Posts

Application of Algorithmic Design and Data Structures in Developing Structured Programs

Image
 In all computer programming including Java, there is often multiple ways to solve a problem. As experience is gained in a Java programming, the coder will develop an intuition for selecting the right algorithmic design and data structures based on the problem or design they are trying to solve or achieve. To understand Algorithms in its simple terms, it is a step-by-step procedure or set of rules for performing a specific task or solving a particular problem. When designing on applying Algorithmic design, the software developer must consider the nature of the task. Questions such as the does your application involve sorting, searching or optimizing. Understanding Algorithms and applying it to what your trying to solve, is a determining factor. With respect to data structures, we first my understand what is a data structure. Data structures is a way of organizing and storing data to perform operations efficiently  with a coded application. There are a few choices that a softwa...

Installing and Learning Java Object Oriented Programming

Image
What is Java Programming  Java is a high-level, object-oriented, and general purpose programming language developed by Sun Microsystems. The main focus of Java was to be a platform that is independence. Java program can run on any device or platform that has a Java Virtual Machine(JVM) installed.  Java is used in a wide range of applications, including web application, mobile applications, enterprise applications and so much more. Key Features and Design Principles: Write Once, Run Anywhere Object-Oriented Platform Independence Security Rich Standard Library Automatic Memory Management Multithreading Helpful Informational Links to Install and Learn Java: Installation and Directions https://www.java.com/en/download/help/download_options.html    https://docs.oracle.com/en/java/javase/21/install/overview-jdk-installation.html Learning Java https://www.freecodecamp.org/news/learn-java-free-java-courses-for-beginners/#java-tutorial-for-beginners  https://www.udemy.co...

Tech Topic Discussion - Healthcare Technology Management and Information Technology

    Tech Topic Connection:   Healthcare Technology Management focuses on Medical equipment to save people's lives all across the world. In recent years, the industry has shifted and begun integrating to be more technologically focused. Medical equipment is finding its way onto corporate Healthcare networks, either wired or wireless fashions. Converging Biomedical, medical devices, and Information Technology will bring life-saving devices to the next level. Each medical device has some programming on how the device operates. Keystrokes and operations are all driven by an embedded program in that the CPU receives instructions. Devices such as IV pumps receive initial programming via application and connection dongle to receive drug libraries via wireless networks to ensure all pumps across an enterprise healthcare system have the same version of the drug library. This method promotes standardization and reduces drug misadministration. Another example of software i...

Network Security

                  Network Security   Miguel Artache The University of Arizona Global Campus TEC101: Fundamentals of Information Technology and Literacy Professor Amr Elchouemi May 24, 2022       Computer networks are the backbone of our everyday lives. We interact with computers and networks daily to shop, plan vacations, go to school, and do research. The Internet superhighway allows everyone accesses to every piece of information available on the Internet. The unfortunate part of the information superhighway is the malicious activity by individuals or groups with a purpose. The basics of Ping is to tell you if the destination is online and communicating. Network Administrators and Ethical hackers use Ping for basic troubleshooting. Ping packet floods from multiple hosts can carry out distributed Denial of Service Attack (DDOS) simultaneously. Here is an example. A hacking group wants...

Healthcare Digital Transformation

  In the past several years, the Healthcare industry has been going through a technological transformation. All hospital service lines have moved from paper charts to electronic charts. Electronic Medical Records are leading the way in this transformation. From physicians to nurses, you see workstations on wheels and ipads in the hands of clinical staff. Many hospitals are moving to Epic to centralize that patient healthcare record data and take advantage of patient portals. Patient portals provide seamless access for patients to medical records anywhere. The fact is that the patient owns their medical records and needs to have access quickly for follow-up appointments. In the old days, you needed to go to the hospital patient record depart and request that your patient files be printed. As computer networks grow in speed and security, more healthcare organizations move medical devices to their networks for patching and security hardening. Many organizations have commented on build...

Traveling the Network Routable Path

Image
  Network packets travel through the network using switches and routers between the source and destination. There are the preamble, source, and destination in each packet and the information being sent (Payload). Using a packet tracing application such as the Cisco IP Packet tracer allows the Network Engineer to follow the packet path through the network and determine if their problems along the path. Diving a bit deeper, the network hop path can be manipulated using routing protocols or administrative distances. In other words, you can traffic shape packets to take network routes that you want. I was a Network Engineer in my previous professional life and often used both of these tools. The PING command is important because it could tell me if the destination device is online. The challenge with PING is if the remote device is blocking ICMP protocol, the ping packets will fail to reach the destination. However, this does not mean the device is offline. By default, you send a 32byt...

Reflections on Microsoft Office Applications

              Role of Applications Reflection Essay   Miguel Artache The University of Arizona Global Campus TEC 101 Fundamentals of Information Technology and Literacy Professor Amr Elchouemi May 9, 2022             One encounters word processing, spreadsheet, presentation, and database application in the business world. Each application has its unique advantages and disadvantages based on given scenarios and situations. Each of us encounters these applications in one way or another. Understanding each application allows you to work through tasks quickly and know the proper application to apply. I will delve into each application through my reflection essay and outline the framework. Word processing applications such as Microsoft Word are the market letter in anything that requires processing letters, mailing labels, and forms with check boxes and fillable sections for any busi...