Through the mind of a Neo-Luddite

Neo-Luddite criticisms of technology and counterarguments Computers cause massive unemployment and de-skilling of jobs. Computers have indeed created new jobs and increased employment for both low and high skilled workers. Computer usage around the word has proliferated giving rise to jobs such as data entry clerks, programmers, web developers and repair technicians that never existedContinue reading “Through the mind of a Neo-Luddite”

Secrets about Project Nightingale

Medical records traditionally were stored in paper folders, the healthcare industry is moving towards electronic data collection and storage.  Ascension shares names dates of birth, diagnosis, lab results and   hospitalization information of patients and shares this with Google in a project called Nightingale.  This project claims to use Artificial Intelligence to improve information for patientContinue reading “Secrets about Project Nightingale”

“2020” Pandemic Tool Kit

The following technologies are necessary for response to any pandemic in 2020: The Infusing of location services into dashboard technology on a user’s device. This will allow users to be able to identify locations in close proximity to them that offer aid or hospitals with available accommodation.  Additionally a user with symptoms may use theirContinue reading ““2020” Pandemic Tool Kit”

Can an employee be fired for content posted on social media?

YES!!!!!!! It is reasonable to fire an employee for content posted on social media.  An employee of an organization has a responsibility to the organization and their employer to conduct themselves in a professional manner. As an employee one is looked at as a representative of the organization therefore the expectation is that the employeeContinue reading “Can an employee be fired for content posted on social media?”

Using a former hacker to enhance security.

A company that engages in ethical hacking has many advantages to gain.  The ethical hacker uses the same techniques that would have been applied by a black hat hacker to ascertain the vulnerabilities of a network.  A company that does this gains strategic advantage, by being able to foresee these vulnerabilities and to apply correctiveContinue reading “Using a former hacker to enhance security.”

3 privacy concerns currently impacting society

Employee Monitoring  This involves monitoring employees in the workplace through video surveillance, telephone monitoring, e-mail and voice mail monitoring, computer keystroke tracking, internet web site monitoring, with or without an employee’s knowledge. The action of employee monitoring is taken by employers to monitor staff in an attempt to improve productivity. Employees who are aware theyContinue reading “3 privacy concerns currently impacting society”

Is intellectual property like physical property?

Intellectual property is not like physical property. Firstly property is a general term which applies to any item or thing for which ownership can be extended to. Therefore an individual’s property can be a phone, house, land, computer or car to name a few. According to the world intellectual property organization Intellectual property refers toContinue reading “Is intellectual property like physical property?”

My First Blog Post

A review of Fifth Generation Networks (5G) — Anthoneal Knight What is 5G? Rouse (2020) defines Fifth generation wireless (5G) as the most recent cellular technology existing with the main function being to increase the speed of wireless networks.  This network facilitates the transmission of data over a wireless broadband multigigabit speeds estimated as highContinue reading “My First Blog Post”

Design a site like this with WordPress.com
Get started