Tech & Engineering Essay Examples and Topics. Page 28

5,642 samples

Cloud-Based Solutions for Individuals and Businesses

There are a number of cloud-based solutions that enable users to process and store data using remote servers. The Achilles heel of these solutions is that they are vulnerable to a security breach.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 558

Thermal Imaging and Its Industrial Use

Moreover, the paper also looks into the importance of thermal to the industries that use them and to the extent to which thermal imaging has revolutionized progressed firms.
  • Subjects: Engineering
  • Pages: 11
  • Words: 3145

Controlling Fully Automated Cockpit Systems

Human operators often question the commands of an automated system because one cannot control the "indirect" mode changes of the system."Indirect" mode changes impede teamwork between operators and automated systems."Automation surprises" is a term used [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 576

Information Technology in Operations Management

In spite of the difficulty to automate driving in roads with heavy traffic as correctly observed by Levy and Murnane, the challenge of building a computer that can substitute for human perception and pattern matching [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 823

The Design of the Communication System

This will ensure that in case of failure, the base station is notified and corrective signals are sent to the weather station.
  • Subjects: Programming
  • Pages: 7
  • Words: 1952

The Trade in Data as Business

The trade in data has in the recent past become a booming business considering the fact that it runs unregulated and it is done without the consent of the victims.
  • Subjects: Data
  • Pages: 2
  • Words: 559

Warmley Conservation Area Analysis

The prominent features in the area consist of the Warmley House, gardens, Clock Tower, Windmill Tower, Icehouse, the Grotto, the Mound, and a former 13 acre lake called Echo pond.
  • Subjects: Internet
  • Pages: 4
  • Words: 1192

Information Literate Society Issues

Information literacy skills that are taught by librarians are important to students in their jobs and lives, and this makes the task of visiting a library for students an inevitable one.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 613

Connectivism as a Learning Theory

From this point, it is important to discuss assumptions of Connectivism regarding the nature of learning, the nature of learners, and the character of knowledge among other aspects from several perspectives, including the views of [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1129

Singapore Airlines Mission, Image, and Purposes

To sum up, SIA's activities in the implementation of new technologies, customer service innovation and excellence policies, and human resources development secure the company in the highly competitive industry.
  • Subjects: Aviation
  • Pages: 3
  • Words: 875

Visible Spectrum: Discovery, Development, and Applications

The visible spectrum was discovered in the 17th century and studied throughout the late 18th and early 19th centuries as technology advanced, and today knowledge of the visible spectrum has found use in many areas [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 552

Are We Scientific Experts Now?

This way of thinking is similar to what can be seen in the book "Are We All Scientific Experts Now" by Harry Collins wherein instead of a deteriorating belief of the public in the capabilities [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 737

Cloud-Based Systems: History, Applications, and Prospects

The main theme of the paper is the potential of cloud manufacturing and the current developments in that field. The article also describes the history and the current state of the cloud-based systems.
  • Subjects: Cloud Computing
  • Pages: 8
  • Words: 2200

Risk Formulating Information Systems Strategies and Plans

I know of a company that has failed to implement the updated security protocol after the security team failed to communicate the importance of the changes and the other employees protested the banning of certain [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 901

Project Management: Masdar City Project Success

To determine whether the Masdar City site was a success it is important to evaluate what the goals of the project were, if it succeeded at them and if it met the criteria above.
  • Subjects: Project Management
  • Pages: 3
  • Words: 921

The Hacker Subculture Nature and Allure

The Internet connected people all around the globe and changed the face of the society forever. However, with the development of the computer networks, the meaning of the term started to change.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1697

Dubai Wi-Fi: Connectivity and Communication in Public Spaces

Given the general goal of the project, the associated objectives include locating the public places where Wi-Fi connection will be provided and locating the activities for the feasibility study that will prove the potential of [...]
  • Subjects: Project Management
  • Pages: 27
  • Words: 4396

Visual Display of Data: Exploratory Data Analysis

Exploratory data analysis forms the basis of confirmatory statistical analysis because it plays a significant role in the characterization of variables, summarization of data, and visualization of patterns and trends.
  • Subjects: Data
  • Pages: 3
  • Words: 490

Machine Translation Accuracy: Google Translate

According to Sreelekha, Bhattacharyya, and Malathi, the market for the technology will grow in the future, and translation speed, cost, and quality are all significant factors in the success of an application.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 971

Regulatory Compliance and Industry Standards

The safety policy outlines the responsibilities, accountabilities, and requirements of the SMS. Information security is of the essence in the aviation industry to facilitate data sharing.
  • Subjects: Data
  • Pages: 3
  • Words: 909

Data Protection Mechanisms

Data encryption is an effective protection mechanism that is used to safeguard data in transit, at rest, and at the endpoint.
  • Subjects: Data
  • Pages: 3
  • Words: 862

Color Map Pattern Method

If as a result of the test, it will be possible to reconstruct the original image using the data that in the process of running the sequence was stored in an array.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 567

McAfee Labs Threats Report: August 2015

The authors of the report also note that the existence of TOR and Bitcoin significantly increases the capabilities of criminals to remain undetected.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 850

Analysis of Cisco’s Smart Cities

Cisco's current and future projects are related to the development of smart cities which can be characterised by the use of the Internet of Things in virtually every system of the urban area.
  • Subjects: Data
  • Pages: 3
  • Words: 912

Tablets for Rehabilitation of Prisoners

The management teams of correctional facilities monitor the tablets to ensure that inmates use them appropriately. They keep the inmates productively occupied by allowing them to communicate with their families and attain knowledge and new [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 556

Cyber Preparedness in Emergency Management

Cyber security became one of the fundamental constituents of emergency management's preparedness, mitigation, response, and recovery stages, and quick restoration of IT systems and recovery of organizations were discovered as the major duties of FEMA [...]
  • Subjects: Cyber Security
  • Pages: 21
  • Words: 5750

Risk and Vulnerability Management and Assessment

The primary school in the community is across the river. It also has a risk department which helps to ascertain the veracity of the dangers in the community.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 596

Autonomous Vehicles: The Ethical Operational Parameters

Given the long process of developing a precedent base, the ethical principles of the operation of autonomous vehicles will help legislators to develop appropriate regulations on the division of responsibilities between the manufacturer and the [...]
  • Subjects: Other Technology
  • Pages: 13
  • Words: 3765

The Identity Theft: Statistics and Research

Therefore, both the problems in the current framework for keeping personal information safe and the promotion of technological awareness among the target audience have to be researched.
  • Subjects: Data
  • Pages: 1
  • Words: 314

Windows Logs: Improving Cybersecurity

The specified event points to the need to configure the current settings of the master browser in order to address possible security issues and close the loopholes that potentially make the computer vulnerable to malware.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 305

Smartwatches: Computer on the Wrist

Smartwatches are deservedly said to be popular devices nowadays because they provide users with a lot of useful functions and opportunities.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 310

Geographic Information System (GIS) in Network Analysis

Second, the location of the residents and facilities within the catchment area is determined, and compare the ratio of the residents to the number of facilities as well as the time distance between the two.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1986

Cybersecurity: Weak and Strong Passwords

The strong passwords have a low probability of being guessed because the amount of possible iterations and combinations is extremely high.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 287

A Promising Web-Based Business in Dubai

It includes an analysis of the external environment and industry, customer segmentation and value proposition, business strategy, digital marketing, revenue streams, and website interface design among other topics in an exploration of the possibility of [...]
  • Subjects: Internet
  • Pages: 16
  • Words: 3007

Simulation in Petroleum Engineering and Development

Using a computer model, the simulation attempts to mimic the appearance and behavior of the well through mathematical and physical computations in the attempt to describe the active geological processes ongoing in the reservoir.
  • Subjects: Applications
  • Pages: 2
  • Words: 614

Digital Education: The New Bibliophobes

The second chapter of the book is just a wonderful revelation of the contemporary literacy situation in the society among youth.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 842

Impact of the Advent of Automobile in America

This realization has brought the idea for the need for preservation of the wilderness in its natural form in order to ensure that the future generations would have the opportunity to enjoy the scenery and [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1435

Importance of Software in the Manufacturing Industry

There are however several challenges that must be addressed for the manufacturing industry to be a success. The challenges that must be tackled are those to do with the costs of manufacturing and the time [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 999

Maintenance Services in Industry

There is the management that involves the supply of equipment, machinery and other auto parts while the other maintenance is for the supply of materials that are solely used in the industry for the customers.
  • Subjects: Engineering
  • Pages: 2
  • Words: 303

Qualitative Data Analysis Recommendations

All a researcher should do is to open the file in the software itself, underline the piece to be coded and haul the code from the code administrator.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 923

Design Team for Bed-To-Wheel-Chair Transfer Device

His role in the design process of the bed-to-wheelchair transfer device will be the identification and application of engineering concepts used in the medical field that are relevant to the project.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

“Evolution of Federal Cyber Security” by J. Roth

Even after training, the GAO report continued to demonstrate system control deficiencies due to failures in the identification of enough boundary security mechanisms, breakdown in the need to know, insufficient restriction of physical access, and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 592

Massive Resources: Trasing the Dynabook

The conception of the "Dynabook" developed by Alan Kay is both a set of actual technological solutions in the area of computer programming and IT technology, and an idealized and sublimated vision of technological matters.
  • Subjects: Programming
  • Pages: 5
  • Words: 1385

The Universal Design for Learning Solutions Plan

However, it is important to note that before the appropriate AT services and devices are provided to the disabled learners, it is important to carry out an assessment on the UDL of the students to [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 598

A System for Controlling the Flow of Traffic

The system should meet the maintainability goals and the maintainability requirements. The system should also optimize fault localization and fault monitoring capabilities in order to support the maintainability requirements.
  • Subjects: Engineering
  • Pages: 2
  • Words: 655

Competitor Companies: YouTube vs. Google Video

The restriction of user-generated content to the use of a downloadable plug-in from VideoLAN had an irreversible effect on the growth of the site since it troubled many users in its operation and hence necessitated [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 900

Mars Reconnaissance Orbital

Some challenges were encountered with two of the devices mounted on the Mars Reconnaissance Orbiter in November. The HiRISE installed in the Mars Reconnaissance Orbiter has shown over time that, it is of great importance [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 551

Facebook Addiction Problem Overview

This paper is an in-depth analysis of the risks that Facebook poses to children and the steps that parents should take to ensure that their children do not become victims of Facebook use.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 839

Xbox Project: Kinect Opportunities

New markets could be a big opportunity for the company if it were to explore them first before any of its competitors.
  • Subjects: Project Management
  • Pages: 3
  • Words: 805

The Five Factor Model: Technology Acceptance

In addition, the authors propose a dispositional outlook to comprehend user attitudes and beliefs, and investigate the impact of user personality on both the supposed importance and of the subjective practices towards the acceptance and [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 864

The Bart’s Basic Boating Database

Table 1: List of fields in Inventory table and their description Another of Bart's Basic Boating information needs is keeping track of sales made by the company.
  • Subjects: Data
  • Pages: 2
  • Words: 867

IT Investment and Productivity Paradox

With increased investment in IT in the production, manufacturing and service sectors of economies there is a need for assessing the level of production of the technology to firms.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 793

Soft Systems Methodology in Problem Solution

This methodology is applied in analysis of the challenges facing Ugenya Co.Inc.specifically it's used in analysis of the use of information as well as information flow within the corporation.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2586

The Effects of Technology on Our Life

First, to demonstrate how technology has taken up the role of directing people's actions, she uses the example of the balloon that appears at the right bottom side of the computer.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 874

Business Information System by Google Docs

Department managers share the requirements, recommendations, list of criteria, and deadline information for the developers. Processing of the online stored information is performed online, and hard copies are processed by workers responsible for processing any [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1607

Improving the Response to Marine Emergencies

However, we still need to facilitate this process, for instance, by informing the National Fire Service about the implementation of this project and its results. These are the most objectives that have to be attained [...]
  • Subjects: Project Management
  • Pages: 8
  • Words: 2221

The iPad Tablet as Technological Needs

The availability of a large internal memory maximizes the use of the gadget for this function. It is notable that the device also caters to entertainment needs of the clients.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1190

IPod Product as a Media Devices Market Development

The aim of the paper is to analyze the iPod product in the context of media devices market development, and argue on the matters of product popularity within the consumers.iPad may be regarded as the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 558

The iPad Isn’t Just Fun and Games

It is noteworthy that the iPad is a revolutionary product with numerous implications for those in the business world. While several negatives have emanated from different quarters, the general feeling, and expectation is for the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 527

The Project of Improving Online Fire Prevention

The aim of the present document is to summaries the information collected to start the project of improving online fire prevention information for businesses.
  • Subjects: Project Management
  • Pages: 8
  • Words: 2248

HDRI and Tonal Mapping in Photography

The science of High dynamic range imaging has developed the dynamic range of processing, transmission, and representation of imaging photography beyond the traditional forms.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 523

Design User Interface for a Mobile-Phone Application

The paper is developed in order to actualize a user friendly iPhone which will enhance the following: Intuitive interface searching for professional development tools; Utilize all the feature and functions in the iPhone; A lot [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 2208

Project Risk Management of Cloud Computing

To national policymakers understanding the economic disequilibrium helps in developing predictability of the market behavior which is important in establishing an operational budget policy that can cope with the disequilibrium particularly by influencing their planning, [...]
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1058

Curve-R: Accessing R-Language Through the Cloud

The reason behind this project is the fact that many countries in the UAE lack the capital and the expertise to sponsor their students and researchers to developed countries and that they learn the statistical [...]
  • Subjects: Cloud Computing
  • Pages: 17
  • Words: 3882

R-Language Software: Efficiency in Use

Due to the fact that most of the users of the software are in the IT segment, interactive conference and seminars about the service is the best approach in marketing the software and also providing [...]
  • Subjects: Programming
  • Pages: 3
  • Words: 789

Role of It in Hastening Communication and Flow of Information

The very use of these technological gadgets eliminates the need of hiring more staff to enable communication and hence reduces the number of individuals that are to be held responsible during any form of communication.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1410

Contemporary Issues in GMB. Several Aspects

Two aspects that can be specifically mentioned in the context of business are globalization, namely, the expansion and the integration of economic activities into world market, and the rapid technological changes. How the technology serves [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1064

Court Case of Swain vs. Geoffrey Osborne Limited

The court was to resolve whether the defendant and the second defendant were liable for personal injuries sustained by the lorry driver in the accident. On the day of the accident, the driver had driven [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 708

Information Management: Photo-Sharing

The purpose of this report is to outline the potential impact of the technology of photo-sharing on the sector of Non-Governmental Organizations.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1113

Introduction to the Private Security

Detection basically involves finding out the possible threats, the second step is protection which involves coming up with means of preventing the possible threats from occurring, and finally reacting to the threats by means of [...]
  • Subjects: Computer Security
  • Pages: 4
  • Words: 655

Internet as a Communication Tool

In my form, I have undertaken tests which were both related to the application for writing positions The tests are SDIS and involve speed and critical thinking which if not taken with the care of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 908

Technological Facilities: Computers in Education

The researcher chooses the students who study in the high school stage to investigate the issue of computer usage in high schools Physics classrooms in Saudi Arabia because different computer software is highly beneficial for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 842

Network Infrastructure Upgrade: Selection Process

As one of the top management team members, I was involved in advertising a job for a suitable company to write a proposal report and present to us so that we could evaluate them and [...]
  • Subjects: Other Technology
  • Pages: 11
  • Words: 3501

Generation Y: Beta Testers for Prestige

It is, therefore, of little surprise that it is this generation and this age range that gave way to the development of 'beta' modes.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 724

System Safety Engineering: Hazard Analysis

According to the authors, FMEA can be utilized in the industry for the purpose of identifying "potential failure modes, and their causes and effects" on the performance of the system in engineering management.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1807

Nuclear Life Cycle: Hazards and Risks

Other processes that includes in the aspect is the subsequent cleaning of the systems that were used in the processes of the plant and which are "contaminated radioactively", the removal of the unused radioactive fuel [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2642

Cyberbullying as a Serious Issue

However, it is easy to postpone the completion of the course work and take a longer time to complete a course.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Computers’ Critical Role in Modern Life

The manner in which the military operates in the modern world has completely been influenced and revolutionized by the use of computers.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2909

The Internet, Globalization and Network Society

The embracing of the internet's usage as a means of communication in the future will depend on the evolvement of people's quality of online relationships and the amount of time people are bound to be [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 836

Communication Process: Mobile Phones as Fashion Statements

In general, the research may be regarded from the perspectives of the communication process development, as the importance of cell phone communication should not be underestimated, and the influence of this communication on other aspects [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 561

Reliance Levels in Web-Based Applications & Offline

For one to succeed in any area of life, one needs to have the self-assurance that you can perform the intended goals and be persuaded that no matter the limitations that may come forth you [...]
  • Subjects: Technology Effect
  • Pages: 25
  • Words: 6985

Net Neutrality: Freedom of Internet Access

In the principle of Net neutrality, every entity is entitled access and interaction with other internet users at the same cost of access.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1239

John Searle: Can Machines Think?

He says that according to strong AI, the computer is a mind if it is well programmed, that is, it can be said to understand things if it is given the correct programs.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 1001

Software: Product or Knowledge?

The software however is the product of the knowledge. Likewise software is a product of knowledge in programming but it is not the knowledge itself.
  • Subjects: Programming
  • Pages: 3
  • Words: 952

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Expansion of Optus Mobile

It is for this reason that I have chosen to write a report including a case study of the working of the mobile industry in Kenya, so that Optus, the company I am working for [...]
  • Subjects: Internet
  • Pages: 11
  • Words: 3860