Search
Now showing items 51-55 of 55
A prototype for threat detection on big data using behavioural analytics for government ministries
(Strathmore University, 2015)
While no one would dispute the capability of big data to enlighten enterprise operations, the present methods of mining and managing big data are still evolving and are posing serious security and privacy challenges. ...
Converged network access solution for mass network connections : case of Last Mile Networks
(Strathmore University, 2014)
In current network access, customer premises equipment (CPEs) connect to a single
network option at a time, the CPEs operate based on established connections. Although
telecommunication companies have designed and ...
An explanatory study on the determinants of internet access penetration in Kenya
(Strathmore University, 2011-05)
This study was undertaken using primary and secondary methods to provide gainful insight on those factors that have shaped Internet Access Penetration in Kenya and hence make conclusions on the determinants thereof. Internet ...
The Effect of engagement strategies on the employee engagement of millennials in Kenya’s software development firms
(Strathmore University, 2021)
This paper analysed the effect that four (4) specific employee engagement strategies had on employee engagement in the software development space in Kenya. The study was guided by these four objectives/strategies; where ...
Critical factors that influence growth of technology-based Small and Medium Enterprises: case of software as service providers in Nairobi, Kenya
(Strathmore University, 2021)
Small and Medium-sized enterprises all over the world especially in third world countries play an important role in the economy and contribute substantially to unemployment reduction. This sector is emerging today as an ...