Category: Tech & Engineering

  • Full Disclosure of the Vulnerability

    Table of Contents Abstract Introduction Research method and approach Results Responsible disclosure of the vulnerability Role of hackers in full disclosure of the vulnerability Discussions, Scope & Limitations Conclusion References Abstract The demand for better software products and secure internet from efficacious internet users has created an environment where vulnerability disclosure is an opportunity to…

  • Survey on CMMI Framework.

    Abstract The software development process involves wide range of variables that requires effective monitoring and control for the successful completion of the and projects. In order to ensure quality product development and delivery of services various initiatives to make the processes very efficient are proposed. CMMI frame work is the most accepted way to improve…

  • IDS Deployment: Purpose and the Degree of Risk

    Table of Contents Purpose of an IDS System What Is the Degree of Risk? Proposed Solution References Purpose of an IDS System Among the reasons behind the use of an Intrusion Detection System (IDS) in the company are in relation to access control (Stewart, Tittel, and Chapple, 2008). The financial impact of such intrusions often…

  • Project Portfolio Management: Elements and Features

    The modern world is characterized by a great development of market relations. Almost all spheres of everyday life nowadays are influenced by this issue. That is why it is obvious that our time can be also called the age of rivalry. To survive a person should become successful and overcome all difficulties in his/her way.…

  • Industrial Engineering Jobs: Job Descriptions and Main Tasks

    Industrial Engineering is a branch of engineering concerned with the production or manufacturing processes and their improvement. The Industrial Engineer could have various job titles including: Safety, health and environment (SHE) specialist Logistics planner Manufacturing Engineer Quality Control (ISO) Engineer Consultant Engineer Design Engineer Sales Engineer Project Engineer Electrical engineer Process Documentation and Methods Analyst…

  • The Electronic Flight Bag: ForeFlight App

    Table of Contents Introduction The Best One Available Helping a Crew Conclusion References Introduction Primarily, the author should note that an electronic flight bag (EFB) is a digital application used on a tablet on a flight deck. In general, storing information about flight briefing, flight charts, and documentation is a crucial feature of an EFB,…

  • Video Games Impact on Peoples Lives

    Table of Contents Introduction Brief History of Video Games Video Games and Media and Communication Video Games and Marketing Perspective Historical Development of Video Games Future Implications of Video games on Society Video Games and Human Needs Conclusion References Introduction The current world has had a great deal of revolution in so many sectors, one…

  • Victorian Desalination Project Management

    Introduction to Desalination and the Victorian Desalination Project Desalination is the process of removing or eliminating considerable amounts of salt and other minerals from saline or seawater (Mitchells, Brighton & Samuel 2012). The process produces fresh water, which is suitable for domestic and agricultural applications. Saline water, which is drawn directly from the sea, is…

  • Job Site Theft: Current Problems and Possible Solutions

    Introduction Job site security currently poses a major challenge to contractors with losses from job site theft estimated at over US $ 1 billion. Professional contractors, equipment manufacturers, equipment dealers, and insurance companies experience huge losses as a result of vandalism and theft of construction materials and tools. Impacts of Job Site theft Job site…

  • The Aircraft Operator Standard Security Program

    In my opinion, the most important aspect of The Aircraft Operator Standard Security Program is the fact that it is a universal system. AOSSP can be compared to an airport security program (Forest & Price, 2016). ASP is unique for every airport, and therefore it leaves more space for mistakes and breaches in security. AOSSP,…