Operating systems – the choice of Linux as opposed to Windows

Operating Systems Historical Recap: Linux Presently Linux operating system is actually all over. It’s found in phones, cars, refrigerators, Roku devices as well as runs the super computers, the larger percentage of the internet, plus the world’s stock exchange. Its history began back in 1991, with a graduate student, Linus Torvalds who created a new … Read more

Will AI robots end human civilization?

In early March, a Goh game held in Korea attracted the whole world’s attention. Different from any of the previous Goh games, one of the player, Alpha Go, is an artificial intelligence (AI) robot manufactured by Google instead of a human. Before the game, most of the people, including some senior specialists, thought that Master … Read more

Advantages and disadvantages of Cloud Computing for FlixVision

Acting as an International Development officer based in the US[31], for one of the largest non profit, on demand providers of TV programmes and movies that you can stream, FlixVision, it would be a challenging task to recover the company following major streaming disruption over the Christmas period since introducing cloud computing.  The server was … Read more

Multiuse and multitasking systems

A Multiuse System:  UNIX is a multiprogramming system, it permits multiple programs to run and compete for the attention of the CPU. This can happen in two ways:  Multiple users can run separate jobs.  A single user can also run multiple jobs.  The  windows operating  system  is a single user system … Read more

How did Donald Trump make use of social media to his advantage?

Since the rise of the Internet, Apple, Facebook, Instagram, Snapchat, YouTube and Entertainment we have seen a drastic change on how we live and communicate in this new Era. The greed of the industry to pitch ideas, beliefs and new ways of thinking into our society are what rocked the foundation of America and our … Read more

Risk assessment methodologies and frameworks for cloud computing

In [13] a security risk assessment method has beenintroduced based on an Analytic Hierarchy Process (AHP) model. The assessment iscarried out using the principles of: decomposition, pairwise comparison, and synthesisof weights. Thus, AHP has three layers of decomposition: formulating the problem ofassessing cloud security risk in a hierarchical structure is the first step in AHP. … Read more

FSO communication systems

There has been an exponential rise in the demand for broadband applications and services [1, 2]. Optical carrier technologies can be a good solution since they potentially offer huge bandwidth [2-6]. Optical communication has gradually replaced the copper-based access network technologies. Optical fiber has many advantages (low cost, no electromagnetic interference problems, and less power … Read more

To what extent IT organizations apply Green IT in Saudi Arabia? (findings)

5.1 Introduction This chapter discusses the research results and validate model after analysis. It also identified the critical factors after analysis, discuss the findings, and fulfilling research objectives which are as following: 5.2 Critical Factors Identified After Analysis After analysis, the researcher observed that the respondents have identified new factors related to Saudi Arabia’s context … Read more

Storing, mapping and viewing health information

Geographic information systems (GIS) are computer-based systems for the integration and analysis of geographic data. Geographic data are spatial data that result from observation and measurement of earth phenomena referenced to their locations on the earth’s surface. Whenever public health professionals or epidemiologists use disease registries with address information, consider the locations of toxic waste … Read more

Differences in public information presented by local administrative units in Romania.

1. Introduction Public information on data and elements of interest are on the rise in contemporary society (Kassing, Johnson, Kloeber, & Wentzel, 2010) that has identified increased public awareness as a method of achieving its objectives of sustainability (Kendall, 2008) and transparency (Welch, 2012). The need of authorities to inform the public comes derives also … Read more

Deterrence in cyberspace

The concept of deterrence Deterrence is a strategy that is  intended to discourage actions taken by an adversary (a state,  a non-state, an organization, a person) in order to prevent serious consequences.  The concept of deterrence was defined by Paul Huth as “the use of threats by one party to convince another party to refrain … Read more

Android application to make measurement techniques easier

Chapter 1 Introduction to Project 1.1 Project Summary “Mathematica Android Application” provides a facility to measure an object by clicking it’s photo in Android Mobile. We have made the application easier to use and introduce new style of measuring an object. In earlier day we have to carry instruments like measuring tape for measuring an … Read more