⚙️ Essays on Tech & Engineering

Tech & Engineering

The State of Digital Forensic Tools

Introduction The exponential developments that mark the technological era have brought about varied effects on the global community. What people refer to as the ‘digital age/era’ remains characterized by an improvement in general efficiency, improvement of business processes, enhancement of image, reduction in costs of transaction by cutting off intermediaries,...

Tech & Engineering

The Computer Hardware and Software

Different levels of computing require different computer hardware and software according to the computing requirements. This implies that the selection of computer hardware and software should be done by the changing needs of the larger organization and its respective information systems at the various computing levels including personal, workgroup, and...

Tech & Engineering

International Project Management

Introduction Project managers are trained professionals who work in the field of project management. Their main duty is to ensure that the planning, execution, and closing of various projects, thus project managers are very common and often work in fields such as construction industry, engineering, and many other sectors of...

Tech & Engineering

Necessity of Security Management

Introduction Security management in an organization refers to activities undertaken by organizations to protect their computer systems from unauthorized access and data loss. Computer systems in organizations handle data most of which is confidential. Good security management is an attribute of a good information system. Poor information management can bring...

Tech & Engineering

Social Intelligence Application in Various Fields

Social intelligence is the practice of getting well with others and bringing them to your world. This exercise involves people’s skills of understanding social dynamics, and enough knowledge to enable one to interact well with others. Social intelligence is a great factor to be considered by any organization that wants...

Tech & Engineering

The Occurrence of Human Error

Introduction Since the manufacturing process is complex and consists of various systems that intricately integrate, it is prone to human error. Human errors occur from the failure to regulate systemic processes of manufacturing as stipulated, which leads to inauspicious outcomes. When manufacturing operators fail to regulate manufacturing processes according to...

Tech & Engineering

Social Intelligence and Social Network Analysis

Introduction Two of the most significant advances in the 20th century have been the invention of the computer and the growth and development of networked systems. These two have transformed the way in which society interacts and in the last two decades, there has been a remarkable rise in the...

Tech & Engineering

Servicenow: Design in Service Desk System Using ITIL

Abstract The purpose of the project is to develop a web-based application for the Information Technology Infrastructure Library (ITIL) service to meet the communication needs of Qatar Petroleum, which is a government-owned company. ITIL provides help desk services from a centralized point of contact between the end-user, the customer, and...

Tech & Engineering

Community Development Through the Wind Energy

Introduction In the world we live in today, energy is a very important resource to our day to day living. Energy is a backbone in running almost all human activities like cooking, food production, storage, etc. In the investigations, Balakrishnan (2006) admits that it is necessary to classify energy which...

Tech & Engineering

SNMP Technology Application: Network Management Tools

Introduction Network system administrators distinctively identify and use the SNMP technology to construct effective management systems for network /communication centric services based on key SNMP technology whose principles and design decisions reflect system scalability, cost-effectiveness, and secure operations at all levels of network-centric communication services. Typically, SNMP technology’s administrative tasks...

Tech & Engineering

Computer Programs in Architecture

Introduction Computer architecture is a model used to explain how hardware and software are interconnected to form a system. It explains the structure of the system and how given elements are related to each other. It is noted that this form of architecture can be viewed as the process of...

Tech & Engineering

Summary of Boosting Algorithm – Machine Learning

The AdaBoost algorithm performs better than other algorithms by generating a hypothesis with a low training error derived through the combination of many different hypotheses into a single hypothesis. In addition, the combined hypothesis has a smaller variance compared to variance produced by the weak learner, WeakLearn. AdaBoost is effective...

Tech & Engineering

IT Project Risk Management: A Case Study of Denver Airport Baggage System

All projects have risks in one way or the other. It is crucial that organizations plan for the risks in advance by anticipating them and having a contingency plan at bay should they occur. This is achievable through risk analysis. Risk analysis is a process that avails tools for identification,...

Tech & Engineering

Wireless Networks in Construction Industries

Introduction One of the most important accomplishments realized in the 21st century was the invention of the computer and the subsequent creation of computer networks. These two entities have virtually transformed the world as far as information processing and communication is concerned. The networking capability of computer systems can arguably...

Tech & Engineering

Improving the IT Security Infrastructure

Research Outline Introduction, Objectives, and Methodology This chapter introduces the main topic – information technology infrastructure, including various subjects in design, architecture, security and many other topics on information systems, knowledge management, globalization, and other related topics. It is the job of managers to make IT infrastructure of an organization...

Tech & Engineering

Solar Ponds in Sea Water Desalination Feasibility Study

Introduction Water shortage is a major global problem more so in arid and semi-arid areas. Both population and weather changes contribute to the increased water shortages affecting various nations globally. The nations, however, possess a wealth of seawater resources that could effectively be used to generate water for use by...

Tech & Engineering

Computer and Network Architecture

Summary This paper takes us through computer systems architecture and the constituent components that make up a computer. It introduces us to the functions of the hardware parts of a computer and how each part of a computer system work. Ideally, computer architecture constitutes hardware that acts as a platform...

Tech & Engineering

The Security of Computers and How We Can Improve Security Systems

Security of computers is important in nearly all technology-dependent industries that utilize computer systems. It is better referred to as computer security. Often, information on a computer is open to few threats lest the computer is connected to a network. Today, the use of networked computers has increased dramatically and...

Tech & Engineering

The Denial of Service Attack Case

Summary Denial of Service Attack (DoS) is an attack on a computer system with an aim of stopping service delivery to the intended recipient. It is a malicious effort by a rogue person to prevent internet access completely or to make it function inefficiently. A common way of denial of...

Tech & Engineering

Development in Information Technology

Current development in information technology has proved to be beneficial especially due to the fact that it has stimulated development in different sectors. Nevertheless, by focusing on the problems that have resulted from the same, it is easier to conclude that it has resulted in more problems than the solutions....

Tech & Engineering

Multitouch Technology: Significance and Future

Introduction In the past, the interaction between humans and computer systems was limited to the use of a single finger and one mouse pointer. These traditional interfaces denied users their dexterity (Nadine 2). The development of multi-touch technology is aimed at giving users more versatility when interacting with their computers....

Tech & Engineering

Accidents After Using Cell Phones While Driving

Introduction Despite being a relatively new communication technology, cell phones have within the last two decades gained unrivaled prominence as the preferred medium of communication. At the present, it is estimated that 80% of the world population use cell phones and nearly all homes own at least one cell phone....

Tech & Engineering

Cloud Computing Security Analysis and Assessment

Key Findings Cloud computing is a computing strategy that is inevitably growing at exponential growth and has influenced approaches to ensuring the security of its infrastructure and stored in the cloud. Further, it has further been identified that cloud computing infrastructure lacks standards against which security concerns can be frugally...

Tech & Engineering

Digital Game Design for Elderly Users

Introduction Games have been there since time immemorial for all age groups – from children (the normal play games) to adults a good example is hunting games in times of yore (or hunting for fun and a source of entertainment). With the advent of computers, games have evolved into a...

Tech & Engineering

Cell Phone and Its Impact From Personal Experience

The cell phone is one of the most recent developments in the technology sector. It is an electronic device that was mainly used for communication between people; however, from the advancement in technology many other purposes including entertainment, security, and commerce use have been developed. The reason I chose the...

Tech & Engineering

Software Requirements Management: Challenges and Approaches

Introduction For software projects to enjoy full and requisite customer satisfaction, the people responsible for the making of the software must have a good definition of the requirements and good management to avoid such shortcomings. This helps in the avoidance of unwanted rework on the software. If managers have a...

Tech & Engineering

Security Defenses Against DDoS Attacks

Introduction In the recent past, a rise in the use of the internet by both primary and secondary users has experienced a rise in different forms of attacks. These attacks range from worms and viruses to thefts of personal information. In addition to that, new and emerging forms of attacks...

Tech & Engineering

Factors Affecting Resistivity Tools

Introduction Background Resistivity logging constitute a way of well-logging by which there is the characterization of rocks or sediments that occur in boreholes through the measurement of the electrical resistivity. The so measured resistivity constitutes a very significant property that expresses the potential of a material to opposing an electric-current’s...

Tech & Engineering

Oil From Shale: Potential, Problems & Development

Abstract In answer to the quest for a sustainable and secure supply of combustible liquid hydrocarbon fuels and gases, the development and recovery of oil from oil shale provides a fundamental answer to the need for meeting current energy demands for use in industry and other areas demanding fuels oils....

Tech & Engineering

LAN, WAN Database Security in the Cloud

Introduction The area of networking has been very interesting for me given the fact that there are very new technologies that are in the world today. Of great concern to me is the cloud computing. This is where the data of an organization is stored somewhere; very far from the...

Tech & Engineering

Relevance of IT and the Significance of Technology

Introduction With firms struggling to embrace technology in their mainstream activities, there are some managers and consultants who are struggling with cloud of doubt; does information technology matter in any organization? What advantage does is bring to an organization yet the benefits that one company gets can easily be got...

Tech & Engineering

Masonry Arches Retrofitted With Carbon Fibre

Introduction When the term masonry arch is mentioned what comes to mind are ancient buildings and cathedrals of the Catholic Church. It must indeed be acknowledged that masonry arches form the pillar upon ancient buildings and engineering was founded upon. A study of ancient building shows that arches have been...

Tech & Engineering

The Fly-by-Wire (FBW) System

Introduction Fly-by-wire (FBW) system is how a result is obtained or an end is achieved in aircraft control through the aid of a computer. Jack G. Ganssle and Michael Barr noted that the fly-by-wire system is the substitute of the previous conventional system or process by which an aircraft’s flight...

Tech & Engineering

Information Technology Infrastructure

Choosing Software Application software is a computer program that is used to assist users to do their repetitive jobs easily and with accuracy. Examples of this software include the Office Suite that has modules like Microsoft Word which assists users to type text documents, Microsoft Excel which assists the users...

Tech & Engineering

The Communication Technology in Internet

Introduction The Internet has evolved into an essential component for vast majorities in their daily lives. It is impossible to cite any organizations, businesses, hospitals, companies, and even offices where the Internet is not used to enhance their performance. The Internet has become a way of life and a primary...

Tech & Engineering

Performance of Public Construction Projects in Abuja, Nigeria

Abstract Research into the facts behind the failure of public construction projects in Abuja Nigeria to meet time and budgetary allocations strongly pointed to the failure of local, internationalcontractors, and the government to incorporate a performance evaluation mechanism to evaluate the performance of the awarded projects during the implementation phase....

Tech & Engineering

Kaspersky Internet Security Firewall Assessment

Abstract This experiment aimed to conduct an assessment on firewall security, based on the experiments conducted on a firewall utility of Kaspersky Internet Security. This entailed undertaking a series of tests on the firewall utility to ascertain the security capabilities of a firewall on a network. The experimental environment was...

Tech & Engineering

Organizational Philosophies and Technology

Organizational philosophies and technology within my organization The organization chosen is the United States government. Its various agencies, departments and branches are critical aspects of the analysis. Ethical technology policies form an important part of the organizational philosophies. The US government has a range of policies that are designed to...

Tech & Engineering

A Robotic Car System Controlled by a Computer

Abstract Because of the increasing number of terrorism activities, the human safety has become one of the most crucial concerns. This project aims at designing a robotic car system controlled by a computer via RF (400 MHz) signals. The robot can be controlled in several ways, with movements going up...

Tech & Engineering

Cloud Computing and Its Relationship with Web 2.0

Executive Summary Cloud computing is a new technology that is based on Internet and remote servers. Many companies have introduced cloud computing to their organization because of numerous benefits that are associated with the technology. Cloud computing shares some details with Web 2.0 that may include features such as sharing...

Tech & Engineering

Effectively Managing Virtual Teams and Teamwork

A Virtual Team A group of people working at different geographic locations but connected electronically form a virtual team. However, they telecommute with the possibility of occasionally meeting face to face. To qualify as a team, it must be composed of twenty-five or more people. Virtual teams are characterized by...

Tech & Engineering

Wireless Network Security Threats: Conceptual Study

Abstract The growth of information technology has made wireless networking one of the most imperative tools of communication. Businesspersons and home users have resorted to wireless technology as a way of communicating with business partners and friends. This is because wireless networking is easily accessible, inexpensive and easy to use....

Tech & Engineering

Wireless Robot Car Report

Introduction The idea behind this project is to come up with a system that will be a substitute for the use of human life in cases where explosives or hazardous materials are concerned. It is rather practical and moral to use robots to perform hazardous tasks instead of using human...

Tech & Engineering

The Technology Behind Bing Maps

Bing Maps was developed by Microsoft in response to the business threat posed by Google who also offer Google Earth Pro, for the visualization and mapping of much of the world using satellite imaging from low- and medium-Earth orbit satellites. The main competitor to Google Earth is Bing Maps which was...

Tech & Engineering

Database Security and Auditing

Introduction Database security has a lot of significance to the organization because it determines the organization’s data confidentiality, integrity, and availability. The level of information security determines the right person to have access to the data, the data type of data that a particular user should access this can be...

Tech & Engineering

Effects of New Technologies on Criminal Justice System

Introduction The advancement in modern technologies has indeed brought about a revolution in the criminal justice system. The introduction of these new technologies will help in the enhancement of the justice system to come up with an advanced international way of verifying an individual’s true identity to aid in global...

Tech & Engineering

Wireless Systems: Generations and Types

Introduction The main objective of this research paper is to explore the various fundamental aspects regarding the topic Wireless Systems. The paper begins with a short description on the background trends, history and various generations of wireless systems and then goes on to explain the different types of components required...

Tech & Engineering

Information System Technologies and Their Importance for Business

Introduction Technology is important in the daily operations of companies in modern society. It’s being relied upon by the companies as it helps enhance communication and increase efficiency in the working environment. Technology has a major role in establishing and maintaining a well-developed company through the utilization of emails, mobiles,...

Tech & Engineering

Network Security and the Vulnerabilities That Can Happen

Network Standards and the vulnerabilities A computer network is an interconnection of two or more computers (peripheral devices may be included as well). The types of networks include LANs (Local Area Networks), MANs (Metropolitan Area Networks) and WANs (Wide Area Networks). Networking has several advantages such as sharing of computer...

Tech & Engineering

Application of Computer Sciences in Teaching

The focal point of the paper is to summarize and critically evaluate the work by Arijit Sengupta named Docbase – a Database Environment for Structured Documents, published in December 1997, by the Department of Computer Science, Indiana University. SGML or “Standard Generalized Markup Language” (Sengupta 1997) is used throughout the...

Tech & Engineering

Online Banking Relationship in Saudi Arabia

Abstract Internet banking offers a kind of self-service technology that is fast assuming an important full-fledged allotment medium for utilization of banking products and banking services, especially in developed countries. Since the internet was introduced to the bank industry in Saudi Arabia in the 1980’s banks in the kingdom have...

Tech & Engineering

How Information Systems Are Incorporated in a Business Setting

Summary This report aims to look at how information systems are incorporated in a business setting. The importance of various information system components within an organization thus contributes to the smooth running of a business. It is also important to note the various effects of information systems on individuals, groups...

Tech & Engineering

Role of Technology in Business and Advertising

Abstract Today it is eminent that the role of computers has a huge impact on every person. Computerisation has taken over majority of the societal roles and has greatly improved lives. The most advanced machines include the intelligent systems that can control other manual machines. Today the manufacture industries use...

Tech & Engineering

A Framework to Enhance Teaching and Learning Using Web 2.0

Introduction Over the past few decades, information technology has infiltrated almost every aspect of our day-to-day lives including education. Due to the rapid advances in information technology and its inclusion in virtually every aspect of life, several types of research have been carried out on its applicability in education and...

Tech & Engineering

Reliability of Pile Testing in Hong Kong

Introduction The Pile test is mainly used to test piles using the application of an axial load or force which covers vertical and raking piles which are often analyzed when they are compressed (GIF 1). The term compression is hereby used to define a pile that would resist an axial...

Tech & Engineering

Automatic Voltage Regulator and Bond Servoline Data Acquisition

Describe how AVR obtains and represents information about the measured and desired value of generator output voltage. The use Automatic voltage regulator (AVR) is purposely for the generator synchronous, and it is used to keep the generator’s terminal voltage at the rated value. Typically, when there is a drop in...

Tech & Engineering

Website Development Plan for Furniture 4 Office Company

Business Analysis As it presently stands, Furniture 4 Offices (F4O) is a small organization with 2 full-time employees and a relatively small base of clientele. However, due to the rapid expansion of the client base, the company needs to come up with ways to improve its effectiveness. This may call...

Tech & Engineering

Ben Foods Pte.: Online ERP Integration Sales Catalogue

Introduction Ben Food(s) Pte is a major food distribution company in Pacific Asia majoring in Animal and poultry products as well as wines and beverages. With a business history of over half a century, the company has grown and expanded with a wide supply chain and shop outlets across the...

Tech & Engineering

Digital TV: DVB-T in Australia

Introduction The abbreviation DVB-T stands for the term Digital Video Broadcasting – Terrestrial. The first successful attempt of DVB-T usage was carried out in 1997 in Great Britain and since then the technology has won the considerable popularity around the world (Radio Electronics, 2009). The work of the DVB-T is...

Tech & Engineering

Information Technology IT Capabilities

Information technology (IT) is vital to improving organizational efficiencies at all levels. The rapid change of the business environment requires organizations to adapt flexible IT strategies to meet both the business environment changes and the specific needs of the organizations. The logistics and management corporation, FedEx relies and depends upon...

Tech & Engineering

VoIP Technology or Upgrading the In-House PBX System

Report 1 Business need that the recommendation seeks to solve The business need is to determine the best solution for the company between adopting VoIP technology and upgrading the in-house PBX system. Upgrading of the in-house PBX will requires lesser amount of money as compared to VoIP adaptation but VoIP...

Tech & Engineering

Software Development Project: The Project Manager Job

It can be well stated that technical skills or people skills are more important to the team manager in a software development project. The job of the project manager is to look at the activities of the people or team and motivate them to complete the job on time or...

Tech & Engineering

The Role of IT in the Business Process

Introduction A business process can be defined as a set of activities that are implemented to ensure the provision of a product or service for an organization’s customers. Organizations implement a number of processes in order to ensure that their business is run successfully, however, there is always a need...

Tech & Engineering

Details of the IT Infrastructure

Abstract This paper presents a proposal for a model of IT infrastructure which is tailored to enable a business establishment better service its clientele base and enhance its administrative and communication as well operational network. The thrust of this business is to provide advance rental training facilities offer many services...

Tech & Engineering

World’s Best Practices in Project Management

Abstract Project procurement management is concerned with purchasing products, services into an organization to perform specific work (Kloppenborg 2008). Organizations are involved in the process as a buyer or seller performing contract management and change control processes. These processes facilitate project team members’ administration of contracts and their obligations by...

Tech & Engineering

Systems Acquisition and Implementation Management

Introduction To determine the directional influence of particular information systems on organizational decision-making, it is necessary to look at associated cost-reduction effects. Organizations like THM Corporation can employ new information systems to allow the cost-reduction effect to work in the direction of either centralization or decentralization. For example, the implementation...

Tech & Engineering

Analysis of Enterprise Web Services Security Model

Outline In this document, we would be addressing various policies and security issues that an enterprise web service may have to face in a real environment. This would give an insight on how to develop security policies and strategies. We will also be seeing security risk management approaches and various...

Tech & Engineering

IPhone Application for Breast Cancer Prognosis

Abstract This dissertation presents the technique to be used in the development of a mobile application that will be used to effectively diagnose breast cancer by means of the popular prognostic index referred to as the Nottingham Prognostic Index (NPI).It further discussed into great depths the impact and application of...

Tech & Engineering

Wireless Network: Data and Information Security

Introduction Network security is essential in any network infrastructure. Despite the shortcomings of a wireless network in relation to confidentiality, integrity, and availability of data, an enhanced security can be realized through altering the system ID, disabling identifier broadcasting, encrypting data, using firewalls, and protecting workstations. Securing Wireless Network Securing...

Tech & Engineering

Importance of Information Security in Business

Introduction Any information developed by an organization is of great importance. For this reason, organizations need to protect such information from a wide range of threats including hacking, virus infection and misuse. Information security ensures that there is continuity of the business. It also ensures that the business is not...

Tech & Engineering

Electrical Technologies: Battery, Compass, GPS et al.

Battery Equipment and machinery work when these are powered by energizing signals either from electrical sources or batteries. Batteries play a key role in making the equipment and machinery portable and useful in multiple applications. Batteries are mainly of two types; Lead Acid Batteries These are used in vehicles and...

Tech & Engineering

Technology in Educational Setting: Preparing a Speech

The topic of increasing the efficiency of the learning process for educators is relevant since young people often use digital technologies in their daily lives. Consequently, it will be interesting to learn about expanding opportunities for their use. Since the audience is mixed, it is important to stick to a...

Tech & Engineering

MSc Autonomous Robot and GPS Module Experiment

Introduction After the project components described in chapter (4), all components described will then be integrated in a way to achieve the goal of the project (an Autonomous Robot capable to navigate from one waypoint to other waypoints). There are several experiments though, that should be conducted in a sequence....

Tech & Engineering

Impact Analysis of Green Computing in Advertising Company

Abstract Plummeting on IT energy costs, lengthening the life of the hardware, and decreasing carbon emissions are but a few of the factors contributing to green computing in diverse institutions and commercial organizations. It is popular public knowledge that global warming is a most important problem which all and sundry...

Tech & Engineering

The Concept of Reinforced Embankment on Soft Foundation

Abstract Geosynthetic reinforcements on foundations and other soft soil masses is a cost-effective engineering method that substitutes conventional methods which are prohibitively expensive for embankment constructions. Geosynthetics improve engineering materials confining properties of soft soils to withstand pressures due to the earth. Different forces with varying magnitude and effects on...

Tech & Engineering

Migration From Ris/Ghost Cast Thin Images to Wds

Introduction The project is a transition from RIS/Ghostcast Thin Images to Windows Deployment Services (WDS) Thick Images in a Built to Order (BTO) environment, determining WDS server infrastructure with full WDS option on unicast and multicast deployments. Network bandwidth, installation mode, converting RIS based images to WIM based images. Network...

Tech & Engineering

Biometric Security as a High Security System

Abstract In the present age of globalisation, close proximity of different nationalities often raises security issues in all countries. To combat the situation almost all countries have now resorted to biometrics security to identify and ward off the elements that can harm the security of the nation and its socio-industrial...

Tech & Engineering

Fatigue on Pilots in Aviation Industry

Outline This paper is going to take a look at fatigue as an issue that affects pilots in the aviation industry. The following factors will be discussed in this proposal The definition of fatigue. The causes of fatigue on pilots. The effects of fatigue on pilots’ performance in the industry....

Tech & Engineering

Robotics and Autonomous Mobile Robots

Introduction According to Nourbakhsh and Siegwart mobile robotics is a recent field that has combined technologies from various fields of engineering and science. The essence of mobile robotics is to provide the previously rigid parts of machines a dexterity rivaling and even exceeding human beings through the complex combination of...

Tech & Engineering

Design Optimization of Multi-element Aerodynamic Configurations

Aerodynamic optimization has been actively studied since the publication of a paper by Hicks and Henne in the 1970s (Hicks, & Henne, 1978) regarding the topic. Since then, several works on the optimization of full aircraft configurations (Reuther, Alonso, Jameson, Eimlinger, & Saunders, 1999; Secanell & Suleman, 2005), leave alone...

Tech & Engineering

Agile Project Management

Abstract The business environment in which organizations operate today is always changing, and it is becoming more and more complex. Organizations, both private and public, feel increasing pressures that force them to respond quickly to changing conditions and to be innovative in the way that they operate. Ever since the...

Tech & Engineering

Managerial System Development Methodologies

Introduction System development methodologies pertain to steps followed to form, plan, and control the process of developing an information system. Conventional systems development methodologies include system prototyping, joint application design, and rapid application design. These systems differ based on techniques, teamwork, and the organization. Although these methods vary in their...

Tech & Engineering

Product Life Cycle of Apple iPhone Assessment

Every product undergoes the five stages of product life cycle (PLC) at a certain period of its manufacturing. These stages are the introduction phase, the growth phase, the maturity phase, the saturation phase, and the decline. When analyzing the PLC of any item, it is necessary to focus on the...

Tech & Engineering

Electronic Data Interchange in Shipping: Legal Issues

Introduction Electronic Data Interchange (EDI) involves the conduct of business transactions by exchanging the documents in electronic formats using web-based applications or Internet. EDI covers a wide range of transactions including placing purchase orders, offering price quotations, customer order confirmations, order status enquiries, shipping and the associated transactions such as...

Tech & Engineering

Steam Injection Oil Recovery

Steam injection oil recovery is one of the most common ways of oil extraction, that has been in use since at least the 1960s (Dong et al. 1191). The process is implemented during the tertiary stage of enhanced oil recovery, which occurs during the exploitation of an oil well after...

Tech & Engineering

Power Protection Coordination Thesis

Introduction Various reasons are given in the planning and operation of a power system protection that involves overload protection devices such as over-current relays, differential relays, distance relays, circuit breakers, and other “special purpose overcurrent protective devices”. These reasons can be summarised simply as to prevent power outage and major...

Tech & Engineering

Search Technologies in Business

Nowadays, the World Wide Web contains an infinite amount of information. However, Internet users often have to sort out data they would find useful and up-to-date. Luckily, due to the development of new technologies, search engines simplify this process. Such systems are designed to make the search faster and more...

Tech & Engineering

Moodle Is a Virtual Learning Environment

Abstract This paper investigates the use of Moodle as a virtual learning environment in educational settings. It highlights the characteristics of Moodle making it uniquely suited for educational purposes and explores the software from the viewpoint of the teacher. It also analyzes the impact of Moodle on learning and the...

Tech & Engineering

Website in Schools

Abstract This dissertation addresses the technology of website use in schools to enhance learning and communication between and among all participants. The dissertation aims to explore the technology of website use in schools for the purpose of enhancing learning and communication for the benefit of the pupils, parents, teachers, school...

Tech & Engineering

Methods of Scope Management of Projects

Introduction: Defining scope management It is important to clearly define the scope of a project to avoid emerging issues and navigate the project’s life cycle with confidence. Scope refers to the work required to reach the project’s outcomes and outputs set during a planning phase. It can be described as...

Tech & Engineering

Cloud Computing Security Issues

Introduction Recently, cloud computing has being considered as the major transformational paradigm in IT environment. It provides the opportunity to both “use the computing and storage resources on a metered basis” as well as “reduce investments in computing infrastructure” (Krutz & Vines, 2010, p. 3). As the next evolutionary stage...

Tech & Engineering

Transfer of Knowledge and the High Tech and Electrics Industry

Going to the moon, talking to a person who is on the other side of the earth, slowing the rate of aging – all these things have recently stopped existing only in fairy-tales. Technology has improved the quality of our lives and has been helping us in reaching our dreams....

Tech & Engineering

Software Quality Assurance in Multi-Vendor Environments

Overview of Quality Quality is generally defined as a measure of excellence in a firm’s production process and outcome (Swanson, Esposito & Jester 1999, p.33) or as Bowen P (1985, p. 87) puts it, “the state of being free from defects, deficiencies, and significant variations” and that quality embraces cost,...

Tech & Engineering

Fire and Rescue Services: Organizational Behaviour

Introduction A fire tragedy and its corresponding rescue operations often provide an avenue where issues of human behavior originate. It is during such events that human character is made manifest about the organizational structure. Under normal circumstances, tragedies involving fire attract rescue and evacuation operations. During such a time the...

Tech & Engineering

Introduction to Project Management

Introduction A project is a long term or short term undertaking aimed at meeting a desired goal or objective such as in an organization, company or by an individual. In order for one to obtain effective and efficient results from a project, they have to plan for the project under...

Tech & Engineering

Teaching Online: Communication, Interaction and Education

Introduction Human beings are able to share various ideas and information through the many channels of communication available to them. The exchange of ideas enables human beings to express their feelings to others and at the same time learn valuable aspects of their lives and the environment (Vai 2011). Therefore,...

Tech & Engineering

Computer Security: Ping Seeps and Port Scans

Abstract The interior motive of this piece of work is to investigate the security concerns of the company as a result of the introduction of nefarious computer activities called ping sweeps and port scans. Introduction Network security is vital especially for companies dealing with a large amount of data. Protection...

Tech & Engineering

Quality of Service Routing Strategies

An Overview of QoS Routing This section provides literature reviews on the Quality of Service (QoS) routing. The paper divides this section into two parts. The first part provides a review of literature that examine the general overview of QoS, and the second part of this section examines QoS routing...

Tech & Engineering

University in Dubai Managing Information

Introduction This assignment is to review a public University in Dubai, focusing on the ICT department. The university has been struggling to deliver quality education to its students. This is the reason why it has focused on strengthening the ICT department to facilitate the flow of information between the students...

Tech & Engineering

Relational Databases: Features and Functions

Introduction to Database A collection of information which is organized in such a manner that it can be easily accessed, managed, and updated by the individuals of a company, such collection of information is known as a database. A database which is well designed and well managed supports decision making...

Tech & Engineering

Comparing Technology: LCD Plasma Televisions

Abstract The CRT technology although quite old is fast being replaced by newer technologies in display science. Thus new systems like LCD, PDP, OLED, PLED, etc are making their presence felt, particularly the first two, viz, LCD and PDP in the domestic TV industry. Both PDP and LCD are similar...