Optimization of Elliptic Curve Digital Signature Algorithm (ECDSA) and Its Implementation

Abstract: In the present era, developing high-level application programs has been a major concern for the programmers. Elliptic curve digital signature algorithm (ECDSA) is one of the fastest growing fields in cryptography. In the internet communication, securing e-commerce and other online transactions requiring authentication is a necessity. Optimization involves making a program bug-free, reduced time … Read more

How is Telemedicine impacting patients and providers?

How is Telemedicine impacting patients and providers? As a fast-growing field in the healthcare sector, telemedicine shows a lot of promise in solving various difficulties that health professionals and patients are facing today. Supplying a range of advantages for both patients and medical providers, it offers: Pros of Telemedicine Adopting the latest telemedicine initiatives can … Read more

Types of Information and Managerial Hierarchy.

There are generally three types of information required in the decision-making process within a typical organization hierarchy, namely, the operation information for the operation level, the tactical information for the mid-tier of the organization and strategic information for the top level of the organization. The types of information required at different levels of managerial hierarchy. … Read more

What is DSDM?

DSDM used to stand for ‘Dynamic Systems Development Method’ but as the method became widely used in areas that were not solely for I.T. and ‘systems development’ it was decided to drop the acronym. DSDM does not stand for anything anymore although the strapline of ‘Driving Strategy, Delivering More’ often appears. DSDM has been developed … Read more

Trezor 2.0 overview

What is trezor? Trezor 2.0 is the hardware wallet for securely store Cryptocurrencies. It’s simply USB connectable and allow to receive, store and send bitcoin, ethurum, ethurum classic, Zcash, Litecoin, Namecoin, dogecoin, dash and bitcoin testnet. Basic Technical Details about trezor 2.0 CPU – 120 MHz embedded ARM processorScreen – Bright OLED – 128 x … Read more

Brief History Of Cyber Security

Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. There are four types of security controls access, flow, inference, and cryptographic complement each other. These all four types of component do their work individually. Access controls operate at … Read more

Interpersonal Communication Skills

Working in the industry of IT, people communicating across the globe is something that is highly likely, recognising other people’s backgrounds and their culture is important to do. Having different religious beliefs require some people to leave during the work hours to practice. This is a cultural difference and can therefore affect communication between some … Read more

SEER software

SEER software is a project management software application which is about algorithmic. SEER software has invested about two and a half decades of research. This software is designed to estimate, plan and also monitor the work required regarding the maintenance project, or software development. SEER, this word comes from the noun, which is referring to … Read more

Statement of Purpose for Technology

Right from my childhood I am fascinated towards technology whichever communicates each other. Being a kid, I loved playing with the telephone lines in my home and unwittingly listen to my cousin” discussions with the help of Two-line phone. At that time, Information flow from one end to another, using a device seemed straight out … Read more

The OSI and TCP/IP Models

During and before the 1980s, there were only a handful of protocols and standards that were around and they belonged to different manufacturers who didn’t have much dialogue with each other. Though eventually computer science and technology continued to be further innovated and become more readily available to companies and the public, it became necessary … Read more

What is Information Security

INFORMATION SECURITY: Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerian hexad, which includes confidentiality, possession (or … Read more

History of ICT in education

In education, ICT has a long history. Technology first used in education a long time ago. But since it’s came to people’s acknowledgement, technology first use in education in 1600s. The Slide Rule: The first educational technology known as Slide Rule was first introduced in 1654 by Robert Bissaker. The instrument was designed for use … Read more

Email as a means of communication

Communication: New communication methods have brought a change to how people are working, this includes the ways in which they work in and how they work together for instance, the facilities used by the employees and the technology being used by them. It is almost impossible to be in a work place that does not … Read more

What is DBMS

Database Management System, a computer software application that interacts with the user, other applications, and the database itself to capture and analyse data (Database). Examples: Well-known DBMSs include MySQL, PostgreSQL, Microsoft SQL Server, Oracle, Sybase and IBM DB2. SQL SQL is just a ANSI standard, and is used as a base with most Database systems, … Read more

What is Freelancing?

What is Freelancing? Understand this as an example. Suppose there is a person who comes very good designing and is a second person to do designing. So if the person who comes to designing, designing for the other person, then the work of the other person will be done and in return, that person will … Read more

Hadoop History

Hadoop is an open source, Java-based programming framework that supports the computing and storage of extremely large data sets in a distributed computing environment. It is section of the Apache project created by the Apache Software Foundation. Hadoop History As the World Wide Web grew in the late 1910s and 2010s, search engines and indexes … Read more

Information System Audit

The information system controls effectiveness is evaluated through an information system audit. An audit aims to establish whether information systems are safeguarding corporate assets, maintaining the integrity of stored and communicated data, supporting corporate objectives effectively, and operating efficiently. It is a part of a more general financial audit that verifies an organization’s accounting records … Read more

Web programming language: PHP

PHP is a well-known web programming language that has been widely used to create exceptional websites. According to W3Techs survey, PHP is being used by 82% of majority web server. This language is popular because of its collaborative features, excellent HTML and database integration support. Today, businesses are moving to the online world, and looking … Read more

Internet threats

The internet has arised as an integral part of the current genesis of people, from communication over instant messages and banking to emails, studying, travelling and many more, internet has affected every facet of many lives. With the increasing continuation by people using the internet, protecting very important information have become essential. A computer with … Read more

Steps of Referential Communication

Referential communication is composed of four steps. The first one is composed of a context-specific signal that has a meaning to the recipient (semantics). Secondly, there is a voluntary control over the signal being produced. In the third step, the signal is detected by the particular recipient. Finally, the signal is understood and the recipient’s … Read more

Challenges and problems faced by NGOs in terms of IT and IS

CONTENTS Despite the governmental support, the sustainability of the NGOs is still influenced by many other problems and challenges which affects their effectiveness in society as well as their efficiency at achieving their goals. Fund development and fund-raising is a NGO’s greatest challenge, particularly during an economic downturn and when unemployment rates are high. The … Read more

The Meaning of Virtual Reality

Communicated with in an apparently genuine or physical path by a man utilizing extraordinary electronic hardware, for example, a protective cap with a screen inside or gloves fitted with sensors. The meaning of virtual reality comes, normally, from the definitions for both ‘virtual’ and ‘reality’. The meaning of ‘virtual’ is close and the truth is … Read more

The application of Information Technology systems

As the application of IT systems is the usage of said systems, it is hard to define how this may be either morally or ethically wrong. The Internet could be considered to be morally dangerous, as a young child could easily stumble across pornography. However, the Internet makes the sharing of information easier for society … Read more

Information Technology Report Essay

The accelerated growth of content rich applications and online gaming, which demand high bandwidth, has changed the nature of information networks. High-speed communication is now an ordinary requirement throughout business, government, academic, and home office environments. Internet access, telecommuting, and remote LAN access are three of the clearly defined services that network access providers are … Read more

NCE Informational System Proposal Summary

The following proposal summary has been prepared by the Information Technology (IT) team describing a new information system required by our Advanced Services Network Consulting Engineers (NCEs). The information provided has been summarized and is intended to provide an overview of the proposed project. Executive Summary Within our organization we have a group of Network … Read more

The Usage of IT in The Banking Industry

Information technology has dramatically changed the way banking is done over the last 15 years or so. The era of change banking in Canada began from the establishment of Interac’s national Automated Teller Machine (ATM) network in 1986. National Debit Card network was introduced in 1994. First full service virtual bank came into being in … Read more

Information Technology

The accelerated growth of content rich applications and online gaming, which demand high bandwidth, has changed the nature of information networks. High-speed communication is now an ordinary requirement throughout business, government, academic, and home office environments. Internet access, telecommuting, and remote LAN access are three of the clearly defined services that network access providers are … Read more

Testing Tools, A Report on what is Commercially Available

Once an application has been developed, the developers must demonstrate that it performs the tasks for which it was designed accurately, reliably and with adequate performance. For this to be fulfilled extensive testing must be carried out and tools have been built to assist with this process. Developers have built different types of tool for … Read more