Category: Tech & Engineering 2928
-
Cybercrimes: Email Account Compromise
Table of Contents Introduction Discussion Conclusion References Introduction Cybercrime has become a major problem. People are involved in many criminal activities. One of the cybercrimes is email account compromise (EAC). EAC is a criminal organization that preys on businesses and people intending to steal money from their bank accounts. According to IC3, there were 585…
-
Professional Networking: Advantages and Disadvantages
Available literature demonstrates that the use of online professional networking comes with obvious advantages, particularly in this era where many professionals and businesses rely on information and communication technologies not only to communicate but also to conduct business. The foremost advantage of online professional networking is that it can enhance an individual’s visibility online because…
-
Aspects of Cloud Computing
Introduction Two areas are particularly important to focus on when developing a concept for cloud computing technologies. The design should allow a user to secure data, and also, data assets that may be stored in the cloud should be easily accessed through the window of shared activities in the cloud as per the cloud service…
-
Hazardous Materials Incidents During Summer
First responders dealing with hazardous material incidents during summer experience a great deal of challenges, mainly because of the high temperatures and elevated humidity. In the article ‘Beyond the Rule of Thumb Survival Tip 53’, Lisi (2010), illuminates some of the inherent dangers presented by the summer weather to first responders. He extensively discusses the…
-
Modernization of Educational Process: Positive and Negative Sides
Modern day colleges and universities have implemented numerous methods of improving access to their courses and services (Brodahl, Hadjerrouit & Hansen, 2011). This comes in form of online distance learning, the digitization of books and course materials, college web portals where registration for courses can be done in a quick and effective manner as well…
-
Public Law and Private Law Implications
Table of Contents Abstract Introduction Public and Private Laws Conclusion References Abstract Using the telephone as well as World Wide Web services by minors has never been discussed properly. Children tend to use the telephone for making paid calls and their parents refuse to pay the bills afterward. The question is whether these bills are…
-
Fire Hazards: The Trained K-9 Task Force
Table of Contents Introduction Danger Posed by Electric Equipment Critical Role of the Red Cross at the Moment of Disaster Conclusion Works Cited Introduction With the recent fierce fire in a high rise in the Bronx, New York, fire specialists acknowledged that it was the deadliest fire that has occurred in the last thirty years.…
-
Data Structures and Algorithms
My understanding on data structures and algorithms goes mainly to the three books that I read as a beginner and continue to consult the books whenever I need guidance. Data Structures Using C by Aaron M. Tenenbaum Data Structures, Algorithms, and Program Style Using C by James F. Korsh Data Structures and Algorithms with Object-Oriented…
-
Improving Company Productivity With New Technologies
Table of Contents Introduction How the new technologies are changing the way of doing business Advantages and disadvantages of using this new technology Companies that have adapted this technology Conclusion References Introduction The web technologies have advanced in the past years. Web 2.0 and Enterprise 2.0 are among the recent technologies that have come up…
-
The Most Recent Technology: Blackberry Messenger
Table of Contents Introduction What the Experts Say based on the tetrad theory from McLuhan Conclusion Works Cited Introduction Thanks to the world’s move towards becoming a global village, new technological advancements have emerged and smart phone users are not an exception. Latest models of blackberry phones have one of the most recent technological infrastructures…