StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Establishing Requirements, Low-Fidelity Prototyping and Proposed Data Gathering Information Technology Case Study
10 pages (2558 words) , Download 2 , Case Study
Free
Organizational needs must not be considered at the expense of human needs. While working towards the satisfaction of organizational needs, the enrichment of human users must also be considered with high requirements and early enough in the development cycle for effective implementation of human-supported information systems.
Preview sample
Franchising Business Model Information Technology Research Paper
8 pages (2374 words) , Download 0 , Research Paper
Free
In a world where data and information play an essential role in the daily lives of many people; where competition is ruled by how data and information are shared between and among users; where a split-second delay in obtaining the information could spell substantial profit losses for companies, the availability of the data to the end-users.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Intrusion Detection System Information Technology Report
11 pages (2911 words) , Download 0 , Report
Free
Connecting a computer to the internet increases the risk of having someone, install malicious tools and programs, break-in, or using the malicious programs to gain control of other machines by the use of a remote. These attacks have been evident in the banks where individuals have severally accessed accounts belonging to clients and gaining access to the information.
Preview sample
A Methodology for the Development of a Visual Programming Language Information Technology Term Paper
5 pages (1442 words) , Download 1 , Term Paper
Free
The language is abbreviated “G”.  The technology was original released for the Apple Macintosh in 1986. It is used for various tasks that include; industrial automation, data acquisition, and also instrument control. The tasks can be used on various platforms like Microsoft Windows and different types of UNIX, Linux and MAC OS X. LabView 2009 is the latest version that was released in August 2009.
Preview sample
A Network-Based Intrusion Detection System for ACME Software Solutions Information Technology Lab Report
13 pages (3475 words) , Download 1 , Lab Report
Free
The paper explores how the setup of the NIDS and Network can be changed to suit the existing functionality with no extra expenses on security; how IDS support systems and tools may use NIDS to add the existing functionality of IDS; how the security of the database could be configured to minimize the effect on services in existence as well as maximize security.
Preview sample
Microkernel Operating Systems - Approaches to Operating System Design Information Technology Essay
12 pages (3400 words) , Download 1 , Essay
Free
If privilege levels that are multiple are provided by the hardware, then the only software, which will execute the level that is the most privileged (that is kernel mode or supervisor), is the microkernel. The userspace contains actual services of the operating system such as user interface, device drivers, file systems, and protocol stacks. 
Preview sample
Internet and Web Technologies Information Technology Term Paper
10 pages (2854 words) , Download 0 , Term Paper
Free
Computerization and digitalization of maps have made it much easy for people to navigate through maps and be able to trace areas or locations which they need with ease (Condit, 2005). Digitized maps are accessible over the internet have been of great assistant to travelers or people who are tracing businesses or institutions.
Preview sample
New Technology Solution at Cisco Information Technology Case Study
8 pages (2692 words) , Download 0 , Case Study
Free
Management information systems have become an important part of almost every business or organization. At the present, the implementation of information systems can be seen in almost all the departments of a business or an organization. This report requires a discussion about the use of information systems with respect to a specific organization.
Preview sample
Flexibility within the Information System Context Information Technology Report
6 pages (1821 words) , Download 0 , Report
Free
The concept of flexibility within the IS context is defined as the ability of an information system to contain a certain measure of variation, concerning the necessities of the chosen business process. For instance, a support system for decision making is required to consist of a sensible capability in order to enhance effective analysis, data entry, and presentation.
Preview sample
Penetration Testing ACME Software Solutions Ltd Information Technology Report
7 pages (2001 words) , Download 2 , Report
Free
Timm suggests that adequate NIDS management will reduce false positives and false negatives. Signature-based NIDS are efficient in detecting known attacks but may not detect unknown or modified attacks. In anomaly-based NIDS unusual activity, out of the normal pattern of network traffic, triggers the alarm. Even though false negatives are reduced, this method is not flexible.
Preview sample
Application of Computers by Architectural Designers Information Technology Essay
6 pages (1675 words) , Download 1 , Essay
Free
One such occupation is architectural design. The principal duty of an architectural designer is to design buildings or urban landscapes. This means that an architectural designer should possess good creative skills, artistic talent, and imagination. Thus, this article presents an interview on the impact and role of computers on an architectural designer.
Preview sample
Digital System Clock Design Information Technology Case Study
6 pages (1699 words) , Download 0 , Case Study
Free
This project has been developed using the C programming language in aid of the RSK16C62P software development kit.  The system is set to come with an inbuilt feature to be used to set the time & date through its switches SW1, SW2 & SW3. The clock display is on a 2” x 8” LCD display screen which will show both the time and date. 
Preview sample
Cloud Computing - Changing Technology and Management Issues Information Technology Essay
6 pages (1730 words) , Download 0 , Essay
Free
Almost everything in our lives, whether it be power grids or traffic control, food or financial transactions, depends upon information technology. The phenomenal expansion of internet-connected devices is addressed by an emerging computing model – cloud computing. It is perfect considering the increasing presence of technology nowadays. 
Preview sample
Information Technology and Privacy Information Technology Term Paper
11 pages (3004 words) , Download 0 , Term Paper
Free
Various other characteristics aided by developments in Information Technology have also increased the invasion of individual privacy. Among such factors is the development of hacking, which enables people to access information systems without the owner’s knowledge. Security measures such as the implementation of the USA Patriot Act have also further increased interference with citizen privacy.
Preview sample
Data Models in Enhancement Information Based Systems Information Technology Coursework
4 pages (1279 words) , Download 0 , Coursework
Free
The paper “Data Models in Enhancement Information Based Systems” is a well-turned example of coursework on information technology. Data models do describe the arrangement and the flow of information and data within a given organizational structure and how the information or data is accessed.
Preview sample
Management of Emerging Technology and Organizational Transformations Information Technology Research Paper
9 pages (2783 words) , Download 0 , Research Paper
Free
This paper is based on an exploratory analysis of the smart card industry characterized by the ‘coopetition’ concept (M’Chirgui, 2004) where actors in the smart card industry interact with market conditions and the industry environment in a unique nature. This interaction has generated a complex and intensive competitive landscape constituted in a mix of co-operation and competition.
Preview sample
Record Management Procedure and Procedure for Document Management Information Technology Essay
17 pages (4541 words) , Download 0 , Essay
Free
Provision of historical records of the operation of the enterprise activities is guaranteed as well as the facilitation of sound decision-making within the organization. Procedures are provided to give support to the stated policies and to provide assistance to all areas of the enterprise with the specifications of the policies.
Preview sample
The End of Corporate Computing Information Technology Literature review
7 pages (2040 words) , Download 0 , Literature review
Free
These innovations and development have been analyzed by different authors expounding on different topics and sometimes proposing news models that may improve past innovations and technologies. Nicholas Carr has written numerous articles on technology and innovation. “End of corporate computing” is an example of one of his articles.
Preview sample
Globalisation in Information Systems Information Technology Essay
6 pages (1681 words) , Download 0 , Essay
Free
Generally, the world is changing at a faster rate in which organizations should embrace the way that the organizations operate. This may include measures and strategies of embracing new technologies or change. Globalization in an information system is an important initiative that has increased productivity and efficiency on the products.
Preview sample
Systems, Applications, and Products in Data Processing Information Technology Assignment
4 pages (1165 words) , Download 0 , Assignment
Free
In one survey conducted by U.S. based consulting group on the Australian ERP marketplace, only 33 percent of ERP implementation were reported successful (International Resources Management Association 2001,  p.95). According to IRMA, this result was based on success in value creation, cost-effectiveness, and tangible financial impact.
Preview sample
Telecommunication Infrastructures in Australia 2001 Information Technology Report
8 pages (2251 words) , Download 0 , Report
Free
South Korea has been the first to launch the commercial satellite digital multimedia broadcasting service in the year 2005 and that has helped the mobile users to watch the television while travelling and the country has been a pioneer in 3 G broadband service and South Korea has gone forward by developing 4 G service.
Preview sample
Global Positioning System Information Technology Coursework
8 pages (2163 words) , Download 0 , Coursework
Free
There are still a number of issues associated with GPS and these include the various ways in which the system can be jammed, liability issues, responsibility for operating the system, funding for the base stations, how precise the positioning data should be, and what type of users should be authorized access to the most precise signals.   
Preview sample
Web-Based System Integration Information Technology Report
6 pages (1714 words) , Download 0 , Report
Free
The most important backdraft that has been noticed in the case of aquarelle.de has been the appropriate responses that are required by the customers in the form of emails. As compared to Amazon, the IT system portals that make sure that the swift email responses are generated on the customers’ query are the ones that make the customer satisfy and this is not the case with aquarelle.de.
Preview sample
Information Technology Strategic Advantage Information Technology Essay
6 pages (1603 words) , Download 0 , Essay
Free
Information technology (IT) is a major component in organizations and enterprises all over the world. However, information technology is changing at a faster rate than how it can be utilized and thus many organizations tend to utilize half-baked resources. Service orientation can be defined as a design paradigm that specifically specifies the development of automatic logic in the form of services.
Preview sample
Arguments for the Thesis that Our Current Society is in An Information Age Information Technology Essay
6 pages (1663 words) , Download 1 , Essay
Free
Information is very important in life and makes so many things happen in different societies and even the world. Without information, it would not be easy to conduct business and even to treat people, among many other things. This is the reason why information is very important. It keeps people informed. 
Preview sample
Building a Security System to Protect the IT Assets of a Medical Centre Information Technology Assignment
13 pages (3074 words) , Download 0 , Assignment
Free
To improve Beachfront's efficiency the management decided to open an IT department. Due to the complexity of the LAN and the risk of misappropriation of sensitive and confidential information, there is a need for a security system to protect authorized personal, intruders, hackers from accessing and damaging sensitive data.
Preview sample
Grant Proposal for Federated Search Engine Program for Medical Library Information Technology Report
10 pages (2611 words) , Download 0 , Report
Free
Students, these days require information in a much deeper manner than they did earlier, due to an increase in competition and the need to stay ahead of it. In order to foster a better learning environment and to harness the benefits of the digital age, the A.T Still Memorial Library at the A.T Still University, Mesa, Arizona, proposes the usage of a Federated Search Engine.
Preview sample
Dangerous Effects of IT Innovation Information Technology Essay
10 pages (2753 words) , Download 0 , Essay
Free
The problem with inventions and innovations lies solely with the user. The good effect of the internet lies with the user. The Internet has opened a Pandora of bad effects along with good effects. The harm lies with the people using it rather than the technology.
Preview sample
Do All Inventions Equate To Progress Information Technology Essay
7 pages (2016 words) , Download 0 , Essay
Free
The essay will discuss one of the major inventions which have completely changed life. The invention of the Internet is one of the most impactful inventions in the history of mankind. The Internet has become an essential part of our life and it has become the best tool for being connected with the world.  
Preview sample
Adverse Consequences of IT Innovations Information Technology Essay
8 pages (2191 words) , Download 0 , Essay
Free
The world today is driven forward by technology and the social effects of technology have become the biggest debate. There are lots of people running behind the latest innovations of technology without even understanding what it is for. Electronic or computer automation has come in every sphere of life and the idea of functioning without a computer has been unimaginable and the process has been speeded up by the arrival of computers.
Preview sample
Analysis of a Type of Online Game Known as Facebook Zynga Texas Hold EM Poker Information Technology Literature review
8 pages (2009 words) , Download 0 , Literature review
Free
This paper focuses on a type of online game known as Facebook Zynga Texas Hold” EM Poker. The main focus is going to be on how this game plays a role in creating a virtual community. The virtual community, in their mode of interaction, in this case, online games form a culture. The impact of virtual communities can be felt through online games.
Preview sample
The Global Consequence of Information Systems Information Technology Report
9 pages (2498 words) , Download 0 , Report
Free
In another glaring instance of information technology leaving serious consequences, the American government announced the introduction of high-speed broadband all over the country to facilitate better communication to boost the organizations and individuals who were suffering due to the recession.
Preview sample
Applying Information Technology Systems in Manging a Sports Club Information Technology Case Study
14 pages (3899 words) , Download 0 , Case Study
Free
The development of different operating systems that actually perform the tasks needed in business, from the most basic calculating procedures toward the complicated procedures of accounting and systematic planning of business transactions, the computer technology or Information technology have actually been the main source of successful trade and exchange transactions in the business industry.
Preview sample
Protecting against Serious Threats against Computer Systems and Networks Information Technology Assignment
5 pages (1324 words) , Download 1 , Assignment
Free
Vital information can be stolen in an instant from our government, which could be sold over the black market to terrorist organizations who could potentially use that information against us and possibly destroy the backbone of this fine country. We must stop these ruthless acts against our computer systems and say no more!
Preview sample
Three Different System Analysis and Design Approaches Information Technology Report
6 pages (1862 words) , Download 0 , Report
Free
RAD is a software development methodology that involves iterative construction and development of prototypes and includes mergers of different structural techniques, particularly the information and data-driven from information engineering with the use of prototyping techniques to promote and accelerate software systems development(1).
Preview sample
Wireless Network Security Issues Information Technology Report
13 pages (3651 words) , Report
Nobody downloaded yet
The 802.11 wireless network standard, and its extensions in the form of 802.11b, g, and n, are now not only included in desktop and notebook computers but are included in most smartphones and PDAs, and more rudimentary consumer devices. Increased reliance on wireless networking creates an increased need for effective wireless security.
Preview sample
Multitunneling Grid Transactions Information Technology Lab Report
6 pages (1888 words) , Download 0 , Lab Report
Free
The following are the situations that this can be important Where one needs to talk directly to a specific TCP port to a machine that is separated by a firewall/gateway if it is possible to SSH into the gateway. Where it is possible to send data to a machine but one wants the data to be encrypted Where 1 and 2 are to be done.
Preview sample
Cloud computing the Choice of Platform for a Pilot Study Information Technology Essay
9 pages (2532 words) , Download 0 , Essay
Free
This has led to the option of cloud computing. Cloud computing actually encompasses both a platform and an application. It could be described as the platform for the future generation that provides availability of a large number of virtual resources, dynamic allocation of these available resources, data storage facilities, servers hosting web applications.
Preview sample
Computer-Based Simulation Software in Medical Training and Teaching Information Technology Research Proposal
7 pages (2075 words) , Download 1 , Research Proposal
Free
To improve clinical judgment and technical skills in anaesthesiology students, different kinds of stimulation modalities are available. In the United States of America, these simulation modules have been developed on the basis of the key competency requirements of anaesthesiology students as stipulated by the common program of the Accreditation Council for Graduate Medical Education (ACGME).
Preview sample
Improving Security in Web Services-Based Services Oriented Architectures Information Technology Report
9 pages (2770 words) , Download 0 , Report
Free
The technologies of the present day’s web services like UDDI, WSDL, SOAP, and XML  are all vulnerable to various types of attacks. Since these technologies are highly interoperable, they are more exposed to attacks of all types.  This paper proposes a new architecture for securing a web service from attacks of all kinds.
Preview sample
The Importance of Social Engineering Information Technology Term Paper
7 pages (1979 words) , Download 0 , Term Paper
Free
It includes the human element of engineering attack. The social engineering aspects of cybercrime point out human weaknesses to encourage the acts of illegal and unauthentic attacks. The report deals with the issues of social engineering attacks regarding the human perspective and the various means through which the information is being hacked.
Preview sample
Continuous Speech Recognition for Clinicians Information Technology Term Paper
7 pages (2004 words) , Download 0 , Term Paper
Free
The amalgamation of the computerized information systems is not just a separate entity in today’s world but is rather a fundamental tool for growth and globalization. Clinicians have found the same use for technology and many dynamic changes have been made to adopt technology in the form of speech recognition systems for the patients as well as the hospital staff.
Preview sample
Developing Mobile-Commerce in Information Systems Information Technology Report
6 pages (1739 words) , Download 1 , Report
Free
This calls for a due understanding and respect for the organizational politics and initial resistance to such an endeavor. Also, it is imperative that such an effort is supported by meaningful results in the long and the short run. In fact, it means a commitment to flexibility and communication on the part of the fabricators of such a process.         
Preview sample
Information Technology and Business Alignment at the World Bank Information Technology Term Paper
9 pages (2250 words) , Download 0 , Term Paper
Free
There were many limitations and weaknesses found which hindered the growth of the world bank in applying the IT and the Business strategies such as numerous global differences in connectivity, affordability, and access to the latest technology. It was easy to impart the knowledge but not the expertise of the people which was called the tacit knowledge
Preview sample
Network Traffic and Performance Information Technology Lab Report
13 pages (3409 words) , Download 0 , Lab Report
Free
Although scheduling techniques work well in managing packet flows through a network system, they suffer a common problem during periods of congestion. Since buffer space is a finite resource, under very heavy loads all space will be allocated and new arrivals must be discarded indiscriminately regardless of different classes of service.
Preview sample
An in-Depth Description of Security in Hierarchical Mobile IPv6 Information Technology Report
9 pages (2497 words) , Download 0 , Report
Free
The utilisation of IHA in the SeQoMo structural design broadens HMIPv6 with fast detection of MN movements. It is thoroughly based on layer-2 information to support the IP-level handoffs. It is also meant to offer the MN with the perceived movement information on both the local or global peripheral built.
Preview sample
The Key Areas of Risk and Compliance Information Technology Essay
6 pages (1792 words) , Download 0 , Essay
Free
Organizations are faced with various information security risks ranging from infrastructure vandalism and failure to fraud, theft, sabotage, and emergency occurrences such as fire, flood, and terrorism. In this regard, organizations need to have sound Information Systems policies in place to ensure that their information as well as that of the stakeholder is secure.
Preview sample
Structure and Navigation System of the EBay Site Information Technology Essay
6 pages (1688 words) , Download 0 , Essay
Free
The world has now shrunken owing to the great leap of achievements seen in the communication industry. The internet is the greatest discovery of the millennium is fueling growths that would have been unimaginable earlier. Over the past ten years, the internet has paved way for more activities being done online, day to day.
Preview sample
The Assistance of Software in Communication Plan Information Technology Term Paper
6 pages (1800 words) , Download 0 , Term Paper
Free
As the paper tells, the communication plan of any company helps in image building and raising public awareness about the company. The perception about the products of the company by the people depends on the communication of the company with stakeholders, customers, shareholders, and other contacts or suppliers.
Preview sample
Internet Protocol Television Information Technology Case Study
8 pages (2346 words) , Download 0 , Case Study
Free
The advent of IPTV opens up the television market to telephone companies and other service providers with lower barriers to entry than existing digital platforms. IPTV is the delivery of digital television over broadband networks with faster access and improved digital video compression. However, there are many commercial and technical issues involve with IPTV and this paper will discuss some of them.
Preview sample
1201 - 1250 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us