StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Device MotoRazr2 and Its Design Information Technology Assignment
15 pages (3875 words) , Download 2 , Assignment
Free
Therefore, the user interface plays a pivotal role in making a device worthwhile. As it was discussed in the first assignment, MotoRazr2 has a poor UI design. The second external display of MotoRazr2 is a 2-inch display (240 x 320 pixels) having a super-sensitive touch with 256k colors (GSMArena, 2012). The super-sensitivity of the touch proves a real mess for the users to handle the phone properly.
Preview sample
The Impact of Image Informatics on Medical Imaging Systems Information Technology Essay
14 pages (3690 words) , Download 4 , Essay
Free
Imaging informatics, also referred to as medical imaging informatics is a branch of biomedical informatics. The main aim of imaging informatics is to improve on the efficiency, reliability, accuracy, and dependency of medical imaging services within the general hospital or medical setup. Biomedical informatics is a field of various disciplines.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
First IT Security in Information Systems Information Technology Case Study
8 pages (2315 words) , Download 3 , Case Study
Free
IT security is effectual both for individuals, as well as for companies. Users of computers and internet face a number of security issues everyday some of which include hacking of passwords and accounts, data loss, private information retrieval, and data modification. All of these problems are directly associated with IT security issues.
Preview sample
Enterprise Resource Planning Information Technology Literature review
15 pages (3870 words) , Download 3 , Literature review
Free
Every ERP system must provide access to an effective integrated marketplace and facilitate a reliable infrastructure. Often the best practices for ERP incorporation are ignored, leading to catastrophic results and bankruptcy. Implementing the correct measures and selections will help in the correct use of ERPs and manage operations without disturbances and time lag.
Preview sample
Business Requirements for Matrix Data Corporation Information Technology Case Study
4 pages (1122 words) , Download 3 , Case Study
Free
The business requirements will used to review and approve the deliverable and also provide a guide of the set up process, introduce team players, and discuss the risk and the new system applications. When implemented, the Matrix Corporation will utilize a more robust data warehouse system. The MDC in Owings Mills, Maryland is a company that collects data and analyses web-based data for large clients using Web analytics software.  
Preview sample
Online Booking System for Parking Information Technology Report
9 pages (2544 words) , Download 2 , Report
Free
Context of the project Usually people waste so much time trying to locate a parking space especially in busy commercial centres such as cities and shopping malls. Besides wasting time this activity can be draining psychologically and can be a demotivator and a prospective client may even drive away when they fail to locate a vacant space (Whapples 2005).
Preview sample
Online Booking System for Parking Information Technology Research Proposal
10 pages (2799 words) , Download 5 , Research Proposal
Free
An online booking system for parking will make it easy for people to know the exact location of available parking spaces and book them in advance before driving there. This will save people time wasted in the search for available parking spaces and also help in mitigating the issue of unnecessary traffic jams.
Preview sample
The lack of IT systems within the logistics department of TATCO Yemen Information Technology Literature review
16 pages (4000 words) , Download 2 , Literature review
Free
The company’s logistics focuses on supplying various products to consumers, an area where it has registered significant successes in the recent past. However, due to the rapid growth and expansion of its consumer base, stark challenges in the company’s management of inventory continue to exist.
Preview sample
Annual Potential Loss Application Attack Threat Information Technology Case Study
10 pages (2405 words) , Download 4 , Case Study
Free
The basic architectural implementation only offers two thin layers of protection. It is widely accepted that the more layers of protection the more security, in this kind of network architecture.  An intruder only needs to compromise just one server to get access to the web resources in the system.
Preview sample
The Enterprise Resource Planning Software Information Technology Assignment
10 pages (2726 words) , Download 3 , Assignment
Free
ERP software is the best solution for the Castle Family Restaurants. According to the Management Study Guide website, ERP has various advantages. For starters, an ERP contains various decision support tools like planning and simulation. The Castle Family group of restaurants needs to effectively manage its human resources.
Preview sample
Network Administration Capstone Project Information Technology Report
22 pages (5902 words) , Download 4 , Report
The task of estimation has been going on in the present company for a while. However, in most instances, this is done either manually or by employing the use of an old DOS system. This has generally been identified to be highly ineffective as not much work as expected to be done by the department using it has always been produced.
Preview sample
Enterprise social networks Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
There are many small colleges and educational institutes who have posted videos of their courses and online classes to create small advertisement with the resources available within the institute and uploaded them on YouTube or Facebook.
Preview sample
Converting A Network of Personal Computers From Windows XP to Windows 7 Information Technology Report
20 pages (5423 words) , Download 6 , Report
Free
However, one work that has been most useful is Meredith & Mantel [Project Management: A Managerial Approach, Jack R. Meredith & Samuel J. Mantel Jr., Third Edition, John Wiley & Sons, 1995, ISBN 0-471-01626-8].  This has been extensively quoted from, and the specific references are given where appropriate. Much of the material cited below, where it has not been specifically referenced has come from the consensus of practical industry project management experience, for which specific sources cannot be cited, if many cases some years after the event.  
Preview sample
Ethnographic Data Collection Information Technology Research Paper
20 pages (5241 words) , Download 4 , Research Paper
Free
It thus enables us tenable to familiarize with the people while scrutinizing them in order to file an extensive and authentic report on them. While doing so one is likely to establishes friendships as well useful contacts with the locals, leading to the formation of ordinary life which gets rooted in their practiced cultures owing to regular encounter with thus enabling one to learn how to communicate with them at a personal levels (Denzin).
Preview sample
Sustainable Information and Corporate Governance Information Technology Report
13 pages (3687 words) , Download 2 , Report
Free
It largely depends upon the user. However several risks are also associated with it. The study is about the implementation of social networking platform in a University of UK. The university chosen for this purpose is University of Bolton. The implementation will facilitate open and effective communication throughout the campus, but to get superior result, the university need to design a governance strategy.
Preview sample
Code Smell as an Aspect of Software Maintainability Information Technology Term Paper
10 pages (2649 words) , Download 2 , Term Paper
Free
Therefore, the presence of code smells seems to be an ideal maintainability assessment indicator. Developing strategies that to be used in assessment of maintainability, is very important, considering that significant cost and effort is used during maintenance. Existence of code smell has been suggested and an approach that can be used for maintainability evaluation. 
Preview sample
Data Mining as an Emerging Technology Information Technology Research Paper
22 pages (5565 words) , Download 4 , Research Paper
It is vast finding its use in marketing, managing inventory, management of quality, and managing of risks associated with loaned money. Data mining application have also been seen in use in biological use as seen in DNA testing and gene analysis in living organisms.
Preview sample
IT Management Role in Magnum Enterprises Information Technology Term Paper
20 pages (5117 words) , Download 4 , Term Paper
Free
As a first step, she invites you to write a short statement where you describe what you see to be your role as head of the IT management effort at Magnum. The role of an Information Technology (IT) Manager varies with respect to the company; therefore, the IT Manager can be responsible for diverse areas of the information technology.
Preview sample
A Detailed Analysis of a New Website Idea Information Technology Report
9 pages (2816 words) , Download 3 , Report
Free
Additionally, software applications and tools developers and manufactures are paying a great deal of attention on development of high tech technology based platforms. In addition, this increasing competition also has a serious impact on the development of the website and its operational effectiveness.In the past few years the online business and e-commerce platforms have changed traditional business practices.
Preview sample
Upgrading server 2003 to server 2008 Information Technology Research Paper
15 pages (3750 words) , Download 2 , Research Paper
Free
The system was efficient in demonstrating basic information related to the popular transport modes that were popular among specific genders. For instance, the tube was popular for males along with thirteen men using the tube but they were most popular for females with twenty-two women using the tube.
Preview sample
Advances in Wireless Network Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
As the technology is advancing, the wireless communication is considered as the major mean of communication between the people and different organizations. The methods utilized for the communication are becoming simples for the general people and becoming more complex for the engineers and related staff of the organizations that are providing the communication.
Preview sample
Developing Service-Oriented Solutions Information Technology Annotated Bibliography
10 pages (2565 words) , Download 2 , Annotated Bibliography
Free
In this article, the authors report on the structure and use of a method that can be used to examine, plan, and deploy service-oriented architecture projects in the context of a fractal software development model. The article relates to the research in the sense that it talks about the key domains of service-oriented architecture within the context of software engineering practice.
Preview sample
The Influence of Computer Games on the Ethics, Economic Aspects and Social Issues Information Technology Essay
19 pages (5548 words) , Download 4 , Essay
Free
Whether it is work or leisure computers have been part of man's every unit time of life he spends since the last decade. While on one hand computers are mainly used to lessen man's workload and to increase perfection and accuracy in tasks, on the other hand, they are a source of pleasure and entertainment
Preview sample
Green IT Support in Resolving Environmental Issues Information Technology Report
13 pages (3536 words) , Download 4 , Report
Free
Overall, there has been an unprecedented increase on the scale of concern regarding climate change and environment sustainability issues. The increasing global concern regarding the environment has brought to the fore concerns regarding the carbon emissions and energy wastefulness associated with the IT systems.
Preview sample
Network Security Plan Information Technology Case Study
9 pages (2523 words) , Download 4 , Case Study
Free
The network infrastructure in every institution is used to send particularly vital information. The infrastructure is vulnerable to threats like eavesdropping, tapping of network cable, and impersonation. These threats can lead to organizations losing their credibility on maintaining the security of their clients’ data.
Preview sample
Password Cracking Systems Information Technology Report
24 pages (6507 words) , Download 3 , Report
There are potential hazards present on the internet just as there are beneficial elements. It is therefore recommended that the personal information relative to a person's security and personal use is kept safe so that it may not be altered by any spammers or malware.
Preview sample
Information Security Audit and Assurance Information Technology Literature review
11 pages (3092 words) , Download 4 , Literature review
Free
The collection, input, storage, processing and the dissemination of data and information in the organizations database. Increase in the use of information technology in the organization has made the operations and activities in the organization more effective. Data is stored in a database that makes access, retrieval and manipulation easy and more secure (Chrisopher, 2012)
Preview sample
Internet Protocol Security (IPsec) Information Technology Report
11 pages (2968 words) , Download 2 , Report
Free
Internet is a public network which was not created with the aspect of security in mind. Since the Internet Protocol has no built in security feature and the information communicated over the Internet is in the form of plain text, this information is very vulnerable to threats such as unauthorized examination, alteration or exploitation.
Preview sample
The Utilization of IPad in College Information Technology Term Paper
11 pages (2931 words) , Download 2 , Term Paper
Free
They have enabled achieving plenty and as a result are being employed in every discipline. I-Pads are the new addition to the classrooms which have enabled further utilization of technology in the field of education and the class room environment (Hess, 2011).
Preview sample
The Role of Competitive Intelligence in an Organization Information Technology Article
10 pages (2860 words) , Download 3 , Article
Free
 Competitive intelligence is a term that is used to refer to the processes which companies employ to gather data and apply data and information about various aspects of the market with an aim of achieving a higher performance as compared to business rivals (Bartes 664). The intelligence that is gathered and applied for business advantage includes information on consumers, business competitors, products and services. 
Preview sample
Network Security Information Technology Research Paper
16 pages (4296 words) , Download 4 , Research Paper
Free
As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.e. logical security, internal security and external security. The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well.
Preview sample
The Usage of Mobile Devices in Education Information Technology Research Paper
10 pages (2500 words) , Download 2 , Research Paper
Free
According to the paper in the past few years, mobile technology has turned out to be ubiquitous all around the world. With the influence of the latest mobile and portable computing systems in the hands of everybody, now the era of technology has reached to a level where people have started using mobile devices for learning and educational purposes.
Preview sample
Technology, the surrender of culture to technology Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
One of the most prevalent philosophical issues within the past 50 years has been whether or not modernism and its derivatives are the most hopeful means by which humanity can work to extricate itself from the cycle of chaos, misery, and destruction that has defined our existence for the past several millennia.
Preview sample
Why Use Bitcoins Information Technology Research Paper
9 pages (2250 words) , Download 4 , Research Paper
Free
Name: Instructor: Course: Date: Why Use Bitcoins? Abstract A completely peer-to-peer version of electronic money without going through a financial institution, allows online payments to be sent directly from one party to another. The major rewards are lost if a third party is required to curb double-spending but still, digital signatures provide part of the solution.
Preview sample
The Future of Information Systems Information Technology Research Paper
22 pages (5500 words) , Download 3 , Research Paper
This research will begin with the statement that at the present, the majority of business organizations heavily rely on the huge volume of data and information. These sets of data and information are collected from a wide variety of sources. In fact, the day-to-day functions of an organization are based on these sets of data.
Preview sample
Software Development Best Practices, Vision & Goals Statements Information Technology Essay
15 pages (3750 words) , Download 2 , Essay
Free
The study is governed by such objectives: 1)develop an online matching program that would substitute the existing matching program (software application) used to facilitate more than 8 million single men and women in the United Kingdom to find their best matches, 2) the quality, confidentiality, performance, usability, and security would be priority features of the online matching program.
Preview sample
Negative Impacts of Technology Information Technology Essay
28 pages (7365 words) , Download 7 , Essay
Technology has made human life easy, fast, and worth living. This is because of its integration in numerous parts of human daily lives. People today have, therefore, become more dependent on technology compared to centuries ago. For some, it is not possible to imagine how life would be without technology as part of it.
Preview sample
Data Mining Techniques and DNA/bio-data analysis Information Technology Essay
10 pages (2500 words) , Download 4 , Essay
Free
The author explains that data mining applications include market analysis, fraud detection or unusual pattern detection, risk analysis and management, text/web mining, stream mining and DNA/bio-data analysis, scientific data analysis. The data mining tasks can either be descriptive or predictive.
Preview sample
Advances in Wireless Networks Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
Seeing the growing importance of computer networks in today’s modern world, the management of University of Iland (UoI) has decided to implement a new and more sophisticated network technology structure to better manage university tasks and operations. The basic purpose of this report is to offer a detailed analysis of new wireless network technology implementation at University of Iland (UoI).
Preview sample
Network Architectures for Data Centers Information Technology Term Paper
11 pages (2950 words) , Download 5 , Term Paper
Free
This technology based trend is known as a centralized data center. As the central and major provisioning point of communication network, data storage, and compute support services, the corporate data center was established in the middle of the mission critical operational processes and functional areas for one basic purpose: The expenditures of offering huge scale, centralized technology based services to thousands of clients were extremely high that it could simply be managed and controlled by practically collecting and connecting that technology based resources in a common place.
Preview sample
Data Warehouse Design and Implementation Information Technology Research Proposal
9 pages (2783 words) , Download 4 , Research Proposal
Free
However, at the present business organizations have a wide variety of database systems such as online analytical processing, data warehousing and data mining systems. In this scenario, data warehousing offers effective tools for maintenance, storage and retrieval of data.
Preview sample
Web Mining and Social Multimedia Information Technology Research Paper
7 pages (1750 words) , Download 2 , Research Paper
Free
Web Mining and Social Multimedia. Web mining is the use of data mining techniques to extract data from web documents. Data mining allows for analysis of data in order to make rational decision based on the data report collected. When such data is being analyzed based on the web documents, especially with a wide spread of social multimedia, the information gathered can benefit research institutions, businesses and economy overall.
Preview sample
Long Term Care Health Informatics Implementation Aspects Information Technology Coursework
13 pages (3461 words) , Download 3 , Coursework
Free
The main purpose is to understand the objectives and goals of that organization prior to the implementation of the security controls, patients care and business goals. In fact, these goals can be achieved while understanding the risks that are identified during the risk assessment and aim to reduce those risks to an acceptable level.
Preview sample
IT Methodology Information Technology Research Paper
10 pages (2632 words) , Download 2 , Research Paper
Free
While the amount of data has been increasing steadily, the relevance of the data has been declining. The utility of this kind of data is very low because of the irrelevance of the information in spite of the presence of a large amount of data. There are a number of software that help in analyzing the data.
Preview sample
Information Security Implications of Using Java and AJAX Information Technology Case Study
10 pages (2920 words) , Download 2 , Case Study
Free
Distributed and e-commerce systems and apps depend on a variety of features and technologies in their realization, comprising scripting languages, web, server-side systems, mobile processing, and in fundamental databases. The mixture of these technologies produces a system that necessitates extra concentration regarding security and privacy issues.
Preview sample
NHS Computer Scheme Information Technology Coursework
10 pages (2500 words) , Download 2 , Coursework
Free
The need to ensure efficiency in the provision of services in the medical industry is the sole driver of the adoption of Information technology in medical operations and processes. The NHS computer scheme project was aimed at addressing similar concerns in the UK health sector. The main aim of the project was to deliver a more integrated IT system for storage and retrieval of medical information records.
Preview sample
Integration of Agile Practices into Waterfall for Business Advantages Information Technology Research Paper
6 pages (1696 words) , Download 2 , Research Paper
Free
The first and second phases involved reviewing of relevant literature followed by questionnaire development respectively. The third phase involved gathering a list of survey participants and distribution of the survey by following IRB guidelines. The fourth, which marked the final phase involved analyzing the data findings and then comparing it with existing literature.
Preview sample
Routing Protocols for Ad-hoc Wireless Network Information Technology Dissertation
20 pages (5000 words) , Download 4 , Dissertation
Free
IEEE 802.11b standard is operational on a 2.4 GHz unlicensed frequency spectrum that offers a maximum data rate of 11 Mbps. Likewise, this standard divides the band further to 11 separate channels, as 11 channels are available in north America and 13 channels are in Europe.
Preview sample
Object and Data Modelling for Happy Tour Information Technology Assignment
13 pages (3495 words) , Download 2 , Assignment
Free
A new economy flight company, Happy Tour, is looking for an online, web-based system that could allow their customers to search for the availability and fares for the flight to the desired destination, make payments securely through a third-party payment system in order to book the tickets for the desired flight, view the real-time seating arrangement with available seats and select the desired seat in order to self-check-in and othes.
Preview sample
Internet Protocol Version 4 and It Next Generation IP Information Technology Report
14 pages (3646 words) , Download 2 , Report
Free
For this reason, it was designed in a simplest and lightest form. However, after global adoption of IP version 4 throughout the world, it motivated researchers to review and redesign it. IP version 6 is a new or updated version of the previous version i.e. The protocol operates the network layer that is a third layer of the Open System Interconnection (OSI) model. 
Preview sample
9801 - 9850 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us