Deadlock from Multithreading

INTRODUCTION The objective of this small article is to give an introduction about threads, deadlocks and how a deadlock may occur illustrated with code using the Java programming language. In the end, I give my personal point of view about the subject. MULTITHREADING A thread can be defined simply by “a separated computation process” thatContinue reading “Deadlock from Multithreading”

Overloading Operations

INTRODUCTION The main objective of this small article is to provide an introduction about operators in Java, the possibility of overloading operators and method overloading. OVERLOADING OPERATORS Operators in programming languages are used to assign, and calculate a math expression, for instance. The usual Java operators are: + – * / for addition, subtraction, multiplication,Continue reading “Overloading Operations”

Bring your own Device

INTRODUCTION The objective of this small article is to give an introduction about the BYOD – Bring Your Own Device concept, analyze advantages and disadvantages of using this model and my personal insight about the subject. WHAT IS BYOD? BYOD is an acronym for Bring Your Own Device, which is basically a new concept whereContinue reading “Bring your own Device”

Personal Information and Privacy on the Internet today

INTRODUCTION The main objective of this small article is to give my point of view on internet privacy and stolen information. PERSONAL DATA AND INFORMATION This is not new for a computer professional that conversations and information can be stolen on many ways which may be using technical flaws, the insecurity of the internet protocols,Continue reading “Personal Information and Privacy on the Internet today”

Target Security Breach in 2013

Introduction The main point to be covered in this discussion is the Target Corporation security breach that took place in 2013, which affected customers who swiped their credit and debit cards between Nov. 27/2013 and Dec. 15/2013, and became a very important topic in network security. This security issue was announced via a report writtenContinue reading “Target Security Breach in 2013”

Summarizing a Little Bit Operating Systems

Since the early years in computing, Operating Systems were used in computers to make an interface between the human user and the computer machine. OS or Operating System can be defined by “operating system is the software that controls the overall operation of a computer” (Glenn Brookshear, J, 2011). Nowadays, users have plenty of optionsContinue reading “Summarizing a Little Bit Operating Systems”

Queues and Algorithms in the Scheduling Context

Since the early years, computer scientists in the search for computer science solutions to provide high complexity machines to support science, math and business related operations, developed the Queue technique in computing, which was and still one of the most important topics in computer science. “Queue” can be defined as “a storage organization in whichContinue reading “Queues and Algorithms in the Scheduling Context”

Computer Science: Storage and Non-Volatile Memory Issues and Trends

Computers does nothing without information and it needs to be processed and stored, what makes necessary the use of high technology to write data and keep it for further access. Technology nowadays offers so many ways to store and handle data (Magnetic Disks and Flash Drives, for instance), but as systems generates large amounts ofContinue reading “Computer Science: Storage and Non-Volatile Memory Issues and Trends”

Current Trends in Computing: Devices and Technologies to Support E-Learning

Considering the large growth of the Online Learning System worldwide, my subject this week is Technology Trends to Support Online Learning, which I believe is one of the most important topics in innovation these times. Electronic learning or E-learning is defined by Innovative Learning as a term used to define a learning system supported byContinue reading “Current Trends in Computing: Devices and Technologies to Support E-Learning”

Academic Integrity in a Cultural Context

Intellectual Property is defined by the WIPO as “creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce” (Switzerland, 2014). WIPO – an acronym for World Wide Intellectual Property Organization can be defined as a self-funding agency, containing 187 member states, which its main objectiveContinue reading “Academic Integrity in a Cultural Context”