Cloud Computing (Support)

“Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased”, (Armbrust et. al., 2010).  INTRODUCTION  Cloud computing concept didn’t come to the light to swallow … Continue reading Cloud Computing (Support)


Biometric Technology

INTRODUCTION With the introduction of biometric studies into the computer science, the first devices and methodologies started to grow in such manner we can see fingerprints scanners in airports, voting machines in democratic countries and even in ATM’s (very common in Brazil). There are different methods to identify an information system user, including fingerprints and … Continue reading Biometric Technology

Blocking Methods

In usage almost 99% of the companies computers, the windows operating system have huge evidences of its fragility in the protection of malware and spyware, which are easily installed and replicated through many machines in the work environment (Chris Hoffman, 2016). As a security solution blocking methods including blocking websites, and monitoring the computer activity … Continue reading Blocking Methods