⚙️ Essays on Tech & Engineering

Tech & Engineering

Managing Digital Supply Chain in Microsoft

Introduction To succeed and stay competitive in the digital and online media market, media companies should assist their teams to work together more efficiently, amalgamate content and business systems, and streamline business processes. The delicate act of balancing of sustaining a high level of service and at minimal costs is...

Tech & Engineering

The Use of Technology in Four Seasons Hotels

Executive Summary The Four Seasons Hotel has been in operation since the 1960s. The business is made up of more than 50 hotels around the globe. These hotels are fondly referred to as “the properties” by the employees and the management team. The hotels have continued to attract global clients...

Tech & Engineering

The Concept of Project Management

The concept of project management revolves around a case study, a company’s project or operation – but as a whole, it involves management and how to be able to successfully carry out a task up to the end of its schedule set up by the project manager or the customer....

Tech & Engineering

Technology Venturing: the Tablet Uprising

This is primarily a small computer that can in use by anybody in different activities that are in relation to it. It is mobile in that it allows more efficiency than the laptops that one needs to put somewhere in order to use. The tablet can be used even without...

Tech & Engineering

The Contemporary Church and Technology in Worship

Background of the Study Technology and the contemporary church have developed very much intertwined ever since the printing press began printing religious information and communications. Technology has been grudgingly adopted in many churches who initially fought against the use of technology in their communications however, failure to adopt such technology...

Tech & Engineering

Integrating IT in the Work of Organizations

Introduction Analyzing the impact of Information Technologies (IT) on the work of organizations, it can be stated that at present a significant portion of companies’ expenditures is devoted to IT. In that regard, IT constitutes almost an inseparable aspect of organizations, although the exact impact of IT is still researched....

Tech & Engineering

The Applicability of Task Technology Fit to Mobile Technology

Technology Acceptance Model (TAM) TAM is an information technology (IT) theory that dictates how users come to embrace and use technology. The model proposes that when users interact with new technology, a number of factors control their judgment on how and when they will use it as shown below: Perceived...

Tech & Engineering

Social Approaches for English in Technological Context

Introduction For many years, language teachers have consistently used technological aids in teaching foreign languages in different learning institutions. Technological aid has often come in the context of computer-aided teaching through the support of the World Wide Web to create a comprehensive online learning experience for students (Levy, 1997, p....

Tech & Engineering

Job Applicants’ Higher Learning Database Implementation

Introduction The arrival of information technology especially in the 21st century is something that cannot be understated. This is so because it has been proved to be a provider of amicable solutions to businesses and individuals, obstacles that hinder the achievement of competitive edge (Gardiner, 2005). On the other hand,...

Tech & Engineering

Value Management: What It Is, Differences Between VM and VE

Introduction Every organization that exists in the world today has one single purpose that overshadows all the others: to be successful in what it does. Success is a measure defined by the organization’s attitude as well as the processes that govern the organization’s overall operations. Each process is a set...

Tech & Engineering

How Do Video Games Affect Children?

Introduction Like any other thing video games have positive and negative effects. Many children nowadays stay indoors where they spend most of the time on the screen. Many games have been developed from the need for speed and road rash racing games to the grand theft vice city mission games....

Tech & Engineering

Information Technology and Its Impact in Education

Introduction The world today is experiencing what could be referred to as the information revolution. Although other technologies have contributed to this condition, computer technology is the main contributor. Computer use has penetrated almost all parts of life; both economic and social. As with any other new technology, information technology...

Tech & Engineering

Aerodynamics: Airfoil Design and Optimization System

Problem statement The design of high-lift machines is one of the most demanding concerns in aerodynamic study. The requirements for the structure of these machines depend entirely on the main disciplines in aeronautical study. These include aerodynamics, aeroacoustics, structures, systems and kinematics. The chief objective of the systems/structures is the...

Tech & Engineering

Collaborative Technology in Education

Automated simulation techniques, social networks and digital games suffer from various public relations predicaments, but today they demonstrate various powerful capabilities and advantages. The viability of these tools is a good indication that schools ought to adapt the new technological trends. However, there are various impacts of collaborating social networking...

Tech & Engineering

Business Intelligence and Information Architecture

Abstract Business environment in this 21st century relies on an extraordinary level of managerial intelligence and information management. A solid Information architecture (IA) could be a cornerstone in enabling information based business intelligence with extensive integration of various information contents in enterprise architecture (EA). But this IA based EA is...

Tech & Engineering

Emergency Management and Emergency Planning

The four phases of emergency planning Mitigation This phase happens before and after emergencies occur. It involves all the activities and efforts to reduce the likelihood of occurrence of emergencies or disasters or efforts to minimize the impacts of such disasters. It includes activities such as buying flood of fire...

Tech & Engineering

Information and Security in Organizations

Before the advent of the internet, networking occurs in a closed system that exists within a particular organization (Computer Security, 2009). Under this system, a network administrator creates the username and password for the users (Computer Security, 2009). The internet, which is an open system, allows access to information even...

Tech & Engineering

Voice over Internet Protocol Technology

Abstract This research study is a form of an argumentative research paper that seeks to explore whether or not Du and Etisalat, the two telecommunications organizations that have been licensed to provide VoIP services, should block their users from utilizing this technology. Background information of VoIP shall be examined, regarding...

Tech & Engineering

Computer Software Classification

Computer software refers to programs that direct the activities of computer systems. These programs are written by programmers who use specific programming languages to generate instructions that the computer understands through the use of language translators. Thus, computer software consists of the detailed preprogrammed instructions that control and coordinate the...

Tech & Engineering

Impact of Information Technology on Indian Banking System

Abstract With its latest developments and innovative tools, information technology has revolutionized every industry, whether in production or in service. Adoption of information technology provides for distinct benefits like improved efficiency in operations, significant reduction in costs and it acts as an enabler for the provision of superior quality customer...

Tech & Engineering

Communication Systems: Recommendations in Dealing With Cyber-Threats and Warfare

Introduction Cyber-threats and warfare is an issue not only in the United States but also in the rest of developed nations. According to Cavelty (2008), the threat posed by cyber-threats calls for a greater understanding of the context in which they occur (p.29). The author supposes that to get an...

Tech & Engineering

Information Communication Technology in Education

Introduction Globalization and technological change have created a new global economy that is powered by information and communication technology. This technological change has brought serious concerns for educational institutions. Information and communication technology also known as ICTs have become the basis for educational reform. This paper discusses the role of...

Tech & Engineering

Understanding and Managing Cybercrime

Introduction Since its invention, the computer has been integrated in almost all areas of our lives. This includes infrastructure systems like financial systems, communication systems, defensive systems in the military, supply of services like water and electricity, traffic control, security systems among many others. A threat that the United States...

Tech & Engineering

Use of Cell Phones While Driving

Cover Letter This course has been really very helpful. I have learnt a lot of useful things and most importantly I have realized how dangerous it is to use mobile phones while driving. All most all the assignments were very good and very useful. This course has largely expanded my...

Tech & Engineering

Research Studies Analysis about Education

Outline Introduction Thesis: This research paper presents an analysis of two articles from peer-reviewed journals; these are ‘”Learning with Technology: The Impact of Laptop Use on Student Achievement” by James Cengiz Gulek and Hakan Demirtas and “Engaging Students in Multimedia-Mediated Constructivist Learning – Students’ Perceptions” by Mai Neo and Tse-Kian...

Tech & Engineering

Private Internet Usage in the Workplace

In this computerized era, communications can be done instantaneously. Information passed can be retrieved in seconds from any part of the world through internet access. Both the employers and employees have been benefited, such as employees could perform efficiently and employers were able to achieve their goals in their business....

Tech & Engineering

Supply Chain Management: Dell computer

Dell computer was founded in 1984 by Michael Dell and is today one of the most successful businesses. From the beginning, they integrated a new concept of a direct sales model which eliminated middlemen and sold directly to the consumer, and a build-to-order process of manufacturing which they named Dell...

Tech & Engineering

The Internet Communication

The Internet, as one of the types of communication, appeared in 1957 in the USA in order to create a new information transfer system. There are also other types of mass media such as radio, TV, and newspaper; and the Internet is the fourth type that entered the sphere of...

Tech & Engineering

Securing the Host From the Virtual Machine

Introduction The publishing industry is one of the old industries around the world. Books hold a unique place among other media. By the early nineteenth century as the scale of book production increased dramatically, editorial activities split off into the separate business of publishing. The publisher handled and copyedited the...

Tech & Engineering

A Critical Examination of the Rules on Force Relative to the Cyberwarfare

Introduction Background Cyber-attacks or cyberwarfare is a new type of warfare that uses digital technology to distort, steal or erase critical information, which results in serious economic, political and social consequences. Many governments have come to appreciate the power of cyber warfare and are using it to attack other nations...

Tech & Engineering

Computerizing the Purchasing System of the Company

Introduction House incorporated is a medium sized company selling motor vehicle spare parts with over ten branches scattered across five major towns in California. It has several department interconnected using a common server. The departments that are interconnected include accounts and finance and procurement human resources, marketing and administration. The...

Tech & Engineering

Quality of Oil Project by the Kurdistan Government

Introduction. Research question Oil is considered to be the most significant product in the Kurdistan region of Iraq. Throughout the Saddam Hussein ruling, the Kurdistan Regional Government was deal with just 13% of the incomes achieved from their oil. But transforms in the political outlook have also provided a better...

Tech & Engineering

Scope of Improvement on the Environmental Impact of Air Travel

Abstract The given project is devoted to the in-depth investigation of the problem of air travel environmental impact and the ways it can be improved. The significance and importance of the problem precondition the increased attention to the analysis of the aviation industry as one of the most fast-growing spheres...

Tech & Engineering

Intellectual Property Rights and the Internet

Copyright Issues The Internet has proved to be and proficient medium in spreading out information and due to this, it poses challenges to the typical values of copyright law. Most significantly, the internet provides the public with flawless duplicates of various things which includes pictures, animation, text, videos, and other...

Tech & Engineering

How Organizations Protect Customer Privacy

Abstract Personal Privacy Information has been regarded as a crucial issue when eCommerce transactions are discussed. With increased reports of data and identity theft, virus attacks and hacking, customers are worried when they have to give personal information on the Internet. Consequently, organizations are faced with the responsibility of ensuring...

Tech & Engineering

Systems, Process and Use Case Modeling

Introduction Use case modeling has become the foundation of the most popular de facto standard technique for performing software requirements analysis and specification. However, use case modeling has its well-known problems, and different requirements engineers typically perform use case modeling differently. This paper provides a hierarchically organized set of detailed...

Tech & Engineering

Survey of Methodology of Data Mining

Today in information technology era, there is ample of information available and a number of users are accessing data daily for their use and requirements. Data mining is a commonly used term in computer field. Data mining is the process of sorting huge amount of data and finding out the...

Tech & Engineering

An Information System: System Analysis, Design Methods, System Building Blocks

A company has many functional departments (such as Finance, Human Resources, etc.) Explain or describe the process that should be taken to develop an automated information system and or software An information system designing process is a key stage to the implementation of an information system in an organization. The...

Tech & Engineering

Human-Computer Interaction. Passwords and Security

Introduction User ID and passwords control authentication is the widely used mechanism to access the data in most of the current conventional information systems. With the rapid increase in the number of password-protected accounts on the internet, users have to create and remember a host of passwords. Despite the rapidity...

Tech & Engineering

Information Tecnologies Questions Nowadays Analysis

How a message is transmitted from one computer to another one using layers Two computers communicate when they are in a computer network. For such a network to exist the computers are either connected either through a physical medium such as an Ethernet cable or through a wireless network that...

Tech & Engineering

Discriminating Factors During Etl Phase of Data Warehouse

Introduction The extract transform load (ETL) is the trio of distinct functions that are integrated into a common programming tool, most when administering databases. The extort utility deciphers data from a particular resource and pulls out a preferred section of data which is converted into a preferred position. Lastly, the...

Tech & Engineering

Children in Web: Protection and Prevention

Introduction Technology is the improvement made on computers, education, medicine, transportation and other technologies as well as the useful knowledge that enables humans to achieve their purpose more effectively; it is actually the growing capability of humans to achieve their purposes, the great technological transformation must be understood to a...

Tech & Engineering

Image Rendering Methods Analysis

Computer world is comprised of images, videos, images both static and animated. These images are built from a set of pixels on a grid. Rendering is a process of creating image from a model. Image rendering is common term in graphics world, most of the work on graphics requires image...

Tech & Engineering

Technology Integration Across Curriculum

The term “Technology Integration” the term is commonly used by teachers and professors to describe the efficient usage of technology in student’s daily lives and make students understand the effective use of each technology. Not only do university teachers use these tools in classrooms but the K-12 teachers also try...

Tech & Engineering

Performance Measurement in Engineering Projects and Management

Introduction Although it has long been recognised that performance measurement has an important role to play in the efficient and effective management of organisations, it remains a critical and much debated issue. Significant management time is being devoted to the questions – what and how should we measure – while...

Tech & Engineering

Local Area Networks: Concepts, Hardware, Protocols

Introduction Circuit switching was first traditionally offered by the telephone system, in which the low or high capacity for any type conversation is saved on each and every switch with the help of a trunk line among the two subscribers. Although anyone face any type of difficulty to get a...

Tech & Engineering

Establishing an IT Disaster Recovery Plan

Abstract Business today face not only uncertain markets but various threats and disasters that are man made as well as natural. While natural disaster include Tsunamis, Tornadoes, Earthquakes and others, man made disasters include terrorist attacks. What is common among these disasters is that they strike quickly, without warning and...

Tech & Engineering

Junk Classifier in the World Wide Web

Abstract This paper addresses the techniques used to analyze web pages and in-text in general to outline effective strategies in junk filtering. The paper as such investigates the effectiveness of traditional and modern junk classifiers to bring out the present state-of-the-artwork. The paper also shows the basic attributes of the...

Tech & Engineering

Local Area Networks: Elements, Servers, and Layers

What are the elements of a network? There are usually three basic elements of a computer network: software, hardware, and protocols. A combination of these three elements forms a network. When we assume that a computer network is like a rail or road where vehicles pass through, then the “traffic...

Tech & Engineering

Learning Theories Behind New Technologies

Introduction The role of new technologies in contemporary education is well-recognized and largely studied by numerous scholars. There are various opportunities for the integration of these technologies into the educational process as well as considerable challenges. This paper aims to discuss several questions and concerns related to theories and models...

Tech & Engineering

Foundation Concepts, Hardware and Protocols

Who creates Ethernet standards? What is the difference between Baseband and Broadband transmission? Which physical standard should be used for a web hosting company? Why? Ethernet standards Ethernet is a dominant LAN technology, developed at Xerox Palo Alto Research Center by Metcalfe and Boggs. After the initial development, Ethernet was...

Tech & Engineering

Effective Electronic Systems: Qualitative Analysis

Introduction To collect data on the topic of effective electronic systems, interviews with four participants were conducted. Each interview consisted of five questions associated with respondents’ perceptions of the use of electronic systems in the workplace. Questions that the participants were asked aimed to answer the following research questions: What...

Tech & Engineering

Telecommunication Management Analysis

What does the data link layer do? The data link layer offers the functional and procedural way for the transmission of data between network entities and to detection and correction errors that may occur in the physical layer (Fitzgerald & Dennis, 2001). Typically, the data link layer was planned for...

Tech & Engineering

Interactive Whiteboards in Saudi Primary Schools

Introduction Contemporary school has a task to prepare every student for life in the information society. Consequently, it is a task of a teacher to create a favourable environment and provide opportunities to learn and communicate. Communication is a substantial aspect in individuals’ lives and through it knowledge can be...

Tech & Engineering

Data Strategic Applications’ Benefits in the Aviation Industry

Abstract This thesis aims to investigate the benefits of data strategic applications in the aviation industry. The study seeks to examine the impact of data strategic application and digitalization on the curated travel experience, security identification, customer experience, and airport services. Digital transformation and other important financial evolutions are motivating...

Tech & Engineering

Internet Financial Reporting Analysis

Introduction The 21st century is characterized with increased technology and in particular in the information technology. There has been noted a great advancement in information technology that has enabled promoted the performances of many organizations greatly by facilitating online shopping and Internet Financial Reporting. Online selling is the process where...

Tech & Engineering

Arab Open University’s Information Technology Infrastructure

Requirements Definition The scope is by using IMS open architectural specifications to build an IT infrastructure that will be used for general purposes and e-learning, pointing to the obvious advantages of such methods. IMS – is a project, which unites the efforts of 29 representatives of industry, government apparatus and...

Tech & Engineering

VoIP Quality of Service Evaluation.

Executive Summary This research paper explores the performance of VoIP, as well as the parameters that affect the quality of service of VoIP. The different communication aspects of VoIP namely; call signaling protocols and networking environments have also been explored, with the latter’s emphasis on LAN and WAN. Performance evaluation...

Tech & Engineering

User Involvement in Value Management of Construction Projects

Abstract The investigation was conducted to determine the impact of end-user Involvement in value Management of mega construction projects to ensure their satisfaction. The underlying objectives consisting of the history of value management, managing value in construction work, meeting value objectives, integrated value and risk management, user involvement in quality...

Tech & Engineering

Culture in Project Management

Abstract Due to the ongoing globalization of business, international expansion of different companies, and the emergence of culturally diverse environments, project managers face challenges that have not existed before. Some of these issues can have a significant adverse effect on the performance of the team, and so they should be...

Tech & Engineering

Local Area Network: Foundation Concepts, Hardware and Protocols

BOTS and Hacking BOTS are simple DDOS exploitation programs that attack in a unique manner. These programs when remotely installed are able to send commands and execute accordingly by the hacker. The attacks represent the mainstream of DDOS and work through the centralized control of distributed zombies or bots. The...

Tech & Engineering

Telecommunications Management – Network Security

The Need for Network Security Network security is an increasing phenomenon that is used to combat the increasing threat of attacks on the private information being transferred and stored on the internet. The need for network security has increased due to the increase in the traffic on the internet, the...

Tech & Engineering

Data Warehousing Is One of the Significant Achievements in the Field of Information Systems

Introduction Data warehousing is one of the most significant and current advances in the field of information systems (IS) which has become a better means of changing data into helpful information. (Kimball. 2002).pp25.It is an advanced way of combining data from several, often very large, distributed, different databases and other...

Tech & Engineering

Debate on Wi-Fi Networks

Introduction Wi-Fi is a registered trademark of the Wi-Fi Alliance for certified products based on the IEEE 802.11 standards. It is also called Wireless LAN (WLAN) or Wi-Fi. It is supported by most computer systems be it be laptops or personal computers. Most of the operating systems like Linux or...

Tech & Engineering

Information Technology and Society

Recently, there are lots of concerns whether technology affects every part of family life. Evidence suggests that it does have a negative impact on our lives. We are spending more time in doors than we are outside. The time spent on the computer, watching TV or playing computer occupies about...

Tech & Engineering

Internet Privacy at Work: Main Reasons

A policy on the usage of the internet spells out the behavior of internet browsing that is perceived to be the most appropriate within the workplace (Foltz, Cronan & Jones, 2005). Typically, such a policy seeks to enforce on the employees of an organization, time restrictions at a time when...

Tech & Engineering

Planning Process Foundations in Organizations

Introduction Planning is the process used by organizations to create a series of steps that provide a roadmap and a framework by which required objectives can be met. Planning is undertaken by individuals, organizations both big and small, governments, not for profit and charities, in fact, all entities that want...

Tech & Engineering

Project Management – A System Approach to Planning

Project management refers to the process of planning, organizing, and managing the resources of an organization to enhance the successful completion of the specific goals and objectives of a project of an organization. The project is referred to as the set of activities that use resources such as money, people,...

Tech & Engineering

Contemporary Information Systems and Approaches in IT

Introduction When we talk about contemporary Information Systems, we no longer mean to discuss traditional IT strategies and there is a reason to it. Traditional IT applications have commonly focused on internal efficiencies and have therefore been evaluated using traditional ROI criteria. Traditional IS applications tends to focus more towards...

Tech & Engineering

Types of Network Security

Introduction Network security refers to all provisions and policies established and adopted to protect any network infrastructure and network resources from being accessed by an unauthorized person (s). The Network administrator is charged with the responsibility of establishing a combination of effective measures aimed at securing the network. While computer...

Tech & Engineering

Computer Crimes and Their Types

In the modern world where advancement in technology was remarkable, especially in computers, the authority had an additional job in solving technology-based crimes. Technologies such as home computers, the Internet, websites, made it possible to have business transactions over the internet. This has been a new dimension that crimes are...

Tech & Engineering

Security in the Software Development Lifecycle

Abstract The security of computer applications during the design phase of SDLC is a critical issue for the safety and performance of these applications. This paper analyzes the various security techniques used to protect computer applications during their designing phase. Introduction The Software Development Life Cycle results in a quality...

Tech & Engineering

Lifecycle of a Project Management

Introduction Managing projects is a complicated and expensive proposition. Extreme care should be taken at all stages to see that any project is managed efficiently. A brief report on the project life cycle is given below. It is proposed that this is the way that future projects will be managed...

Tech & Engineering

Internet Security and Shopping Growth

Introduction The era of globalization and technological development resulted in the high promotion of the global network all over the world. Nowadays the success of business companies and enterprises is influenced by the internet. Due to the rapid development of internet technologies the notion of “internet security” is widely used...

Tech & Engineering

Transfer Protocols Technologies Comparison

File Transfer Protocol Introduction FTP stands for File Transfer Protocol and is one of the easiest and securest methods through which files may be exchanged over the Internet. When a file is being downloaded from the Internet, it means that it is actually being transferred from another computer over the...

Tech & Engineering

High Performance Project Teams and Management

This paper outlines methods to create high-performance project teams while reflecting on their leadership and team experiences. A number of detailed steps are outlined through which better output; quality of work can be achieved. Conflict resolution measures have also been outlined clearly in this while analysis of team performance has...

Tech & Engineering

Project Management in Organizations.

Project design and implementation of an information system in an organization assumes utmost importance today. Hence, teams handling project need to consider both the technical as well as ethical implications of a project plan (Rogerson, 1996). So projects need to adopt ethical sensitivity, make sure ethical issues are well thought-out...

Tech & Engineering

Current Laws and Acts that Pertain to Computer Security

Introduction With a rapid increase in the use of computers around the world, new criminal behaviors have been spawned and laws are being made continuously to counter the emerging problems of computer security. A computer security incident is any unlawful, unauthorized, or unacceptable action that involves a computer system or...

Tech & Engineering

The Impact of Information Technology on Communication of Individuals and Organizations

Information Technology is today’s major center stage. This can be viewed from the way information technology has made information delivery to become easier as it is channeled worldwide hence also contributes to the shaping of the new global millennium. Information technology has made information delivery to become easier as it...

Tech & Engineering

Is Google Making Us Stupid?

There is absolutely no doubt that this article forces the reader to think about the time he spends browsing endlessly through websites after websites. Throughout the article, the author shares his experiences, regarding the effects of Internet usage on his mind, with the reader. Reading through the whole material, it...

Tech & Engineering

Ethical Issues in Computing

Providing personalization of internet services while still protecting users is a subject that has been much discussed in current times. Web sites have wanted to take advantage of communications on the internet so as to provide customers with personalized information and web services as well as to target advertising. The...

Tech & Engineering

Information Systems Development and Analysis

Information Systems Development (ISD) of an organization involves different processes that are to be collated systematically. To accomplish this task, a number of professionals of various levels like System Analysts, Information Systems Manager, Programmers, etc. work together. The processes of ISD include identifying the needs of clients, planning, analyzing, task...

Tech & Engineering

Computer Safety, Reliability and Security

Introduction The security of computer system has been an issue of concern since early 1940s. During those eras security of computer was achieved by the use of heavy door lockers, which were not easy to master or break through. But due to the advancement of computer technology more sophisticated means...

Tech & Engineering

Company Data Warehousing: Winners and Losers

A data warehouse is the major store of an organization’s historical data, and its corporate memory. It contains the raw materials to support managerial decisions. According to Greenfield 2005, a data warehouse is a copy of transaction data specifically structured for querying and reporting. The data warehouse can be a...

Tech & Engineering

Expert System Software in Business Decision-Making

Introduction Information fuels the new economy and plays an essential role in developing and maintaining a sustainable competitive advantage. The demands on a business today – increased global competition, lower barriers to entry, lower profit margins – are creating an ever-increasing need for access to data. The ability to get...

Tech & Engineering

Technological Innovation in Project Management

With the advent of globalization and highly sophisticated technological advances, today, more than ever before, there is a high need for stable, streamlined project management. The business world and governments are in constant pursuit to analyze and enhance their effectiveness and efficiency for work and output so that better prospects...

Tech & Engineering

Cell Phone Use in the Car Issue Analysis

Cell phone usage has exponentially increased in the past decade. The wireless connectivity as well as the multiple facilities provided by the cell phones has made them immensely popular. The cell phones have now become not just means of communication for people, but more like personal storage and computing devices...

Tech & Engineering

Project Management: The Managerial Process

Project Communications Plan A successful project implementation starts with accurately and competently organized communication system. Proper quality and speed of data exchange between different stakeholders within a project ensures the sustainability of teamwork and contributes to the timely corrections and ultimate delivery of the project outcomes. The choice of methods...

Tech & Engineering

Enterprise Resource Planning Assignment

Discussion Part The implementation of the ERP is challenging for any organization disregarding whether the ‘big bang’ or phased approach is used. The ‘big bang’ approach suggests that the company will shift from the old ERP to the new one at a single point in time. The advantage of such...

Tech & Engineering

Nine Challenges of Alternative Energy

The modern energetic system which relies predominantly on fossil fuel is considered to be dangerous for the environment. Two major drawbacks of non-renewable sources of energy, such as coal or petroleum, are Carbon emissions and their limited reserves. As Chau et al. (2015) claim, “energy generated from fossil fuels produces...

Tech & Engineering

Allstates Insurance Company’s Data Security and Trend Analysis

Introduction In the world today there is a problem relating to information. This is because most companies have suffered a great deal due to the loss of information. Private and confidential information stored by companies has found themselves in the wrong hands that use them for personal gains. For the...

Tech & Engineering

The Role of Social Communication Tools in Education

Introduction and Theoretical Framework The present research aims at analyzing the perceptions of Saudi students toward the use of social media in their education as a means of supporting the learning process. Investigating students’ understanding of social media is crucial since it is closely associated with contemporary educational methods. Acquiring...

Tech & Engineering

Will Robots Take Over Human Jobs?

With technological advancement, increasingly more robots are being employed in different sectors, particularly in jobs that appear difficult or dangerous for human beings. Most people are convinced that robots will take their jobs in the future. On the contrary, some individuals have a conflicting perception that robots do not have...

Tech & Engineering

Evie.ai, a Virtual Personal Assistant

Overview Nowadays, it is hard to imagine a day without a computer. This technology has already penetrated millions of homes and working settings, and people depend on the opportunities offered by recent technological progress. The rise of technologies provokes the need for artificial intelligence (AI) as an attempt to develop...

Tech & Engineering

Concrete Masonry Corporation’s Project Processes

Introduction The project to move some of Concrete Masonry Corporation’s production capabilities into Eastern Europe is currently in the early planning stage. As such, the detailed plan has not emerged yet, and the manager, Kevin Lewis, does not know which specific activities he will have to carry out to complete...

Tech & Engineering

Computers’ Role in Modern Education

Introduction Humanity has experienced rapid advancement in the area of technologies for the past several decades. Electronic computing devices are now the basic means of data processing in the business, science, communications, entertainment, education, and other spheres of human activities. The omnipresence of computers and digital technologies in modern society...

Tech & Engineering

Hydraulic Fracking Wastewater Treatment Technologies for Petroleum Engineers

Abstract This paper presents the basics of hydraulic fracking and discusses various possibilities of wastewater management technologies. Factors include water composition, delivery methods, and purification processes. The paper outlines the environmental impacts of hydraulic fracturing which highlights the importance of wastewater treatment. The main scope of the paper investigates the...

Tech & Engineering

RapidMiner Company on a Field of Data Mining

Introduction To stay competitive in an ever-changing technological environment, companies have to use the available data as a tool for predicting what may occur in the future. Thus, predictive analytics plays an essential role in capturing useful information and employ it for modeling customer behaviors, patterns of sales, and other...

Tech & Engineering

Technology and Its Impact on Teaching

Digitalization of different spheres and professions of the modern world brings significant changes to everyday activities. One of the fields in which technology is emerging the most rapidly during the last decades in education. Therefore, technological tools and digital methods have become more widespread in educational spheres. Our institution has...

Tech & Engineering

Learning Management Systems Project Monitoring

Introduction The LMS solution supports different e-learning models and integrated training programs for students. Monitoring the LMS implementation is an important step in the project management process that entails the measurement of project variables against certain project plans and milestones. It involves an ongoing evaluation of achievements, challenges, and potential...