StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Cloud Storage and Synchronization: Information Management Tools by Greg Notess Information Technology Article
2 pages (500 words) , Download 1 , Article
Free
After being entrusted with the role of reviewing a topic of interest that would be of great benefit to the business, I came across an interesting article that changed my perception of cloud computing. I am ready to share my findings with
Preview sample
Information Security Management Information Technology Case Study
9 pages (2428 words) , Download 1 , Case Study
Free
The social engineering cyber attacks by the blogger that are targeted at discrediting EZ Company’s information integration and visualization technology are seen to be as a result of a long-standing dispute between the blogger and some of EZ Company’s principal executives. In a bid to try and get at these principals, the blogger is directly targeting EZ Company and its product.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The Issue of Media Piracy Information Technology Case Study
6 pages (1729 words) , Download 1 , Case Study
Free
The paper gives an overview of Internet piracy. Besides providing a historical overview of how peer-to-peer music sharing sites and programs paved the way to Internet piracy, the report also discusses the three main factors that tend to promote its high costs of entertainment, online availability of pirated media.
Preview sample
Mobile Digital Forensics Information Technology Research Paper
6 pages (1696 words) , Download 3 , Research Paper
Free
Additionally, besides mobile phones, other related devices have also been devosed to add value to human life and increase efficiency in their communication and other social and economic functions. However, in as much as these technologies have brught many advantages in human life, they have also been cited as the potential causes of the many problems that continue to affect the quality of life.
Preview sample
Tracking Technology Information Technology Essay
5 pages (1540 words) , Download 1 , Essay
Free
Total Information Awareness (TIA), a proposal by the Defense Advanced Research projects (DARPA) that is reliant on data mining and tracking information will be discussed in terms of the regulations and ethical concerns involved. The Global Positioning System (GPS) is a more advanced tool in terms of reporting the location of an object. The GPS tracker has a receiver that determines the position of an object. 
Preview sample
Type of Technology of Wireless Local Area Network Information Technology Report
4 pages (1215 words) , Download 0 , Report
Free
Wireless Local Area Network represented by (WLAN), is a network that operates wirelessly and acts as a link between two or more devices that are compatible with the wireless system. This type of technology has played a very vital role in simplifying networking without major interruptions by allowing simultaneous linkage and resource sharing within a given area whether an office or a home.
Preview sample
Information Security Policy for Amazon Inc Information Technology Report
24 pages (6813 words) , Download 1 , Report
Over the past few decades, there have been emerging new technological developments rapidly and the world has seen much progress in the economy due to such advancements. Implementation of information security mechanisms is not an easy task, it needs proper management and governance to apply this effectively in any organization. 
Preview sample
Wearable Devices in Healthcare Information Technology Literature review
14 pages (4308 words) , Download 2 , Literature review
Free
While entertainment, communication and commerce are some of the fields which are making good use of the faster and more powerful systems available now, the health care sector is similarly investing in research to develop miniature, wearable healthcare devices that can be used by patients to monitor their own health or to assist those suffering from restricting illnesses.
Preview sample
Relational Database Management Systems and their Alternatives Information Technology Literature review
6 pages (1838 words) , Download 2 , Literature review
Free
In this scenario, relational database management systems provide an excellent support to companies for the management of their complex data in an effective and efficient manner (Jingmin & Wang, 2001). 
Preview sample
Troubleshooting of the Software or Hardware Devices Information Technology Coursework
8 pages (2100 words) , Download 1 , Coursework
Free
Most troubleshooting techniques use the process of elimination whereby the technician will follow certain steps in order to determine and resolve the problem. The complexities of troubleshooting techniques depend on the level of damage that the device is having. However, there are certain steps that are common to all troubleshooting techniques. 
Preview sample
Reflective Analysis of Professional Work Placement Experience in the Field of Information Technology Information Technology Assignment
5 pages (1304 words) , Download 1 , Assignment
Free
The project was scheduled to run for ten weeks. Each week had specific tasks that followed the induction exercise. In each of the tasks, there were lessons to be learned and reflections to be made. The tasks for the first two weeks involved the studying of the stakeholders' needs. This was necessary in order to plan and develop a website.  
Preview sample
The Capacity of the Fourier Transformation Information Technology Assignment
2 pages (500 words) , Download 0 , Assignment
Free
The exercise finds that this filter is inappropriate since it led to the loss of important details. This set includes images (9-16) under noise value of 5.2 and filter breadth 1000. In comparing this
Preview sample
Airline Operations: The Impact of a Global Monitoring System on Safety and Finances Information Technology Coursework
10 pages (2500 words) , Download 2 , Coursework
Free
The use of navigation technologies such as Global Positioning Systems (GPS) in real-time tracking are technologies developed to ensure the ground crew receives data from an aircraft at all times, with respect to condition and position. In every system, it is elemental to consider the possibility of an error, which translates to the GPS system of aircraft tracking not being a hundred percent effective and efficient.
Preview sample
Copyright Infringement Information Technology Case Study
5 pages (1785 words) , Download 1 , Case Study
Free
The author presents software piracy which is a serious global problem that needs to be addressed so that intellectual integrity is maintained. The reasons that people give for pirating software will also be discussed. The paper will also give a conclusion of the major issues that will be discussed herein.
Preview sample
Frequency Domain Analysis of Control Systems and Time Domain Analysis Information Technology Term Paper
5 pages (1617 words) , Download 0 , Term Paper
Free
Signal processing has the primary goal of providing the underlying information on the specific problems for the purposes of decision making. In control systems, control theory is normally used both in the analysis and design of feedback systems. Such systems include those that regulate temperature, fluid flow, force, motion, pressure, voltage, tension and current.
Preview sample
The Idea of Sandboxing and Its Techniques Information Technology Coursework
14 pages (3700 words) , Download 0 , Coursework
Free
The idea of sandboxing can relate to a child’s sandbox that is made to protect the sand from the outer environment and must be kept in a particular place. The idea of sandboxing in the world of information technology is that a virtual area is dedicated for the non-trust worthy applications that can risk other data present in the system can run smoothly in the system without creating a mess to other applications.
Preview sample
The GroupBased Labeling Scheme Information Technology Research Paper
21 pages (5158 words) , Download 1 , Research Paper
The author states that the first experiment evaluated the time needed for the initial labeling process along with the labels’ size. The second experiment focused on assessing the time needed to determine the different relationships. The third experiment evaluated the queries’ response times before and after insertions.
Preview sample
Administration Systems- System Users, System Modification, Implementation Strategies Information Technology Assignment
10 pages (2845 words) , Download 0 , Assignment
Free
The paper “Administration Systems- System Users, System Modification, Implementation Strategies” is a thrilling example of an information technology assignment. System requirements are the official and legal features that an administrative system needs before being implemented. These requirements are the key elements that ensure that the system runs in a systematic manner.
Preview sample
Administration Systems and Their System Requirements Information Technology Assignment
10 pages (2706 words) , Download 0 , Assignment
Free
The paper “Administration Systems and Their System Requirements" is an excellent example of an information technology assignment. System requirements depend on several factors, and the first is the type of business and products produced in the company. This determines the requirements of the administrative system in the company.
Preview sample
Analysis of the Tempora Surveillance System Information Technology Assignment
5 pages (1366 words) , Download 1 , Assignment
Free
Surveillance refers to the process of monitoring the activities, behavior, or communication of other people, with the intention of managing, directing, protecting them. This includes the use of electronic equipment, such as cameras, CCTV, intercepting any information that is transmitted through electronics, use of postal interceptions, and human intelligence agents (Ernst, 2012).
Preview sample
Security, Audit and Compliance Information Technology Research Paper
13 pages (3611 words) , Download 2 , Research Paper
Free
Data Protection Act (DPA) 1998 of the UK was formed. Data controllers are required to adhere strictly to this Act. Section 55A to 55E of the Act allows the Information Commissioner to issue a monetary penalty notice to data controllers who breach the regulations of the Act. Principles of the Act guide the data controllers on how to manage the data.
Preview sample
Whether the Internet Is an Ally of Liberation or Not Information Technology Assignment
7 pages (1940 words) , Download 1 , Assignment
Free
The author states that the history of the internet originally beganin1962 when there was the beginning of the “Galactic Network”. However, in the present-day context, the internet is omnipresent and almost every individual has access to the internet. This has also become the most important social need for an individual.
Preview sample
Ideal Model of Presentation Information Technology Essay
5 pages (1611 words) , Download 0 , Essay
Free
Such knowledge is oriented on different platforms that define its eventual usage, storage, and expression. Among them are the prospective packaging and presentations systems, as well as the process of its optimization. The packaging will consider information technology systems while the prospect of optimization will involve the brainstorming of ideas.
Preview sample
Promoting Information Security in Banking Solutions Inc Information Technology Case Study
5 pages (7946 words) , Download 1 , Case Study
Free
Another major issue is the failure to write site-specific DRBCPs for all item processing facilities, but on for the five largest processing facilities. Skipping some item processing facilities poses an information security risk to both customers and the institution. Various sections of DRBCPs have been affected including emergency and crisis response procedures.
Preview sample
Performance and Wearable Technology Information Technology Case Study
15 pages (4177 words) , Download 1 , Case Study
Free
The author states that performance and wearable technologies have five categories of applications. The first is the wellness and fitness category. Products that are both wearable and smart gadgets are used to monitor the emotions and the activity of the user. The second is the medical and health care category.
Preview sample
Project Management Office in an Agile Environment Information Technology Case Study
5 pages (1368 words) , Download 1 , Case Study
Free
The fastest responses to the changing business needs across the large portfolio should be equally considered. In maximizing the values that incur through the vibrant and continual prioritization of work, its basis might be visible as the measures of the value of the money spent, time sensitivity, and risks involved. 
Preview sample
Differences Between a Library and an Archive Information Technology Literature review
5 pages (1556 words) , Download 1 , Literature review
Free
There exist differences between a library and an archive, though these two are important sources of information. An archive may have a library as its part, or an archive can be a department in a library. The main differences between archives and libraries lie in the types of material they hold, the way people access this material, and their role.
Preview sample
Technology and Foundations into the Wireless Network Information Technology Term Paper
18 pages (4878 words) , Download 1 , Term Paper
Free
The following paper presents wireless problems of connectivity, security, authentication, and slow performance. The market is full of wireless management tools whereas the paper narrows down to the analysis of the network problems that arise in wireless network monitoring using the Observer platform.
Preview sample
Relations between IT Professionals and Society Information Technology Term Paper
12 pages (3116 words) , Download 1 , Term Paper
Free
The author of the paper states that IT professionals are no more exception. For this purpose, the concept of religion and ethics, corporate social responsibility, which has been provided in the lectures and tutorials, is highly essential as they are directly related to ethics and ethical way of living.
Preview sample
Enterprise Resource Planning Integration of Nonfinancial Measures for Business Success Information Technology Literature review
10 pages (2787 words) , Download 1 , Literature review
Free
In this system, various areas including planning, purchasing, and inventory and marketing departments within the business are integrated with the help of information technology in order to create harmony, understanding and coordination within the business. The changing business environment has forced companies to rethink their strategies and develop approaches aimed at achieving the strategic goals with minimal losses at all times. 
Preview sample
The Concept of Interoperability and Utilisation Information Technology Case Study
8 pages (2194 words) , Download 1 , Case Study
Free
Over the years, highly complicated programs and computer systems have been replaced with the modern-day upgraded versions of computer systems. However, with the up-gradation of a computer system, the procedure of conducting tasks in a computer system has become more or less complex owing to which the concept of interoperability.
Preview sample
Recommendations for CSC Australia Company Information Technology Book Report/Review
7 pages (1750 words) , Download 3 , Book Report/Review
Free
The company faced challenges in demands by the clients to provide innovative and growth in the information technology sector caused by the dynamic changes in the digital era. It was also determined that there was conflict in technology wall between the business, its employees and the clients as a result of new generation decision makers.
Preview sample
The Impact of Mobile Devices on Cyber-security Information Technology Coursework
5 pages (1530 words) , Download 1 , Coursework
Free
According to Kelly (2007), organizations are not supposed to do away with their personal computers with smartphones. To justify this, he claims that PCs have been the main focus of hackers for many years. With this in mind, organizations managed to invest extensively in effective security software in order to safeguard their information.
Preview sample
Network Security Assessment Information Technology Essay
2 pages (550 words) , Download 1 , Essay
Free
Network scanning on the other hand is the process of identifying any active networks either to attack or assess them. It can be conducted through vulnerability scanning which is an automatic
Preview sample
Strategic Network Management Information Technology Coursework
6 pages (1691 words) , Download 1 , Coursework
Free
Online social networking presents various vulnerabilities and risks that require prudent mitigation despite its nobleness in steering performance. The major vulnerabilities that hold the capacity of compromising performance include individual/institutional reputational damage, information leakage, malware attacks, and privacy breach among others.
Preview sample
Spatial Domain Filtering Information Technology Essay
6 pages (1708 words) , Download 1 , Essay
Free
The image subtle elements in the uproarious image are lost. Both images have grey backgrounds. The differences why edges show up like that in the Laplacian filter in light are that the image has a consistent force for instance when the power inclination is zero and when the power is transformed, its reaction is in two ways and positive qualities placed on the default side.
Preview sample
The Development of a New Password Reset Process Information Technology Case Study
18 pages (4645 words) , Download 1 , Case Study
Free
The development of the new portal or integration with the old system will be centered around the development of a new password reset process. However, with the new system being but the integration of new features and upgrading of the servers, it is expected to rely on the interfaces of the old system in its development to obtain the new interfaces.
Preview sample
Information Systems Trends Information Technology Article
15 pages (4123 words) , Download 1 , Article
Free
Businesses use information systems at all levels of operation to collect, process and store data. It is then the duty of the management to obtain this data in the form of information, so as to carry out day to day activities. All processes in businesses today such as payment of bills and making of business decisions use information systems.
Preview sample
Twitter Visualization Research Methodology Information Technology Assignment
8 pages (2140 words) , Download 1 , Assignment
Free
On weekdays and weekends, people follow different kinds of schedules and performed a different set of tasks according to their routine. Notably, the comparison of data is made on the basis of tweets made on the weekend and the weekday. Notably, the data were compiled from the states of the Australian Capital Territory (ACT), Northern Territory (NT).
Preview sample
The Mobile Social Application Information Technology Literature review
18 pages (4867 words) , Download 2 , Literature review
Free
This application offers the users a chance or a platform in which they express their feelings without the pressure of revealing their identity or being judged by their friends. broken down into two subsystems, the mobile application client and the server that includes the database. The database will store all data that will include; login information, user accounts, error logging information and communication information details. 
Preview sample
Concept and Significance of SSCM Information Technology Book Report/Review
10 pages (2500 words) , Download 2 , Book Report/Review
Free
The critical discussion would aim at generating an effective understanding of SSCM while evaluating different challenges faced in its implementation. It would also render effective recommendations relating to the problems faced. SSCM aims to focus on integrating, coordinating, organizing and also controlling the supply chain activities.
Preview sample
Cassandra Database Information Technology Literature review
8 pages (2113 words) , Download 1 , Literature review
Free
The database automatically divides the data across nodes found in cluster of database. Cassandra later became an incubator for Apache. As of this writing, the paper will discuss the general information about Cassandra database. Consequently, the paper will further discuss the database based on its data storage, query format, and its query processing. 
Preview sample
Prefix Labeling Schemes Information Technology Term Paper
26 pages (7643 words) , Download 1 , Term Paper
It is important to note that the metrics of an effective and efficient labeling scheme are the compactness of the encoded labels and the optimality of the algorithm. For complex XML documents, the most preferable labeling scheme is range-based, however, the requirement for re-raised a considerable overhead.
Preview sample
How the Internet Developed within a Period of 20 Years Information Technology Case Study
10 pages (2846 words) , Download 1 , Case Study
Free
The author of the following paper gives detailed information about the sole purpose that was also launched in an attempt to make the interaction between the military and the US Government agency so that proper control over bombs and missiles could be maintained and matters relating to nuclear technology can be easily communicated.
Preview sample
Virtual Private Networks Information Technology Coursework
5 pages (1340 words) , Download 1 , Coursework
Free
Configure as well as enable routing and the remote access service. In the setup wizard for routing and the remote access services, make a selection of virtual private network server from the common configurations list. When IP address assignment prompts, select from the specified addresses range and then configure range 172.16.0.248 to 172.16.0.25
Preview sample
Credit Card Theft and Identity Theft Information Technology Essay
5 pages (1349 words) , Download 1 , Essay
Free
The discussion which has been conducted in this essay focuses on outlining a range of issues concerning crime and how information technology may be utilized to engage in delinquent and illegal activities. However, it should be noted that a comprehensive analysis of a range of issues represents that it is important to distinguish between the legality of the scenario.
Preview sample
Sprint Spark as Very Powerful Long-Term Evolution Network Information Technology Thesis
5 pages (1475 words) , Download 1 , Thesis
Free
The Sprint Spark technology is basically an enhancement of the current standard LTE network that delivers a fair quick Internet access when using a mobile phone, which is at the same level with a broadband connection. This Sprint network new evolution is part of the Network Vision, which involved redesigning the cell towers it uses and other important aspects of the network operations (Costa, 2014).
Preview sample
Role of Security Automation Systems in Oil and Gas Industry Information Technology Literature review
8 pages (2382 words) , Download 1 , Literature review
Free
However, and more importantly, according to Siemens. There is also the ever-increasing risk of cyber attacks that target their information and communication technology (ICT) infrastructure as well as intellectual property. OGP (2010) observes that the adoption of new technologies by both upstream and downstream operators, such as security automation systems, is one way the industry players use to mitigate the issues and enhance service delivery.
Preview sample
Stages in the Evolution of Infrastructure and Database Server Information Technology Assignment
5 pages (1511 words) , Download 1 , Assignment
Free
Every stage describes a unique configuration system of computing-power and the elements of infrastructure. These five stages in evolution include; “general-purpose mainframe and minicomputer computing”, “personal computers”, “client/ server networks”, “enterprise/ Internet computing”, and “cloud computing”. 
Preview sample
The Role of Knowledge Worker Information Systems Infrastructure Information Technology Assignment
6 pages (1608 words) , Download 3 , Assignment
Free
IT infrastructure consists of both the hardware and software components of a computer system. It includes other aspects such as the internet and all related services, which are vital for organizations operations (Turban et al., 2001). The infrastructure helps organizations to carry out their IT operations to satisfy all the stakeholders’ needs.
Preview sample
1951 - 2000 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us