Timestamp

Sort By:
Page 21 of 29 - About 281 essays
  • Better Essays

    Q1. Discuss the three major current issues in the practice of EA. The three major current issues in the practice of EA are as follows: 1 EA management not be completely, effective and successful utilized in the Organizations At first, Lack of top management support: due to the EA need long time to provide the benefits but in Organizations’ view they want the return on investment is often expected within a too short amount of time (Namba and Iljima, 2004). Once the Organizations’ top management

    • 1843 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Block Chain Essay

    • 1847 Words
    • 8 Pages

    What Is Block Chain and Where does it come from Block chain comes in to existence with the invention of world’s first crypto currency “bitcoin”. Bit coin is the first crypto currency of world that was introduced on 31 October 2008. It was released as open source- software in 2009. It was introduced by satoshi nakmoto. After the success of bitcoin, a lot of crypto currencies were introduced in world. Today there are more than 700 crypto currencies in world. All the crypto currencies work on block

    • 1847 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Plasmasphere Essay

    • 1670 Words
    • 7 Pages

    Plasmasphere is a highly dynamics region which can expand and shrink within hours or less during geomagnetic active times. Previous studies showed that the plasmasphere plays an important role in energization and/or loss mechanism for electrons in the radiation belt. Therefore, constructing a plasmapause (the outermost region of plasmasphere) model is key to study the correlation between radiation belts and plasmasphere in details. This study aims to conduct a comprehensive analysis for plasmapause

    • 1670 Words
    • 7 Pages
    Better Essays
  • Decent Essays

    School of Engineering & Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline

    • 3651 Words
    • 15 Pages
    Decent Essays
  • Decent Essays

    The use of recent and modern multimedia devices which is connected to the internet like scanners, cameras, and especially smart tabs and cell phones made capture, storing, transmission, and sharing of a huge amount of images, songs, and videos much easier and faster Cryptographic hash functions used to map the input data to a binary strings, different digital representations can emerge from an image through image processing like rotation, cropping, compression, filtering etc…, the change of one bit

    • 1710 Words
    • 7 Pages
    Decent Essays
  • Better Essays

    Chapter Five Implementation of the Security System 5.1 Introduction In this chapter will be discuss the implementation of the security model through the illustrative examples to explain functionality of the model. In order to test the functionality of the system, a case study application is used. The proposed case study is a messaging system used to exchange messages between clients under the control of the server. 5.2 Implementation Tools The proposed system has been built by means of the

    • 1775 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Security of NoSQL Database against Intruders Abstract The evolution of distributed web based applications and cloud computing have generated the demand to store voluminous of big data in distributed databases efficiently to offer excessive availability and scalability to users. The new type of database resolves many new challenges especially in large-scale and high concurrency applications which are not present in relational database. These new sorts of databases are not relational by using explanations

    • 1707 Words
    • 7 Pages
    Better Essays
  • Decent Essays

    Distributed Database vs Centralized Database centralized database: In a centralized database, all the data of an organization is stored in a single place such as a mainframe computer or a server. Users in remote locations access the data through the Wide Area Network (WAN) using the application programs provided to access the data. In a centralized database, all data of an organization are kept in a single computer as a central processor or server. Users in remote locations access data by using

    • 1864 Words
    • 8 Pages
    Decent Essays
  • Better Essays

    BCIS 6320 03 NAME: Koushik.Yelakanti ID NUMBER: 349885 AMAZON DYNAMO DATABASE Introduction: Amazon dynamo database is a collection of databases, storage, compute, tools and support. Let us start with the data bases these databases fallen into two sections they are 1. Traditional classic relational databases, 2. NOSQL databases. Any database can be rum on the amazon platform which is built to be flexible as possible, we are using MYSQL, IBMDB2, Oracle, postgre SQL, and some databases

    • 1866 Words
    • 8 Pages
    Better Essays
  • Better Essays

    The reminder of this thesis has been organized as follows. Chapter 2 reviews a general overview of basic knowledge should be mastered for good understanding and pointing out the key points of desired attributes as well. Furthermore, possible malicious attacks have been briefly defined and the threat model adopted also reviewed in a brief which helps to know what the environment conditions could be and what is the ability of an attacker to gain secret information. Then after, how an attacker can use

    • 1987 Words
    • 8 Pages
    Better Essays