Overview of Cryptography Cybersecurity, Data Privacy & eDiscovery Law & Policy eJournal

The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain confidential. Cryptography provides a solution to this problem, but it has spawned a heated policy debate. Some government agencies want to restrict the use of data encryption because they fear that criminals and spies may use the technology to their own advantage. However, Encryption Techniques so far have both advantages and disadvantages to society, and issues about abuse require a formularized policy.

Effect of Brain Drain or Skilled Labor Migration on Economic Development and Economic results of migration

This paper reviews the problem of brain drain or skill migration from developing countries mostly to industrialized countries. Some case studies are presented to illustrate some major problems facing Africans today in not being able to utilize optimally the human as well as material resources endowed to us by Almighty God to enable us to render our expertise for the development of our continent of Africa. This proposal includes the setting up of an International Academy of African Academics and Professionals in Diaspora (IAAPD). It is envisaged that IAAPD will have a Talent Bank which will be a database on African Academics and Professionals living and working inside African countries as well as outside with detailed information about the experts, their areas of expertise and products developed etc. Furthermore, professional resource centres which will be land-based as well as cyberspace or virtual based will be set up made of published information (journals, technical reports) and specialized research equipment/facilities available in African countries where African Academics and Professionals can have access to for their use as well as for developing upcoming African Academics and Professionals. It is envisaged that African countries will create an enabling environment through entry visas and professional short visit regulations for African academics and professionals to use their Sabbaticals, annual vacations, study/research leave, professional short visits etc. academic/ professional staff exchange to go to other African countries to render their service.

Parallel Merge Sort

Parallel Merge Sort – implement a classic sorting algorithm utilising concurrency Distributed System, Sorting Algorithm, Distributed System

The aim of our project was to implement a classic sorting algorithm utilizing concurrency. We decided on Merge Sort because of its inherent parallelism. Sorting in general has been hailed as a cornerstone in Computer Science [SHG09], as many computer algorithms rely heavily upon it. Such an algorithm is for example the classic Kruskal algorithm for constructing a minimum spanning tree of an undirected graph [Kru56]. Merge Sort is based on the popular Divide-and-conquer approach [CLR02], where the problem at hand is broken into smaller problems of similar nature, which are in turn solved recursively, and the solutions are then combined.

When Walmart enters the Finnish Market what should a Finnish retailer do strategically?

When Walmart enters the Finnish Market what should a Finnish retailer do strategically?

Nowadays, due to globalization, an increasing number of retailers in developed countries are shifting their priorities and focusing more on a growth strategy by reducing their dependence on their home markets and making expansion into more attractive foreign markets. This foreign market expansion and retailer globalization strategy generally pose a threat and cause panic to the local retailers and local businesses that have been targeted for such foreign market expansion.

TCP Congestion Control by Onwutalobi Anthony-Claret-thumbnail

Congestion Control and review TCP functionality

This paper is aimed to discuss congestion control and review TCP functionality that provides congestion control techniques of handling buffer –overflows, loss of packets and congestions that we experience over a network. The primary focus is on discussing the four intertwined algorithms, namely slow start, congestion avoidance, fast retransmit, and fast recovery, which will help us to solve this congestion problem. The algorithms are rooted in the idea of achieving network stability. We demonstrate in this paper how the implementation of this algorithm reduces congestion over the congested network and more importantly how it scales gracefully in the network environment by providing high utilization and low queuing delays.
[...]

The Many Faces of Publish and Subscribe and Its Impact on the Future Internet

In this paper, we factor out the common denominator underlying these variants, these decoupling dimensions are illustrated by presenting the publish/subscribe paradigm with traditional interaction paradigms. Second, we present the many variants of publish/subscribe schemes: namely. Topic-based or list-based, content-based and broadcast based. Third, In particular, their respective benefits and shortcomings are discussed in terms of securities and implementations.
[...]