Press "Enter" to skip to content

Bored Giant

Legacy vs. Modern Information Systems

There is a huge difference between the information systems that were run on older operating systems and modern information systems. To begin with, the legacy…

Key Length and Security

The security of information systems and the key length applied in encryption is very closely related to each other and determines the level of security…

Keeping your Defenses Firm

Any information system used at a company, business, or organization tends to be connected or networked to the outside world and users through a network…

Keeping Track of System Access

System access is an important aspect of information system security as the people who are allowed to access certain portions of the system can make…

Keeping Track of Swarms of Information

Swarms of information might sound like a strange data structure to be used in the storage and representation of information, but in essence, they are…

Keeping Track of Sales and Stock with Computers

Business management is something that has been traditionally restricted to books and other paper records. They were hard to maintain, and managing them was a…

Keeping Information Secure

Information should be kept secure at all times and stages of its processing from the very moment it is input to a system right up…

Keeping Critical Systems Online

Uptime is a factor of the online system’s performance that determines whether or not they are accessible or even reachable by the customers concerned with…