Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (115)
- Association of Arab Universities (24)
- University for Business and Technology in Kosovo (13)
- Universitas Negeri Yogyakarta (11)
- Technological University Dublin (10)
-
- University of South Florida (8)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (6)
- Tashkent State Technical University (6)
- United Arab Emirates University (5)
- Embry-Riddle Aeronautical University (4)
- Faculty of Engineering, Mansoura University (4)
- Karbala International Journal of Modern Science (4)
- Kennesaw State University (3)
- Penn State Dickinson Law (3)
- Southern Methodist University (3)
- University of Central Florida (3)
- Western Michigan University (3)
- Brigham Young University (2)
- DePaul University (2)
- Institute of Business Administration (2)
- Journal of Police and Legal Sciences (2)
- Maurer School of Law: Indiana University (2)
- Purdue University (2)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Georgia Southern University (1)
- Illinois Wesleyan University (1)
- Kansas State University Libraries (1)
- Old Dominion University (1)
- Olivet Nazarene University (1)
- Keyword
-
- Internet (12)
- Cybersecurity (10)
- ToC (10)
- Privacy (8)
- Internet of Things (6)
-
- Machine learning (5)
- Social media (5)
- TAM (5)
- Table (5)
- Technology (5)
- China (4)
- Contents (4)
- Editor (4)
- Healthcare (4)
- Information security (4)
- IoT (4)
- Tanzania (4)
- AI (3)
- ARIMA (3)
- Arduino (3)
- Communication (3)
- Computer and Control Systems Engineering (3)
- Covid-19 (3)
- Cyber (3)
- Data mining (3)
- Information (3)
- Innovation (3)
- Intellectual property (3)
- Intellectual property rights (3)
- International (3)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (115)
- Applied Mathematics & Information Sciences (16)
- International Journal of Business and Technology (13)
- Elinvo (Electronics, Informatics, and Vocational Education) (11)
- The ITB Journal (10)
-
- Military Cyber Affairs (8)
- Future Computing and Informatics Journal (7)
- Chemical Technology, Control and Management (6)
- Karbala International Journal of Modern Science (4)
- Mansoura Engineering Journal (4)
- Bulletin of TUIT: Management and Communication Technologies (3)
- Dickinson Law Review (2017-Present) (3)
- Emirates Journal for Engineering Research (3)
- Human-Machine Communication (3)
- Journal of Communication Pedagogy (3)
- SMU Data Science Review (3)
- Business Review (2)
- Journal of Digital Forensics, Security and Law (2)
- Journal of Police and Legal Sciences (2)
- The Journal of Electronic Theses and Dissertations (2)
- Acta of Turin Polytechnic University in Tashkent (1)
- Australian Journal of Teacher Education (1)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- DePaul Magazine (1)
- ELAIA (1)
- Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings (1)
- IP Theory (1)
- In The Loop (1)
- Indiana Law Journal (1)
- Inquiry: The University of Arkansas Undergraduate Research Journal (1)
Articles 91 - 120 of 252
Full-Text Articles in Computer Engineering
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Journal of International Technology and Information Management
This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless …
Table Of Contents Jitim Vol 30 Issue 1, 2021
Table Of Contents Jitim Vol 30 Issue 1, 2021
Journal of International Technology and Information Management
Table of Content
Overcoming Team Boundaries In Agile Software Development, Scarlet Rahy, Julian Bass
Overcoming Team Boundaries In Agile Software Development, Scarlet Rahy, Julian Bass
Journal of International Technology and Information Management
Abstract: The usage of agile software development methods is increasing and so is the need for enhancing the collaboration between the different stakeholders. Thus, we chose to investigate the communication tools and challenges across the different boundaries and consequently deduce implications for practitioners. This research addresses inter-team communication by exploring the practitioners' perception on the different communication tools and the challenges faced at the three different boundaries, inter-team, team and customers, and geographically separated teams. We aim to enhance the productivity of software development through enhancing the communication between the different stakeholders. In this research, we use grounded theory approach …
An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara
An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara
Journal of International Technology and Information Management
From our study, all three covid-19 vaccines have a similar proportion of adverse reaction reports in which the patient had a history of allergies. However, the proportion of life-threatening outcomes were lower for those with the Janssen vaccine (0.62% hospitalization rate for Janssen versus 2.59% for Pfizer and 0.60% death for Janssen versus 5.15% for Moderna). In terms of specific allergies, patients with *cillin or sulfa allergies had the most adverse reactions to covid-19 vaccines, however, Janssen again had the lowest percentage of reported deaths (1.39% for *cillin-related allergy deaths for Janssen versus 6.10% for Pfizer). In terms of patient …
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
Journal of International Technology and Information Management
This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system can …
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Journal of International Technology and Information Management
There is much research on Critical Success Factors when implementing novel IT solutions in different industries and contexts. However, for the domain of higher education the amount of studies is limited. This is partially due to the fact that what is considered higher education is different across countries. Universities, Universities of Applied Science, Vocational Universities, Polytechnics and related (research) institutes both have similarities and differences. However, one commonality is that institutions in higher education are not sufficiently capable of supporting the development(s) and requirements of educational processes with adequate (innovative) IT. Therefore the purpose of this study is to determine …
Table Of Contents Jitim Vol 29 Issue 4
Table Of Contents Jitim Vol 29 Issue 4
Journal of International Technology and Information Management
table of contents
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Journal of International Technology and Information Management
Telecommunications organizations have to follow the rapid innovation of technology if they want to face challenges raised by competition. The challenge to respond to the huge market demand of updated products and services from customers requires that the organization‘s working environment be equipped with tools and communication facilities that contribute to ameliorating productivity. Cameroon Telecommunications (Camtel) is facing a digital telephony and Internet Protocol strategic management challenge. Successful implementation cannot be achieved if the employees are still depending on the ageing public switched telephone network (PSTN) as their primary communication system, despite the frequent loss of dial tone experience in …
Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo
Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo
Journal of International Technology and Information Management
Mutual trust among social networks users encourages positive communications, so it is critical to study trust in the context of online social networks. In this study, we built a model to calculate trust of social media users. Data was collected from Qzone (Tencent Technology Co., Ltd.), a SN service (also known as QQ) in China. We identified 150 QQ users and 3 friends from each of the users; data of these users were collected by Python program. The relationship between trust and closeness was constructed using an ordinary least squares regression model, and the factors that influence trust between social …
Conflict Resolution In A Multi-Level It-Enabled Outsourcing Network: A Structured Solution Approach, Shreekant Vijaykar, Mahesh Gupta Prof., Pradip Kumar Bhaumik Dr.
Conflict Resolution In A Multi-Level It-Enabled Outsourcing Network: A Structured Solution Approach, Shreekant Vijaykar, Mahesh Gupta Prof., Pradip Kumar Bhaumik Dr.
Journal of International Technology and Information Management
Using the case study of an Indian Technology and Outsourcing Service Provider, SmartKey (real but renamed company), a technology vendor to a global healthcare provider, this paper analyses offshore outsourcing issues using IT-enabled services to gain deeper insights needed to understand the core conflict and propose a well-reasoned solution approach. Reasoning, the conscious thought process leading to a well-justified decision, is an important managerial skill required for making dynamic decisions, resolving conflicts, and thereby developing human resources. This paper explores Goldratt’s Evaporating Clouds (ECs) as a systematic approach to reasoning in particular, and as a system for developing human resource …
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Journal of International Technology and Information Management
The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
Journal of International Technology and Information Management
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.
In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.
With an increasing threat to information security for …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn
How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn
Journal of International Technology and Information Management
Although much research has been done into the importance of IT Capabilities (ITC), Digital Leadership (DL) and Digital Transformation (DT) with regard to organizations’ firm performance and ability to thrive in the current digital market, there is little research on qualifying which specific ITC and DL competences affect the success of an organization's DT and ultimately impact their ability to adopt newly emerging technologies. This research aims to address the influence of DL and ITC on DT as well as which specific DL competences and ITC might ultimately affect an organization’s ability to successfully adopt newly emerging digital technologies. Quantitative …
Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang
Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang
Journal of International Technology and Information Management
The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and …
Three Emerging Innovative Technologies Required For Cyber Operations To Execute Commander’S Intent At Machine Speed, Andrew Stewart
Three Emerging Innovative Technologies Required For Cyber Operations To Execute Commander’S Intent At Machine Speed, Andrew Stewart
Military Cyber Affairs
Decision advantage for the DoD and Combined Cyber Operations results from the secure, seamless, and rapid maneuver of data and information. In the DoD’s 2018 Artificial Intelligence Strategy, the DoD recognized that it must, “put in place key building blocks and platforms to scale and democratize access to AI. This includes creating a common foundation of shared data, reusable tools, frameworks and standards, and cloud and edge services.”[1] More than ever, integrated, adaptive cyber operations provide the means of maneuver for data to enable DoD’s decision advantage-based goals. To support this vision, the integrated implementation three innovative cyber technologies …
Assessing Impacts Of 5th Generation (5g) Cellular Telecommunications On Internet Of Things (Iot) Deployments, Michael Love, Marwan Jamal
Assessing Impacts Of 5th Generation (5g) Cellular Telecommunications On Internet Of Things (Iot) Deployments, Michael Love, Marwan Jamal
Military Cyber Affairs
The Internet of Things (IoT) is emerging as a primary enabler of the transformation to digital business services in today’s economy. At the same time, 5th Generation (5G) cellular transport technology is emerging as a viable means to support IoT data requirements. Although 5G is still in its infancy, DoD leaders need to understand the impacts that 5G will have on IoT projects as there are several challenges involved with integrating 5G into IoT. In order to achieve the maximum benefits of high bandwidth, low latency and superior performance, an entirely new grid of cell sites and access units …
A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany
A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany
Future Computing and Informatics Journal
Requirements engineering is a crucial phase of software engineering, and requirements prioritization is an essential stage of requirements engineering particularly in agile software development. Requirements prioritization goals at eliciting which requirements of software need to be covered in a particular release. The key point is which requirement will be selected in the next iteration and which one will be delayed to other iterations for minimizing risk during development and meeting stakeholders’ needs. There are many existing techniques for requirement prioritization, but most of these techniques do not cover continuous growth, change of requirements, and requirements dependencies. The prioritization techniques need …
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
Seattle Journal of Technology, Environmental & Innovation Law
No abstract provided.
Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman
Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman
Mountain Plains Journal of Business and Technology
This study examines the monetary impact of tariffs on consumer internet access via a digital subscriber line (DSL). Historically, the Communications Act of 1934 mandated that telephony services be provided to everyone, without exclusion. With the rapid emergence of the internet, the Connect America Fund was recently implemented to ensure equal access to both voice and broadband services. Since many telephony companies have emerged as internet service providers, DSL internet service is often bundled together with a landline telephone, especially in rural areas. This study examines the total cost of such bundled DSL internet service across the classes of cities …
Evaluation Of Characteristics Of Wireless Sensor Networks With Analytical Modeling, Halim Khujamatov, Ernazar Reypnazarov, Doston Hasanov, Elaman Nurullaev, Shahzod Sobirov
Evaluation Of Characteristics Of Wireless Sensor Networks With Analytical Modeling, Halim Khujamatov, Ernazar Reypnazarov, Doston Hasanov, Elaman Nurullaev, Shahzod Sobirov
Bulletin of TUIT: Management and Communication Technologies
In this paper, a mathematical model of the operation process of the ZigBee standard wireless network for remote monitoring systems based on the Markov chain apparatus was developed. Using the model was evaluated of the operation process of the CSMA/CA algorithm of the MAC level of the IEEE 802.15.4 ZigBee standard. The peculiarity of this mathematical model is that it takes into account the level of loading of network elements and potential distortions in the transmitted packets as a result of the influence of interference. Using the developed mathematical model, the main characteristics of the network operation process, such as …
A Novel Energy-Efficient Sensor Cloud Model Using Data Prediction And Forecasting Techniques, Kalyan Das, Satyabrata Das, Aurobindo Mohapatra
A Novel Energy-Efficient Sensor Cloud Model Using Data Prediction And Forecasting Techniques, Kalyan Das, Satyabrata Das, Aurobindo Mohapatra
Karbala International Journal of Modern Science
An energy-efficient sensor cloud model is proposed based on the combination of prediction and forecasting methods. The prediction using Artificial Neural Network (ANN) with single activation function and forecasting using Autoregressive Integrated Moving Average (ARIMA) models use to reduce the communication of data. The requests of the users generate in every second. These requests must be transferred to the wireless sensor network (WSN) through the cloud system in the traditional model, which consumes extra energy. In our approach, instead of one second, the sensors generally communicate with the cloud every 24 hours, and most of the requests reply using the …
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
The Role Of Network Components In Improving The Reliability And Survivability Of Mobile Communication Networks, Dilmurod Davronbekov, Utkir Karimovich Matyokubov
The Role Of Network Components In Improving The Reliability And Survivability Of Mobile Communication Networks, Dilmurod Davronbekov, Utkir Karimovich Matyokubov
Acta of Turin Polytechnic University in Tashkent
This article compares the different architectures of mobile communication networks (MCN) and examines the survivability of the network. Typical survival strategies for improving MCN survivability, failure mitigation strategies for network elements, wireless network survival rates, failure scenarios at MCN levels, and survival indicators are presented. The importance of fiber-optic communication in the construction of communication lines between MCN components has been studied. The issue of designing MCNs in a cost-effective and highly viable way is considered, and the necessary expressions of the design process are given.
A Study Of Static And Dynamic Characteristics Of Multifunctional Signal Converters, Akmal Abdumalikov
A Study Of Static And Dynamic Characteristics Of Multifunctional Signal Converters, Akmal Abdumalikov
Chemical Technology, Control and Management
The issues of continuity, accuracy, speed and reliability of signal conversion, which are the main problems of quality control and management of production processes, remain relevant. Research shows that in practice there are different signal variables, the study of which is highly formalized in a number of modeling tasks and basic classification studies, in particular transients in converters, its sources and elements requires a unified mathematical approach, that is, visual, highly formalized modeling and research based on it. The paper presents a graph model of multifunctional signal converters that provide microprocessor and electronic devices with signals in the form of …
Occ Future And Obstacles Under 5g Requirements, Noor Jihad, Sinan Abdul Satar
Occ Future And Obstacles Under 5g Requirements, Noor Jihad, Sinan Abdul Satar
Emirates Journal for Engineering Research
Telecommunications specifications of the fifth-generation (5 G) are being established to satisfy the rising demands of high-speed broadband networks (i.e., a few tens of Gigabits every second). The 5 G standard derives primarily from a rising number of subscribers and a multitude of various apps, commonly referred to as smart devices, communicating as part of Internet-of-Things (IoT) network For 5 G, a few possible developments such as millimeter waves, large multiple-input multiple-output, and small cell connectivity have appeared. While such technologies will meet 5 G specifications, attention is being given to a complementary potential wireless optical wireless communication (OWC) system. …
Cloud Technologies In Islamic Education Institutions, Alimjon Dadamuhamedov Irgashevich
Cloud Technologies In Islamic Education Institutions, Alimjon Dadamuhamedov Irgashevich
The Light of Islam
Information and Communication Technology is making use of ICT tools to store and retrieves information. It plays an important role in growing and maintaining a country’s economic growth. One of the latest technologies prevailing nowadays is cloud computing. By sharing IT services as platform-based, software-based, and infrastructure-based in the cloud, educational institutions in Uzbekistan can now out-source non-core services and better concentrate on offering students, teachers, faculty and other staff the essential tools to help them succeed. This paper looks at how Cloud Computing can be applied in the study of ICT and focuses on the role of cloud computing …
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
Algorithms For Data Reliability Based On A Cryptographic Distributed Database (Blockchain), Fayzullo M. Nazarov, Akmal R. Akhatov, Farkhod F. Meliyev
Algorithms For Data Reliability Based On A Cryptographic Distributed Database (Blockchain), Fayzullo M. Nazarov, Akmal R. Akhatov, Farkhod F. Meliyev
Scientific Journal of Samarkand University
The ever-growing information flow in modern society, the diversity of information technologies, the complexity of tasks solved on a computer, have set many tasks for users of these technologies. Currently, due to the numerous data streams, the need to process this data in a short period is also growing. Due to the large number of data streams for their storage and processing in the shortest possible time it is required to create automated systems. This research paper presents algorithms for solving the problem of increasing data flow by forming a distributed database. Based on this, methods for optimizing the storage …
Trading Up: Exchanging Our Data For A Better Life, Nathan Turner
Trading Up: Exchanging Our Data For A Better Life, Nathan Turner
Marriott Student Review
We live in a data-driven economy. Many people feel like consumers are on the losing end of an economic data-battle with tech giants, but this is simply not true; our data can drive innovation. That’s right—personal data collected from you and me can influence new technologies that will improve our lives. This should excite us, but our fear of losing data privacy can quell our excitement for progress and even restrict innovation. Our quality of life has already begun to improve through data driven innovation, and technological progress is not slowing down. If we let our fear of losing data …