Author: Lenny Muraya

Approach to Enterprise Data Security and Privacy on Converged ICT Platforms

Information and Communication Technology (ICT) convergence refers to the fusion and/or integration of individual ICTs in order for the fused or integrated technologies to operate as a single unified ICT platform without clear boundaries between them. Convergence of technologies is mainly driven by needs that cannot be addressed without this technological integration or fusion. This…

To access this post, you must purchase Ultimate Membership.

Read More

The Basic Elements of Risk Analysis and Risk Analysis Approaches

In the recent years, there has been a trend by organizations to adapt Information and Communication Technology (ICT) platforms to operate their business processes. More and more organizations have been endeavouring to have nearly all parts of their value chains automated, by having them operated on electronic platforms. This has led to the automation of nearly all parts of Information Systems (IS) for most organizations. This applies both to the private sector and the public sector, as more and more public services are ported onto electronic platforms.

To access this post, you must purchase Ultimate Membership.

Read More

Customer Management Within a Business Process Management Project

EXECUTIVE SUMMARY Business Process Management is a complex project in any organization as it touches on an organization’s business and revenue models. It is therefore the essence of any organization. Anything that impacts an organization’s business processes cannot be handled casually. This is why it is vital to ensure that once a Business Process Management…

To access this post, you must purchase Ultimate Membership.

Read More

The Wired Equivalent Privacy (WEP) Encryption

EXECUTIVE SUMMARY Wireless networks have been adopted for use both within organizations’ brick-and-mortar precincts and in many public areas like hotels, university campuses, modern city malls, homes, in airliners, and even in some public service vehicles. A way of integrating security within the wireless network infrastructure is therefore crucial to safeguard the data in motion…

To access this post, you must purchase Ultimate Membership.

Read More

Implementation of Redundant Array of Independent Disks (RAID)

EXECUTIVE SUMMARY Redundant Array of Independent Disks (RAID) involves making multiple, smaller hard disk drives to operate like large, high-performance disks while keeping costs low. Various RAID configurations exist to address the various storage requirements of different data operation processes.   RAID storage is complemented and augmented by other storage devices and technologies. This journal…

To access this post, you must purchase Ultimate Membership.

Read More