Records management

INTRODUCTION            Records management is the systematic control of all records from their creation or receipt, through their process, distribution, organisation, storage, and retrieval, to their ultimate disposition. Records management is fundamentally supported by record keeping activities to ensure records are properly captured and retrievable in a reasonable response time. Records management has existed from … Read more

Government surveillance through the internet and satellites, and how it invades our privacy as citizens?

In this month of October alone, there have been a reported 7 terror attacks across the globe. Over the last two decades, we have seen an unparalleled level of instability across the globe. Breitbart news reported on the 14th of June 2016 that since the September eleventh atrocities, the world has seen the harsh reality … Read more

Linux Mint memory management

While not a unique feature to Linux Mint this operating system stores nearly everything it can in RAM such as kernel data, user application data, and mirroring data stored on the disk for faster access. The reason it does this is, to most linux systems empty RAM is wasted RAM. From the user level this … Read more

Censorship of the Internet

A) Internet is the global communication network that allows almost all computers worldwide to connect and exchange information. It all began with the development of electronic computers in the 1950’s. The origins of the internet date back to the 1960’s when research was commissioned by the US government. ARPANET was funded by the US military. … Read more

Healthcare Breaches: An Evolving Threat

Abstract A data breach refers to the situation in which any unauthorized parties access sensitive information. Data breaches in the healthcare industry have been increasing due to the increased value of personal information obtained from these areas. Personal information in the healthcare industries includes names, social security number, Medicaid numbers, street addresses among other details. … Read more

Should space exploration be our priority?

The Pandora’s Box that is space holds vast mysteries that mankind has yet to yield. The start of space exploration in the 50’s marked a turning point in American history, and as a result of the new scientific innovations in space, human’s knowledge of earth, the atmosphere, and beyond has increased astronomically (Kalam). However, in … Read more

Libraries as local centers of information & knowledge/passages to national and global knowledge.

Chapter-1 Introduction 1.1 Introduction Over the times, the community has trekked diverse phases. First it was agricultural society where agriculture was the dominant force for development. This was followed by industrial phase as there was a sudden increased growth in industrialization. Then the revolution in information technology which made the society to force forward and … Read more

Everest Simulation Report

Executive Summary Everest simulation is an online group task which requires participants to take a variety of roles, and collaborate for achieving both personal and team goals. There are two attempts of simulation, that one is completely virtual, and the other one is required to have face-to-face communication. The result of first climb was not … Read more

Network Management – Fault Management

Like most things in Management there will always be some things that work and others that fail, which is why when performing Network Management, you need to be able to quickly detect and rectify the faults with the network to prevent downtime and limit impact on the User Experience process. Fault Management provides a range … Read more

Forecasting model for vehicular accident cases (proposal)

Chapter one Introduction BACKGROUND OF THE STUDY One of the factors identified and considered as a major contributor of death in Ghana is vehicular accident. Vehicular accident can therefore be defined as the collision of a vehicle with another vehicle, animals, pedestrians, or any other object.  And this can lead to loss of life, damage … Read more

Automatic rule checking

Automatic rule checking is becoming more and more important in the build environment. It has been identified as potentially providing significant value to the AEC industry from both regulatory and industry perspectives (Solihin et al, 2015). Regarding construction-specific applications, researchers have looked into regulation compliance checking as well. The most commonly known application of automated … Read more

HEALTH DATA BREACH RESPONSE PLAN

HEALTH DATA BREACH RESPONSE PLAN Purpose: The purpose of this health data breach response plan is to provide a comprehensive guide on how to appropriately respond to a data breach within the private network. The Incident Response Team is responsible for putting this plan into action when a breach occurs.   Definition of PHI data … Read more

Minecraft staff member application

Your Minecraft Username I get the impression people apply for staff with good intentions hiding their ulterior motive, which is that being staff puts you in a position of superiority and therefore you have a sort of prerogative. What I want before anything else is to align myself with the members. I want to be … Read more

Clinical Computing Infrastructure

Clinical Computing Infrastructure Construction Of Health IT Health  IT  consists of a multiple set of technologies, policies, standards, and user sets. The text and diagram is intended to help put some of the buzzwords into perspective. A general framework for understanding the levels of health IT from a technical perspective is as follows:  Application … Read more

Importance of IT Governance plan at an organization

IT Governance plan at an organization: IT Governance plan: IT course of action to the business is the most astonishing assessed driver and consequence of IT Governance practices. The vast affiliations see its centrality plan remembering the ultimate objective to pass on viable business results and feel IT Governance is the best means to achieve … Read more