Independence Day Keynote Speech: The rebirth of a Nation: An insight into the dexterity of our founding fathers and their vision for Nigeria and the issue of nation-building.Read More
Information is power and the most critically sought commodity in today’s world. Those that control the information are usually seemed to be the most powerful in our contemporary society. Therefore, for the past thirty years, there has been a controversy resulting from accusation and counter-accusation of imbalance flow of information from the west to south. The purported victims which are the developing nations have been raging bitterly over the news coverage of events in their continent and have denounced western newspapers, journals, and television outlets for their alleged sensationalism and anti-development bias (Legum & Cornwell, 1978). Due to this controversy, on several accounts, developing nations have attempted to engage the western nations through different channels to address the issue of global information inequality. One that may readily come to mind is the UNESCO meetings in 1969 (Sean , Elie, Sergei , & Somavia, 1980), 1974 (Mowlana, 1985), 1976 (Bandopadhyay, 2006) and 1980 (Tokunbo, 2000) consecutively, where the UNESCO group of experts on mass communication and society noted in its disturbing but revealing report that: What has come to be known as the free flow of information at the present time is often, in fact, a one way rather than a true exchange of information.Read More
News flow controversy: evaluation of news imbalance and distortions – the author will be discussing the developing world perception of new world information order, seeking to find what changes they expect from it. The essay will also attempt to identify the positions taken by these disputants by closely looking at the exchange of charges and counter-charges between those demanding balance in the news and those demanding journalistic freedomRead More
The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain confidential. Cryptography provides a solution to this problem, but it has spawned a heated policy debate. Some government agencies want to restrict the use of data encryption because they fear that criminals and spies may use the technology to their own advantage. However, Encryption Techniques so far has both advantages and disadvantages to the society and issues about abuse required a formularized policy.Read More
Understanding of Encryption Techniques and its advantages and challenges – The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain confidentialRead More
This paper is aimed to discuss congestion control and review TCP functionality that provides congestion control techniques of handling buffer –overflows, loss of packets and congestions that we experience over a network. The primary focus is on discussing the four intertwined algorithms, namely slow start, congestion avoidance, fast retransmit, and fast recovery, which will help us to solve this congestion problem. The algorithms are rooted in the idea of achieving network stability. We demonstrate in this paper how the implementation of this algorithm reduces congestion over the congested network and more importantly how it scales gracefully in the network environment by providing high utilization and low queuing delays.
In this paper, we factor out the common denominator underlying these variants, these decoupling dimensions are illustrated by presenting the publish/subscribe paradigm with traditional interaction paradigms. Second, we present the many variants of publish/subscribe schemes: namely. Topic-based or list-based, content-based and broadcast based. Third, In particular, their respective benefits and shortcomings are discussed in terms of securities and implementations.