Category: Tech & Engineering

  • Implementation of the Boston’s Smart City Concept

    Rapidly developing technologies allow their adoption in every industry to benefit people. The theory of smart cities has been a utopian concept for many years; however, it started to be increasingly implemented across the world, allowing for significant enhancement of the cities with various innovative technology. Boston is one of the most progressive places in…

  • The Stealth Securities: Home Security System Project

    Table of Contents Introduction Body Conclusion Work cited Introduction The home is considered a place where there is privacy and one feels secure. This perception has been changed with the increase in insecurity. Vandals have breached the security of many homes leaving the inhabitants with fear. To prevent burglary, security measures have been adopted over…

  • Presenting E-Learning and Design Concepts

    Definition of E-learning E-learning is the use of electronic technologies to create learning experiences (Horton, 2012). It is a broad definition of the field of using technology to deliver learning and training programs. It describes media such as CD-ROM, Internet, Intranet, wireless and mobile learning strategies. Some include Knowledge Management as a form of e-learning.…

  • Kurzweil 3000 System Deployment

    Table of Contents Initiating Planning – Analysis & Design Executing – Implementation Controlling Closing References Initiating The initial stage of Kurzweil 3000 deployment requires the active participation of the involved stakeholders. Therefore, the initiating phase would require the establishment of communication channels with the interested groups such as parents, individual teachers, and, possibly, respective local…

  • Interactive Tools: Types and Its Benefits

    Table of Contents Introduction Playposit Google Forms QR Code Generator Prezi Closing Thoughts Introduction Information technology is a key to remaining competitive; Modern interactive tools present various opportunities; Modernization of the consulting process; Clients value innovation and creativity; Presentation will offer four valuable interactive tools. In this modern day and age, it is important to…

  • PDF Viewer in Firefox, Opera, and Chrome Browsers

    Table of Contents Introduction Google Chrome versus Firefox and Opera Differences in the three browsers References Introduction Browser developers are faced with the need to develop an all round and comprehensive browsers which are secure and reliable search engines. Browsers such as the Mozilla Firefox, Google Chrome, and Opera have customization cursors and tabs structured…

  • Rules and Requirements of the Combustible Liquids Use

    Introduction The dangers and risks involved in handling flammable and combustible liquids and gases call for extra vigilance in the processes of packaging and transporting these liquids and gases. The fact that the harmful effects that can result from careless handling of these liquids are irreversible and long-term in nature, safety precautions are important when…

  • Object-Orientation and IT Analysis

    Table of Contents Introduction Object Orientation. Risks Risk management The cost Benefits Conclusion References Introduction The most important things to consider when considering object-oriented are how the system will be used and the availability of resources to operate under the new system. Factors to consider in this area include whether or not to reuse some…

  • Suppression of Flammable and Combustible Liquids in Storage Tanks

    Table of Contents Introduction Applicable terms used NFPA 30 classification of combustible and flammable liquids Flammable storage tanks The causes and preventions of storage tank fires Case study: Flammable storage tanks Buncefield oil depot Management of fire risk Conclusion Works Cited Introduction The suppression and control of full surface combustible tanks fire demands more commitments…

  • Impact of Cybercrimes on Business

    In the past couple of years, there has been a rise in cybercrimes due to technological advancements. Recent attacks include the SolarWinds supply solar winds assail, Carnival cruise lines raid, Sodinokibi attacks, Avon cyber-offensive, Ether heist, and the fake cryptocurrency scam on Twitter (Haworth, 2021). These sorties targeted individuals and corporations where individuals stole data,…