It has become essential for organizations across the world to deploy the latest technology and information systems to understand customers and answer real business problems whilst delivering the best service to their customers. As economies are moving towards a more digitalized ecosystem, the value of data has grown exponentially. Businesses acquire data from a number of sources such as social media sites, online polls, cookies, etc., to assess online activities, find new ways to target customers and monetize the data. Such data often includes personal and sensitive personal information, which if compromised or misused can cause immense harm and thereby a threat to privacy. Though privacy has not been clearly defined because of its many forms and versions, it can be said that it is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. Privacy as a concept remains important Continue reading
Information Technology
File Organization Techniques
The basic technology of the data organization is based on a hierarchy. Data must be approached on an organized basis, if it is to be useful, in data processing, the hierarchy of data is described below:- A character is any simple number, alphabet or special symbol. A data record consists of a group of related data fields(e. g. Employee’s sequential record, customer record, etc.) A data field is an area that can hold one organization more characters that, together represents a specific data element(e. g. The name field, the quantity filed) A data file is a compilation of related data records maintained in some prearranged order. A database usually consists of several related organization integrated data files. A file consists of a number of records. Each record is made up of a number of fields and each field consists of a number of characters. In order to produce useful information Continue reading
Data Warehousing and Data Mining
Organizations tend to grow and prosper as they gain a better understanding of their environment. Typically, business managers must be able to track daily transactions to evaluate how the business is performing. By tapping into the operational database, management can develop strategies to meet organizational goals. The process that identified the trends and patterns in data are the factors to accomplish that. By the way, the way to handle the operational data in organization is important because the reason for generating, storing and managing data is to create information that becomes the basis for rational decision making. To facilitate the decision-making process, decision support systems (DSS) were developed whereas it is an arrangement of computerized tools used to assist managerial decision making within a business. Decision support is a methodology that designed to extract information from data and to use such information as a basis for decision making. However, information Continue reading
Factors Affecting the Performance of Computer Networks
Networking is very important in the world of computer. Networking is the activity of connecting the computers to each other to make-up the computer network. In other word is the purpose of sharing data through linking of two or more computing devices together. Networks are built with a mix of computer hardware and computer software. A computer network is a collection of computers and devices connected together via communications devices and transmission media. There are few factors that affect the performance of computer networks. Those factors will reduce the quality of service of the network. The major factors are Latency, Packet loss, Retransmission, Throughput and Queuing delay. 1. Latency Latency is the kinds of delays typically incurred in processing of network data. A low latency network connection is one that generally experiences small delay times, while a high latency connection generally suffers from long delays. Although the peak bandwidth of Continue reading
RFID Standards
As far as standards of RFID are concerned, an RFID system can use a few standards. Reason behind this being that there is no one universally accepted standard at the moment. Since years, competing standards have been one of the crucial challenges for RFID. The specifications and standards may be decided and composed at the national, international, industry or trade association level. The individual organizations may call their own specifications as “standard”. When these individual organizations set various industry standards and specifications, normally they are based on international standards in order to make implementation and support easier. Apart from this, there comes an added advantage of providing a wider choice of available products. These standards can be applied to include the content and format of the codes placed on the tags, the frequencies and protocols that will be used by the tags and readers to transmit the RFID data, the Continue reading
Security Issues of Cloud Computing and Countermeasures
Along with the rapid development of information technology, all the organizations are seeking unique ways of driving their businesses forward, and the responsibility to manage these increasing demands is now placed on computer networks to provide a competitive edge and create new opportunities at reduced cost with efficient service. This has accelerated all the business and technological initiatives that promise to provide these services at the comparably low infrastructure and operating costs. A fine example of this scenario is the rapid growth of cloud computing. Cloud Computing, often referred to as simply “the cloud”, is a distributed architecture that centralizes server resources on a scalable platform, enabling ubiquitous access to configurable resources and services. It provides storage and access for data over the internet instead of our computer’s hard drive. Leveraging the Internet, it provides unparalleled and distributed services based on virtualization and service-oriented architecture. Cloud is not another recent Continue reading