Category: Tech & Engineering 2928

  • Security Risks Associated With a Mobile

    Security risks associated with a mobile device may be, for instance, malware, malicious websites, or premium SMS billing. Additionally, email and SMS phishing and spyware are used to control the actions you do via the mobile device. One more risk emphasized by McAfee is QR code abuse, which may lead to personal data leakage (Ansari,…

  • Work Automation via Technological Advancement

    The automation of the working process may have many different impacts on society. There is a belief that automatization will cause a significant moral reconsideration of the role of human labor. Some researchers believe that this process will inevitably cause a high unemployment rate and the elimination of particular professions (Allienne et al. 133). Moreover,…

  • OneDrive: Installation, Registration, and Security Issues

    Table of Contents Installing Registration Add Files or Folders to OneDrive Security Issues Sharing References Installing After I installed OneDrive for Windows, a copy of the installed version was downloaded to my computer and saved in a separate OneDrive folder, later synchronized with the cloud version. After installing the OneDrive for Windows desktop app on…

  • The Market of Cloud Computing

    On the whole, the author of the article states that three giants dominate the world of cloud computing – Microsoft, Amazon, and Google. However, new technologies are developed every day. These technologies can either preserve the oligopoly or destroy it. It is stressed that cloud computing is a popular target for investments nowadays. The three…

  • Hardware Components, Network, and Connection

    Table of Contents LAN software and Hardware Components WAN software and Hardware Components Network Equipment Specification of Connection Media References Dreamz Inc. has significantly developed and expanded to include e-commerce services and branch offices in the scenario. As a result, using a sole (local area network) LAN network is insufficient to assemble the venture prerequisites,…

  • Top 3 Linux Distributions for Privacy, Security, and Penetration Testing

    Linux is an open-source operating system (OS) family founded on the Linux Kernel. Users usually get the OS by downloading one of the Linux distributions, available for a variety of systems such as powerful supercomputers (Rocks Cluster Distributions), personal computers (Linux Mint), and embedded devices (OpenWrt) (Day, 2021). Currently, the security and privacy of people…

  • Cloud Services: SaaS, PaaS, IaaS and IDaaS

    The aim of this paper is to discuss key service models of cloud computing: Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Identity as a Service (IDaaS). The paper will analyze five cloud deployments at East Coast Polytechnic Institute (ECPI) and identify each of the service models.…

  • Comparing Prince2 and Scrum Methodologies

    Executive Summary The aim of this report is to compare two project management methodologies, Scrum and PRINCE2, where the key similarities and differences are summarized. The methodology used in the report is a review of the literature. Therefore, past studies and scholarly publications are explored as the key sources of data. The literature has been…

  • The 2002 Überlingen Mid-Air Collision

    Table of Contents What Happened The Findings How TCAS Could Have Avoided Mid-Air Collision Reference What Happened On July 1, 2002, a Bashkirian Airlines Tupolev TU-154 and a DHL Boeing 757 cargo jet collided over Überlingen, Baden-Württemberg, Germany. All 71 people on board of the two aircrafts were killed. Peter Neilsen was the key contributor…

  • The Future Trends of Electric and Hybrid Propulsion Systems

    Table of Contents Introduction The Context Methodology Ethical Implications Conclusion Reference List Introduction Aviation has always been associated with cutting-edge innovation, international activities, and experience, and therefore the global and rapid development of technology and other events of a global scale is reflected in it in the first place. For example, we can cite the…