StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Role of CIO in Effective Information Technology Strategic Planning through Corporate Governance Information Technology Literature review
10 pages (2821 words) , Download 1 , Literature review
Free
The paper will also attempt to explain how the different frameworks and models can be applied by CIOs in the organization to achieve success in business alignment and strategic planning. The paper will also explore the two game-changing facets of corporate governance and strategic planning that did not exist earlier. The aspects examined are cloud computing and social media
Preview sample
Introducing the Agile Method for Web Development in Saudi Arabia Information Technology Literature review
9 pages (2903 words) , Download 1 , Literature review
Free
The software development process involves applying a specific methodology to identify “who is doing what, where, why, how, and when” so as to better manage and guide it and deal with potential problems. Its fundamental components or stages are specifying, developing, validating, and evolving, but different needs and requirements mean that the generic process has to be adapted.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Green IT Initiatives Information Technology Report
7 pages (2396 words) , Download 1 , Report
Free
As we all know for all kinds of operations businesses are dependent on some or the other kind of information or communication technology. Information technology (IT) plays a vital role in achieving the company’s desired objective. Today, the most known and effective technology is “green IT”. Green information technology is an advanced technology used for reducing extensive or additional energy.
Preview sample
What is the Turing Test, and Why is it so Difficult to Pass Information Technology Report
8 pages (2223 words) , Download 1 , Report
Free
One of the most difficult challenges in developing Artificial Intelligence (AI) is to create a machine that “thinks” as intelligently as humans do. However, devising a definition for the word “think” itself is quite a task. This is because it is yet unclear as to what comprises a human being’s thoughts, and what is the driving force behind his/her intelligence.
Preview sample
IT System Analysis and Design Information Technology Report
10 pages (2745 words) , Download 1 , Report
Free
The software would automate the customer relations, financial, and HR functions of the company. The company is a middle-sized firm catering to the printing and brand protection needs of its customers. There has been rapid expansion and the company needs automation to increase efficiency. They do not want to purchase the software as they are more complex and come with unnecessary modules.
Preview sample
Computer Sciences and Information Technology Information Technology Assignment
8 pages (2126 words) , Download 1 , Assignment
Free
A patient may require emergency resuscitation or services that require urgent attendance in order to save a life which is the key aspect of patient care. The services may not be available being that the doctor concerned is committed or attending to another procedure in a different place which may be far geographically (Louis E. Boone 13).
Preview sample
IT & Society Information Technology Literature review
6 pages (1600 words) , Download 1 , Literature review
Free
A central controversy that raised concerns among scholars studying the history of media or communication technologies is the extent to which technology conditions social change. Each of the scholars emphasizes on different factors associated with technological change. However, in the past years, scholars have criticized the concept.
Preview sample
Computer Applications in Health Care and Biomedicine Information Technology Assignment
19 pages (4797 words) , Download 1 , Assignment
Free
The knowledge-based clinical statements are expected to reduce the workload on the clinician. They will also reduce the time they take to make decisions. Decisions made with these systems are also correct always. These positive factors will make clinicians in the future to accept the knowledge-based system.
Preview sample
Pay Per Click Application Information Technology Report
10 pages (2910 words) , Download 1 , Report
Free
Pay per click (PPC), also referred to as cost per click (CPC), is an internet advertising model where advertisers pay an agreed-upon amount to the publishers (website owners) each time their advertisements are clicked (Wikipedia, 2011). Rather than using the bidding system, the website owners commonly charge the advertisers a fixed amount or price for each click made on their advertisements. 
Preview sample
The Social Web and Security Risks on People's Information Information Technology Report
6 pages (1793 words) , Download 2 , Report
Free
The social web and social media are 21st concepts, although the idea of interpersonal connections has existed throughout history. Contrary to historical notions of social networks, contemporary social networks that exist in the space of the internet carry with them inherent risks to private information.
Preview sample
General Systems Theory: Problems, Perspectives, and Practice by L.Skyttner Information Technology Book Report/Review
10 pages (2534 words) , Download 1 , Book Report/Review
Free
According to Skyttner (2006), the scholastic paradigm revolved around religion, with all scientific and social developments supporting religion. In this era, religion was superior to all other factors, and nature was alive and mortal. In this case, theological considerations took precedence over all other factors.
Preview sample
Network-Based Intrusion Detection System Information Technology Report
8 pages (2146 words) , Download 1 , Report
Free
Biometric systems will also be incorporated at the entrance/exit of the critical department for tracking employee existence and activity. IP based cameras will be installed on suitable locations for tracking critical server equipment and employee activities. For detecting potential and current threats, intrusion detection systems will be considered.
Preview sample
Computerized Clinical Decision Support Systems in Healthcare - Pros, Cons, and Liabilities Information Technology Literature review
8 pages (2340 words) , Download 1 , Literature review
Free
Medical practitioners are using technology-based tools and applications to treat patients and provide them with high-quality health care services. While computerized decision aids such as health information systems have made their presence felt in the industry and such systems are widely adopted by clinics and hospitals, there are significant barriers facing the optimal use of these systems.
Preview sample
Principles of Computer Security Information Technology Coursework
6 pages (1695 words) , Download 2 , Coursework
Free
With the increased use of computers and the Internet to manage our lives, cyber crimes have become a common term of use. Criminals have managed to adapt the traditional method breaking into a house to breaking into computer systems. Cybercrime is defined as "use of the Internet, computers and related technologies in the commission of a crime".
Preview sample
Blackhole Exploit Kit - What They Are and How They Work Information Technology Case Study
7 pages (1872 words) , Download 1 , Case Study
Free
In recent years, the number of malware has increased significantly because of the use of automation, as well as kits to facilitate its distribution and creation. It is a type of crimeware that takes advantage of exploits that are unpatched with the view of hacking computers through malicious scripts that are planted on legitimate but compromised websites.
Preview sample
Impact of Energy Costs in Information and Technology Sector and Adopting Cloud Computing Technologies Information Technology Research Proposal
6 pages (1797 words) , Download 1 , Research Proposal
Free
What are the current implications of high energy costs in the information sector and what is the potential significance of using cloud computing technologies to lower energy consumption? What is the concept behind cloud computing and data virtualization? What are the likely benefits of moving data centers to the cloud? What are some of the associated risks and mitigation measures?
Preview sample
Key Players and Security Solutions in Smart Grid Information Technology Research Paper
7 pages (1979 words) , Download 1 , Research Paper
Free
Basically the smart grid is a set of technology that people are utilizing to get efficient electricity delivery systems into the current era of technology, by making use of information technology supported remote control and automation. Additionally, collaborative communication mode is used to make possible the computer processing that has been employed for decades in a number of other sectors.
Preview sample
Evaluation of Website Interface Re-Design 5 Information Technology Research Paper
8 pages (2330 words) , Download 1 , Research Paper
Free
Because of too many graphics/ pictures (which is a plus to the Nebula Website since it needs to display its products), a significant amount of time will be taken to load depending on connectivity wherever a user is. This may inconvenience an impatient visitor, hence not achieving his/her goals in visiting the site.
Preview sample
Enhancing Cyber Situational Awareness through Active Defense Information Technology Research Paper
7 pages (2532 words) , Download 1 , Research Paper
Free
Situation Awareness Research Initiative has the primary objective of collaborating to advance research and technology in relation to cyber functionality, security, efficiency, dependability, reliability and security situations awareness as initiatives aimed at improving and refining related metrics, standards, mission assurance practices and visualization of the cyber projects.
Preview sample
Situational Awareness Analysis Tools Information Technology Research Proposal
9 pages (2679 words) , Download 1 , Research Proposal
Free
Situation awareness in cyber (CSA) defense entails the realization and recognition cognitively, of the performance of the technical enterprise, the relationship between technical performance and sets of missions that are under support, recognition of threats internal and external toward the enterprise, and have the activity awareness in relation to the broader agency.
Preview sample
Dynamic Host Configuration Protocol Information Technology Essay
11 pages (3305 words) , Download 1 , Essay
Free
There has been so much scientific and technological advances in the last few decades as compared to the progress achieved by humans in the last few centuries and millennia. This great leap in knowledge started more or less during the Industrial Revolution and has been accelerated ever since, resulting in an explosion of data, information, knowledge and wisdom.
Preview sample
Virtual Private Network as an Appropriate Control Information Technology Case Study
8 pages (2105 words) , Download 1 , Case Study
Free
VPN will encrypt the data before sending and it establishes a secure channel protected from hackers of cybercriminals. However, user credentials are required for authorization and authentication on the VPN server. Furthermore, for configuring multiple operating system environments on active directory, a domain server must be placed in Georgia, India, California, Canada, and New York. 
Preview sample
The Use of Various E-Books among Statistics Students In Libya Information Technology Thesis Proposal
8 pages (2697 words) , Download 1 , Thesis Proposal
Free
A number of recommendations will be developed that will aid the Higher education sector in Libya inadequately integrating the use of e-books. These recommendations will essentially be based on both an extensive analysis of the stakeholder preferences and experience in relation to technology-based learning as well as on an overview of the key institutional contexts with respect to the same.
Preview sample
Windows Network Proposal Information Technology Case Study
7 pages (1861 words) , Download 1 , Case Study
Free
Domain extensions tend to help to obtain the required domain name in case the first choice of domain is not available in a particular extension for example if the preferred domain name is shivllc and shivllc.com has already been registered then there is a chance the company may be able to obtain the domain name shivllc.net or shivllc.org (Lowery, 2013).
Preview sample
Decision-Making Model in E-Learning Information Technology Coursework
12 pages (3355 words) , Download 1 , Coursework
Free
This paper proposes an intelligent decision-making MCDM model that generates concept map ontology construction and decision-making in e-learning. The design and implementation utilize intelligent rules and integrates a myriad of techniques. Learning materials are classified and presented to the users depending on the constructed fuzzy ontologies.
Preview sample
Success of Different Traceability Tools Information Technology Research Proposal
8 pages (2171 words) , Download 1 , Research Proposal
Free
The concept of traceability remains an essential component for all projects undertaken in software development. The identification of the various relationships and effects of attributes, upon others within the same project, remains essential in successfully implementing a software development project.
Preview sample
Justification for New Hardware for Windows 8,1 Information Technology Research Proposal
7 pages (1842 words) , Download 1 , Research Proposal
Free
The most efficient method for a company to migrate to Windows 8.1 is through desktop virtualization. It is faster and cheaper than upgrading from a disk. This is because this method needs only one server to be upgraded to Windows 8.1 and the VM endpoints will run on an image generated by the server. Enterprise mobility will also be addressed through desktop virtualization.
Preview sample
Planning Stage in Computer Sciences and Information Technology Information Technology Research Proposal
14 pages (3410 words) , Download 1 , Research Proposal
Free
The management of the Systems Upgrade project for Clyde Valley Financial Solutions will two major milestones i.e. installation of the Windows Server 2008R2 Microsoft and installation of the Management Console (MMC). Windows Server 2008R2 will endow the company with a centralized tool for daily management of activities in the form of Server Manager.
Preview sample
The Causes and Effects of Internet Addiction Information Technology Research Proposal
11 pages (3214 words) , Download 2 , Research Proposal
Free
The research study is dedicated to investigating the causes and effects of internet addiction. The researcher formulated three hypotheses that will be tested and validated or nullified when carrying out the research study. The research takes a quantitative research design with questionnaires being the main tool of primary data collection.
Preview sample
IP Internetworking in Denver and Houston Information Technology Case Study
8 pages (2089 words) , Download 1 , Case Study
Free
The organization XUMUC is facing issues regarding networking throughout its new centers. It is advisable that the XUMUC should take into consideration the necessary changes that have been proposed for upgrading they're exiting the network setup. Further, the assignment also showed some of the measures that are required to be undertaken to reduce the high administrative overhead.
Preview sample
Mobile Digital Forensics Information Technology Research Paper
6 pages (1696 words) , Download 3 , Research Paper
Free
Additionally, besides mobile phones, other related devices have also been devosed to add value to human life and increase efficiency in their communication and other social and economic functions. However, in as much as these technologies have brught many advantages in human life, they have also been cited as the potential causes of the many problems that continue to affect the quality of life.
Preview sample
Knowledge Management Design and Implementation Information Technology Literature review
10 pages (2855 words) , Download 1 , Literature review
Free
However, the data that is analyzed via different techniques is fetched from data warehouses, where many databases are interconnected with each other. Major techniques that are involved in the process of knowledge management are regression, classification and clustering (Wu, Ming, He, Li, & Li, 2014).
Preview sample
Robotics in Healthcare Sector Information Technology Literature review
8 pages (2262 words) , Download 1 , Literature review
Free
This paper also outlines some of the main advantages those are presently attained through the robotics technology in the medical sector. Basically, a ‘robot’ is a reprogrammable, multifunctional machine intended to move material, tools, parts or particular devices through a variety of engineered motions for performing various tasks.
Preview sample
Database Security Controls Information Technology Literature review
12 pages (3569 words) , Download 1 , Literature review
Free
It helps the organizations in managing, accessing and updating their data in the best way possible with easy access as the data is saved in a systematic record. As new software is present with innovative technology for a database, the risk to secure the data from malicious sources is also a prime concern of the administration and the IT Department of any organization (Natan, 2005; Loch & Carr, 1992).
Preview sample
Data Mining in Airlines Information Technology Literature review
6 pages (1759 words) , Download 2 , Literature review
Free
Since huge applications have a huge number of variables, direct utilization of computer experiments requires exceedingly large designed experiment as well as considerable computational effort. Naturally, variable selection can be conducted after executing small computer experiments. However, conventional techniques of variable selection cannot be applied in huge variables.
Preview sample
E-Learning Management System Information Technology Literature review
10 pages (2937 words) , Download 1 , Literature review
Free
However, if quantity is achieved without quality, the outcome is not favorable. Instead of face-to-face, ‘Distance Learning’ involves learning from a computing interface. The distance between the learner and the educator is the basis for employing this means.
Preview sample
How has Hacking and the Motivation of Attackers Evolved Information Technology Research Paper
12 pages (3421 words) , Download 1 , Research Paper
Free
The period saw great development in mainframe computers and numerous technology based companies had invested for development of computer languages. for training and supporting computer programming projects, which provided an easy access for codes modification.
Preview sample
Microsoft Windows 7 Security Best Practices and Vulnerabilities Information Technology Research Paper
11 pages (3120 words) , Download 1 , Research Paper
Free
This paper has discussed the best practices of the Windows 7 Operating System and also some vulnerabilities of this system. It has two sections: the first section has elaborated a number of the best features in Windows 7 OS. 
Preview sample
Authenticating iOS Devices to Join the Active Directory Domain Information Technology Literature review
10 pages (2791 words) , Download 1 , Literature review
Free
However, some users would be having intentions of accessing personal files of other users, corrupting public files or denying users access to printers forcing us to think carefully about network integrity. Contemporary society cannot allow us to continue using a centralized service delivery system where people crowd around one terminal to receive services.
Preview sample
Role of Technology Assessment to the Company Information Technology Literature review
6 pages (1635 words) , Download 1 , Literature review
Free
The integrated technology entail portfolio that is project based. Technology can be defined as an integration of tools, people, knowledge and systems with a goal of improving the organizational performance and lives of people. Assessment of technology has to target knowledge, systems and tools, procedures, people and the new knowledge pertaining to technological innovation.
Preview sample
The Role of Health Information Technology in HIE Information Technology Literature review
7 pages (2236 words) , Download 1 , Literature review
Free
It allows the providers to deliver quality and low-cost services quite quickly, and the patients can improve their health issues by participating more with their very own health (Chaudhry, Wang, & Wu, 2006).In the recent years, there is seen much of the Federal struggle to increase the use of health information technology or electronic health information implementation to prompt innovation in Healthcare Delivery by health service providers (Buntin, Burke, Hoaglin, & Blumenthal, 2011).
Preview sample
Operating System Proposal Information Technology Literature review
10 pages (2634 words) , Download 1 , Literature review
Free
Though Linux Kernel alone could not make an operating system, it is matching with GNU tools marked the starting point for the current Linux operating system (Carns, Ligon, Ross, & Thakur, 2000). Though Linux has enjoyed incredible achievement since the first request of Torvalds in 1981, it is in numerous ways still at the start of its potential.
Preview sample
Accounting Information System Proposal for Homeowners' Association Information Technology Research Paper
21 pages (5460 words) , Download 1 , Research Paper
With technological advancements in operations, organizations are often forced to digitalize their operations through the upgrading of systems and procedures used in conducting activities in the organization. One such area that firms have often sought to digitalize has been financial system in use by such organizations so as to accommodate all system’s functionality in relation to the generation of services by the system.
Preview sample
Implementing a Geographic Information System for Water & Sewerage Company Information Technology Research Paper
6 pages (1339 words) , Download 2 , Research Paper
Free
This is to help to efficiently manage their utility distribution systems and replace the existing system. This will act as a learning point for other water and sewerage companies in other counties. Nairobi, the capital city of Kenya is the most important economic centers in Eastern and Central parts of Africa (Preston, 2013). 
Preview sample
Crowdsourcing Information Technology Literature review
15 pages (3902 words) , Download 1 , Literature review
Free
Throughout its growth, crowdsourcing has greatly affected the field of interface design. Regardless of a few challenges facing crowdsourcing, incorporating crowdsourcing guarantees several benefits that offset its shortcomings to project implementers.
Preview sample
Advertising on the Web: Options and Trends Information Technology Literature review
8 pages (2299 words) , Download 1 , Literature review
Free
While for profit organizations advertise so as to persuade and convince the audience to use their services and products, not for profit organizations use it to encourage behavior or perception change as well as raising awareness. This communication, generally with respect to commercial offerings, ideological or political support, is commonly via a range of forms of paid media that include the Internet, billboards, print media, and radio.
Preview sample
The Reason for a Company to go to an Enterprise Solution Information Technology Literature review
11 pages (3042 words) , Download 1 , Literature review
Free
Meanwhile, the term “enterprise” is very broad and often encompasses virtually all aspects of computer technology for business solutions, including software, hardware, and the employees needed to successfully implement the requirements of particular organizations. Overall, marketing personnel have coined the phrase “enterprise solutions” to foster interest in various business solutions offered by specialists.
Preview sample
Identity Theft Information Technology Literature review
7 pages (2101 words) , Download 1 , Literature review
Free
This form of theft involves the criminals obtaining and using the personal information of different people like their credit card data, bank account details and insurance information as well as social security numbers to make purchases of goods and/or services in a fraudulent manner without the consent of the owners.
Preview sample
Learning Management System Information Technology Literature review
12 pages (3196 words) , Download 1 , Literature review
Free
The Learning Management Systems (LMS), during the last 15 years have become vital for e-Learning contributors as platform to hold course registration, substance storage and deliverance, evaluation, supervision and treatment (Lai and Savage 1-21). On the other hand, the LMS market has remained very disjointed. We cannot find any particular e-Learner organization that has get fame and analyst organizations that directs this industry such as Bersin & Associatesi, report that client can select from numerous sources.
Preview sample
Human Factors and Social Aspects in Software Engineering Information Technology Case Study
7 pages (1893 words) , Download 1 , Case Study
Free
While one could view software engineering as an issue solely left for the engineers, surprisingly, the humans do influence how it is developed. In light of the definition offered, it is easier to see why humans play a pivotal role in the software engineering.
Preview sample
1851 - 1900 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us