Posts

Showing posts from 2021

Future of Computers in HealthCare

Image
 I chose the healthcare industry to provide the role of computers there in.   When monitoring patients, doctors and nurses can take records and direct medications at the point of care. This reduces a lot of potential for errors from employees trying to read the writing or remembering the circumstances later on. It also adds performance because doctors and nurses can enter relevant data on the scene.  Medical computers measure medical devices that operate CT Scans, ultrasounds, MRIs, or blood tests. They can even be combined into the equipment itself, freeing space.     Additionally, doctors and nurses can show subjects their X-Rays and other pictures or videos to explain their health and medication.  Computer monitoring saves lives in hospitals. Computers control heart rate monitors, lab equipment, blood pressure monitors, and other crucial medical equipment and notify staff if something is not correct.  In some cases, computers can aid doctors in procedures, making situations more saf

File & Memory Management

Image
  Part 1: Backup Files Computers organize and store files on the hard drive and other removable drives in folders or directories.  File backups are essential for multiple reasons, easy access, drive failure, viruses, etc.  One example is if the operating system fails, then we can retrieve our files from the backups.  My current backup plan is using Google Drive; it is convenient and valuable.  I backup my files weekly.  My only challenge is to remember my backups and cataloging them. Part 2: Determine RAM Random-access memory (RAM) is a hardware component used to store temporary data for the programs running on computers, smartphones, gaming consoles, and other devices. Operating systems (like Windows and macOS) need to have a certain amount of memory installed to boot up.   RAM and HDD are both types of computer memory. RAM is used to store computer programs and data that the CPU needs in real-time. RAM data is volatile and is erased once the computer is switched off. The hard disk ha

Analyze & Design A Blog

Image
  Analyze and Design a Blog   The blog's target audience is the readers that will read the blog the most and benefit from it.   They will find the most value in the blog content and will appreciate it.   We need always to keep the audience in mind.   My target audience is people interested in technology news and articles.   My design has to be crisp and updated to keep the audience interested.   My method has to incorporate the latest technology trends and should also contain the newest technology topics. Mortals are occupied, have low attention spans, and are flooded with a sea of content daily. So first opinions matter more than ever. You only have about 3 seconds to draw a website guest in, tell them what you do, and make them take action.    Here are some options to consider: 1.     Graphical Header Picture – A header picture or professionally designed image can significantly increase the perceptions and credibility of the blog 2.     Trendy Tagline – The goal of th

Tech Topic Connection

Image
  The healthcare industry is growing slowly compared with other industries using computers.  Since the dawn of Windows personal computers, healthcare computing has grown by leaps and bounds.  Healthcare requires on a lot of sensors and peripherals to read and display data.  Scanners, printers, Pulse monitors, oxygen sensors, blood pressure monitors, etc.  Healthcare uses high-level programming languages and programs execution methods.  Healthcare is mostly going web-based, and that means more integration and availability both on and off-premises. A lot of healthcare data is stored in databases, and database management is the key to the success of an application.  Especially with the increased use of electronic health records, databases are becoming fundamental in healthcare use.  Healthcare is also under malware and other online attacks that make their systems very vulnerable.  The industry needs to invest in high-grade protection systems to defend against multiple online threats.  Int

Network Security

Image
  A ping flood DDoS attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an intruder tries to overcome a targeted device with ICMP echo requests. Typically, ICMP echo-request and echo-reply messages are used to ping a network device to diagnose the device's health and connectivity and the link between the sender and the device.  The network is forced to respond with an equal number of reply packets by flooding the target with request packets. This causes the target to become unavailable to regular traffic. A ping attack demands that the intruder knows the IP address of the destination. Attacks can be divided into three kinds, arranged by the target and how the IP address is resolved: Blind ping – This involves using an external program to reveal the IP address of the target computer or router before launching a DDoS attack. Router disclosed – the ping flood targets routers to obstruct information between computers

Computers in the Workplace

Image
  Subject:  Computer Purchase - Basic Date:  Sep 2, 2021 Contender 1:  ASUS ROG Strix G17 G713QR-XS98 - $1899 AMD Ryzen 9 5900HX 3.3GHz Processor NVIDIA GeForce RTX 3070 8GB GDDR6 32GB DDR4-3200 RAM 1TB Solid State Drive Microsoft Windows 10 Pro 10/100/1000 Network 2x2 Wireless LAN Wifi 6 (802.11ax)+Bluetooth 5.1 3" Full HD Anti-Glare IPS 300Hz Display   Contender 2:  Acer Predator Triton 500 PT515-52-77P9 - $1899 Intel Core i7-10750H Processor 2.6GHz NVIDIA GeForce RTX 2080 SUPER with Max-Q Design 8GB GDDR6 32GB DDR4-2933 RAM 1TB Solid State Drive Microsoft Windows 10 Home Killer Ethernet E3100G 10/100/1000 Network Killer Double Shot Pro Wireless-AX 1650i Bluetooth 5.0 6" Full HD Widescreen LED-backlit IPS NVIDIA G-SYNC 300Hz 3ms Overdrive Response Time Display Winner:  Contender 1:  ASUS ROG Strix G17 G713QR-XS98 - $1899.  This is the clear winner because it has a faster CPU and Graphics card.  Also the screen is bigger.  All in all a better pc.   LG 34WL85C-B.AUS 34"

Traveling Through A Network

Image
  Ping Activity: Google.com Google.com.au Google.co.jp Traceroute Activity: Google.com Google.com.au Google.co.jp The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops.  Each packet hops to a local Internet service provider, a company that offers access to the network, usually for a fee.  The next hop delivers the packet to a long-haul provider, one of the cyberspace airlines that quickly carry data across the world. This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.  For the system to work correctly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.  The final hop takes a packet to the recipient, which reassembles all packets into a coherent message. A separate message goes back through the network, confirming successful delivery. Distance and time are di

Web/Mobile App Critique

Image
  Netflix Review: Although Netflix's streaming service started as a niche offshoot of its disc-mailing service, it is now the front-runner in the category, thanks to its reliable core catalog and some of the best original programming. Netflix integrates excellent features across interfaces, allows offline downloads on mobile platforms, and features 4K content. However, with other high-profile services now available at lower prices, the expensive costs of Netflix's comparable plans stand out. Netflix has an extensive catalog of video content, but it changes all the time.  Shows available one day may be gone the next. It's difficult to state authoritatively what is in Netflix's catalog at any given moment, but that's all part of the fun. Netflix has lost many of its most-watched shows, including  The Office  (to NBC's Peacock),  Friends  (to HBO Max), and several Marvel movies (to Disney+). This is potentially dangerous new ground for Netflix since it will need to

About Me

Image
  Find a good and calm place to raise a family and put down roots.  My goal is to learn the skills needed and then assist local governments with their security needs.   We have seen increased ransomware and malware operations trying to cripple our utilities, hospitals, and police departments.  Each of us has to help each other from a humanity and morality perspective.   All it takes for evil to prevail is for good men and women to do nothing.    BlogThis! Share to Twitter Share to Facebook