can be regarded as one of the major forces contributing to the evolvement of business. When it comes to computing, five major waves have been identified. The first four waves include the introduction of computers in the 1960s, the development of small computers in the 1970s, the creation of...
Topic: Technology
Words: 834
Pages: 4
Executive Summary This report discusses cloud computing and information security in the area of information management and control. Information management is introduced and its risk to an enterprise is assessed and additionally, to provide more elaboration the ePrescribing system is provided as a case study. This report concludes that in...
Topic: Information Technology
Words: 2551
Pages: 10
In grinding, it is highly important to know properties of different materials. For this purpose, various standard and non-standard methods are used (Kreibig and Vollmer 46). The report at hand is going to sum up the key assumptions concerning the shape, color, and brightness of sparks produced in grinding, which...
Topic: Manufacturing
Words: 589
Pages: 3
Introduction Access to information is among the most important aspects of contemporary life. The popularity of portable devices capable of Internet connection has created a strong demand for network systems that provide fast and reliable data transfer. The following paper is a literature review on the evolution of network systems...
Topic: Evolution
Words: 1227
Pages: 5
There is no doubt that all is in a state of flux this phrase can be used to describe the situation in any period. As for modern society, it can be stated that changes taking place today are even more significant than those related to the past centuries because modern...
Topic: Culture
Words: 589
Pages: 3
The phenomenon of cloud computing Although the phenomenon of cloud computing is rather recent, it has become one of the most extensively discussed topics in the IT sphere. Despite a number of related challenges and vulnerabilities, cloud computing is now considered to be the most promising among next-generation technologies. A...
Topic: Tech & Engineering
Words: 1749
Pages: 7
Situation Analysis Current Student Experience The fine-dining restaurant project at Thompson Rivers University is designed to meet the TRU’s five strategic priorities and to address the dinner services needs of the immediate community, which are not currently met effectively by existing restaurants. The analysis of the market indicates that adequate...
Topic: Restaurant
Words: 2242
Pages: 9
Introduction Technology has transformed the education sector as people try to find easy ways of passing knowledge. Assistive technologies have benefited learners who suffer from various physical or mental problems. Normal students have also benefited from advanced technology as a new era of online learning become popular in the global...
Topic: Technology
Words: 1194
Pages: 5
Privacy and Security: Introduction The issue of personal data safety has become increasingly significant lately (Libicki, 2015). Because of the new opportunities that cybercriminals gain as technological progress continues, healthcare institutions become more vulnerable. The recent case of the UCLA Health System having been accessed by hackers shows that the...
Topic: Health
Words: 584
Pages: 3
Introduction The government of the USA pays much attention to national security and tries to ensure it in different ways. Electronic surveillance is one of them. A special information-sharing network was created to let the law enforcement agencies monitor people’s phone calls and e-mails and gather this information so that...
Topic: Tech & Engineering
Words: 3391
Pages: 13
Introduction Many people do not understand the complexities associated with hotel development projects (Kirkland 2015). The progression from concept to the drawing board and final handover is a lengthy process. It is full of risks and uncertainties that continually threaten the successful execution of the project (Kirkland 2015). Construction projects...
Topic: Building
Words: 4487
Pages: 17
Introduction Carr touches upon a controversial topic of the impact of technology on our reading skills and human intelligence (par. 3). He expresses concerns about the changes in reading patterns that we experience due to the Internet; it makes our reading less deep and shallower. Our reading has indeed changed...
Topic: Technology
Words: 1225
Pages: 5
It should be noted that information and data are the most important assets of any company. Therefore, organizations always run the risk of losing them and employ various measures to protect their information. Network security is rather complex to sustain, and companies resort to advanced technologies to secure their data....
Topic: Tech & Engineering
Words: 828
Pages: 4
Abstract The advancement in technology has had a lot of impacts on the operations of many businesses all over the world. This is attributable to the fact that as technology advances, businesses get platforms to improve their products, products’ delivery, as well as the provision of better services to customers....
Topic: Growth Strategy
Words: 560
Pages: 3
Introduction It could be hardly doubted that the development of new technologies vastly influences nearly every aspect of contemporary life. It is possible to say that this technological impact is evidently present in the sphere of public health and nursing. Since science has always contributed to the development and improvement...
Topic: Nursing
Words: 568
Pages: 3
Table 1 covers the essential strategies and interventions aimed at eliminating or minimizing hazards faced by the workforce operating in various settings at each of the three stages of the source-path-worker model. Table 1. Control interventions. Hazardous Situations Control Strategies and Measures Operating a very loud and noisy machine The...
Topic: Tech & Engineering
Words: 594
Pages: 3
Introduction DC motors are machines that convert direct current electrical energy into mechanical energy or torque, whoch is also reffered to as the moment of a force. The operational mechanism of the motor is based on the forces that act on the magnetic field, which is caused by flow of...
Topic: Tech & Engineering
Words: 1160
Pages: 5