StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Conducting Personal Communication in the Public Sphere: Facebook Information Technology Report
7 pages (2036 words) , Download 2 , Report
Free
One significant drawback of conducting personal communication in the public sphere (Facebook) is that it hampers genuine discussions and arguments because people tend to encircle themselves in a periphery that is surrounded by similar interest groups individuals. The feature of community in Facebook is thus formed in keeping with narrow perspectives.
Preview sample
Network Security Best Practices Information Technology Essay
8 pages (2287 words) , Download 3 , Essay
Free
Based on the best practices for a secure network listed above, a company should then review and update its security policy. This policy states how the company will protect its assets and to what extent it will implement protection measures. The document should never be considered complete, as threats are continually adapting, and in this way, so should the security policy.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Examine consulting processes and techniques Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
Free
Some of the crucial steps that need to be taken in order to go ahead with the project and allocation of responsibility amongst the participants are discussed in brief. Key participants in the project include stakeholder Executives of the client, IT Directors and Store Operations Directors from the retail chains in six countries and the Consultant.
Preview sample
Data Breach of South Africa Police Information Technology Essay
3 pages (808 words) , Download 31 , Essay
Free
According to Rouse, “A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so.” As such, this paper seeks to discuss the data breach of South Africa Police and evaluate its impact on different people affected by this action.
Preview sample
Who Mandiant Is Information Technology Essay
5 pages (1456 words) , Download 2 , Essay
Free
Of late cyber attacks are on the increase across the globe. Mandiant is an agency investigating and advocating for safe computer and data handling practices. The agency has been playing a critical role in investigating trends of data handling as well as data theft across the globe. Data theft or data handling methods tend to attract more interest from various stakeholders.
Preview sample
Computer Sciences and Information Communication Technology Information Technology Essay
5 pages (1289 words) , Download 2 , Essay
Free
In conclusion, it is worth noting that Information Communication Technologies are a crucial element required by all businesses. Information Communication Technology is responsible for the smooth running of the business. Entrepreneurs should therefore aim at using the best ways of communicating with their customers.
Preview sample
Project Management Methodologies Information Technology Essay
12 pages (3243 words) , Download 5 , Essay
Free
The document presents an introduction to the project management standards, similarities, and differences between the processes and knowledge areas being used by the project management standards. Moreover, the project management standards utilize themes, tools, and techniques for managing and monitoring the projects, the document contains a discussion and comparison of these tools and techniques.
Preview sample
Designing the LC-415/505 Computer Information Technology Essay
5 pages (1656 words) , Download 2 , Essay
Free
Most of the concepts of the operating system become more complex as technology improves. Its difficulty applies in the application of software and connections in different stages of the pipeline. All the learners must understand different processes of the operating system and their extensions before learning a detailed concept of the internal implementation algorithms and data configurations in different systems.
Preview sample
Universal Plug and Play and Its Weaknesses Information Technology Assignment
12 pages (3172 words) , Download 2 , Assignment
Free
One of the main weaknesses of universal plug and play devices is that trust on all other communicating devices which in most cases are not trustworthy. There is no software that can check whether the devices with which UPnP devices communicate are prone to attacks or not. Moreover, buffer overflows are an issue regarding the use of UPnP devices.
Preview sample
How can we safeguard against the cybercrime Information Technology Essay
3 pages (750 words) , Download 4 , Essay
Free
White collar crime is something that has elicited debate and mixed reactions from across the globe with many companies such as Enron and WorldCom going down as a result of it. Cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century.
Preview sample
Small Business Management Information Technology Scholarship Essay
8 pages (2200 words) , Download 2 , Scholarship Essay
Free
Despite the notion that starting up an entity is tedious people should know that with proper planning, endurance as well as passion, actual businesses can be set up. (ehow.com, 2011) This is going to be a study about the topic of small businesses in New Zealand and more specifically, there will be a comprehensive answer to be provided to the study question, “Which are the merits and demerits of setting up a small business in New Zealand?
Preview sample
The Analysis of the Recent Microsoft's Acquisition of Skype Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
In order to evaluate the decision of Microsoft to acquire Skype it would be necessary to refer to the common causes of acquisitions as a strategic tool. Usually, firms use acquisition worldwide in order to increase their market share or improve their infrastructure in regard to their product/ services.
Preview sample
An Open Source Network Intrusion Detection System Information Technology Article
2 pages (788 words) , Download 2 , Article
Free
Initially, Snort was used as a packet sniffer tool, in order to analyze and detect data packets on the network. However, as the tool matures, it was transformed as an Intrusion detection system. Moreover, the architecture of Snort comprises of four components i.e. packet decoder, preprocessor, detection engine and module with the features of logging and alerts. 
Preview sample
Impact of Social Networking Information Technology Research Paper
5 pages (1375 words) , Download 2 , Research Paper
Free
With the current technological advancements, the conduction of business transactions has continuously been transformed. In the early day, business was mainly conducted offline while currently, various organizations incorporate both offline and online transactions in ensuring they are able to meet a wide range of customers.
Preview sample
The latest 4G communications development Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
In this scenario, high speed information and data transmission rate indicates that 4G communication systems are available for a person who is moving in a plane, car or train. In addition, the arrival of 4G integrated systems offered a completely renovated set of services all through the telecommunication sector, demonstrating an entirely new level for users and a great investment intended for providers (Renshaw; Turban, Leidner and McLean).
Preview sample
Business Implications of Security on the Internet Information Technology Essay
3 pages (750 words) , Download 3 , Essay
However, security on the internet is a major concern because it is not always guaranteed. In instances where cyber security is breached or compromised, the internet can have far-reaching negative implications on businesses. This paper explores some of these implications and provides an overview of some of the solutions that various businesses rely on to deal with such implications.
Preview sample
Link Layer Protocol Services to the Network Layer Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
The data link layer (layer 2) majorly deals with the transformation of the logical communication channel provided by the physical layer (layer 1) into a more reliable mode of communication by splitting the data into frames allowing error and flow control.
Preview sample
Cursework on Behavioral Modeling Information Technology Coursework
2 pages (500 words) , Download 2 , Coursework
Free
Behavioral state machine diagram is a model that reflects and show this dynamic state of any single class as it pass through its course of life and is influenced by certain events. The response to these events and actions taken by that class is also highlighted in the behavioral state machine diagram.
Preview sample
Online Publication of Personal Contents: Needs and Threats Information Technology Coursework
4 pages (1077 words) , Download 2 , Coursework
Free
Cybernetic publication and exchange of children’s images and videos though are the emotional requirement of many parents, the possibility of dangers from their misuse cannot be ignored and as far as possible, the images and videos published should be safe from the possibilities of threats to the social identity of the children.
Preview sample
IT - Business Intelligence Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Free
The purpose of Business intelligence is to look through the stored information, generate historical, present, and even predict future events of a business, thus helping an organization to operate based on reliable information, thus planning effectively for its activities to enhance business growth and success.
Preview sample
Amazon,Ebay,and Google:Unlocking and Sharing Business Database Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
Big companies like Amazon and eBay have to invest a lot in experimental research and development to take the business to the new level, which is produced free of cost by allowing external developers and entrepreneurs access to their databases. The knowledge base of the companies has widened manifolds by this practice as the external developers and entrepreneurs are coming up with new and innovative ideas in which the platforms of these companies can be used, which is profitable for both.
Preview sample
Origins of Modern Computing Information Technology Assignment
5 pages (1312 words) , Download 3 , Assignment
Free
Whenever there are discussions regarding computer architectures and the manner in which computer systems and computers are developed, organized, and implemented, the von Neumann architecture is mentioned as a yardstick for comparison. The reason for this is that almost every electronic computer that has ever been developed has been based on this architecture (Aspray, 1990).
Preview sample
Smart grid Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
Additionally, collaborative communication mode is used to make possible the computer processing that has been employed for decades in a number of other sectors. At the present, these technologies are being used on electricity networks, from wind farms all the way to the consumers of electricity in homes, the power plants and businesses.
Preview sample
The Concept of Engineering Information Technology Assignment
5 pages (1471 words) , Download 2 , Assignment
Free
In utilizing the computer-aided design simulation program, it is imperative to predefine the expected outcome and the boundary conditions that must be adhered to. Boundary conditions are set to ensure that modelling is within a finite/ definite set of rules and concepts that lead to a specific outcome.
Preview sample
The Whole Earth Network Information Technology Literature review
6 pages (1733 words) , Download 2 , Literature review
Free
The scale and nature of computer ideas and concepts have however changed dramatically for the last four decades. In the computer historical era, these empires used to handle their administrative records and messages reliably and at minimum cost. Each of these empires possessed their own characteristic information handling technology, which makes them formulate their own technological solutions.
Preview sample
Procrastination by Regina Arnold Information Technology Book Report/Review
8 pages (2210 words) , Download 2 , Book Report/Review
Free
It emerges that listening to music from the iPods have an addictive behavior that philosophers describe as learned. Indeed, people juggle and shuttle between certain tasks or places with the white earbuds on. This reduces their ability to concentrate and complete the task at hand (Wittkower, 2008). Therefore, the resulting scenario has always been tasked with being postponed to a later date or time.
Preview sample
Harassment and Bullying when using Email, SMS, Facebook in Workplace Information Technology Research Paper
7 pages (1750 words) , Download 2 , Research Paper
Free
This paper comprehensively analyzes the rising trend of cyber bullying in the work environment, showing how it occurs through social sites, phone messages and even via email. The paper also shows how cyber harassment negatively affects employees’ motivation, causing unnecessary stress, fear, and emotional fatigue, eventually lowering the productivity of workers and consequently, that of an organization.
Preview sample
Init Process in Linux Information Technology Case Study
10 pages (2644 words) , Download 2 , Case Study
Free
This mode of operation allows different modes of the operating system to be used. These modes become specified by the run levels. The file in the directory “/etc/inittab” holds a key role in the operations of the operating system. The different versions of the operating systems have different capabilities and disadvantages in their own right.
Preview sample
Fraud And Cyber Terrorism Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Fraud activities have in the recent times increased as many people are desperate and are engaging themselves in crime as they try to make ends meet and hence participating in the acts of fraud in their work places and other institutions. Fraud-fighting actions can be categorized into three main groups: prevention, detection and investigation.
Preview sample
The Negative Impacts of Cybercrime on Business and Society Information Technology Research Proposal
7 pages (2099 words) , Download 3 , Research Proposal
Free
Computer crime (commonly referred to as cybercrime) is a reference to any type of criminal activity that involves the use of a computer or an internal/external network. This type of activity has been increasing at alarming rates over the past few decades, to the point that seemingly no one is immune from becoming a victim (Dearne, 2002, p. 262). 
Preview sample
Ow Usability Can Help Improve Mobile Commerce Information Technology Report
10 pages (2774 words) , Download 2 , Report
Free
The WAP method uses the concept of URL, browsers, servers, and gateways. Its usability can be improved by creating mobile-friendly sites. This will also reduce the cost of data plans. The standalone mobile application method is where a downloadable client is available for use by customers to do bank transactions.
Preview sample
Data Mining for Business Intelligence Information Technology Case Study
6 pages (1798 words) , Download 4 , Case Study
Free
Business intelligence incorporates the tools as well as the systems which perform vital functions in the strategic reorganizational processes of the company. The systems in the business intelligence enable the corporation to collect, saves, view and evaluate to assist in the process of decision making.
Preview sample
Social Networking Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Social Networking: Ethical Issues. The topic on social networking was opted to be closely evaluated in terms of ethical issues that encompass and pervade the subject because it is a huge issue and a lot of teens, young adults and adults are members of at least one social network sites: Facebook, YouTube, and Tweeter, from among others.
Preview sample
The effects of retail channel integration through the use of information technologies on Firm performance Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
It is evident that firms that have been vertically integrated through information technology are bound to experience low uncertainty regarding its flow of production. This is due to the strong structure of the association. However, it faces issues with flexibility on the side of production given the involvement of many units that are affected due to modifications effected to comply with technology.
Preview sample
Create a Video Environment for the Organization Information Technology Case Study
5 pages (1394 words) , Download 2 , Case Study
Free
The number of channels also needs to be increased. One circuit should be enhanced with IP based technology to have a maximum number of channels where communication can take place. Reducing the cost of running the company by ensuring that video conferencing can be set up in at least main branches of Rapid Freight will subjugate traveling allowances for meetings or wasting of time.
Preview sample
Service Oriented Architecture: Patterns and Antipatterns Information Technology Literature review
20 pages (5627 words) , Download 2 , Literature review
Free
This is achieved by introducing convenient services, which are self sufficient and recyclable software components that have independent platform hence easy to retrieve through external network such as the internet. The stated architectural technique can be put into practice by employing a myriad of SOA expertise, for instance OSGi, SCA and Web Services.
Preview sample
Network Architectures for Data Centers Information Technology Term Paper
11 pages (2950 words) , Download 5 , Term Paper
Free
This technology based trend is known as a centralized data center. As the central and major provisioning point of communication network, data storage, and compute support services, the corporate data center was established in the middle of the mission critical operational processes and functional areas for one basic purpose: The expenditures of offering huge scale, centralized technology based services to thousands of clients were extremely high that it could simply be managed and controlled by practically collecting and connecting that technology based resources in a common place.
Preview sample
Why Use Bitcoins Information Technology Research Paper
9 pages (2250 words) , Download 4 , Research Paper
Free
Name: Instructor: Course: Date: Why Use Bitcoins? Abstract A completely peer-to-peer version of electronic money without going through a financial institution, allows online payments to be sent directly from one party to another. The major rewards are lost if a third party is required to curb double-spending but still, digital signatures provide part of the solution.
Preview sample
Ethnographic Data Collection Information Technology Research Paper
20 pages (5241 words) , Download 4 , Research Paper
Free
It thus enables us tenable to familiarize with the people while scrutinizing them in order to file an extensive and authentic report on them. While doing so one is likely to establishes friendships as well useful contacts with the locals, leading to the formation of ordinary life which gets rooted in their practiced cultures owing to regular encounter with thus enabling one to learn how to communicate with them at a personal levels (Denzin).
Preview sample
Networking Information Technology Statistics Project
11 pages (2750 words) , Download 2 , Statistics Project
Free
There are total five topologies to design a computer network. However, all of these five topologies share certain factors. Each topology demonstrates disadvantages as well as advantages that will be discussed further. Star topology is recommended for the wired local area network. It is the most widely adopted topology.
Preview sample
The Employees Performance of Their Duties in Macrobox Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
Macro box alleged that it not only suffered actual damages but also damages on its customer goodwill due to several DNS attacks launched by activist groups to compel them to cease and desist from providing software services. According to Macro box, the actual perpetrators cannot be determined although a blogger has been traced.
Preview sample
Field Data Collection Automation Project Information Technology Essay
2 pages (711 words) , Download 2 , Essay
Free
The automation projects help to garner important information about the various aspects of the citizens. Apart from the allocation of Congressional seats, the information is also used by various agencies which are involved in the development processes. It hugely impacts decision-making and operational activities as the data facilitates evolving policies.
Preview sample
Information Sensitivity and Protection of Data Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Furthermore, BIDMC’s security and privacy policy also encompasses the password guidelines and implementation of remote access software. In this way, these rules and regulations ensure the less wastage of technology resources. In addition, this arrangement as well ensures the proper establishment of the corporate security and privacy.
Preview sample
Fantasy or Reality the Illusion of the On-line Realm Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Free
Fantasy or Reality the Illusion of the On-Line Realm. We may have all been a victim of the false reality on the internet in some way. There are several reasons why someone should be concerned while playing a game over the internet. Games and the internet have become so prevalent in our lives we cannot escape them even if we try.
Preview sample
Taxonomy of Bloom at the Senior-Level College Information Technology Essay
5 pages (1250 words) , Download 4 , Essay
Free
It details in easy-to-understand, numerous phases how man’s intelligence should evolve from the initial stages of acquisition of knowledge up to his more complex capacities to analyze and develop critical thinking, thereby enabling him to arrive at conclusions and create new products and alternatives that will eventually add up to the facts and data.
Preview sample
Hand-In Assignment on Information Technology Information Technology Assignment
3 pages (750 words) , Download 4 , Assignment
Free
Ultimately, this can help to find out such processes which are not giving the required result and are consuming useful resources. By using metrics to determine such processes which are consuming many resources can help to work on that particular portion of software.
Preview sample
Comparative Discourse: Three Scripting Languages Information Technology Research Paper
5 pages (1571 words) , Download 2 , Research Paper
Free
Active Server Pages (ASP) is defined by Yank (2001) as “a proven, well-established technology for building dynamic Web applications, which provides the power and flexibility you need to create anything from a personal, Web-based photo gallery to a complete catalog and shopping cart system for your next eCommerce project. 
Preview sample
Television and Personal Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
Free
Television and Personal. Philo Farnsworth is credited for having invented the complete set of the electronic components that make up the Television. This technology changed the society at large transforming the way people conducted activities such as businesses and information gathering.
Preview sample
The Effects of Computers on Todays Society Information Technology Coursework
4 pages (1160 words) , Download 2 , Coursework
Free
Computers have had a huge impact on our society. People no longer need to go out and mingle with each other to be considered social. Thanks to Facebook and MySpace we can be socially viable within the comfortable confines of our rooms. The microprocessor was invented in 1971 and nobody could predict its success story.
Preview sample
Regulation and Competition in the ICT Market Information Technology Essay
8 pages (2196 words) , Download 2 , Essay
Free
In fact, before the far-reaching reforms, telecommunication service provision remained a monopoly of state corporations or in rare cases, was monopolized by private entities. Due to the fact that the provider of telecommunication services in most cases was the government, the regulation of this sector was never quite independent since all the policy-making and regulatory powers lay with the government and its agencies.
Preview sample
8701 - 8750 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us