StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The IT Sector in India Information Technology Dissertation
64 pages (9911 words) , Download 1 , Dissertation
Some MNCs had encountered failures and frustrations while some demonstrated sequential investment growth after the initial entry. The entry model has to be determined based on the OLI paradigm (ownership, location and internalization). To determine the right mode of entry in the IT sector was the motivation for this study.
Preview sample
Principles of Information Systems and Data Management Information Technology Assignment
10 pages (2845 words) , Download 1 , Assignment
Free
MEDLINE is an excellent example of medical informatics. The vast amount of medical information is funneled through MEDLINE. Users can access MEDLINE for free using the PubMed website and find existing articles and information in their own field of research. The database holds articles from over 5,400 journals.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Biometric Technology in Singapore Information Technology Coursework
8 pages (2160 words) , Download 2 , Coursework
Free
Terrorist organizations across the world have capitalized on socio-cultural differences and conflicts prevailing in the world by playing one community or religion against another and thereby seeking shelters in some countries with a view to targeting other countries under the names of religious wars. Consequently most governments have had to re-think their security strategies and allocate budgets to counter this potential threat of terrorism. 
Preview sample
Design and Validation of a General Security Model with the Alloy Analyzer Information Technology Case Study
9 pages (2517 words) , Download 1 , Case Study
Free
Our main reason for the study is to find how the architecture of a system is affected when security is to be included in the general architecture. Elements in architecture are computational and have connectors between them and the other elements in the architecture.
Preview sample
Compuer Publishing with Indesign Information Technology Essay
6 pages (1709 words) , Download 1 , Essay
Free
The massive printing of books also helped in the spreading of an awareness of a philosophy that emerged when humanists or renaissance scholars returned to the works of the ancient writers. Previously, scholars were guided by the church teachings, and many people were concerned with actions that lead to heavenly rewards.
Preview sample
IT Industry in Australia Information Technology Research Paper
6 pages (1922 words) , Download 1 , Research Paper
Free
IT is a discipline related to technology and how information is treated. The term first appeared in an editorial published in the Harvard Business Review in 1958, whereby Whisler and Leavitt who were the authors commented that the recent technology had no name, and they thought they would refer to it as information technology.
Preview sample
Impact of the Use of Mobile Email Devices on Current Email Use Information Technology Essay
6 pages (1645 words) , Download 1 , Essay
Free
In the midst of technological advancement particularly in the innovation of information technology, emails have been so important in day to day flow of business transactions, communication systems, and in connecting people around the world. Everyone seems cannot bear to lose communication due to the fact that to communicate at a fast pace has become a basic necessity and not a mere luxury.
Preview sample
Main Aspects of Email Working Information Technology Coursework
6 pages (1654 words) , Download 1 , Coursework
Free
Finally, various components (hardware, etc) such as a router, DNS, mail server, and ISP will be discussed in brief. Below figure1, show how email actually works after Tom clicks the ‘send’ button and Jane accepts it.
Preview sample
Web Site Development and Information Architecture Information Technology Coursework
9 pages (2434 words) , Download 1 , Coursework
Free
XML is a document-processing standard that is an official recommendation of the World Wide Web Consortium (W3C), the same group responsible for overseeing the HTML standard (Eckstein & Casabianca, 2001). According to Eckstein & Casabianca (2001), XML is actually a simplified form of Standard Generalized Markup Language (SGML2), which is extremely complex, especially for the Web.
Preview sample
A Logic of Authentication Information Technology Coursework
16 pages (3885 words) , Download 1 , Coursework
Free
As a result, Borrows, Abadi, and Needham formulated a logic of belief and action, to address these errors. The logic allows people to formally describe the beliefs of trustworthy parties involved in these authentication protocols, thus uncovering subtleties, redundancies, and flaws through an analysis of the protocols’ syntax and semantics.
Preview sample
Digital Technologies Issues Information Technology Essay
8 pages (2201 words) , Download 1 , Essay
Free
Other properties included are the onload and onunload body tags, map drawing canvas, and the ability to check the functionality of browsers as well as access graphics from databases. In terms of coding, an ampersand signal is very crucial. It should be indicated as amp and as, an attribute that makes it easy for construal by diverse browsers.
Preview sample
Data Warehousing and Business Intelligence Information Technology Essay
10 pages (2673 words) , Download 2 , Essay
Free
However, more often than not, most solutions fail either due to lack of proper planning, lack of foresight, or due to the sheer quantity of the data that needs to be dealt with. This is where a planned, technical, and structured method for data processing becomes inevitable and concepts solely concentrating on Information management come in the picture. 
Preview sample
Interface Design Factors that Inhibit the Development of Internet Banking Information Technology Research Paper
16 pages (5370 words) , Download 1 , Research Paper
Free
With respect to Norman’s (1999) essay on use of the term affordance in human-computer interaction, this report affirms the importance of this powerful concept, reinforcing Norman’s distinctions of terminology, and expanding on the usefulness of the concepts in terms of their application to interaction design and affordance of internet-banking.
Preview sample
Setting up a Website for an Online Insurance Quotation System Information Technology Research Paper
11 pages (2975 words) , Download 1 , Research Paper
Free
While certain other sites help in identifying the various possible combinations that go into a plan and help the customer to choose the right combination that would cover his needs. At the same time, it would also propose whichever is the most optimal cost for the customer as well. 
Preview sample
Comparison of CORBA and Web Services Information Technology Essay
10 pages (2754 words) , Download 1 , Essay
Free
Wells Fargo was the first financial services company to support Internet Banking. The Wells Fargo Internet was implemented as a 3-tier architecture. The Internet is one of several applications implementing the "View" or "presentation tier".
Preview sample
Nokia Strategy for Industry Leadership Information Technology Report
6 pages (1728 words) , Download 2 , Report
Free
Strategic decisions considered include the introduction of new models, partnerships with other companies, competition and legal action against companies, expansion into new markets, and marketing and pricing strategies. The industry of which Nokia is a part is very competitive, so companies in this industry have to react proactively to change, or create change rather than reacting.
Preview sample
Project Management as Tool in Inforamtion Technology Information Technology Coursework
7 pages (2164 words) , Download 2 , Coursework
Free
Projects, going by their generic definition, can be differentiated from regular operational tasks in that they are temporary in nature, are objective or goal-oriented, have a definite lifetime consisting of a start date and an end date and require a diverse set of human resources, each of whom brings specified skills and knowledge to accomplish the different project tasks.
Preview sample
Peer to Peer Networks Information Technology Essay
7 pages (1942 words) , Download 1 , Essay
Free
A very recent example of that is the way the iPhone was launched as a locked device, then unlocked, then locked again and unlocked once more. P2P networks are only a part of that battle for control between industries and individuals which means that piracy may be reduced or even contained to a level but it might never be stopped altogether.
Preview sample
Identifying Threats and Vulnerabilities to Computer Information Technology Report
6 pages (1836 words) , Download 1 , Report
Free
The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken. It also provides recommendations for them. Threats to the system include the absence of multilayered protection.
Preview sample
Comparing and Contrasting IIS and Apache Web Servers Information Technology Essay
8 pages (1697 words) , Download 2 , Essay
Free
IIS on the other hand is not and still on the surface more expensive than Apache. While the debate on which system is secure will rage, Apache will continue to excel at the goal it was designed for i.e for ease of use between different operating systems. Similarly, IIS will continue on its path i.e. designed as a strong, stable, secure server for its own operating system.
Preview sample
IT Proposal Information Technology Research Paper
8 pages (2286 words) , Download 1 , Research Paper
Free
This chapter focuses on the research methodologies which should be used in order to make the construction projects more effective and efficient. It also shows data in the form of tables, in order to understand it more clearly.
Preview sample
Why Do People Play Games Information Technology Case Study
13 pages (3902 words) , Download 1 , Case Study
Free
The problem does not necessarily always have to involve a competitor, it may just be a puzzle. The competition or a challenge is what stimulates the minds of the players making gameplay all the more fun. The majority of the people enjoy competition and especially in a scenario when we are allowed to choose the complexity and level of the competition or challenge.
Preview sample
The Concept of Cloud Computing Information Technology Research Proposal
17 pages (4561 words) , Download 1 , Research Proposal
Free
The first objective of the study entails providing qualitative answers to the influence of the development of cloud computing on modern technology, and secondly, the study seeks to illustrate the potential of utilizing cloud computing alongside highlighting the risk factors for cloud computing. The research seeks to find attributes that future technologies ought to embody in order to make them suited for use in various societal obligations.
Preview sample
Digital Content and Related Issues Information Technology Report
8 pages (2489 words) , Download 1 , Report
Free
The modern technology and innovations have reformed the use of the Web. Previously the scope of the web was limited but as the time passed the quick advancements introduced new method to name a few of which is Web 2.0. The evolution of the World Wide Web emphasizes on sharing information and ensures maximum collaboration of the users. Different tools are used for this purpose.
Preview sample
Application Service Providers Information Technology Essay
15 pages (4042 words) , Download 1 , Essay
Free
Currently, a large number of people including academicians and researchers distribute information through the Internet and as this number goes on increasing day by day, ASPs begin to generate new business models. 
Preview sample
Importance of Online Transaction Processing Information Technology Essay
6 pages (1797 words) , Download 1 , Essay
Free
Earlier OLAP software tools comprised applications such as Hyperion, Cognos, BusinessObjects and MicroStrategy, but several database vendors currently offer them with OLAP modules included, such as Analysis Services with Microsoft’s SQL Server 2000 and Express and Darwin with the Oracle database, while IBM offers the DB2 system that can handle OLAP applications.
Preview sample
The Goals of My Field Site Placement Information Technology Essay
7 pages (1817 words) , Download 1 , Essay
Free
Self –actualization is the main lesson I learned in this placement. I was able to realize who I am and what virtues I uphold in my life that are vital in improving the lives of other human beings. Through this placement, I was able to realize that social work is the field I belong to based on my strong passion for providing humanitarian assistance to others.
Preview sample
Web Bonding and Physical Bonding Information Technology Literature review
8 pages (2216 words) , Download 1 , Literature review
Free
The power of an idea whose time has come is something that cannot be prevented by anyone or any government. The Internet today has done a lot to propagate new ideas, thanks to which the borders of a country are now porous. This was what happened during the so-called Arab Spring, in which some Arab nations underwent radical social and political changes to achieve genuine reforms in their systems. 
Preview sample
Policy, Team and Information Technology Information Technology Case Study
7 pages (1974 words) , Download 2 , Case Study
Free
The paper looks into those factors and probes the possible ways of harmonizing the differences using the available communication networks. The study even goes further to investigate some of the ways the performances of both systems can be enhanced. The policy refers to the principles formulated by the management entities of an organization to be followed by everyone. 
Preview sample
Contemporary Software Systems Information Technology Case Study
10 pages (2709 words) , Download 1 , Case Study
Free
Singularity is a Microsoft Research project to develop techniques and tools for building dependable systems that address the challenges faced by contemporary software systems. Singularity is approaching these challenges by simultaneously pushing the state of the art in operating systems, run-time systems, programming languages.
Preview sample
Computing Information System Information Technology Research Paper
6 pages (1374 words) , Download 1 , Research Paper
Free
The utilization of the information technology in every field of life is emerging day by day and it has transformed the working and handling of systems into a more manageable structures. This emergence of technology has inspired all aspects and areas of life. The system I am going to discuss is as well a better depiction of information technology implementation into different living and working sectors.
Preview sample
Interactive Website Evaluation Information Technology Outline
6 pages (1688 words) , Download 1 , Outline
Free
This paper describes the business model that is used by Nike: “We grow by investing our money in design, development, marketing and sales and then contract with other companies to manufacture our products” (Nike Biz, 2009). The website that has been chosen sports oriented people and also enthusiasts who prefer to customize and personalize all of their products (Johnson, G., Scholes, K. and Whittington, R., 2006).
Preview sample
Wireless Home Network Information Technology Research Paper
7 pages (1793 words) , Download 1 , Research Paper
Free
Computers are dominant tools that facilitate users to store and perform functions on large amounts of data swiftly. Networks are basically a collection of computers linked by cable or other media as a result they can contribute to information and resources with each other (Nash, 2000). This report presents detailed overview of the implementation of a wireless network for home computers. 
Preview sample
Analysis of Rich Internet Applications Information Technology Research Paper
10 pages (2533 words) , Download 1 , Research Paper
Free
RIA or Rich Internet Applications are web based applications that contain the majority of the uniqueness of desktop based applications. Normally Rich Internet Applications carried through means of customary web browser with help of special and standard plug-ins or it also delivered through the independently by means of virtual machines or sandboxes.
Preview sample
The Processes that Occur in a Network Information Technology Coursework
8 pages (2203 words) , Download 1 , Coursework
Free
It has the built-in mechanism to request for a retransmission of the packets reported corrupt. Similarly, there are several processes implemented through the use of specialized equipment at the server-side to ensure the integrity and security of the information. Perimeter Firewall is the outer boundary wall of secure network implementation.
Preview sample
If the Software Patent Is Bad Information Technology Coursework
9 pages (2503 words) , Download 1 , Coursework
Free
People have been arguing to end software patent But refer to the above conclusions, in majority cases, it has been observed that no doubt there is a risk involved in continuing software patent but it would be unethical to discontinue software patent. Software patents encouraged innovations and encourage inventors.
Preview sample
The Legal Issues and Potential Privacy Implications of This IT System Information Technology Assignment
7 pages (1805 words) , Download 1 , Assignment
Free
This IT system will be able to maintain the data about the loyal customers of the company. In addition, the database will also be able to reflect the details of purchases made by the customer from time to time, so that the company is able to make use of the info to strengthen its marketing activities.
Preview sample
Power IT Resource Planning Strategy Information Technology Case Study
8 pages (2244 words) , Download 1 , Case Study
Free
Power IT Ltd. is an England based company with an annual turnover of ₤40 millions. The company comprises of two units: Power IT Production and Power IT Services. During the 1999, it was decided to replace the existing MRPII (Material Resource Planning) system which was being used to support the company’s production processes with the latest ERP (Enterprise Resource Planning) system.
Preview sample
Virtual Private Network Information Technology Case Study
7 pages (1788 words) , Download 1 , Case Study
Free
The virtual private network is delineated as networking which applies the use of public telecommunication infrastructure like the internet to provide individuals or remote offices with secure access to their individual or organizations network.  The main aim of the virtual private networks is to help in providing organizations with similar capabilities but at lower costs.  It works through the use of the shared public platform.
Preview sample
The Spread of the Internet and the Diverse World Information Technology Essay
7 pages (2101 words) , Download 1 , Essay
Free
There is no doubt that the internet is causing more harm than good to the world population. Innocent people are suffering from violence that has been created by the internet. Funny enough there are people who claim that the advantages of the internet far outweigh its disadvantages. No wonder the world will always experience perennial wars thanks to the internet.
Preview sample
The Impact of Web 2.0 Information Technology Essay
8 pages (2307 words) , Download 1 , Essay
Free
Today hotel marketing is all about extending customer delight, which is beyond customer satisfaction, if a hotel has been able to extend this delightful experience to the guest, it is definite to find expression in the online travel community and these work much better than traditional forms of advertising.
Preview sample
Web Site of the British Pharmacological Society Information Technology Case Study
9 pages (2547 words) , Download 1 , Case Study
Free
The Web 2.0 concept as discussed in general relates to e-commerce. But here we will discuss its impact on the improvement of the BPS website with regards to its informative and user interactive context. The technological savvy of this world is exploring the possible aspects of transform learning and discussion using Web 2.0 technologies.
Preview sample
How the Internet is Changing Todays Audience Information Technology Essay
18 pages (4848 words) , Download 1 , Essay
Free
In illustrating the differences between Web 1.0 and Web 2.0, Tim O’Reilly points to two specific case studies – Netscape which dominated Web 1.0 and Google which has dominated Web 2.0.  These case studies indicate the differences between the software-based approach of the older web as compared to the service-based systems of today.
Preview sample
Information Security of Java and NET Information Technology Research Proposal
11 pages (3148 words) , Download 1 , Research Proposal
Free
Security and the related configurations for both Java and .NET and simply handled with XML which can be governed through a GUI. With .NET, the GUI can be used to adjust all security configurations much as the GUI tool supplied with Java. However, the java environment allows programmers to set both the code and agent-based security settings.
Preview sample
Designing a Visual Application and Using its Features Information Technology Assignment
8 pages (2072 words) , Download 1 , Assignment
Free
The tasks for the assignment are first deciding the front end by drawing the structure and state transition diagram, then designing the front end and showing the use of data types, arrays and selection structures if any, and finally documenting and analyzing how the current application design was organized and managed to achieve the final report.
Preview sample
System Implementation for the Allianz Bank Information Technology Report
6 pages (1682 words) , Download 1 , Report
Free
This report has outlined some of the main aspects and areas regarding the new open-source technology-based system implementation for Allianz bank. It analyzed some of the main aspects of the new system implementation and assessment of the main operational structure This report has analyzed the advantages and disadvantages of this system implementation. This report has also highlighted some issues in open-source technology implementation.
Preview sample
Network Packets Information Technology Case Study
6 pages (1749 words) , Download 1 , Case Study
Free
The clients try to find the NetBIOS service from the server and it uses the LAN MAN to go for an unauthenticated session with the server. The exploitation of the loop whole in the NetBIOS function in Windows NT leads to NULL session creation. One of the proposed solutions could be we can use an IP filter to avoid creating a null session. And we can create classified users to access the server.  
Preview sample
Use of IT in Photographic Equipment Industry Information Technology Case Study
12 pages (3268 words) , Download 1 , Case Study
Free
Once people-orientation is achieved, the next step is making changes in strategy and technology. Next, the organization needs to make compensatory changes so as to align all the components. A resource-based IT strategy “will draw upon the organization’s resources through all its components to capture a sustainable competitive advantage.
Preview sample
How Business Use Information Systems Information Technology Coursework
9 pages (2395 words) , Download 1 , Coursework
Free
Premium forwarding services will have the option of forwarding mails if the customer is temporarily away from home by getting information and processing the same in a cost-effective manner. PostalOne has benefited both the customer and the mailing industry by integrating the electronic system to streamline information which is exchanged about accounts and mails.
Preview sample
In What Ways Does the Internet Threaten Privacy Information Technology Essay
6 pages (1769 words) , Download 1 , Essay
Free
Customers have to trade-off convenience by providing valuable information about themselves (Rust, Kannan & Peng, 2002). They cannot transact on the Internet without revealing important information that they may be unwilling to share. The higher the level of service required, more information would have to be disclosed. 
Preview sample
2501 - 2550 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us