Category: Tech & Engineering 2928

  • From Medical Practice to Daily Life Study

    The paper From bio to NBIC  From medical practice to daily life identifies three technical trends that point to major developments in nano-tech. First of all, breakthroughs in the medical field have been seen, ranging from neuromodulation techniques to molecular medicine. It is expected that machine intelligence (e.g., brain implants) or human body modification…

  • Project (PRINCE2 and PMBOK) Methodologies

    Executive Summary Project management (PM) methodologies are vital since they can determine the success of a project. It is crucial to understand different PM methodologies in terms of their defining aspects. This report will examine two PM methodologies, PRINCE2 and PMBOK. To gain an in-depth understanding of the two methodologies, this report will analyze the…

  • Aspects of Airbus 380 Project Failure

    Exploiting existing information in a company and creating new knowledge as a consequence has become critical in todays experience and understanding of industries. Even though Airbus established a pricey and custom-built ICT-based system for knowledge exchange and monetization, its utilization did not achieve the intended levels. The Airbus A380 is a triumph of construction as…

  • Do Digital Tools Make Us Productive at Work?

    Table of Contents Introduction Thesis Statement Digital Tools and Modern Value Creation Changes in Workers Productivity Information and Productivity Telework and Productivity Cooperation and Productivity Essential Technologies Conclusion References Introduction There have been numerous attempts recently to evaluate the efficiency of the multiple digital tools that are widely used in offices. Deepening individualism and changing…

  • Massive Cyberattacks on the Yahoo Server

    Table of Contents Introduction Case Description Case Analysis Case Implications Conclusion References Introduction People live in the age of the information society, when computers and telecommunications systems cover all spheres of human and state life. However, humanity, having adopted telecommunications and global computer networks, did not foresee the opportunities for abuse that these technologies create.…

  • Biometric Security System: Unimodal and Multimodal Biometrics Techniques

    Biometric access control is currently one of the most popular security options at the highly advanced market. This particular method is simultaneously simple in applying and efficient against most common threats. Access control is the administration of an access point, such as a door, turnstile, elevator, or other device, to ensure that only authorized people…

  • Discussion: Passwords the Weakest Link

    Passwords create the first line of defense against unauthorized access to personal information in software technology. Knowledge of how to create strong passwords protects computers from hackers and malicious software. Strong passwords should be long and have a mix of characters to make it hard to be cracked by brute-force attacks. Passwords are very discrete…

  • Typewriter by Charles Latham Sholes

    Table of Contents Introduction Impact of the Typewriters Invention on USA Conclusion Works Cited Introduction Most of the literature considers Charles Latham Sholes as the main inventor of the typewriter. However, previously, many engineers, such as William Austin, had tried inventing a typing machine but were unsuccessful (Fillipi 5). Sholes-Gideons typewriter was the first successful…

  • Algorithms Changing the Daily Life of People

    The modern world is highly dependent on the use of mobile technologies and applications. Therefore, as an outcome of a permanent connection to the use of technology, people now experience the real-life influence of technology through algorithms implemented in search engines and social media content. Initially developed to improve the quality of content, algorithms are…

  • Issues of Redundant Array of Independent Disks

    RAID is an acronym for Redundant Array of Inexpensive Disks. It is a fault tolerance mechanism for Windows NT servers, which does not require any additional software (Tomsho, 2016). RAID setups are a major cause of customer aggravation, as indicated by the fact that they account for a sizable number of complaints. After weighing the…