StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Evolution of Active Directory Information Technology Literature review
8 pages (2324 words) , Download 1 , Literature review
Free
We look at its introduction as a component of the window 2000 server operating system as well as its present-day form as an integral part of the window server 2008. We also look at how things were managed before its introduction. All this is with the objective of understanding this kind of component Microsoft windows hence try to understand this component act to be of importance to IT users.
Preview sample
E-Government and E-Democracy Systems Information Technology Research Paper
7 pages (1919 words) , Download 1 , Research Paper
Free
It is important to understand that every country in the world presents unique cultural influences, power distance, modes of interpersonal interaction, expectations related to what a government should do for citizens, etc. Thus, expectations from e-government and e-democracy systems vary from country to country and between cultures.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Firewalls: Great Network Security Devices Information Technology Research Paper
9 pages (2524 words) , Download 1 , Research Paper
Free
This paper has discussed some of the types of a firewall, it's working, and its operational structure. Without a doubt, the application of a network firewall ensures enhanced security however there are also a number of issues that make firewalls a complex security management arrangement. However, up till now, firewall technology is the ultimate alternative for best network security management.
Preview sample
Failures in Scope Control when Developing a Web Portal for EBazar.com Information Technology Case Study
8 pages (2487 words) , Download 1 , Case Study
Free
Using the PRINCE model for management, the position where this project failed was in controlling the stages of the process (see Appendix 1). The WBS or the work breakdown structure was initially set, but as the project progressed, the added elements to the scope were not distributed, thus continuing the breakdown of the overall management of the project.
Preview sample
Milestone Challenge Solution Information Technology Case Study
8 pages (2331 words) , Download 1 , Case Study
Free
As the merits of the emerging technology are discussed, it is important to give critical attention to all forms of possible setbacks. One of the first of such setbacks has to do with the issue of internet and software security. For the suggested emerging technology, a lot has been said to depend on the use of the internet.
Preview sample
Understanding Big Data Analytics Information Technology Report
6 pages (1860 words) , Download 2 , Report
Free
The requirements of capturing, storing, questioning/analyzing, and retrieving data have been increased, especially for unstructured data such as video. The increasing data requirements impact traditional or relational databases and relegate them to the venture crumb mound as an up-and-coming variety of vendors’ crumble the traditional software and database dominance.
Preview sample
Google and its Evil Face Information Technology Case Study
6 pages (1862 words) , Download 1 , Case Study
Free
Google is an everyday tool that responds to anyone looking for an answer with a solution making it the most-used search engine in the world by providing any search information or tool it can on an average of fewer than five cent-seconds. The world declares the search engine as a mine for information but fails to look at the downside to it since, in reality, Google is a corruption of the world.
Preview sample
Network for International Travel Agency Information Technology Report
10 pages (2637 words) , Download 1 , Report
Free
OSPF fulfilled all the requirements of the given scenario along with the path selection if a primary link (of 2Mbps) goes down. The ITA HQ router was configured with a static address using a loopback interface and this address is successfully propagated through the complete network. Several tests were also performed after configuration with successful results.
Preview sample
Digital Crime and Digital Terrorism Information Technology Report
6 pages (1878 words) , Download 1 , Report
Free
In the coming years, there will be a need for the country to balance national security and privacy for the interest of people and to maintain national liberty when conducting investigations by means of surveillance. This will be a challenge as most information technology companies are private companies that value the privacy of individuals as compared to national security.
Preview sample
The Expected Benefits of HTML5 Adoption Information Technology Research Proposal
9 pages (2549 words) , Download 2 , Research Proposal
Free
Although the research is expected to achieve its objectives, there are a few unavoidable limitations that may slightly affect the validity of its findings. Fist and foremost because of the short time limit, the research will only be conducted on small population size and therefore the researchers will not be able to effectively assess the target variables.
Preview sample
International Standards and Information Systems Quality Management Information Technology Report
9 pages (2633 words) , Download 1 , Report
Free
One key is the implementation of the international standards that allow assurance of quality management of information systems in the organization. The review of the international standards on quality management and information systems suggests that these standards complement each other. ISO 9000 QMS mainly focuses on establishing a quality management system in any given context.
Preview sample
The Cloud Computing in Business Security Information Technology Report
20 pages (5427 words) , Download 1 , Report
Free
Generally, one needs to specify whether to use one machine per service or whether to deploy one big machine and several virtual servers. The second concern arises regarding acquiring the cloud service; the customers might buy it and own it or might rent it from a service provider from a public cloud.
Preview sample
Cyber Security Issues Information Technology Report
38 pages (9537 words) , Download 2 , Report
Mitigating the relationship between threats and ISS effectiveness are “modifying factors” (Loch et al., 1992) which represent internal and external forces that can influence whether or not a threat is able to be realized and/or affect the severity of such a threat if it were to occur. Much of the literature refers to these as “counter-measures” (Schultz, 2004; Whitman, 2004).
Preview sample
Digital Certificates and Certification Authorities Information Technology Report
16 pages (5484 words) , Download 1 , Report
Free
A digital certificate, which is a component of public key infrastructure, is a digital credential that ensures the security and privacy of communication. The digital certificates basically achieve this purpose by giving a unique identity to the companies, businesses, and individuals over the Internet. It correlates the owner of the certificate with a public key which he further brings into play.
Preview sample
International Workshop on Security Protocols Information Technology Report
8 pages (2344 words) , Download 1 , Report
Free
Most protocols can operate either with or without the TLS presence, it is, therefore, necessary to indicate whether a connection is being made by the client or not. This is accomplished through the server. This is achieved by either using a separate digit for the connection or making use of the regular port number and having the server to switch the connection to TLS.
Preview sample
Virtualize Desktop Infrastructure in the Work Environment Information Technology Literature review
6 pages (1705 words) , Download 1 , Literature review
Free
The system enables several users (desktop) to be hosted using remote servers connected to certain networks through a specific protocol. This means that a certain user can access data in the server despite his/her location. 
Preview sample
Ethical Issues Concerning Information Technology Information Technology Research Proposal
14 pages (3938 words) , Download 3 , Research Proposal
Free
The paper focuses on exploring ways through which qualitative and quantitative research methods are applied in conducting this research, thereby determining findings in relation to the hypothesis. In the other section, the paper has a discussion that seeks to compare and contrast the findings in qualitative and quantitative research.
Preview sample
Biometric Authentication Information Technology Assignment
6 pages (2113 words) , Download 1 , Assignment
Free
A combination of these security measures would be necessary at the DoD to ensure that not only authorized users access the system but also that their activities are authenticated and data transmitted in secure ways. This will help guarantee both authenticity and privacy of information and data at the DoD.
Preview sample
The BlackBerry Network Architecture Information Technology Case Study
6 pages (1738 words) , Download 1 , Case Study
Free
Wiping data is also limited by the device configuration in that it can only be performed if the device is remotely accessible, thus making password protection essential and the only defense mechanism for stand-alone devices (Hoffman 2007). In this regard, a device can be designed and configured to store remotely sensitive information such as emails and business contacts in the cloud.
Preview sample
Best Practices for Network Security Information Technology Report
8 pages (2434 words) , Download 1 , Report
Free
It is something that is so compromising for a network without a security policy. The responsibility of protecting the computer files and all information (e.g., employer’s information) in the network depends on the practices that are applied for security. There are those procedures that are followed to see that the network is fully secured to prevent it from attacks and threats.
Preview sample
Introduction to Information Systems Information Technology Report
9 pages (2377 words) , Download 1 , Report
Free
Students in the field of IT and IS should develop an interest in the study of value in terms of the various influences that connect within the relationships between business and technology. Such a study should include an awareness that business processes are necessarily related to the manner in which systems and processes determine the levels of success for any business.
Preview sample
WAN Technologies Currently Used within the UK and European Markets Information Technology Report
8 pages (2265 words) , Download 1 , Report
Free
The technology was developed as an advanced version SONET which was common in the US. The technology brought about harmonization in terms of WAN standards.  SDH enables the transfer of a particular of converging local area network with different bitrates. To achieve multiplexing, a tributary stream is inserted in containers that are predefined to come up with one stream.
Preview sample
Comparing the Arguments Within Social Networking Papers Information Technology Research Paper
6 pages (1813 words) , Download 1 , Research Paper
Free
The first paper describes the theoretical and mathematical work to produce a software application to implement a call-rating and feedback-driven application for producing social networking recommendations - a key business marketing tool.
Preview sample
Mobile Enterprise Information Technology Research Paper
10 pages (2876 words) , Download 1 , Research Paper
Free
Mobilization is one such technique adopted by businesses and it refers to the incorporation of the use of mobile device technology such as cellular phones, tablets or PDAs in the day to day running and operation of its core operation functions. Mobilization has many benefits. For instance, it opens foreign markets to prospective investors and facilitates the flow of information and ideas within and outside of organizations. 
Preview sample
Session Initiation Protocol Information Technology Essay
12 pages (3194 words) , Download 1 , Essay
Free
The author of the following paper states that SIP trunking means that streams from an IP media that are broadcasted from within an enterprise remains a stream from an IP Media and passes somewhere else within the enterprise or across the enterprise’s boundary to a different enterprise through the Internet protocol.
Preview sample
The Use of Oracle Database Information Technology Case Study
6 pages (1558 words) , Download 1 , Case Study
Free
The paper will provide detailed requirements the will enable users to develop a staff login screen, transaction form for inserting, updating, and deleting records. Trough these requirements the users will also link forms together, use a customized menu, and develop some reports and call them from the forms.
Preview sample
The Successful Emergence of the Internet of Things Information Technology Research Paper
23 pages (6535 words) , Download 3 , Research Paper
The successful emergence of the IoT vision, however, will require computing to extend past traditional scenarios involving portables and smart-phones to the connection of everyday physical objects and the integration of intelligence with the environment. Subsequently, this will lead to the development of new computing features and challenges.
Preview sample
Voice over IP Communication Systems Information Technology Research Paper
12 pages (3998 words) , Download 1 , Research Paper
Free
It is well provided that effective communication over VoIP is a necessity in the contemporary economy because of the technology’s advantages and benefits over the traditional telephony communication systems. It is also pointed out that its popularity and the advanced features of the VoIP technology as well as the associated benefits.
Preview sample
Creation of a Data Structure Information Technology Case Study
6 pages (1655 words) , Download 1 , Case Study
Free
The study of the data structure and algorithm is an important component in the engineering curricula. Computer engineers do not only use the standard of computer packages. Contrary to traditional ways of understanding the data structures, which rely upon the static examples and textbook diagrams provide some aspects of the execution of a program.
Preview sample
Multimedia Cloud Computing for Smart Hospitals Information Technology Thesis Proposal
8 pages (2362 words) , Download 2 , Thesis Proposal
Free
In general, a major limitation that may be faced in the conduct of the study has to do with access to information. In most academic research of this nature, targeted stakeholders tend to get a feeling that participating in the study will expose the weaknesses and flaws associated with their administration.
Preview sample
How Information Technology Applications May Lead to Competitive Advantage in Hotel Industry Information Technology Research Paper
20 pages (5508 words) , Download 1 , Research Paper
Free
Many areas have to be in implementing and developing the projects of Information technology so that they can contribute to an advantage that is competitive in the hotel industry. There exist four areas that are to evaluating the decisions of Information technology in hotels. They entail the co-relationship between the decisions of Information technology and the strategy of the business, application types of information technology.
Preview sample
ERP Implementation Best Practices Information Technology Literature review
6 pages (1649 words) , Download 1 , Literature review
Free
ERP achieves all the operations of the organization including product planning, development, manufacturing and even marketing. Moreover, firms that use ERP benefit greatly when it comes to competition in the market with other companies due to their being ahead in product development and marketing.
Preview sample
HCI Design Project Usability Evaluation Plan Information Technology Research Paper
11 pages (2951 words) , Download 1 , Research Paper
Free
The software system will be a sales system for an online based business enterprise similar to eBay and Amazon. The system’s goals is to simplify the customer’s experience as well as the employee’s productivity by providing tools to ease the acquisition of the desired products that would otherwise be done manually and collected physically. 
Preview sample
Malware Analysis Plan Information Technology Research Paper
10 pages (2639 words) , Download 1 , Research Paper
Free
As a result of the attacks of malware, large amount of losses are incurred every year. In order to overcome the challenge and threat of malware various techniques, tools, programs, applications, security based measures and other knowledge based techniques are used that enable overcoming the challenges of malware. 
Preview sample
OPAC Evaluation Between Drexel Libraries & LAU Libraries Information Technology Research Paper
6 pages (1612 words) , Download 1 , Research Paper
Free
The online interface for system output and user input is among the elements of information retrieval (IR) system. Various online catalogs or online IR systems have diverse user interfaces that would permit user to search information or circumvent outside and within the library collections. 
Preview sample
Comparative Characteristics of the Hybrid Networks on Chip and the Networks on Chip Information Technology Research Paper
8 pages (2226 words) , Download 1 , Research Paper
Free
However, in responding to this crisis related to interconnection, the Hybrid network-on-chip (WNoC) was envisioned as one of the most revolutionized approach. In this paper, it discusses how Hybrid network on chip is better than Network on Chip.
Preview sample
Usability Test Plan of the Sales Management System Information Technology Assignment
9 pages (2269 words) , Download 1 , Assignment
Free
The test measures the effectiveness of the user interface as it is and determines the changes needed to improve the user interface. The usability testing will investigate the sales system user interface prototype and use the results of the test to rectify and refine the user interface of the application. The usability test is basically directed at determining the functionality of the interface.
Preview sample
Database Security - Threats and Challenges Information Technology Research Paper
15 pages (4164 words) , Download 1 , Research Paper
Free
This paper provides an insight on the kinds of attacks that are likely to happen, how they are likely to be perpetuated and by whom. It gives the security threats and challenges that are faced in databases. It also suggests means of prevention of these  attacks.  
Preview sample
Network Security and Control Mechanisms - Threats and Challenges Information Technology Research Paper
15 pages (4116 words) , Download 2 , Research Paper
Free
Although implementation of technological solutions is usually the most applied response to wireless security threats and vulnerabilities, wireless security is most basically a management issue. Effective threat management requires a sound and thorough assessment of the risk, with the environment and development of a plan to alleviate the identified threats.
Preview sample
Enterprise Application SystemsIntegration- Assessment Documentation Information Technology Research Paper
26 pages (6380 words) , Download 1 , Research Paper
This is not a process document, service level agreement or operational document. Any information pertaining to operational issues, are only noted for system design implications. Operational documentation can be found within department Standard Operating Procedures (SOP) or Work Instructions (WI).  
Preview sample
Yahoo's Database Security Information Technology Coursework
6 pages (1816 words) , Download 1 , Coursework
Free
In 1994, these two developers decided to customize Yahoo into a database that could serve quite a number of users through an online platform, precisely the internet (An Introduction to Yahoo, 2015). From that time, Yahoo gradually gained popularity all over the world.
Preview sample
Operating Systems - Windows, Linux and Android Information Technology Case Study
7 pages (1979 words) , Download 3 , Case Study
Free
An example of software includes the office package, Adobe reader, and Acronis disk director. Although there is numerous OS on the market, this paper will focus on three of them, namely Windows, Linux, and Android OS. With the help of online sources as the primary source of data, this study will analyze the above three OS in terms of their structures, components, working mechanism, and code complexity.
Preview sample
Dynamics Overview Microsoft Dynamics and it Role for Users Information Technology Movie Review
6 pages (1815 words) , Download 1 , Movie Review
Free
The address bar has the travel buttons; the forward and the backward buttons hence provide the user with more navigation possibilities. Further, the address bar allows navigation to other pages, modules and even other companies. 
Preview sample
The Effect of Cloud Computing on Enterprise Networks Information Technology Literature review
7 pages (1998 words) , Download 1 , Literature review
Free
In the recent past, companies have been employing cloud computing services in order to increase their reach to clients, improve there retailing, increase their efficiency in data mining and analysis and streamline regulatory reporting at the company. Despite these numerous advantages that accrue from all this, it is vital to realize that cloud computing has its set of limitation.
Preview sample
The Positive and Negative Effects of Technology on the Aged Information Technology Term Paper
7 pages (2008 words) , Download 1 , Term Paper
Free
Various researchers such as West and Rachel and others have written articles in relation to technology but have failed to address the effects of technology on the elderly health care. To ensure proper health care for the elderly through the use of technology, the government, and the private sector should collaborate and educate the elderly on the importance of technology in relation to their health.
Preview sample
Business Continuity and Disaster Recovery in Cloud Computing Information Technology Business Plan
8 pages (2230 words) , Download 8 , Business Plan
Free
The service is accessible from any device, location and at all times (Company, 2013). The company will be having various challenges due to the increased need for disk-based backups, affordability of the storage space, performance and reduction of data footprints, reliability of the system.
Preview sample
Mobile Collaboration as a Technology-based Procedure Information Technology Literature review
6 pages (2096 words) , Download 1 , Literature review
Free
This emerging technology (mobile collaboration) seems to have adequate conditions and platforms with the intention of improving operations of the business entities in pursuit of sustainable competitive advantage within the market and industry of operation.
Preview sample
IT Project Risk Management Information Technology Research Paper
15 pages (4043 words) , Download 1 , Research Paper
Free
IT, in particular, has become an important tool in all-important sectors, and any organization will highly feel the impact of any failure of IT project management on competitive advantage. 
Preview sample
The Effect of the Internet on Communications Information Technology Literature review
9 pages (2538 words) , Download 2 , Literature review
Free
In the past decade only, huge advances in hardware and software technology changed how the world connects. It is at this era that cyber communication erupted and spread all over the world. In digital communication, the participants need to establish the most appropriate styles and forms to use.
Preview sample
Emerging Cyber Security Approaches and Technologies Information Technology Research Paper
18 pages (5009 words) , Download 2 , Research Paper
Free
Furthermore, these countries have invested heavily on methods that they can use for purposes of protecting their cyber space. This paper provides a review of technologies that can be used for purposes of protecting the cyber space, and the various efforts that government organizations have enacted for purposes of supporting the development and implementation of the technologies concerned. 
Preview sample
1951 - 2000 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us