Over the years, people have been generating an increasing volume of health-related data. Traditionally, this data type is produced in citizen-centered health systems where information about patients is collected. Some common sources are patient’s health status record, video/audio exams, known diseases, regular use medicines, etc. Every time a person goes through medical services either elective appointments or urgency/emergency events it produces more data improving the accuracy of tracking each patient’s health. A straightforward advantage of this model is the construction of individualized knowledge that gives support for a diversity of preventive front lines related to diagnosis, treatment, and rehabilitation of…


Murine typhus is classified as a febrile illness that has been eradicated from the United States since the1940s. The vector responsible for its transmission is a flea that infests rats and opossums. The main symptoms are similar to those of other common viral illnesses, including headache, fever, and rash (Doppler & Newton, 2020). After almost eight decades without any registered case of the disease, two people from Galveston, Texas, were diagnosed with murine typhus in April and October 2012. Another new case was reported in the same city in 2013 (Ruiz, Valcin, Keiser, & Blanton, 2020). Ever since, the Health…


When the stable democracy concept is under the spotlight in the specialized literature, there is a common sense that is transversal to many authors. The idea of preservation of a generalized condition composed by multi-factors permeating a society is the core of many definitions related to a stable democracy. The first conception exposed by Eckstein (1961, p. 1) address that simplified view about the theme. The author fundaments the mind of a stable democracy on two main pillars: (i) the ability to maintain the power, and (ii) the capacity to bear without any relevant change in pattern. An analogous perspective…


Security flaws that can introduce vulnerabilities in a software under development are normally repaired in the source code itself. Although it is not always possible to classify a vulnerability as being of only one type, Seacord and Householder (2005) describe three broad classes that have been used to categorize the identified vulnerabilities — “buffer overflows, format string vulnerabilities, and integer range errors (including integer overflow)”. According to Haugh and Bishop (2003), buffer overflow errors correspond to the “one of the most common security flaws”. Nevertheless, resulting failures of inaccuracy in the dynamic memory management are behind many of those related…


Many are the variables to be considered in order to describe the relevance of a topic as cybercrimes. All of them represent a justification for employing efforts toward the development of a programming code each more secure. In this context, a very representative example is the costs related to crimes exploiting failures in insecure codes. Anderson et al. (2013) presented a synthetic vision of the financial damage caused by those criminal actions. According to the authors, the costs generated by cyber tax frauds summed a total of 125,000 millions of dollars only in the year 2011.

Although a huge number…


Software security is a critical topic that has been the focus of attention of many researchers and professionals over the years. One of the reasons this subject does not lose relevance is the number of vulnerabilities that become known each day. According to NVD (2006), a vulnerability can be defined as “a weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact on confidentiality, integrity, or availability”. The numbers surrounding this type of computational issue give a more concrete panorama about its criticality. Seacord (2013) states that in a…


Happiness and career have been seen as being on opposite sides of a tug of war. If one is looking for a job that offers more than the enough to pay bills, so a happiness restriction is considered as unavoidable. On the other hand, when one is pursuing the job that fits for your professional expectations and personal development, the common sense throws a warning about the risk of financial problems. This long-date trade-off has been kept alive because it is based on the assumption that happiness and career are strongly linked. But, if one breaks such a connection and…


Since the computer was introduced in modern society, mankind has been experiencing an increasing influence from its power of leveraging changes. Looking at this scenario in perspective, it would not be unreasonable to assert that there no more exists sectors in society or interpersonal interactions that have not been modified by the use of technology. A very relevant side effect of this wide spectrum of influence is the emergence of a dependency relation from people to computers. Nevertheless, if such a relation is excessive or undesirable to human relations or not, it depends on how the impact of this dependency


Ebola has been considered one of the most harmful illnesses amongst the virus-borne ones. The damage caused by its virulence is made even worse if its epidemic potential is considered. The 2013–2016 outbreak in West Africa was a tragic event that shown clearly the harm power of such a virus. According to Coltart, all other previous outbreaks combined did not make so many deaths as this unprecedented case. Moreover, the range of countries affected by this outbreak was particularly wide since it reached three nations with an aggressive index of transmission — Sierra Leone, Liberia, and Guinea. …


Although it is not reasonable to pinpoint the origin of racism in the United States, many authors have referenced the Civil War as a possible milestone for racism wide-spreading. After the defeat of the southern Confederate states, the racial segregation was accepted as pattern behavior for the people of the time. This racial division started in the agrarian south, but with time it reached the industrial north. As an outcome, the number of white nationalists boosted which in turn leveraged the violent cases against black men, women, and children.

Many decades have already passed since the civil war. Nevertheless, the…

Thiago Nascimento

My tripod of interests: Mathematics, Computer Science, and Content Writing.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store