Tech & Engineering Essay Examples and Topics

Automation in the Aviation Industry

Automation in the aviation industry has both advantages and disadvantages. Advantages include lower operational costs, reduced workload, fewer operational errors, and efficient synchronization of different systems (Campbell, & Bagshaw, 2008). On the other hand, disadvantages include pilots’ complacency due to overdependence on automation, adverse influence on flying skills and knowledge, introduction of new errors, poor […]

Process of Outsourcing Network Security

It is indeed true that determined attacks cannot be protected by firewalls. However, a company’s network is supposed to be provided with a definitive filter in the form of a firewall. It is unfortunate that a number of well known commercial firewalls can still be bypassed by hackers. The vulnerability of companies towards attacks is […]

John’s Kids-Heaven Shop Mobile Applications

Today, many business owners actively use mobile applications because the whole market is changed, and more attention is paid to the Internet technologies to support the market’s progress. As a result, the use of mobile applications is beneficial for businessmen who change their approaches to building relationships with customers. To support John’s Kids-Heaven shop, it […]

Saving Energy Systems: Water Heater Technology

Introduction A water heater is a device that is used at homes to heat water for bathing. It works on the principle of converting electrical energy into heat energy. The following components make up water heaters: tank, dip tube, shut-off valve, heat-out pipe, thermostat, heating elements, drain valve, pressure relief valve, and a sacrificial anode […]

“The Most Human Human” by Brian Christian

The Most Human Human: What Artificial Intelligence teaches us about Being Alive, is a chef-d’oeuvre book by Brian Christian. The book highlights how computers are slowly becoming “human” courtesy of the undergoing technological revolution. In addition, the author explores how human beings behave like computers. Conventionally, the book underscores how computers shape the idea of […]

Seventh Street Improvement Arches

Abstract William Truesdell designed the Seventh Street Improvement Arches, which stand near Minnesota at St Paul. McArthur brothers, together with Michael O’Brien, were the construction contractors. After examination of several available design options, Truesdell settled for oblique method due to the nature of the intersection of the street at Duluth tracks and the St. Paul. […]

The Parking Garage Project Risks

It is important to address the risks that may arise from the parking garage project because of the costs involved. It will also be difficult to compensate owners of cars be parked in the garage. Even though it is impossible to avoid risks in any construction project, understanding potential risks are crucial in responding to […]

High Tech Fraud

The increasing global prominence of the internet is a major source of concern for law enforcers because of the increasing sophistication of fraudsters. Law enforcement agencies in many parts of the world now have cybercrime divisions that tackle the increasing challenge of high tech fraud. This paper reviews an article published by Shaik and Shaik […]

Technologies Effects on Society

Can you imagine living in a world without the internet, televisions, automobiles, mobile phones, computers, and music players? Can you imagine driving to a new location without a GPS device for guidance? Life would be boring, unbearable and slow. Technology has made life easier than it was in the early years of the 20th century […]

Globalization Influence on the Computer Technologies

Globalization is the process that has completely changed the ways of how the world may operate in different spheres of life. On the one hand, globalization destroys several barriers that have recently deprived people of numerous opportunities like distant communication, fast exchange of information, and software improvements by the users’ needs. On the other hand, […]

Oracle HRIS Software

Strengths of an Oracle It meets customers’ expectations due to its long term viability. In other words, HR software is highly competitive (, 2013). It offers a wide choice of the section for customers. In the event that a client wants to deploy human resource software, there are several options through which a customer can […]

Information and Communications Technology’s Digital Divide

A digital divide is a form of inequality that manifests in social and economic spheres as a result of some sections of a community that do not access and use knowledge with respect to information and communications technology (ICT). From a multinational perspective, the divide that exists between countries due to limited access to ICT […]

Protection: Extinguishing Systems and Extinguishers Project

Protect the Parts Cleaning Dip Tank The dry chemical system is good for class B fires. The hazard falls into class B because the chemicals in the clean dip are inflammable. The agents are, usually, sodium bicarbonates transported through gases to aid the fluidization process (Bryan n.pag.). The particles extinguish fires by coating them and […]

Computer Science: Internet Censorship

Introduction After the development of the internet, it became quite easy for people to access information through technology. As more users started using computers and the internet, the platform became a viable avenue for people to do business, express their opinion, and upload data for public access. This development has led to the development of […]

Will Robots Ever Replace Humans?

Introduction/Brief overview Introduces readers to what will be discussed in the paper and to the would-be reviewed articles by Bolonkin and Clocksin One of the main aspects of today’s living is the fact that, as time goes on, more and more people grow increasingly concerned about the possibility for robots (endowed with artificial intelligence) to […]

Cape Breton: Internet Accessibility

Introduction Cape Breton Island is located in the northeastern part of Nova Scotia and the Bay of St. Lawrence on the western part surrounds it while the large Atlantic Ocean covers the eastern section. Cape Breton is remotely located in Nova Scotia. Moreover, it has sparse population density. These factors are responsible for certain challenges […]

Intelligence Technologies: Helpful Innovations or Threats

Introduction Questions are rising as to whether the future technology will transform the human life or it will simply put the future of the humanity in jeopardy (Kurzweil 18). Technology has transformed from the house-size computers of the first generation to the sophisticated technologies that have made almost every part of human duties effortless. Innovation […]

Protection: Housekeeper Safety and Injury Prevention

Abstract This paper addresses the responsibilities of upholding safety and reducing injuries in housekeeping. The paper argues that housekeepers have an individual responsibility to ensure that they uphold safe work practices. The paper further indicates that employers have a responsibility to provide the housekeeping employees with protective gear and safe working environments. Employers also have […]

Educational Technologies

Introduction Background The significance of IT tools as a means to enhance the learning process can hardly be underrated. Modern technologies should be viewed as a powerful tool for information acquisition and transfer; therefore, they can and should be used by teachers. Particularly, the usage of online software as a means of assessing students’ progress […]

Computer’s Memory Management

Abstract Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit (MMU). The MMU is an integral software component of the operating system that resides in the OS’s kernel. The OS manages both types of memory that are categorized into primary […]

Technologies: High-Speed Internet Vs the Cable Television

Summary High-speed Internet and the cable television market will face greater monopolistic power due to the merger of Comcast and Time Warner Cable (TMC). The article discusses two aspects of the merger – first, the increase in monopolistic power of Comcast due to the merger and second, government regulation that might control the rise of […]

Technologies in “The World Is Flat” by Thomas Friedman

“The World Is Flat” video by Thomas Friedman is a chance to learn better the list of software and hardware events and understand the essence of the trends in technology that have already become a kind of “flatteners” in the society. However, the information mentioned in the video proves that there is no end of […]

Technology in “Society is Dead: We Have Retreated into the IWorld” by Andrew Sullivan

The essay under analysis is called “Society is Dead: We Have Retreated into the world” written by Andrew Sullivan. The main purpose of this essay is to raise social awareness about the modern phenomenon of intentional isolation self-inflicted by the majority of our contemporaries these days. The author points out that the heavy use of […]

Aviation History

Introduction Every modern lifestyle or technological aspect has its unique historical background that led to the development of its current state. Aviation is an international business and an academic concept that focuses on engineering the aerospace sciences and technologies.1 Before the civil aviation and the commercial aviation began operating, several theorists, scientists, and early innovators, […]

Project Management: A Pillow with a Vibrated Alarm

Waking up early in the morning is not an easy task, and even with an alarm set, one may oversleep by simply pushing a button on the device or ignoring the sound. However, by introducing a tactile irritant into the mix, one may be certain to wake up within several minutes. An innovative product, a […]

Information Technologies: Virtual Machines

Abstract The present has discussed virtual machines in IT contexts, their benefits, as well as their drawbacks or limitations. Drawing from the discussion, it is concluded that virtue machines provide immense benefits to firms in the IT industry, though more work needs to be done to ensure the security and reliability of these machines. Although […]

Information Technology: Peer-to-Peer Computing

Abstract Peer-to-peer (P2P) computing entails computer platforms that rely on various dispersed computer components to operate in decentralized ways. It simply means the sharing of computer platforms and data. Organizations have pervasively deployed computers across their different business units. Consequently, P2P computing has gained significant attention in research, product development and usages in organizations. Many […]

The Comparative Analysis Essays of Technological Advancements

Introduction The comparative analysis essay is based on Dave Eggers’s The Circle, James John Bell’s Exploring the Singularity and John Cheever’s The Enormous Radio. From the chosen texts, it is evident that the authors are not amused by the modern technological advancements and prefers a satirical opinion of the same. Thesis statement The advancement of […]

3-D Printer Technology

Introduction The modern technology has allowed for possibilities that were not imagined and expected some mere 10 or even 5 years ago. The computer and out flowing devices have become the much needed and used part of the current society which allows to better human lives. A 3-D printer is one of the inventions that […]

Engineers and Ethical Dilemmas

Engineers usually have to design products and help in the implementation of these designs. In the course of doing their work engineers face situations that are tough to decide on in relation to their ethics. It is wrong for an engineer to go against their codes of conduct but at times they are forced to. […]

Project Management of Cisco Surveillance System

Introduction DeVry University is one of the best Universities in the word. This University is wishing to maintain its standard by enhancing security in all the departments, floors, and classes. However, the school board met and decided to use Cisco Surveillance system within its compound. The security manager decided that only high definition Cameras were […]

Aviation: The Black Hornet Nano Unmanned Aerial Vehicle

In recent years, especially since the US officially declared war on terror, drones have become an increasingly valuable military asset. They have been used for both surveillance and combat. Scanning a warzone from a distance to gain prior knowledge about a warzone is indeed a significant tactical advantage (Brooke-Holland, 2013). Over the years, since the […]

Technology Issues: Cell Phone Effects

Introduction Technological advancements have brought many changes in the modern world. According to Ling (56), technology has greatly changed the way various activities are undertaken. One aspect that has undergone significant changes is the mode of information transfer. Initially, people wrote letters in case of a need to pass information to another person, or use […]

Technology Issues: Fingerprint Scanner

Introduction The business environment is characterized by numerous opportunities. However, such opportunities can only be exploited if entrepreneurs conduct a comprehensive environmental scan in order to identify the prevailing opportunities. New business ideas may be generated from internal and external sources. Examples of external sources include customers, suppliers, market trends and competitors. On the other […]

The Drawbacks of Computers in Human Lives

Since the invention of computers, they have continued to be a blessing in many ways and more specifically changing the lives of many people. However, in as much as computers have changed the way people live and do things, it must also be emphasized that they are associated with negative effects. This paper, therefore, discusses […]

Technologies: History of Telephone

What Is Telephone? It is impossible to imagine the modern world without such means of communications as mobiles, the Internet, social networks, etc. However, it all began in the nineteenth century when the telephone was invented. First, it is necessary to note that the telephone is a device used to communicate. The device relied on […]

Technologies: Fire Protection System for Spray Booths

Automotive paint spray booths spraying flammable/combustible liquids are the power-ventilated structures which are actively used to provide the spraying operations because of the structures’ purpose to avoid the escape of the hazardous spray and to limit vapors with the help of the exhaust systems. Following the International Building Code, “307.4 defines Class I, II, or […]

Asset, Tracking, Logistics and Supply System (ATLASS)

Asset, Tracking, Logistics and Supply System (ATLASS) is an information system (IS) that is utilized by the US Marine Corps to offer an excellent platform on which supply management is conducted (Blackledge, 2003). Using the system, it is practical for thousands of users to access and work on data and information that is crucial for […]

How Technology Has Changed Lives?

Introduction Since the turn of the century, the rate of technological advancement has been escalating at an alarming rate. Technology has influenced almost every aspect of people’s lives. Technology has changed lives in terms of the efficiency of service delivery, communication, social processes, education, and business development, among others (Katz 100). Technology has enabled people […]

Computer Science: Threats to Internet Privacy

Introduction Every single individual is entitled to his or her privacy. Even though it may be somehow difficult to precisely define what an individual’s right is, it is, nonetheless, a fundamental human right. Ostensibly, privacy has two different sides. On the one hand, it is concerned with information about individuals that should be kept private […]

Vicarious Programming and Its Artificial Technology

Vicarious concentrates on developing an integrated algorithmic architecture that would result in human-level intelligence in areas related to language, vision and motor control. Today, the company concentrates on developing visual object recognition and segmentation with the aim of creating common products that work effectively in various sensory areas and perform various roles. Vicarious has adopted […]

Technologies: Improving the MD Anderson Cancer Center Website

Search Engine Optimization (SEO) Search engine optimization for the MD Anderson Cancer Center website can be achieved by installing plugins that possess extra features such as page navigation, thumbnail, and customized page numbers (Stokes, 2011). Specifically, this proposed system in Google will consist of a multi-tab page that will serve different areas and services to […]

Dependence on Technology

The modern world has become almost exclusively dependent on technology. Imagining one’s life without a mobile phone, for example, is practically impossible for most of the present-day citizens; in addition, with the advent of the internet, and the incredible availability of information, the power of technology has become obvious. Niel Postman, however, seems to take […]

Design and Installation of a Computer Network

Establishing a computer network goes a long way in improving the operations of any company irrespective of its size. The ultimate goal while executing such a project is to achieve results in the least time possible and at the lowest possible cost. Below is a list of a project team that will take part in […]

Jobs in the Field of Industrial Engineering

There is no doubt that industrial engineering grew out of the second industrial revolution and originally focused on the study and design of work processes and the people who operated machines (Bernstein, 2006). Yet, today the field and discourse of industrial engineering has to a large extent distanced itself from this early concern, with analysts […]

Technology and Personal Devices

Technology and in particular, personal devices are becoming more common. The multifunction of many gadgets makes it possible to effectively use at work and this is exactly what people are doing. Moreover, employees demand that they are allowed to bring and use their own devices at work. An article titled “IT’s Arab spring; Personal technology […]

Privacy Issues in Databases & Data Warehouses

In recent years, advances in information technology and the ‘digitalization’ of everyday activities has brought into the limelight a paradigm shift where huge amounts of personal data about people, their personally identifiable information, opinions, values, and attitudes are generated and stored in databases and data warehouses of service providers offering online services. The mere existence […]

Salinity Control System

Abstract This main objective of this project is to design the salinity control system. This report describes the main steps taken by the team and the peculiarities of the new application. This system will be based on the relationship between the voltage and concentration of salt in the liquid. This development of this application involved […]

Adobe Corporation Interactive Installation

This paper is aimed at analyzing interactive installation created by Adobe Corporation (2007). In particular, it is necessary to discuss the poetics of this piece and the principles which govern this artwork. Secondly, this essay will explain the embodiment of affordances in this interactive design. Finally, one has to describe the effects produced by these […]

Future of Genetic Engineering

Introduction Genetically modified crops are no longer considered a fanciful notion existing in the realm of science fiction but are currently being utilized as a means to grow edible agricultural products (Green, 1999). It is only a matter of time until technology develops to such an extent that it will be utilized as a method […]

My Cell Phone

Life can be a tremendously overwhelming process depending on an individual’s direct surroundings. Challenges expert licensed require an inspiration factor particularly when an individual is away from home and relatives for some time. Keeping contact with friends and kin is valuable in life to keep updated on what is occurring within the social order. There […]

Information Technology Administrator Occupation

This paper is a critical analysis of the Information Technology Administrator occupation, its involvement and relations to other careers in the work settings. Duties and tasks The information technology manager or administrator oversees the day-to-day operation of the systems, and it’s effective and smooth running. The tasks this person is involved with entails, discussing matters […]

Raw Materials for Newspaper Manufacturing

The life cycle of the newspaper is split into several phases. First, each paper is made of wood, is the main raw material for producing printed papers. The newspapers are specifically made of fresh fibers received from spruce trees that grow in forests of Germany, Sweden, and Canada (Axel Springer Verlag 8). Second, the wood […]

Apple Versus Samsung Smartphones

Smartphones are the latest rage in mobile phone technology. The yearly sale of mobile phones worldwide is more than a billion of which 20% accounted for smartphone sales (Kenny and Pon, 2011). There is a 100% annual increase in the sale of smartphones, and the high rate of penetration suggests that by the year 2015, […]

MAFF Manufacturing Company: Project Management Concepts and Applications

Last year, MAFF manufacturing company completed a project that was aimed at expanding the assembly department. The project had taken a maximum of two years. The first step was the acquisition of the adjacent land from a neighboring company. This was due to congestion that was being experienced in the old section. Besides, the company […]

Technology as a Form of Material Culture

Introduction Culture refers to socially transmitted rules for behavior. It generally refers to the way of thinking about and doing things (Schlereth 356). We inherit our culture from the teachings and examples of our elders and our peers rather than from genes, whether it is the language we speak, the religious beliefs that we subscribe […]

3D Printer Technology

Introduction 3D printing is a unique form of modern day printing, originating from traditional ways of prototyping. It is a form of manufacturing technology with an additive element whereby a 3D object is generated by the process of multiple laying-down of material layers. It has impacted greatly modern business transactions. This paper outlines the technology […]

Electricity as the Best Invention

The contemporary world and its society are known for the highly developed technologies that make people’s lives easier and simpler. The number of useful and sophisticated inventions grows nearly every day. The scientists work on new ways of studying the world we live in, exploring its resources and using them to improve our quality of […]

Rat Rod are Better than Custom Cars

Over the years since the invention of the hot rod that comprised old car parts joined and modification of an engine and body parts, various types or classification of the hot rod have come up. Some of these types include rat rod cars and custom cars. These two types of hot rod cars have many […]

Melissa Virus and Its Effects on Computers

Melissa virus affects Microsoft word and spreads as an attachment. If an unsuspecting recipient opens it the virus affects the computer storage. The virus disables the mail servers of a corporate. For example, Microsoft Corporation shut down all its incoming emails because of the Melissa virus. The virus also affected other companies for example Intel. […]

Technologies: Foam as a Fire Fighting Tool

The process of combustion needs oxygen for it to take place. Fire protection and fighting methods are based on limiting the supply of oxygen supplied to a fire. Foam is formed due to a collection of bubbles, and it is one of the tools used in firefighting and protection. The foam covers the fire reducing […]

Television’s Evolution

Introduction Television or TV was privately demonstrated, in a rudimentary way, on 26th January 1926, by John Logie Baird, a Scottish electrical engineer. On that day, he showed his crude, flickering, half tone televised images to a group of approximately 40 scientists from the Royal Institution in London. Baird was one of a small number […]

Web-Based Technology Report

Introduction Facebook, widely regarded as the most popular social networking sites among students, is created to connect users. It allows people to customize their profiles with personal information such as pictures, relationships and personal interests. What’s more, all Facebook users from a common region or users who list a certain movie or music as a […]

Smartphone Software

Introduction Smart phone is a mobile phone which is based on a mobile computing platform. It has more advanced computing capabilities and networking as compared to a contemporary mobile phone. The first smart phones were developed to join the operations of a mobile phone and a personal digital assistant (PDA). Currently, Smartphone devices are used […]

Microsoft Internet Marketing Strategies and Competitive Advantage

Introduction Internet technology inspired a business and commerce revolution not witnessed before. Once used for military purposes, internet communication nowadays provides an important platform for business to business, and business to customer interaction. Company websites have become primary tools where potential customers source for information on particular corporate products before making the actual purchase. Besides, […]

The Newest Gadget in Action: Anything Locator Application for iPhone

Concerning the Design: It’s not What It Seems Introducing a gadget with an original design is one of the keys to the success of the given technological novelty. Therefore, the peculiarities of the Locator Application for iPhone are of crucial importance for the public’s perception. Taking into consideration the elements that add to the stylishness […]

Nanotechnology: Advantages & Disadvantages within the Business Context

Introduction Emerging technologies, in their varied forms and scope, are transforming the world of work, how business entities function, change and progress, and the nature of leadership, managerial and professional careers within the context of the 21st century’s business environment. Indeed, these technologies have evolved into fundamental components of business, industry, and commerce throughout the […]

Foundation Engineering in Difficult Soils

Introduction Recent research conducted in the U.S (Jones, & Holtz, 1973) has shown that the country spends an estimated 7 billion dollars each year as a result of damage to all types of structures build on expansive soils. The research further shows that more than twice as much is spent on damage due to swelling […]

Ensuring Confidentiality and Integrity of Data During Transmission and Storage

Introduction In this scenario, it’s important to realize that data integrity and confidentiality is achieved by ensuring that only the authorized person(s) gain access to the data and that during transmission, storage and retrieval data originality is maintained. That is to say no alterations can be made whatsoever during these processes. We also know that […]

Improving the Security Levels of Software

Introduction With the modern uncertainty in information and physical safety, even computer programmers who understand the inner technical operations for software admit that there is no single way to eliminate computer security threats. However, software developers struggle so hard to improve the security levels of existing software. As a result, the constant improvement allows more […]

Securing Wireless Networks

This shift from paper based on electronic record keeping is very well informed. Adopting wireless and mobile technology will improve the doctors and nurses’ efficiency and lessen their workload. However, this technology comes with a number of challenges and risks (Kim, 2010). Some of these risks affect the patients’ wellbeing. This makes mitigation of these […]

Emerging Technology: Nanotechnology

Abstract Nanotechnology is an emerging technology which is developing at an exponential rate. The technology utilizes novel characteristics of materials that are exhibited only at nanoscale level. Although still in early stages, this technology has signaled potential and breakthroughs in many areas such as medicine, computer technology, food industry, building construction, environment protection to mention […]

Countries to Explore for Product

Usually, the most common security feature found in mobile phones is the phone tracing feature in case the instrument has been misplaced, lost or stolen. Another simple security feature is the phone lock code or the pin lock code. Apart from these, the majority of the phone users are not concerned with any security features. […]

SOS Systems Engineering, Integration, and Architecting

Many people would concur that the world is currently an intricate place to live. Much of this assertion is attributed to two events that have begun to dictate our lives in recent years. First, human beings are deeply immersed in unparalleled levels of assimilation and are engrossed in an intricate web of interacting processes and […]

Project Planning and Project Success Relation

Abstract Real Estate Industry in UAE has been experiencing growth of 20% per annum. As demand for housing increases, the industry strives to meet the demand by rolling out multimillion apartment projects such as the one in the Greens at Emirates Golf Club, Dubai. However, such big projects may not meet their goal, especially when […]

Ethics in Computing

In any given setup, an acceptable code of conduct is always emphasized. Many people and entities have become victims of unethical computer use; this thread comes fro people with ill motives. This vice has lately exposed the internet users to unprecedented mischievous tricks of cyber criminals. The act has created various problems, controversies and is […]

Project Management Assessment: Green Park Development in Madrid

Scope Statement The city of Madrid uses landfills as part of its waste management efforts. After landfills fill up, they require rehabilitation. This project relates to the construction of a sustainable green park in Madrid as part of a land reclamation program on a decommissioned landfill. The city council of Madrid is in charge of […]

Using Technology Tools and Media

Introduction Today, in the 21st century, substantial empirical research has shown that the only way to improve student learning and training is to move away from teacher-centered, standardized paradigm predicated upon time-oriented student progress to the learner-oriented, customized standard predicated upon attainment-based student progress (Aslan & Reigeluth, 2013). Research-based innovations, according to these authors, are […]

Three Worlds of IT

This article dwells upon the use or rather effective exploitation of IT. First, the author states that three categories of IT exist (McAfee 3). These are function IT, network IT and enterprise IT. The researcher provides a precise description of the three categories. It is necessary to note that this classification can be very effective […]

Project Management in Hyten Corporation

This is an analysis of a case study about Hyten Corporation, which aims to introduce formal project management to foresee the successful implementation and completion of its projects. In a pursuit to develop a new product, timely delivery of the new product to the customers is paramount for the success of any project. Due to […]

Reflection of Consultancy Project

This document has been created to acknowledge the completion of the project, which focused on brand development opportunities and alternative market strategies for the national banjo manufacturing company. The project specifically targeted its subsidiary. It is a premium quality British manufacturer. Its brand name is known as the ‘The Shackleton Brand. Following a brief summary […]

Technological Advancement: Intellectual Neutral Element

Introduction Thinking process is a vital element in driving performance in institutions especially in the current environment where change is paramount. The process is driven by diverse factors that hold legal, social, economic and technological implications. These elements influence individuals thinking process and contribute in the formulation of credible course of action. Indeed, individuals thinking […]

Project Management Processes that are Common to Technology-Intensive Organizations

Abstract Changing the operation environment of organizations such as competition and technological developments compels such organizations to seek new, efficient, and effective ways of maintaining competitive advantage. In technology-intensive organizations such as IS and IT-based organizations, altering organizational operations to be project-based has made them increase their performance by ensuring that they meet deadlines for […]

Cloud computing Summary

Cloud computing has been gaining popularity for the last few decades. In fact, small as well as large organizations have realized the potential of cloud in saving costs of procurement, installation and maintaining data storage systems. Synchronized sectors, including banking, have realized such benefits in utilizing cloud computing. It is imperative for organizations to make […]

The ethical issues of Genetic Engineering

Introduction Genetic engineering is a scientific achievement that has led to the development of new ethical issues. Genetic engineering has been a subject of controversy because a lot of people are not comfortable with the technology. The ethical issues are more evident when it comes to cases of genetic engineering on the human tissue. Historically, […]

4G Cell Service

Introduction Mobile communication has changed the way people used to communicate. The advancements made within the technology field can be attributed to these changes. Communication has been joined to mobility due to this, thus people are finding it easier to interact without necessarily moving over long distances. There has been increased growth within the wireless […]

Cryptography, Asymmetric and Symmetric algorithms

Abstract This paper presents a detailed study of asymmetric and symmetric encryption and decryption algorithms by focusing on the operations, the strengths, and weaknesses of the RSA and Data Encryption Standard (DES) algorithms. The best characteristics of DES and RSA algorithms can be combined to form a hybrid encryption algorithm to provide the desired properties […]

Ethical Analysis of the Eight Mile Road Hearsay

Restatement of the Facts I work as a nuclear engineer in the thermal-hydraulic analysis department of a company that builds reactors. During my analysis of a power plant, I had a telephone conversation with an engineer at the Eight Mile Road nuclear power plant about an incident that had occurred at Toledo. The power plant […]

Analysis of nuclear engineering topics: Eight Mile Road Hearsay

Facts I work as an engineer at the Thermo Hydraulics Analysis Department of a nuclear power plant. During an analysis of the power plant, I receive a phone call from an engineer at the Eight Mile Road Nuclear Power Plant and he expresses his concern over the current design of the reactor in relation to […]

Written Communication & Critical Analysis Marion Enterprise

Problem Statement Data is important to manufacturing companies like Marion Enterprise. It is necessary in critical areas of the business such as human resource, production and the organization’s inventory. Data is useless without consistent updates. The research problem is to investigate office ergonomics of the data entry center in this organization. The other issues that […]

A Case Study of the iTrust Security Issue

Introduction Information management is one of the most important parts of any organization. To ensure continuity of an organization, proper record keeping should be encouraged. In addition, proper documentation and record keeping of events, personnel information among other things in an organization ensures that the entity is assured of accountability (Raggad, 2010). Effective record keeping, […]

Singapore Airline

Introduction Overview of the Company Singapore Airline (SIA) is a widely recognized and celebrated brand name in the air transport industry for over 50 years. This is attributable to its route network that covers over 90 cities in more than forty countries and up to date air transport system. In addition, SIA is a member […]

How technology changes society

Abstract Road traffic accidents elicit increasing public concerns considering the overwhelming environmental, economic and social impacts. The brutality of these random incidents is specifically disturbing in developing countries. In these countries, the condition is rapidly worsening. Incident Management Systems (IMSs) are suggested as a strong tool that will facilitate the management and harmonization of salvaging […]

Advantages and Disadvantages of Three Different Measures used to Protect Operating Systems

Introduction Computer or network operating systems are faced by various security vulnerabilities that can cause a breach of data or loss of important information. These risks usually arise from networks whereby an unwarranted user can access an operating system without the necessary credentials. It becomes important that computer systems apply various security strategies to ensure […]

Google Does No Evil

Introduction There is an overtly politicization of Google and its functions. Google and its search engine have absolutely changed people’s way of thinking. Google’s search engine has enabled efficiency and immediacy of everything. Whether it is a difficult word, a research topic, a difficult subject, a social or emotional issue, Google’s search engine has answers […]

Unmanned Aircraft Systems and its use.

The modern world has engineered one of the most advanced technologies in aeronautics, as sometimes there is a dire need for Unmanned Aircraft Systems or UAV–Unmanned Aircraft Vehicles. Moreover, it can be used for several things, including geospatial data gathering (Barnhart et al., 2012). This gives a chance to take a closer look at the […]

Skype: All you Need to Know

What is Skype? The word “Skype” underscores a computer service and software application that permits its users to create videos as well as voice calls to someone else at no cost, by means of the Skype network. Nonetheless, some of its features come at a cost (Hanna, 2012, p.241). A number of features of Skype […]

Technology Research Proposal

Technology is a subtle tool for enhancing the effectiveness of various societal systems. In education systems, integration of ICT technology may incredibly aid in shifting learning from the teacher-centered to the student-focused one. In this context, integrating ICT technology into learning coupled with teaching calls for school leaders to focus their strategic leadership efforts on […]

Security Recommendations for Accounts and Passwords

Introduction Security is a very important issue in computer systems and most organizations dedicate significant resources in securing their systems. Easttom (2006) observes that protecting the system’s perimeters from external attacks and installing antivirus software and anti-spyware does not complete the securing efforts. Proper configuration of the machines is necessary for the network to be […]

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

The three fundamental concepts of security are availability, integrity, and confidentiality. These concepts are commonly referred to as CIA or AIC triad which form the main role of any security program. Confidentiality prevents unauthorized disclosure of company’s data and ensures secrecy of the company’s data and information. Confidentiality should be maintained at all times while […]