Tech & Engineering Essay Examples and Topics. Page 17

4,380 samples

Supply Chain’s Cybersecurity and Risk Analysis

Since there are so many parties involved, it is crucial to assess every part of the process, from obtaining the raw material to the delivery to the customer. Cybersecurity is the critical answer to most [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2006

Amazon Company’s Acquisition Risk Analysis

Since Amazon is one of the largest companies in the world highly sensitive to cybersecurity risks, it would be appropriate for the company to use the best provider regardless of the price of the solution.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2264

Unified Theory of Acceptance and Use of Technology

Nevertheless, the most convenient and affordable is a mobile technology that can work on different operational systems and track the motion of tourists in real time, transmitting data to the Internet server and allowing one [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1119

Social Media: Risks and Opportunities

National Institutes of Health is a medical website for organizing social interactions within the medical community. Meanwhile, the principal goal is to study public health to improve it.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 643

Websites and Social Media Risks

WHO champion health and a better future for all; WHO is funded by the whole world; WHO focuses on pandemics to inform people; WHO has its newsroom to help people.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 594

Education Differences Between Generations

In the modern age, technology development has led to the integration of internet research that was not there in the past in the education system.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 337

Network Protocols and Network Services

The Learning Activity titled "What Are Network Protocols and Network Services?" informs that the concept of a network service refers to the application that operates at the level of the network.
  • Subjects: Applications
  • Pages: 1
  • Words: 317

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Big Data in Enterprise Learning

The emergence of essential concepts in the field, such as big data, allows companies to analyze their employees' behavior and predict its future patterns for better planning in the long run.
  • Subjects: Data
  • Pages: 1
  • Words: 281

Cybersecurity Workforce in Emergent Nations

The lack of help from developed countries in the training and education of a cybersecurity workforce for developing nations can negatively affect the former. Public and private organizations also contribute to the development of cybersecurity [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 831

Issue Specific Policies: Remote Access Policy in RCR

First of all, it applies to all situations in which the remote access to the company's data is implied. The user is to control the duration of each remote access session by logging in and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Importance of Army Cybersecurity

This includes bringing awareness to the cybersecurity issue, involving more people to combat the problem of cyberattacks, and organizing the information based on specialty and tasks that must be completed.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1114

Cybersecurity Strategy and Plan of Action

Padgett-Beale's primary intention of merging the company was to relocate the call epicenter to a property owned by the company roughly 10 miles from the company's previous location and opposite the newly released Padgett-Beale resort.
  • Subjects: Cyber Security
  • Pages: 26
  • Words: 7197

Augmented and Virtual Reality for Modern Firms

The business environment is not an exception, as firms seek to maximize their value through the implementation of high-tech solutions. AR is another major component of contemporary professional training, as it contributes to the better [...]
  • Subjects: AI
  • Pages: 1
  • Words: 348

Smartphone Blackberry Company

Another important feature of the smart phone is the QWERTY keyboard, which is the same as that of the normal computer.
  • Subjects: Phones
  • Pages: 4
  • Words: 1149

Cybersecurity in the Energy Sector

The stable supply of energy is the key to the normal functioning of American society, as it fuels all essential industries that ensure the vitality of the nation.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 630

Effect of Technology in Networking

The adoption of technology in this particular domain extends boosts the standards of the transmission and circulation of data. Second, the learning and application of technology in networking will bridge the gap between the physically [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 362

Importance of Data Analytics in Digital Marketing

Data analytics is the collection and analysis of customer data, including their needs, tastes, and desires to improve marketing strategy. It is a fundamental part of a digital marketing strategy and has numerous advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 293

Cyber-Physical Systems for Buildings Management

The 2016 attack forced the FBI investigation, which revealed that the growing implementation of the IoT was beneficial for cybercrime due to the unsecured data storing and dependence on an external computer or system. Data [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 559

Big Data and Distributed Databases

Big data refers to a type of set of information that requires memory beyond the capacity of the conventional relational databases.
  • Subjects: Data
  • Pages: 1
  • Words: 336

The Value of Network Effects

The value of network effects increases when the product is used more, which is evidenced by popular social media sites like Facebook and Twitter. Network effects compel certain companies to increase the functions of their [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 307

Airport Planning and Management

This paper discusses the issues of airport capacity and delay and the related causes. Lack of capacity is a term commonly used to refer to the cause of the airport delay.
  • Subjects: Aviation
  • Pages: 3
  • Words: 920

The Multiple Object Tracking in Surgical Practice

The investigation below entails summaries of some findings of the MOT in a surgical exercise. Voluntary exercise of the assignment is centrally critical in the system of knowledge.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 950

Researching Facebook Terms of Service

Other areas are the respective rights and responsibilities of the users and the company, additional provisions, and links to other potentially relevant Terms and Policies.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 407

Cybersecurity for Open Data Initiatives

Governments continue to play a vital role in the open data movement.Data.gov was developed under OPEN Government Data Act; this is Title II of Foundations for the Evidence-based Policymaking Act.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2048

IT Process at the Company “Google”

Research of the IT process at "Google" is the key idea to be considered in this paper."Google" is known for its innovative technologies, fast and straightforward search engines, software, equipment, and progressive methods of working [...]
  • Subjects: AI
  • Pages: 2
  • Words: 584

Aspects of Smart Technologies

It is also possible to promote the collaboration of citizens, organizations, and the government via smart technologies. Another method to improve the environmental situation in the city is the implementation of eco-friendly public transport.
  • Subjects: AI
  • Pages: 6
  • Words: 1736

How Technology Is Changing Our Minds

Modern communication the way how individuals establish and maintain relationships is affected by the mentioned factors to a great extent, and, of course, there are is a plethora of advantages within the scope of the [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 287

Chaos Theory. Visual Representation in Video Games

Currently, only rough concept designs of levels are available, and we plan to polish them up further and work on the visuals to create a dark and gloomy atmosphere. Novel puzzles will be designed and [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 295

Researching of Search Engine Optimization

Samsung is the most interested in Bangladesh, Guana, and Nepal since this brand focuses on the relatively free markets of developing countries.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 387

Technology and Society Relations

Consequently, the use of technology in its current form increases the oppression of vulnerable groups in society. However, despite the pessimistic claims of people like Benjamin, technology still positively affects society, and there are many [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 395

Information Systems in a Business Startup

For example, the integration of a marketing IS decreases the difficulty of choosing the best marketing channels for the startup the managers can rely on the collected information and see which media are the most [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 834

Risk Management and Aviation Safety

It is the responsibility of the accountable manager and the senior management team to promote positive behavior and the correct implementation of the safety culture.
  • Subjects: Aviation
  • Pages: 1
  • Words: 291

Drone Technology and Its Role in Logistics

Currently, the logistics industry is profitable and attractive to many companies globally due to the use of drone technology in improving service delivery to customers.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2219

Food4all Firm’s Smart Sensors and the Internet of Things

This report analyses how Food4all can integrate IoT and smart sensor technology in the preparation, storage, packaging, and delivery of food parcels to ensure the safety and quality of their products.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2417

Using AI Emotional Surrogates to Overcome Loneliness and Trauma

These statistical findings underpin the pervasiveness and severity of the crisis, necessitating the adoption of such innovative interventions as artificially intelligent emotional surrogates to alleviate the loneliness and associated trauma. Despite the sophistication and level [...]
  • Subjects: AI
  • Pages: 9
  • Words: 2515

Protecting Digital Assets Overseas for U.S. Companies

The question of how U.S.companies can protect their digital assets can be answered by examining available protection frameworks and how to take advantage of them The U.S.government offers cybersecurity for its companies both domestically and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 573

Databases in Workplace: NoSQL Databases

The purpose of this research paper is to find a NoSQL database that can be used in a working environment and how the organization may benefit from the application of the new model of the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 841

Aspects of Airport Advertisement

The sponsor's principal role is to provide funding and resources for the airport's operations and decision-making on the quality of its services.
  • Subjects: Aviation
  • Pages: 1
  • Words: 352

Notepad++ as a Free Editor for HTML Files

They should locate the HTML file that they want to view, click on it with the right button, choose "Open with," and select a preferred browser.
  • Subjects: Programming
  • Pages: 1
  • Words: 297

Sensitive Data Exposure

In addition to that, even the possibility to reach backups of the discussed information can increase vulnerability. Attackers can get into the conversation of two parties and obtain access to the information they were willing [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 745

Toughness and Corrosion: Definition and Unit

Therefore, the more the energy required to break a material the tougher the material and the lesser the energy required to break the material the less tough the material.
  • Subjects: Engineering
  • Pages: 3
  • Words: 616

M-PESA: Critical Success Factors

Generally, consumers preferred mobile payments on paying for services and transfer of money wherein most of them enjoy the convenience of the technology and this was the initial value point considered by the consumers. The [...]
  • Subjects: Phones
  • Pages: 6
  • Words: 1058

Artificial Intelligence Investments in the UAE

One of the components of the strategy is to support the heritage of the country's founding fathers, which means the UAE has to remain among the most advanced nations.
  • Subjects: AI
  • Pages: 7
  • Words: 1962

Digitalization and Data Policy for National Security

In this paper, the aim is to analyze the impact of digitization on data policy for national security in the United Arab Emirates, specifically focusing on the correlation between digitization, cyber-security, and artificial intelligence.
  • Subjects: Cyber Security
  • Pages: 23
  • Words: 6207

The Million Dollar Page: Why Is It Popular?

Lastly, online advertising's effectiveness was still questionable and difficult to measure; thus, in 1999, Alex's idea would not get enough customers to fill the one million pixels.
  • Subjects: Internet
  • Pages: 1
  • Words: 295

Cyber-Security in Small Healthcare Services

Ensure accurate understanding of cyber-security to small businesses offering healthcare services. As a result, small healthcare firms will require cyber-security frameworks to keep unauthorized individuals out of the systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 558

Information Governance Course and Practical Connection

The author of this paper believes that the use of the mandatory access control model, in which each user is given a digital label, is appropriate to solve the problem of providing specific data for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 890

AppMaker: Threat Agents of Web Attacks

These factors are the capability of the agent, the motivating factor, and the opportunity to attack. This is the main reason most security agents are consistent in exploring web applications with hopes of identifying complicated [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 854

The Role of Technology in Human Capital Management

The two items mentioned can help relay visual information to people in a more accessible manner, enabling them to experience an image that is easier to comprehend and closer to reality than many other modes [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 275

Security Architecture: Handling Sensitive Data

Due to handling data that could be a danger to the business if obtained by its competitors, the business intelligence and analytics system itself is considered sensitive.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 838

Guidelines for Evaluating Research Articles

The title is a topical heading that captures the focus of the research paper. It highlights the purpose of the paper, the key concepts discussed in the paper, or the outcomes of an experiment/study.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 2120

Logic and Design: Flowcharts and Pseudocode

The basic understanding of logic and design is that processes should be presented in a way that demonstrates certain algorithms, i.e.the description of a process should be precise and should contain detailed instructions on what [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 590

How Do Vacuum Cleaners Work?

Regardless of the type, the mechanics of the vacuum cleaners is that while the engine is running, traction is created in the device, by which garbage, dust and dirt particles are sucked through a long [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 654

How the Carbon Absorb the Chemical Harmful Agents

Each of the processes is particular, and can be viewed in the following steps: carbonizing the organic precursor material to carbon of modest internal surface area in the range of tens to hundreds of square [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 686

New “Business” Technological Developments

Big companies, such as Amazon, are trying to harness the power of drones and realize their potential to the fullest. If the effort is successful, the blocks are added to the network, and miners receive [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1930

Mistrust for Results of Big Data and Possible Solutions

However, the number of Big Data challenges using leave concrete reasons for executives to mistrust the analysis results. This challenge is attributed to the complex nature of Big Data and the need for scalability and [...]
  • Subjects: Data
  • Pages: 1
  • Words: 390

Layering and Encapsulation Security Design

The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures. Thus, it is an example of a wrong solution to the world.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 720

Evaluation of the Marketing Mix

"The Race of the Hemispheres" is a video game produced by the Adaptable Home Products Company. As it has been mentioned in the introductory section, AHP sells a video game called "The Race of the [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 838

Working in Virtual Worlds

According to McLennan, it appears that the advent of the virtual world of work that enable more productive virtual environments will increasingly remold the workplace to allow collaboration and connectivity.
  • Subjects: Internet
  • Pages: 2
  • Words: 585

Digital Privacy in an Information Technology Age

Such software could allow collection of private information for instance by evaluating the information that employees send through the company's information systems.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1129

The Process of Knowledge Transfer

The background includes a discussion of CFCL, CFCL's SOFC, and intellectual property protection for CFCL's SOFC. In addition, the scope of use of CFCL's SOFC is known and accepted, that is, if used in the [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1632

Encryption, Stenography & Cyber Criminal Terrorist

The internet and the ICT system as a whole are vulnerable to cyber attacks. This is the method of using to trademark to protect our images and copyright on our intellectual properties.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 580

New Atomic Power Plant Under Construction in Georgia

This will cover the process right from the issuance of the construction permits, the construction process, the size of the output, the type of reactors to be used and the safety measures installed.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1365

Imaging Speed in Biomedical Engineering

A substitute for this in achieve the high speed requirement involves the use of a video rate laser scanner which would have an added advantage of being able to control the size of the aperture [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2751

Analysis of the Basic Attacks That Occur in Cyberspace

One of the risks associated with the use of the internet is the attack of cyberspace. Meanwhile, the FTC was suspicious of the activities carried out by Fortuna Alliance and in May 1996, it begun [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2048

Evaluating for Trends and Gaps in Analyzed Data

The identification of trends and gaps in available data is a vital part of the project implementation because it may be necessary to modify the approach depending on the situation.
  • Subjects: Data
  • Pages: 4
  • Words: 1216

The Structure of Major US Air Carriers

Some of the major airline carriers in the US are Southwest Airlines; American Airlines; Delta Airlines; Continental Airlines; and United Airlines.
  • Subjects: Aviation
  • Pages: 3
  • Words: 852

Internet Resource Evaluation

To this end, it is clear that the website I have evaluated is a useful resource for getting financial information on the type of investment to pursue.
  • Subjects: Internet
  • Pages: 2
  • Words: 551

Mobile Computing Technology and Accounting

Issues addressed include importance of the concept in the businesses today, the effects of mobile computing on accounting as well as business system, the relation of the technology with emerging technology and the future impact [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 657

How Do Hybrid Cars Work

The branch supports hybrid cars because they help to protect the environment through the reduction of emissions to the atmosphere and use of less fuel.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Object-oriented Programming. Java and C++ Programming

Besides, software engineers are required to understand the languages that are suitable for object orientation since not all languages can implement the OO programming concepts. In other words, classes are used to implement the concept [...]
  • Subjects: Programming
  • Pages: 4
  • Words: 1227

Aviation Weather: Atmospheric Pressure

On the other hand, temperature changes the air pressure; therefore, altimeters mostly indicate an altitude different from the true altitude. Thus, the altitude of an airport is the most meaningful altitude to a pilot.
  • Subjects: Aviation
  • Pages: 2
  • Words: 549

Information Security Services for Business

Authenticity: This means that the information security system of an organization should be able to validate data, communications, as well as, transactions and the parties involved so as to ensure that they are genuine.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 924

The Website Caters to Technology Enthusiasts

Unfortunately when it comes to looking for archived articles that are beyond product reviews such types of information require a bit more searching however the website does provide a search bar near the site header [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 725

Effect of Sea Water and Corrosion on Concrete

On the other hand, substantial tautness, for instance due to meandering will shatter the tiny firm pattern, ending up in fracturing and disjointing of the concrete.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4001

Automotive Manufacturing Engineering Processes

Most of the gangs live in the small towns and cities and for this reason, the authorities in such towns and cities must learn the best strategies to use in trying to eradicate the influence [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1384

Technological Advancement: Automatic Vehicles

In the past decades, people complained of the quality of vehicles that used to be produced. Advancement in technology has led to most of the operations being mechanized.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2251

Routing Protocols for Wireless Sensor Networks

This has motivated serious research in recent years addressing the possibility of cooperation among sensors in processing data and the management of the sensing events and flow of information to the sink.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4283

Positive Influence of AI on Business

The majority of use cases are related to business and manufacturing, making it much easier for organizations to make sure that their improvements are beneficial to business [1].
  • Subjects: AI
  • Pages: 1
  • Words: 362

Course Practical Connection: Operations Security

A company should structure the management, information, owners, for instance, clients and suppliers, and users of the information correctly, to enhance the handling of both hard and soft copies. It exposes both the client and [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 863

Sifers-Grayson Company: The Cybersecurity Breach

Finally, the recommendations, as per the improvement of the incident response capability, are introduced to ensure the elimination of the identified drawbacks and the compliance of the engineering company with the security requirements presented by [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1380

Management Information Systems (MIS)

The advances in the evolution of devices and the achievement of a new stage of development critically impacts MIS and creates the basis for the emergence of multiple changes towards the achievement of better outcomes [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 573

Loyalty Cards and Privacy Relations

According to them, it is virtually impossible to guarantee that the data in question will not be stolen, and the only way to mitigate the risks is through digital privacy education.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 285

Examining the Human Activity Influence on the Earth

To be more specific, some of the most valuable contributions to maintaining life on the Earth imply the increased number of organizations and communities that aim to solve the existing environmental problems.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 308

Technology and Its Impact on Education Process

Technology provides the opportunity to involve categories of students with different abilities and pace of learning in the process of progressive education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 349

Malware and Social Engineering Attacks

Social engineering attacks date back to the advent of the Internet, and before that, criminals were using the telephone to masquerade as trusted agents to obtain information.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1226

Airport Operations and Cargo Transportation

Considering the significant number of employees in an airport, and the importance of areas restricted for security reasons, staff identification is a crucial part of an airport's landside security.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Acme Corp.: Designing a Better Computer Mouse

The approach that the company is taking toward the early stages of the development process is to only include design engineers and brainstorm ideas.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 558