Technology

HomeEssaysTechnology
Cyber Security
IN:
Cyber Security Challenges Facing Commercial Aviation: Electronic Flight Bags

Technology is advancing aviation safety and performance in various ways. The Federal Aviation Administration (FAA), International Air Transport Association (IATA), the International Civil Aviation Organization (ICAO) and commercial airlines continuously put efforts into the modernization of aviation systems and process through the adoption and implementation of innovative technologies including electronic flight bags (EFB) and Automatic […] Read more >>

24.01.2023
IT Management
IN:
IT Service Management: Incident Management

In the early days of creating and developing IT-related technologies, the focus was on the creation of software or computer applications. However, in recent years, it shifted towards creating systems that are designed to provide a particular service. For example, websites and mobile apps are being developed to make lives better and create more efficient […] Read more >>

23.11.2022
Computer Science Technology Privacy Issues
IN:
Computer Science Technology: Privacy Issues and Security in Social Networks

Introduction Online social networks, for instance, Facebook and Twitter are vital for social interactions. People can connect with friends in various parts of the world through these platforms. Recent months and years have seen drastic growth in the use of online social networks. The system has stored a lot of private information on the people […] Read more >>

01.02.2021
HS-Risk-Assessment-Paper-for-Empire-State-Building
IN:
HS Risk Assessment Paper for Empire State Building

Conventionally, terrorists have chosen various important buildings as a favored target for mounting their malicious attacks. Their preference is easy to understand since there are many vulnerable buildings all over the world. Some buildings though follow the regulations of building codes, lack substantial design considerations envisioned to prevent or reduce the impact prompted by CBR […] Read more >>

05.10.2020
Forensic Lab Design
IN:
Forensic Lab Design

Recently, a university employed me to create and lead a project as an information security professional. I will do my best to design and build a digital forensic laboratory for the employing organization. Building a lab requires the knowledge and usage of basic principles and concepts of laboratory design. By knowing purpose and objectives, I […] Read more >>

03.07.2020
IBM and the Emerging Cloud-Computing Industry
IN:
IBM and the Emerging Cloud-Computing Industry

IBM is a large and successful IT company, which has been changing over the years together with the market. In the 2000s, the firm decided to enter the clouding computer industry because its popularity was growing with many other firms shifting towards it. However, this shift was accompanied by different questions and issues, which will […] Read more >>

02.06.2020
Fault-Tolerant-Computing
IN:
Fault-Tolerant Computing

Introduction Moore’s law asserts that the processor speed or the computational power of the processors or computers will double every eighteen months. The law was attained after a careful analysis of the transition in the computing field that was geared toward achieving high performance in computers. However, no matter the processing power of a single […] Read more >>

09.01.2020
End-of-life-computers-(re-using-and-recycling-components-of-EOLC)
IN:
End-of-Life Computers Reverse Logistics

The rapid enhancement in technologies in the construction of computers paved the way for greater cost-efficiency. Thus, computers are becoming more powerful and affordable. The relatively high-computing power of 21st-century computers increases their value; therefore, the demand for the goods will go beyond the expected level in the past years. At the same time, the […] Read more >>

17.10.2019
Discount applied successfully