The various types of books I read, and my curiosities caused me to have a more diverse intellectual life. I have read quite a few fictional books over the years. The Harry Potter series, The Mortal Instruments series, and the Hush, Hush series are only a few of the fictional novels that I have read. I have also read quite a few non-fictional books like The Biography of Woodrow Wilson by John M. Cooper, and The Innocent Man by John Grisham. Nowadays, I typically read historical and fantasy…
Fred Brooks is the first recipient of ACM Allen Newel Award. This award is presented as a token of honour to the individuals for their contributions in bridging Computer Science with other disciplines. In the article “The Computer Scientist as Toolsmith – II”, Brooks has given the opinion that Computer Science is probably not the best name that is coined for the discipline of computers which deals with solving problems for the users. Explaining the core difference between Science and Engineering…
My journey starts in Rwanda, a small country in East Africa. It started after I excelled in the national examination, an exam for high school students pursuing college admission, and got rewarded a scholarship to study college in the US. The experience I gained throughout my scholarship period, research, and background inspired me to pursue graduate studies. This goal has been an important reason for both my education and life pathways. In Rwanda, my country of birth, there is a presidential…
Money First is one of the largest banking institutions in the nation. The main goal of Money First is the satisfaction of their customers. This is a multi-facetted goal which includes the accepts of security and data backup. For the past 50 years, data has been increasingly being considered to be an asset to organizations. Therefore, organizations are becoming more concerned about data security strategies and backup management plans. Money First is no different. Customers expect their…
Nicholas Carr's article “All Can Be Lost: The Risk of Putting Our Knowledge in the Hands of Machines” gives much insight through his eyes on the world we live in today and the constant reliance on computers. This article looks into some major technological advancements of today and how these technologies have affected the role people play, and tan individual's abilities. One major technology that is evaluated in Carr’s article is autopilot and the risk it and technologies like it can cause. As…
Mark Weiser discover a brand new word “ubiquitous computing" around 1988, throughout his tenure as Chief engineer of the Xerox town research facility (PARC). each alone and with PARC Director and Chief somebody John Seely Brown, Weiser wrote a number of the earliest papers on the topic, mostly process it and sketching out its major issues. Recognizing that the extension of process power into everyday situations would necessitate understandings of social, cultural and psychological phenomena on…
Passport photos are usually used for many purposes. The most important of them all is to make ID cards. There are several ways through which this type of photograph can be produce. It can be taken directly or a full size photograph cropped. To crop a full size photo, one has to use passport photo software. Unlike in the past, now photographers do not have to take portrait sized photos so as to produce passport photographs. They can use a photograph of any size and produce the desired photo.…
1) Hatman: Intra-Cloud Trust Management for Hadoop AUTHOR: S. M. Khan and K. W. Hamlen Information and calculation uprightness and security are real attentiveness toward clients of distributed computing offices. Numerous generation level mists hopefully accept that all cloud hubs are similarly reliable when dispatching occupations; employments are dispatched in light of hub load, not notoriety. This expands their defenselessness to assault, since trading off even one hub suffices to degenerate…
ABSTRACT: In cloud computing, load balancing is one of the key issues. Load is a measure of the amount of work that a computation system performs which can be classified as CPU load, memory capacity and network load. Load balancing is the process of apportioning the load among various nodes of a distributed system to improve both resource utilization and job response time. Load balancing ensures that every node in the network does approximately equal amount of work (as per their capacity) at…
MidTerm Exam Question 1 Cloud computing is open space where you can place all our music and videos at one place. We can listen to the music, play video games and watch videos from anywhere and not necessarily connect to the computer. So, after turning off computer we can listen to music and watch videos through other device. Question 2 (c) Maintenance: First of all, you do not have to spend more money on the high ended hardware devices to store and retrieve your data. All the hardware and…