Category: Uncategorized

Approach to Enterprise Data Security and Privacy on Converged ICT Platforms

Information and Communication Technology (ICT) convergence refers to the fusion and/or integration of individual ICTs in order for the fused or integrated technologies to operate as a single unified ICT platform without clear boundaries between them. Convergence of technologies is mainly driven by needs that cannot be addressed without this technological integration or fusion. This…

To access this post, you must purchase Ultimate Membership.

Read More

The Wired Equivalent Privacy (WEP) Encryption

EXECUTIVE SUMMARY Wireless networks have been adopted for use both within organizations’ brick-and-mortar precincts and in many public areas like hotels, university campuses, modern city malls, homes, in airliners, and even in some public service vehicles. A way of integrating security within the wireless network infrastructure is therefore crucial to safeguard the data in motion…

To access this post, you must purchase Ultimate Membership.

Read More

Implementation of Redundant Array of Independent Disks (RAID)

EXECUTIVE SUMMARY Redundant Array of Independent Disks (RAID) involves making multiple, smaller hard disk drives to operate like large, high-performance disks while keeping costs low. Various RAID configurations exist to address the various storage requirements of different data operation processes.   RAID storage is complemented and augmented by other storage devices and technologies. This journal…

To access this post, you must purchase Ultimate Membership.

Read More

Problem Structuring Technologies

EXECUTIVE SUMMARY One of the main duties of managers in any organization to make decisions (Khodashahri and Sarabi, 2013, p.1). However, many organizations today have robust and complex value chain processes. Most of these organizations also have complex organizational structures with multiple organizational units, whose activities must be synchronized and coordinated to optimize productivity, minimize…

To access this post, you must purchase Ultimate Membership.

Read More

Comparison Of J2EE And .NET as Tools for Implementing E-Business Applications

EXECUTIVE SUMMARY Over the recent years, the Internet has become readily accepted as the standard platform over which modern organizations carry out most of their operational processes. These operational processes could be business processes for profit-oriented organizations, public services by governmental organizational units, educational services by universities and colleges or collaboration, communication and entertainment services…

To access this post, you must purchase Ultimate Membership.

Read More

Authentication without Identification and Authorization without Authentication

EXECUTIVE SUMMARY In a simple security model, the standard approach in the implementation of security is to identify a user, then confirm the user is who (s)he says (s)he is (authentication), then identify the entitlements the authenticated user has in the application or system, and finally authorize the user to access the entitled resources in…

To access this post, you must purchase Ultimate Membership.

Read More

Content Addressable Storage

EXECUTIVE SUMMARY In the recent past, the amount and nature of both structured and unstructured data that organizations have had to capture, store, manage and maintain has been growing at a very high rate. Initially, the main type of content that was captured, managed and maintained electronically was the structured data. Various global trends lately…

To access this post, you must purchase Ultimate Membership.

Read More