Technology

HomeEssaysTechnology
Cyber Security
IN:
Cyber Security Challenges Facing Commercial Aviation: Electronic Flight Bags

Technology is advancing aviation safety and performance in various ways. The Federal Aviation Administration (FAA), International Air Transport Association (IATA), the International Civil Aviation Organization (ICAO) and commercial airlines continuously put efforts into the modernization of aviation systems and process through the adoption and implementation of innovative technologies including electronic flight bags (EFB) and Automatic […] Read more >>

24.01.2023
electronic money
IN:
Electronic Money: Challenges and Solutions

Electronic money, also known as digital money or digital currency, rose to popularity in 2013 after Bitcoin’s shooting in value by over 1000%. Many people as well as businesses started considering it as an alternative to the usual currencies that are issued by governments across the world. In addition, tourists have been using electronic money […] Read more >>

30.11.2022
IT Management
IN:
IT Service Management: Incident Management

In the early days of creating and developing IT-related technologies, the focus was on the creation of software or computer applications. However, in recent years, it shifted towards creating systems that are designed to provide a particular service. For example, websites and mobile apps are being developed to make lives better and create more efficient […] Read more >>

23.11.2022
Wireless Multimedia Sensor Networks Routing
IN:
Wireless Multimedia Sensor Networks Routing

WMSNs development has been fostered by the availability of such inexpensive hardware as the CMOS cameras and microphones. These interconnected devices are capable of digital retrieval of multimedia content such as live streams, videos, still images, and scalar sensor data from the environment. The wireless sensor network supports data traffic to multimedia platforms by the […] Read more >>

02.02.2021
Networking in Health Care and Medical Device
IN:
Networking in Health Care and Medical Device

A lot of changes have occurred in the health care industry as a result of the emergence of new innovations. A big increase has been realized in the number of patients who visit health facilities on a daily basis to seek medical attention. Medical practitioners are expected to provide the best possible health care by […] Read more >>

01.02.2021
Computer Science Technology Privacy Issues
IN:
Computer Science Technology: Privacy Issues and Security in Social Networks

Introduction Online social networks, for instance, Facebook and Twitter are vital for social interactions. People can connect with friends in various parts of the world through these platforms. Recent months and years have seen drastic growth in the use of online social networks. The system has stored a lot of private information on the people […] Read more >>

01.02.2021
India's Learning Institutions
IN:
India’s Learning Institutions

Why Is Comparative Research on Technology-Based Learning in Educational Institutions Important for My Audients? As a college student studying computer science, I have for a long time been thinking about what good learning in classrooms entails, and how the good learning can be enhanced with the help of technology. With regards to the question of […] Read more >>

03.12.2020
HS-Risk-Assessment-Paper-for-Empire-State-Building
IN:
HS Risk Assessment Paper for Empire State Building

Conventionally, terrorists have chosen various important buildings as a favored target for mounting their malicious attacks. Their preference is easy to understand since there are many vulnerable buildings all over the world. Some buildings though follow the regulations of building codes, lack substantial design considerations envisioned to prevent or reduce the impact prompted by CBR […] Read more >>

05.10.2020
Security-Measures-for-a-Healthcare-Research-Firm
IN:
Security Measures for a Healthcare Research Firm

Nowadays, IT is an integral part of any company or government agency. In this regard, the problem of data security has become particularly acute. The reasons for the vulnerability of information in the corporate network are quite different, ranging from the significant volumes of data to multipoint and the anonymous access to it, which contributes […] Read more >>

02.10.2020
Forensic Lab Design
IN:
Forensic Lab Design

Recently, a university employed me to create and lead a project as an information security professional. I will do my best to design and build a digital forensic laboratory for the employing organization. Building a lab requires the knowledge and usage of basic principles and concepts of laboratory design. By knowing purpose and objectives, I […] Read more >>

03.07.2020
Discount applied successfully