Category: Tech & Engineering
-
Project Planning and Scope Management
Table of Contents Abstract Introduction Literature Review Schedule Delay Analysis in Industry Schedule Delay Analysis in Research Conclusion References Abstract Project delays hinder the effective implementation of projects in diverse industries. Notably, delays indiscriminately affect the different types of project cycles that including the iterative, waterfall, v-model, and adaptive, among other approaches. Project delays entail…
-
Influencing and Controlling the Project
Table of Contents Introduction Organizational change Stakeholder Communication Informal communication References Introduction Project control is essential for its successful completion. In controlling the project, there are a number of issues that the project manager is supposed to take into consideration. These issues include project evaluation, project schedule, budget control, input control, output quality, scope management…
-
Uninterruptible Power Supply System Adoption Trend
Table of Contents Introduction UPS Application and Types Online and Offline Classifications Charger and Battery (Its circuits and their components) Ripples on the AC Harmonics on the DC Silicon-Controlled Rectifiers (SCR) on the Converter The UPS Maintenance Steps Conclusion Works Cited Introduction The uninterruptible power supply system (UPS) is a power supply backup technology, which…
-
Advantages of Fresnel Lenses
Table of Contents Topic Discovery Development Applications Works Cited Topic A Fresnel lens possesses a large aperture and a short focal length, which allows it to capture and focus more from a light source than a conventional lens, and project it over vast distances while needing less mass and amount of material than a traditional…
-
Concept and Problem of Cyber Domain in US
Admittedly, the development of technology resulted in the beginning of Information Era. People have developed a brand new space – cyber domain. Cyberspace suggests numerous opportunities, but it also contains many threats. One of the major concerns related to cyberspace is national and personal security. First, it is important to define the term “cyberspace”. According…
-
Bring Your Device Policy and Security in Business
Table of Contents Advantages of BYOD in Organizations Major Risks Surrounding BYOD Effect of BYOD on an Organization Implementation of BYOD Concepts in Real Organizations Conclusion References Bring your device (BYOD) refers to the organizational policy of allowing employees to bring their technological devices to the workplace and use them to carry out organizational duties.…
-
SQL Injection Attacks and Database Architecture
Table of Contents SQL Injection Mechanisms Understanding the Steps in SQL Injection Conclusion References SQL Injection Attacks (SQLIAs) has risen as a standout amongst the most genuine dangers to the safety of database-driven presentations. A survey conducted by SQL analysts has put SQLIAs among the main vulnerabilities that a network program can have (Dalia &…
-
Technological Play and Touch Technologies among children
The world has changed into a technological world. Most parts of the world have endorsed technology. Approximately 71 percent of children have also endorsed technology significantly (Yelland, 2010). Children access information through technological devices in the form of videos, text and pictures. This aims at equipping them with the needed technological knowledge in the present…
-
Blu-Ray Triumph Over HD-DVD
This paper has elaborated the characteristics that lead to the triumph of Blu-Ray standard developed by Sony over HD-DVD developed by Toshiba/NEC. Sony “was once bitten” in the standardization war between Betamax and VHS format; the company leant the value of having a tight linkage of vertical and horizontal supply chain to push a technically…
-
The Big Data Definition
Table of Contents Introduction The Big Data: methods of collection and developments Collecting the Big Data The Internet of Things: its impact on the amount and type of the Big Data The Big Data’s impact Conclusion Works Cited Introduction In the modern context of a rapidly growing amount of information, the term Big Data was…