Educational Management Information System (EMIS)

Evolution of EMIS The revolution in the information and communication technologies (ICTs) has greatly influenced the life style of whole world.  ICTs has a proven role in the field of medical, business, industry, entertainment, communications but now these technologies has emerging efficient role in education field. In developing countries, education sector is one of the core areas that require more attention for the country’s rapid development. The goal of every educational institution is to provide the quality education to all of its students. In these institutes management at all level continuous strives to achieve this aimed goal. Universities are hiring highly qualified professors and equipping their scientific laboratories with latest equipment’s, adding new technologies and books to their libraries. In these educational institutions the concept of digital libraries is also introduced, in classrooms multimedia projects are installed. The concept of distant learning, different tutorials like web and disk based as Continue reading

Common Access Card (CAC) Deployment

The Common Access Card or CAC is a smart card designed to be used as an ID card that enables physical access to buildings and controlled space like server rooms and for access to computer systems and networks. Department of Defense (DoD) deployed this system to meet its high security requirements for authentication of personnel entering in the Department’s buildings, controlled areas and computer networks. Common Access Card is a smart card that has public key infrastructure (PKI) features to provide secure system functionalities such as authentication, data integrity, confidentiality and non-repudiation. CAC stores the private key of the client certificates, used with PKI cryptography program, in the card and it is hard to extract this key from the card. Common Access Card relies on public key systems and certificates which are way more secure than the current common username and password based identity management systems. An important consideration with Continue reading

Comparison Between Proprietary Software and Open Source Software

Proprietary software can be defined as closed software that is distributed under a license agreement that limits any modifications to the software. Its just opposite to the concept of Open source software. Open source software can be defined as software that is distributed freely under a license agreement with no limitations on changes made to the source code. Many proprietary corporations make software freely available to users. For example, Adobe provides users with the Adobe Acrobat Reader. The Adobe Acrobat Reader is an application that users to view documents that have been saved in the portable document format (PDF). The PDF format is developed by Adobe and has become a standard in saving files as electronic documents. ‘Standardization’ and ‘compatibility’ are the two main drivers for the success of proprietary software. Any user that opens a PDF formatted document with Adobe Acrobat Reader is confident that the document will be Continue reading

Importance of Computer in the Modern Society

Computers are now a fact of life. Computers have created a very effective information system to help streamline the management of an organization. This makes it a much needed tool for every business, banking, government, entertainment, daily life, industry, education, and administration. It can be said of all large organizations, whether the department government or private, use a computer for a variety of their daily business and it is the fastest growing industries in the world today. Each organization usually has one or more large computer systems and a number of microcomputer. The system is a great computer for data processing tasks, while many small microcomputer to use as word processing. Computers have become part of our lives is essential. In general, the use of computers can be divided into several groups. It is known that the rapid growth of computer usage time. In all areas have been using computers Continue reading

What is Cryptography and Its Types?

Cryptography is defined as hiding the message to make it secret using scrambled codes. It allows the date to be changed into a code that is not legal for not permitted person and it needs to be converted back to its original message for it to become readable. Encryption and decryption are the process of cryptography. Encryption is when the readable text is converted into coded text while the decryption is where the coded text is converted into readable text. There are numerous types of cryptography but the symmetric and asymmetric key cryptography is the most used technique. 1. Symmetric-key Cryptography Symmetric-key Cryptography is also known as the private key cryptography. It is the oldest and well-known technique of cryptography. This method is simple which only requires each computer that has a code that will be encrypted by an encryption software into packets of data before it is sent across Continue reading

Blockchain Technology – Advantages and Disadvantages

In 2017, a new form of currency and heated topic came to light, Bitcoin. Soon after its emergence, Bitcoin turned into the most invested in and discussed topic. It was considered to be a future form of digital currency. Investors and debaters understood the basics of how Bitcoin operated, however, the system behind Bitcoin was unclear. Bitcoin, alike many other cryptocurrencies, uses a system called Blockchain. What is Blockchain? How does Blockchain play a role in cryptocurrency? According to Bitcoin.org, “The block chain is a shared public ledger on which the entire Bitcoin network relies.” For example, imagine an iron chain full of square blocks, each block is bind by a transaction between two parties. The blocks are added one after another in chronological order. Within this block, information from both participants is contained. Once the transaction is made, it will be displayed for the public to view.  Blockchain plays a Continue reading