Digital fragmentation, characterized by disjointed systems, duplicate data, and incompatible interfaces, is a growing problem that undermines the effectiveness of technology in managing information and delivering services. This fragmentation leads to cybersecurity vulnerabilities, redundant identity verification, increased operational costs, and a diminished capacity for coordinated decision-making. Users of the Internet deserve streamlined, efficient, connected systems […]
Online learning – Right Words
Attendance is different online, in fact, it’s called participation. Attendance is not a part of online learning. I think it’s important to use the right words and definitions that differentiate online learning from traditional in-person, classrooms of physical spaces. I say this simply because of much explanation necessary to evaluate and explain differences and use […]
Strategic Planning – Technology Evaluation
A set of two words summarizing a planned effort to identify and pursue opportunities for technological change. Innovation is the change that initiates strategic planning; either as a matter of adapting to conditions outside the sphere of influence and locus of control or cultivated by new thinking and a need for change. A new approach, […]
Technology – Qualitative Research
When trying to adhere to program requirements of another discipline (or educational department), not only must the new method be learned and understood how the method is useful to prove theories or test hypothesis’ in advanced topics, but also whether or not it can be applied to the specific field of study. Some methods were […]
Medical/Dental X-Ray Technologies
Problems: The technician states they need to take a picture of the inside of the mouth or body to proceed with any medical or dental procedure (all dental procedures), meaning they need to look inside, just as they use their eyes to look inside for oral inspection or use their hands to feel the area […]
Technology Controls
Limiting or ‘manipulating’ the interests of viewers, readers, listeners, and skewing thoughts and ideals using bad business mentality, where there is a price for attention, pretty pictures, and likeability. Why should you or I be paid to read my book or listen to me speak? Education is not free; we are not in elementary school […]
An Integrated Architecture
An Integrated Architecture What is integrated architecture? In brick-and-mortar terms, or simply building architecture, of which I’m not sure integrated architecture truly exists, would be designed with elements that work together, or parts of each, such as Modern, Masonry, Victorian, Italian, Asian, often associated and varied by culture or timeframe in which it was designed. […]
Law and Compliance Review
Background To establish methods for reviewing and testing compliance, one must understand the structure of the law, its application, its limitations, and how technology is related to the law’s implementation. If no system of compliance exists, then is it even necessary to create rules and compliance if law, regulation, and policy are not a part […]
Policy and Regulation
Listen to associated Podcast: Law, Policy, and Compliance: RDT&E and Standardization What is it, where do I find information on ‘compliance’ and what it means to Information Technology? Is it truly a departmental necessity in every company, or is it built into the research, development, and test phase of the software development lifecycle. What about […]
Identity and Security Design of the Internet
Security Interoperability: A More Efficient Internet Design Research Problem:The Internet does not have a shared data architecture that allows for centralized management of personal information. Each Internet Site that is protected by encryption utilizing a profile and account management system is individualized and users create accounts manually, without an automatic profile copy option. Leveraging account […]
Google’s Sign In With Feature
Why are we okay with massive duplication of our personal information? A mini thesis on risks, benefits, and challenges for users, developers, and companies. There is even some interesting information for investors and security professionals to consider. Profile Security Problems
Software Development Methodologies
Agile, Scrum, DevOps, Lean Development, Waterfall Resources: Software Development Lifecycle Guide – Software Development Life Cycle (SDLC) is a process used by the software industry to design, develop and test high quality softwares. The SDLC aims to produce a high-quality software that meets or exceeds customer expectations, reaches completion within times and cost estimates. These […]