Category: Tech & Engineering

  • Analysis of Cyber Kill Chain Causes

    Table of Contents Introduction Action on Objectives Required Tools How to Countermeasure this Activity Conclusion References Introduction The Cyber Kill Chain provides a broad outline as a component of the intelligence-driven defense model. With the emergence of the Internet, the world has witnessed the arrival of cybersecurity threats that jeopardize both individual and organizational databases.…

  • Future Markets for the US-Made Drone Technology

    The US-made drone technology has led a revolution in many areas of application that range from military, climatography, agriculture, mining, journalism, and pipeline. The technology is deployed in border monitoring in the US. It is effective in responding to global threats of terrorism since drone-bombing airliners do not require any pilots aboard to execute attacks…

  • Impact of Covid-19 on the Smart Home Development

    Table of Contents Introduction Methodology Discussion Conclusion Recommendations and Challenges References Many enterprises have decided to operate remotely after the emergence of the COVID-19 pandemic. The new reality has opened opportunities for smart home technology to be used for business purposes that they were not designed for. Accelerated use of technology in the home creates…

  • Evaluation of Telecommunications Regulatory Practice in the Kingdom of Bahrain

    Project management is always a complex and challenging task requiring effort and multiple interrelated activities. This indicates that the effective operation of any company directly depends on the competent management process and the methodology used. Therefore, this research aims to study the internal features of project management in Telstra company and compare them with alternative…

  • Information Security Incidents and Procedures for First Responders

    The transference of most information archives, money, and communications to electronic form created an independent type of asset – information. Significant risks arise in ensuring state security in the field of information; citizens also suffer from crimes committed in the information sphere. Therefore, the issues of information security incidents are currently the most relevant, and…

  • Discussion of Coding of Qualitative Data

    Table of Contents Abstract Coding Analysis and Discussion References Abstract Coding is the approach for correctly interpreting the information gathered through qualitative research to retrieve patterns and significant observations related to the study’s topic or hypothesis. The analysis of such data can be performed throughout such methodologies as discourse and conversation analysis, theory development, and…

  • Electronic Nature of Information Systems

    The electronic nature of information systems makes them more prone to errors, abuse, and destruction. One reason for this is the network structure of the information systems. Networks consist of computers (clients and servers), that are connected with wires and wireless solutions. This fact makes them vulnerable to physical dangers such as fires, floods, hardware…

  • Remote Work and Smart Home

    Table of Contents Remote Work and Smart Home Methodology Discussion Results Conclusion Recommendations References In the 21st century, more individuals prefer to work remotely rather than perform tasks at the office. As a result, the Working from Home (WFH) environment has experienced shifts, facilitating the process of incorporating smart home concepts. Device manufacturers, utility companies,…

  • Passenger Traffic Forecast for Lufthansa Airlines

    Table of Contents Introduction Lufthansa Airlines Market Analysis Forecast Methodology Conclusion References List Introduction Lufthansa Airlines or Deutsche Luft Hansa AG is the leading carrier in Germany and one of the three prominent aviation companies in the world. Annually, the company operates flights for millions of passengers worldwide. The airline runs a fleet of about…

  • Engineering Aspects of Man-Made Disasters and Oil Spills

    Table of Contents Executive Summary Introduction Oil rigs Major oil disasters Causes of oil disasters Emergency fixing and prevention Conclusion Recommendations References Executive Summary This brief report examines various engineering aspects of oil spill disasters. It provides that oil disasters can occur when engineering controls, such as a blow out malfunctions, are not met. It…