Sunday, February 16, 2020

Wireless Network Security - Cloud Computing Network Personal Statement

Wireless Network Security - Cloud Computing Network - Personal Statement Example This did not auger well with the ethics of data computing, privacy and security. This gave me the reason to think more on wireless network insecurity as well as the probable way to curb the menace. With thirteen years experience in the computing data; this has given the passion to venture into security measures in the field of computing rather than dwelling on my line of specialization-data structure. Much has been done to improve and enhance data network; but there are those who are out to see the failure of the development. These are the individuals out to hack others data sources and cause harm or use it for unintended tasks. Any individual within a geographical network range of an open, unencrypted wireless network can snuffle, record or even capture the data traffic and get illegal right of entry to the internal network wherewithal and the internet. (Lou, et al. n.d) This may result into sending of spam or even doing other illegal actions using the wireless network internet prov ider (IP) address. Attacks by insiders also pose an often neglected threat scenario when devising security mechanisms for emerging wireless technologies. Therefore, this is a venture that requires someone with a greater passion for sanity on Information Technology. All these may be rare for home routers but highly significant concerning to office networks. Since I have involved myself in the contemporary world of information technology and development, my heart feel disoriented whenever I encounter data insecurity trying to paralyze this marvelous work. With the global growth and embracing of Information Technology by many folks, there is tremendous desire to integrate measures to provide intense security to the data store. However, lack of knowledge on security issues by many, means anyone nearby might access and use the connection. Therefore as an expert in computer studies and having first hand concept on the actual problem on the ground, I feel profoundly obligated to extend my knowledge on cloud computing security. This will not only help in fulfilling my passion but also help the world in alleviating the menace of data insecurity. For my Masters studies at King Abdulaziz University, Jeddah; I dealt with the topic â€Å"The Effect of Visualizing the Roles of Data Structure (RODS) in Student Learning, in a Data Structure Course.† This expounded more on the structure and utilization of data techniques in analysis. I have also attended various conferences and trainings on IT like â€Å"The international Conference on Nanotechnology: Opportunities and challenges, Electronic Exam system, Advanced E-Learning Certificate Program among others.† I have vast working experience in various field of IT like; Head of production and Update of Educational Materials Unit & Lecturer, Instructor in Contact and Support Unit, Technical Specialist in the Admission Unit, and Programmer as well as Instructor; in the student services unit-all in the King Abdulaziz U niversity, Jeddah. My research experience is also vast on Database-based Workflow Management Systems, Accessing E-mail using Speech Technologies, Microsoft Agent Speech Recognition Engines all of which entail understanding the concept data specialty and security among other researches. The above clearly demonstrate the efforts I have made to equip myself with the necessary knowledge that will enhance research on cloud computing security. My choice of Cloud computing is because it moves databases and application software to the large data centers where

Sunday, February 2, 2020

The Challenges of Successfully Implementing a Knowledge Management Essay

The Challenges of Successfully Implementing a Knowledge Management Initiative - Essay Example Regarding the topic implementing knowledge management in an organisation, consumer behaviour, DSL is underway due to the increase in internet users globally. For instance, in 2005, the number of internet users escalated from 941 million users to 1.7 billion users in 2008. , As a result, the website has continued to provide consumers with a new purchasing medium, which is far more different from the knowledge management-purchasing medium. This digitalization is changing consumer purchasing and consumption behaviour (Solomon, 2012). Implementing a knowledge-based system elevates the communication between the organization and the consumer. Based on the fact that internet has changed buying behaviour, companies have not been left behind, as they have started using the internet with the aim of reducing marketing costs, hence reducing their product prices. Companies are also communicating and disseminating information concerning their products online. Moreover, the website has provided a n ew communication medium for DSL (Belch, 2008). Key concepts in knowledge management Smartphone Development Labs (SDL) needs to install knowledge management initiative. Implementing knowledge management in SDL comes with understanding the key concepts in knowledge management. Risk, strength and gap are the key concepts in knowledge management. The elements of knowledge management aid in securing collaboration between the organisation and its employees (Canton, 2007). The challenges involved in implementing management with SDL Knowledge management remains crucial in any organization. It remains an economic challenge for the future of SDL. Knowledge management is a long-term goal, which comes with extreme challenges. The challenges include; power & conflict, cross-culture, leadership &organisational culture and security of information (Hislop, 2009). Challenge 1: Power & conflict Knowledge management comes with managing power and conflict. Data management systems created to ease work f or employees require individual effort to the merger with teamwork. The nature of the knowledge management facilitates access to expert information. Knowledge management facilitates the communication of people in an organisation in terms of the approaches used to solve a given situation (Cleland & Ireland, 2006). As compared to knowledge management buying behaviour, knowledge management initiative plays a role in the behaviour of DSL are influenced by the opportunity of viewing and purchasing products or services, visualizing their needs with available products or services, and discussing products with other consumers globally (Hislop, 2009). In addition, knowledge management assisted the consumer by availability, while DSL’ behaviour aids consumers through convenient purchasing. These are just but a few of the strategies that Smartphone Development Labs (SDL) has adopted to ensure the comfort their employees.