Cloud Computing

“Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased” (Armbrust et al., 2010). INTRODUCTION Cloud computing concept didn’t come to the light to swallowContinue reading “Cloud Computing”

Biometric Technology

INTRODUCTION With the introduction of biometric studies into the computer science, the first devices and methodologies started to grow in such manner we can see fingerprints scanners in airports, voting machines in democratic countries and even in ATM’s (very common in Brazil). There are different methods to identify an information system user, including fingerprints andContinue reading “Biometric Technology”

Auditing for Security

INTRODUCTION Today we have methods to make it possible to audit systems, which can be used for good or for the worse, and it is something that can be achieved through external or third-party systems, or it can be implemented with some methodology and techniques which allows the investigation and analysis of events which occurredContinue reading “Auditing for Security”

Copyright Compensation

INTRODUCTION As an example of copyright infringement, since the MPEG layer 3 compression algorithm was made available on the internet in the ’90s (Davis, 1995), the ease of getting a CD device, ripping it and making this available for millions of users through the internet, allowing users to make the use of the artistic andContinue reading “Copyright Compensation”

Electronic Monitoring

INTRODUCTION In spite of the electronic devices such as cameras, fingerprints and identity cards, for instance being used by the police in the past in regards to criminal situations, today is very and very more often that this devices are developed by the industry to help companies on achieving their goals, being possibly regarding policiesContinue reading “Electronic Monitoring”

Blocking Methods

In usage almost 99% of the companies computers, the Windows operating system have huge evidence of its fragility in the protection of malware and spyware, which are easily installed and replicated through many machines in the work environment (Chris Hoffman, 2016). As a security solution blocking methods including blocking websites, and monitoring the computer activityContinue reading “Blocking Methods”

The Therac-25 Case

INTRODUCTION The objective of this discussion is to introduce the Therac-25 case, explain what happened in this historical event, discuss the ethical responsibilities of such individuals and organizations and at the end provide my viewpoint about this historical event. THE THERAC-25 CASE The way as the software becomes more complex and usable, this is veryContinue reading “The Therac-25 Case”

The Wireless Communication and its Impact in the Society Today

Introduction  The subject of my weekly discussion is social change caused by new communication resources created by the new inventions of mankind. To begin, I introduce ways of communicating like the wireless telegraph and the wireless telephone, how they impacted the way we communicate in the familiar, business and other regular human relationships.  The inventionContinue reading “The Wireless Communication and its Impact in the Society Today”

The Wikileaks Case

Introduction The objective of this discussion is to introduce Wikileaks, describe the motivation of such activism, discuss the social impacts in the globalized world and at the end give a conclusion with my personal insight about the subject.  About Wikileaks The Wikileaks foundation was created by Julian Assange in 2006. In an analogy, it isContinue reading “The Wikileaks Case”

The Greatest Challenges Facing Software Engineering in the Next 20 Years

Software Engineering is a very important field of study regarding software development since the beginning of modern computing and the rise of software complexity. If you consider that to achieve a deliverable software component you may need to understand more than just bits and bytes, moreover, for software to be successful in the piece ofContinue reading “The Greatest Challenges Facing Software Engineering in the Next 20 Years”