StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Technology Innovation Information Technology Annotated Bibliography
3 pages (928 words) , Download 2 , Annotated Bibliography
Free
Furthermore, computer aided devices are aimed at helping an organization to be innovative enough, and turning those inventions to a success. In explaining their points, the author uses innovation
Preview sample
Windows Network Proposal Information Technology Literature review
7 pages (2034 words) , Download 1 , Literature review
Free
Its in-house IT team cannot adequately address their current infrastructure requirements. The solution described in this proposal address the configuration and integration of WAI’s Active Directory updates while because WAI has just acquired a new company. Worldwide Advertising, Inc. is now headquartered in Houston, Texas, where they have a Windows Server 12 domain.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Advanced Data Visualization Information Technology Coursework
8 pages (2163 words) , Download 2 , Coursework
Free
This paper is therefore divided into five main segments. It begins with an overview of the research topic. This is followed by a well-stipulated set of data on the value of advanced data visualization to organizations. The third section addresses the limitations while the fourth one is about the future potential of advanced data visualization. 
Preview sample
Defining of Cyberbullying Information Technology Essay
5 pages (1592 words) , Download 1 , Essay
Free
Generally, youths are encouraged to ignore any form of messages from people they do not know anything about. Such messages may contain viruses that automatically infect your mobile device when opened. Deleting them without opening them is the best way to prevent yourself from possible cases of cyberbullying.
Preview sample
The Development of Vehicular and Mobile Network Information Technology Personal Statement
17 pages (4332 words) , Download 1 , Personal Statement
Free
My Ph.D. research focused on the development of vehicular & mobile ad hoc networks, as well as artificial intelligence and real-time communications systems. I started my Ph.D. with strong knowledge in data mining and artificial intelligence fields that I gained during my master of computer science degree from UTM.
Preview sample
Plan and Design of a Small System for Healthcare Facilities Information Technology Research Paper
13 pages (3250 words) , Download 3 , Research Paper
Free
The development of the elated amount of the healthcare facilities has been observed to be a prime need of the healthcare system. The problems that were being faced by the healthcare organization named “My Town” could easily be mitigated with the proper maintenance of the Electronic Medical Record (EMR).
Preview sample
Budget Management System in the Cloud Information Technology Report
18 pages (4711 words) , Download 2 , Report
Free
After capturing data, the quality will be analyzed to evaluate the authenticity and size of data. Furthermore, rich graphics will illustrate the detection of correlation between queries that are coded. Security risks and accessibility factors will also be discussed, as the system will be cloud based. The process of budgeting at the Universities was very laborious and inept. 
Preview sample
Database Management System Information Technology Research Paper
50 pages (10577 words) , Download 1 , Research Paper
The amount of available information is literally bursting to brim. Data is being widely acclaimed as an organizational asset of value. However, without the capability to manage this large amount of data or a failure to readily insert the significant information in response to a given question; it has the tendency to not only become a distraction but also a liability. 
Preview sample
Software Engineering Principles in Ensuring the Forensic Integrity of Digital Forensics Information Technology Research Paper
20 pages (5640 words) , Download 3 , Research Paper
Free
Software engineers should identify a methodology that suites the project. Software engineering works through the incorporation of distinct phases and activities, which focus on the improvement of planning and management of a development project. Methodologies and principles used in software engineering include deliverables and artifacts that are created and completed during the process of developing an application.
Preview sample
Windows Server Deployment Information Technology Case Study
7 pages (2027 words) , Download 1 , Case Study
Free
Establishing an appropriate network structure is one of the most essential tasks for the organization while developing its IT infrastructure. In relation to the features and beneficial aspects, Windows Server 2012 is considered as one of the most effective attributes that can enable WAI to establish its network domain and improve operational and managing functions across its major business units.
Preview sample
E-Book In Publishing Industry Information Technology Essay
14 pages (3748 words) , Download 0 , Essay
Free
In terms of the printed paper books, technology advancement through the digitalization of the printing device has made a significant change. The digitalization has enhanced the quality of printing at a higher level, simultaneously the time taken for the printing of a paper has also gone down to a considerable extent.
Preview sample
Facebook as the Most Popular Social Networking Site Information Technology Case Study
7 pages (2073 words) , Download 1 , Case Study
Free
The development of web 2.0 is among the recent developments in web technologies that have transformed the way people communicate and collaborate. Unlike web 1.0, web 2.0 allows users to create web content and this way they are able to interact. Social networking sites, such as Facebook, Twitter, and various blogs are based on web 2.0 technology.
Preview sample
Review of the Windows Eight Information Technology Essay
4 pages (1100 words) , Download 0 , Essay
Free
The previous Microsoft Office versions could not be used on devices without Windows 8 operating system. Now, with other collaboration software, it is possible to use Microsoft Office on other devices that don't even run on Windows. However, it is always recommended to use original software along with their devices or operating systems.
Preview sample
IP Internetworking in Denver and Houston Information Technology Case Study
8 pages (2089 words) , Download 1 , Case Study
Free
The organization XUMUC is facing issues regarding networking throughout its new centers. It is advisable that the XUMUC should take into consideration the necessary changes that have been proposed for upgrading they're exiting the network setup. Further, the assignment also showed some of the measures that are required to be undertaken to reduce the high administrative overhead.
Preview sample
Query Enhancement and Query Advice Information Technology Essay
6 pages (1703 words) , Download 1 , Essay
Free
In the session of the CKIM conference, several discussions are undertaken on the main theme of authenticity of the information stored on social media websites. There has been a concern regarding the authenticity of the information, fundamentally due to the heterogeneous nature of writers and bias of information among others.
Preview sample
Securing Exploits and Vulnerabilities: Ethical Hacking Information Technology Essay
5 pages (1469 words) , Download 1 , Essay
Free
Advanced Research recognizes the significance of testing its security architecture for exploits and vulnerabilities before attackers take advantage of them and cause serious losses. The security testing software presented in this proposal is referred to developed by Rapid7- a security management company. It presents a package of software solutions.
Preview sample
Securing Data Using IPSEC VPN over Satellite Communication Information Technology Research Paper
18 pages (4935 words) , Download 1 , Research Paper
Free
These aspects comprise elaborating the functions of VPN, techniques to be used for securing valuable data and analyzing the facets of VPN over the system of satellite communications. In order to determine the aforesaid objective of the study, a qualitative approach of research method will be used. 
Preview sample
Teaching and Learning Computer Programming by Mayer Information Technology Assignment
2 pages (645 words) , Download 0 , Assignment
Free
I have learnt the role statistical packages like R play in citizen’s participation in politics and governance. The R package aims to help the common citizen analyze the government’s and
Preview sample
Impacts of Digital Media on Society Information Technology Term Paper
9 pages (2442 words) , Download 3 , Term Paper
Free
Digital media includes the information and contents that can be created, distributed, viewed, reserved as well as modified on computing devices. Due to the widespread use of personal computing and the internet, digital media has become very commonly used media for collecting and distributing content.
Preview sample
Information Security Plan Information Technology Case Study
15 pages (4378 words) , Download 1 , Case Study
Free
The company that we have selected is The Telemarketing Company, people who provide service to other organizations. They have a lot of information data available to them regarding different organizations. It becomes their duty to ensure that the data is protected all the time and no confidential information is leaked through their portals.  
Preview sample
Security Issues of Bitcoin Information Technology Essay
5 pages (1371 words) , Download 1 , Essay
Free
Every Bitcoin contains an address with an encrypted key. This is done in order to secure payments for Bitcoin owners. Despite the implementation of several security measures, the risk of theft is high. Modern hackers can commit cybercrime by using malware. For example, Bitcoins are more like e-cash.
Preview sample
Cyber Breaches in Different Companies Information Technology Term Paper
11 pages (2992 words) , Download 1 , Term Paper
Free
AT&T underwent a cyber breach in 2010 affecting one hundred and fourteen thousand accounts. A cyber security breach affected nearly forty three thousand to fifty five thousand customers of Bartell Hotels in 2014. Zendesk suffered a cyber security breach in 2013 that affected its three consumers, Tumblr, Pinterest and Twitter. The hackers attacking Booz Allen Hamilton in 2011 targeted ninety thousand military email addresses and passwords. The company, Vacationland Vendors Inc. underwent a cyber breach that affected nearly forty thousand people in 2011. 
Preview sample
Analysis of Saudi Aramco and Marathon Petroleum Corporation's Websites Information Technology Research Proposal
18 pages (4909 words) , Download 0 , Research Proposal
Free
The paper "Analysis of Saudi Aramco and Marathon Petroleum Corporation's Websites" is a great example of a research proposal on information technology. I am Mazen Alqethamy. I am from Saudi Arabia. I have 4 years of service experience with the Saudi French Bank, where I was responsible for handling various customer issues and providing suitable solutions
Preview sample
The Development of Security Domains Information Technology Term Paper
17 pages (4770 words) , Download 1 , Term Paper
Free
In the present modern era ‘Information Security Management’, has been one of the most crucial factors with the help of which organizations can ensure their efficiency and effectiveness. Thus, most of the SMEs and large organizations are interlinking systems, which specifically aim towards safeguarding the digitized information.
Preview sample
The Impact of Online Technology on Customer Satisfaction in the Hospitality Industry Information Technology Literature review
21 pages (6209 words) , Download 1 , Literature review
According to Nykiel (2001) implications of modern technology integration, have been of profound benefit to both customers and services/product providers. This is since various aspects and incidences are retainable, redesigned, and reconstructed through innovative technology within hospitality organizations.
Preview sample
Internet of Things - Features, Challenges, and Weaknesses Information Technology Research Paper
24 pages (6758 words) , Download 4 , Research Paper
The successful emergence of the IoT vision, however, will require computing to extend past traditional scenarios involving portables and smart-phones to the connection of everyday physical objects and the integration of intelligence with the environment. Subsequently, this will lead to the development of new computing features and challenges. The main purpose of this paper, therefore, was to investigate the features, challenges, and weaknesses.
Preview sample
Stuxnet: Dissecting a Cyberwarfare Weapon Information Technology Assignment
6 pages (1807 words) , Download 1 , Assignment
Free
Stuxnet was a strong computer virus since it was not lined up to any confidentiality. Unlike other computer viruses that erase or steal any information, Stuxnet's main aim was destroying a military target (Ralph, 49). According to Ralph Langner, the virus was aimed at industrial controllers as opposed to the common misconception that it was aimed at SCADA systems.
Preview sample
The Concept of Free Software Information Technology Term Paper
6 pages (1925 words) , Download 1 , Term Paper
Free
The author states that in the conventional licensing method, the developer is the owner of the software copyright, but in the open-source, copyright belongs to a group or entity although the source code of the software must be open for scrutiny and any user or researcher can adapt and modify the software code.
Preview sample
An Investigation into Threats to Cloud Computing Security Information Technology Coursework
10 pages (2809 words) , Download 1 , Coursework
Free
The competitiveness in the field of actively developing cloud security solutions is often confusing to a layman since he cannot differentiate the nature of one solution and its applicability from the other. However, for a student of computing, the applications, solutions, and suggestions all fall in one frame, which is led by the common and challengingly new threats to security over the cloud.
Preview sample
New Technology: How it Even Impacts on Fashion Information Technology Case Study
4 pages (1368 words) , Download 0 , Case Study
Free
A final development that is likely to be evidenced within the near future is with respect to the breakthrough in health monitoring and diagnostic availability that exists to the average consumer. Only a few brief years ago, in order for an individual adequate track of their vitals, they were required to the doctor and perform a series of tests.   
Preview sample
Does the Internet Make Humans Smarter - Opportunities Given by Modern Information Technologies Information Technology Literature review
3 pages (859 words) , Download 2 , Literature review
Free
With so many persons accessing the internet at this age, the implications of the same are evident. It is clear that the positive effects of the internet have outdone the negatives if Shirky’s article is anything to consider. The author is of the
Preview sample
Database Management System Information Technology Case Study
5 pages (1430 words) , Download 1 , Case Study
Free
A few examples of the well-known databases are MySQL, SQLite, Oracle, IBM DB2, Microsoft SQL Server, dBASE, File Maker Pro, LibreOffice Base, and Microsoft Access. A few functions of a DBMS perform to guarantee data trustworthiness and consistency of data in the database. Such as data word reference management, data stockpiling management, data change and presentation, security management, multiuser access control, and others.
Preview sample
Information Systems Management: Boeing 787 Information Technology Case Study
13 pages (3554 words) , Download 1 , Case Study
Free
The management has also acknowledged the shortfall in the oversight of suppliers a few years back and has significantly staffed up Boeing’s supplier management group since then. Boeing has made a substantial effort with its suppliers to address issues related to reliability so as to assist in the reduction of the frequency of replacements of parts.
Preview sample
New Generation Internet Capable of Intelligent Adaptation: Possibilities to Enhance Network Capacity Information Technology Thesis
60 pages (9069 words) , Download 1 , Thesis
Due to the evolution in the telecommunication industry, the service providers are working on the transformation of their businesses to suitably address the core challenges: rolling out of new services, supporting new business models, increasing revenues, reducing network costs, enhancing capacity and improving the eco-sustainability.
Preview sample
The Role and Influence of Big Data in Organisations Information Technology Essay
11 pages (3012 words) , Download 1 , Essay
Free
The paper “The Role and Influence of Big Data in Organisations” is a fascinating example of an information technology essay. Big data is a catchphrase that has been extensively used to describe a large and complex volume of data that cannot be processed and evaluated based on the available traditional data analysis methods.
Preview sample
Core Security Issues Related to Web Application Information Technology Assignment
2 pages (500 words) , Download 1 , Assignment
Free
This comes in an array of appearance. Few of the major issues faced include the authentication breach. This is often enabled through the infiltration into the
Preview sample
Fair and Responsible Use of Data Mart Equipment Information Technology Case Study
11 pages (2809 words) , Download 1 , Case Study
Free
The employees to whom the policy will be applicable will be individuals who are authorized to access the available computer resources with the intention of performing the daily business duties. Its equipment is fundamental in the daily operations carried out within Data Mart Company hence the need to render proper protection.
Preview sample
The IT Infrastructure of the Pharmacy Business Information Technology Case Study
8 pages (2117 words) , Download 1 , Case Study
Free
The author of the paper states that business units in the present day context have been under high alert with regard to their security towards information from cybercriminals. Likewise, companies have strengthened their cybersecurity procedures, so that confidential business data would be secured effectively.
Preview sample
The Software and Hardware Components of the Watson Supercomputer Information Technology Case Study
9 pages (2775 words) , Download 2 , Case Study
Free
The paper shows that in 2011, the IBM Watson supercomputer competed and won against two competitors, namely, Ken Jennings and Brad Rutter in the challenges of Jeopardy. This supercomputer has the power to retrieve a human's ability by using natural language with a higher accurateness, speediness, and confidence.
Preview sample
The Enormous Benefits of the Internet Information Technology Case Study
7 pages (2063 words) , Download 1 , Case Study
Free
The Internet has made lives easy by giving us a platform through which we can access information regarding any subject across the globe. On the other hand, it even serves as a tool through which we can easily communicate with our friends or relatives or even with unknown people located in any corner of the world.
Preview sample
The Business of IT- Venture Information Technology Coursework
17 pages (4822 words) , Download 1 , Coursework
Free
Specially mentioning, inbound marketing will be used to promote the app, and a premium price based pricing strategy will be taken into account for successfully marketing the app. Apart from these, varied platforms of social media including Facebook, Twitter, forums, and blogs will be extensively used to differentiate the app from the competitors.
Preview sample
Differences Between Analog and Digital Signal Processing and Control Information Technology Literature review
8 pages (2275 words) , Download 1 , Literature review
Free
This paper explains the differences between analog and digital signal processing and controls. Analog signal processing and control can be carried out in real-time and takes up less bandwidth while digital signal processing and control does not assure real-time processing, but takes up more bandwidth to convey the same data. ASP applies analog circuit components like rheostats, capacitors, and transistors.ASP has been in use for numerous years.   
Preview sample
Modelling Passenger Flow at King Abdul-Aziz International Airport Using Any Logic Information Technology Thesis Proposal
6 pages (1824 words) , Download 1 , Thesis Proposal
Free
The third chapter will examine the characteristics of the airport terminals at King Abdulaziz Airport and will also provide for traits of passenger traffic flow inside these terminals. The fourth chapter will decipher meaningful methods and techniques to model and simulate passenger flow in the airport terminals by utilizing already available theoretical frameworks.
Preview sample
History of LINUX Information Technology Literature review
6 pages (1913 words) , Download 1 , Literature review
Free
To make UNIX portable, Ritchie and Thompson were compelled to rewrite it in a novel programming language named C, something that led to its wide use in institutions (Negus, 2013). Richard Stallman, in 1983, began the GNU project with intent to create an operating system that was similar to UNIX, but free, and created the GNU General Public License (GNU GPL).
Preview sample
Application Release and Management Information Technology Essay
7 pages (1976 words) , Download 1 , Essay
Free
The following essay will engage the reader with a discussion and in-depth review of the outlining process by which a team leader might engage stakeholders within a firm that is the task and releasing an application directed towards both Android and iOS devices. For purposes of specificity, the application in question will be directed towards providing utility to the user.
Preview sample
Application Layer and Applications - The Interface between the Networks Information Technology Literature review
7 pages (1928 words) , Download 1 , Literature review
Free
The layer under discussion in this paper is the application layer and applications. The application layer is the layer that provides the interface existing between the applications used in communication and the underlying network where messages are transmitted. This layer in the OSI model serves as the first step of ensuring that data is on the network.
Preview sample
Telecommunications and Networking Information Technology Assignment
10 pages (2500 words) , Download 2 , Assignment
Free
The scheduling algorithm helps in regulating interactions across flows and is highly dependent on the techniques associated with buffer management. This technique states that in order to simplify a problem and make it independent by nature it is essential that an infinite number of capacity buffers is taken into consideration.
Preview sample
Analysis of Gary McKinnon - UK Hacker Case Information Technology Case Study
5 pages (1412 words) , Download 1 , Case Study
Free
From the above research and analysis, it is clear that cyber-crimes are very dangerous because it not only involves a threat to a person but also causes a threat to an entire nation. The criminal activity of Gary McKinnon shows that the chances of national threat and terrorism are very high for any country in the world.
Preview sample
Top-Down Network Applications Design Information Technology Coursework
12 pages (3102 words) , Download 1 , Coursework
Free
In the current phase, the entire network of Fiction Corporation is in a scattered manner. It has been ascertained that the organization employs 10,000 employees and also runs 500 retail outlets. As a matter of fact, the data processing capabilities of these outlets might vary depending on the store size, customer access, and type of network hardware used.
Preview sample
Social Marketing Enterprise - Blogs Information Technology Assignment
6 pages (1710 words) , Download 1 , Assignment
Free
Various factors prove the implementation of the value lever number 5 by the organization on the social platform. One of the factors includes the company’s advertisement of its products on social media. Social media marketing has contributed to the company’s growth. According to its leaders, the company’s sales continue to increase as its presence on social media becomes stronger.
Preview sample
2001 - 2050 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us