Studentshare can solve a range of IT problems. Just join our amazing database of Computer Science academic papers. Whenever you face a challenge in the face of scientific and practical approach to computation and its applications, the samples of other students’ works will help you to understand the essence of this subject. With the help of free Information Technology material such as personal statements, essays, research papers, case studies, problem solutions, and outlines, you will raise your skills worth of Massachusetts Institute of Technology, Stanford University or Carnegie Mellon University, Harvard or Berkeley.
Information Technology Positioning Nike Company for Competitive Advantage
3 pages (753 words) , Download 17
Information Technology Positioning Nike Company for Competitive Advantage Introduction: The use of information technology (IT) in the modern times can be found to provide huge benefits in the functioning of an organization. The successful performance of the Nike Company to a large extent depends on the use of the information technology.
Microsoft Project Research Report
3 pages (753 words) , Download 8
By identifying and influencing the durations taken to complete different milestones, project manager can steer the progress of project accordingly and divert resources to speed up the processes (Marmel, 2011). This software offers various tools that aid manager in devising plan and methodologies for project to follow throughout its life cycle for measurement of progress and recording proportionate costs.
Computer Science
4 pages (1004 words) , Download 7
I always fancied myself with computers since my childhood. Because I grew up in a small town in Vietnam, a place where computers was not introduced to the fullest at the time of its inception and was considered wholly as a luxury instead of a necessity, it was curiosity plus a self driven need to learn about this new technology.
Windows Server Deployment Proposal. New Features of Windows Server 2012
7 pages (1757 words) , Download 6
Premium quality
Installation of a Server Core provides performance and security advantages which in the past one had to make it a personal commitment. Windows Server 2012 has changed all this since currently we have choices.
Case Study--Zynga Wins with Business Intelligence. (ITM class)
3 pages (753 words) , Download 6
Zynga goes beyond the bounds of what traditional games companies do. For them to stay in business, they realized that they need to have a continuous analysis of the trend, habits and behaviors of their users and they have used this to keep crafting their games appropriately.
A Telemedicine opportunity or a distraction
8 pages (2008 words) , Download 6
Telemedicine is a health care delivery technique that applies high-speed telecommunications structures, computer technology and dedicated medical cameras to survey, diagnose, treat and instruct patients at a distance. This paper, therefore, will analyze Telemedicine a model company and in the process highlights its goals and strategies of implementing telemedicine in its processes.
Risk incidence occurrence solution
3 pages (753 words) , Download 5
In addition, poor information flow may result in improper patient identification, inadequate control and organization of the workforce, and improper documentation.Information flow is important in any health care facility because it ensure smooth communication between different departments and between patients and service providers.
Case Study 1: Florida Department of Management Services, Part I
3 pages (753 words) , Download 5
The information system network transmitted the entire information that was collected from government agencies to a specialised data centre in Tallahassee. The system relied on proprietary network architecture as well as mainframe at the data centre, Tallahassee.
Sony: The World's largest Data Breach?
4 pages (1004 words) , Download 5
This essay discusses the internet has become vulnerable due to presence of many hackers ready to pounce on any control and security breach in systems, to make a fortune. Though the internet is a strange world that has not been perfectly maneuvered, firms have tried to incorporate different security systems though sophisticated hackers still get access to such systems.
Cloud computing in marketing
3 pages (753 words) , Download 4
This paper focuses upon cloud computing as the newest technological application that is changing the world. Cloud computing is likely to transform every sector of life in the near future. The invention and continued use of cloud computing will lift off a great burden from businesses. For along time, computers have dominated the business world.
Identifying Success Factors of Implementing ERP in Small Organisations
63 pages (15813 words) , Download 2
The purpose of this study is to determine the factors that influence the success of an Enterprise Resource Planning (ERP) system implementation project at small organisations. The findings of this study identified the success factors, grouping them into three chronological categories; project foundation, project team, and project implementation.
People have become overly dependent on technology
3 pages (753 words) , Download 3
Premium quality
Computers, cell phones, Blackberries, iPods, fax machines, laptops or household gadgets like washing machines, robotic vacuum cleaners – it would be unheard of for the average American to go one day without using some of these gadgets.
The use of web bugs at Homeconnection
3 pages (753 words) , Download 3
They are symbolized as HTML tags. They are usually invisible in the web page or electronic mail so as to conceal the fact that the page is in fact being monitored. However, bugs are not always invisible because any images that are used in the web page can actually be considered web bugs.
Why Is It Said That Packet Switching Employs Statistical Multiplexing?
2 pages (502 words) , Download 3
Premium quality
Multiplexing refers to a resource that is shared among many users and they are of two types; The Time Division multiplexing where periodically only one user gains full capacity control at a time (TDM) and the Frequency Division Multiplex (FDM) where all users get exclusive control of the link capacity.
Clarion School for Boys
3 pages (753 words) , Download 3
Clarion School for Boys is apparently facing several issues with its information system. The major issue in this case study is the effectiveness in the adoption and implementation of the information system. Even through the school’s information system is being used for various functionalities, it is evident from the case that employees are lacking adequate skills and knowledge in the use of the information system.
Substantive literature review on the issue(s) presented;pervasiveness of technology, technological dependence, privacy, autonomy, security of data, democracy online, freedom of expression online, technological euphoria
5 pages (1255 words) , Download 3
This rapid change comes as a result technological advancement that changes the day-to-day technological devices from less to a more powerful device of smaller sizes than the personal computer. This change has recorded progressive production of natural products that
Windows Server Deployment Proposal
6 pages (1506 words) , Download 3
This essay will therefore examine infrastructure server aspects including DHCP and DNS which drive the servers to the application servers which will enable the firm to bring to reality its advertising needs. The essay has set out an active directory schema that will not
Human computer interaction
15 pages (3765 words) , Download 2
Bush The author of this paper is a respected scientist in the scientific community of the Allies. The paper is set in the immediate aftermath of the Second World War and the author concentrates on the large amounts of learning and research produced during the war effort and the inaccessibility posed by the large volumes of information available.
Advantages and disadvantages of measures use to protect operating system
7 pages (1757 words) , Download 2
Information technology is one of the most important fields in computer science. Basically, operating system is the system software. Software supports the basic functions of a computer. Operating system consists of data and programs that manages and run the computer hardware and provide common services for the execution of application efficiently.
Virtual Team success
12 pages (3012 words) , Download 2
In an attempt to support project management globalization and compete in this ever-increasing competitive world, organizations are more and more building and implementing virtual teams
Develop business aptitude skills
3 pages (753 words) , Download 2
In relation to the concept of business networking, the process can be termed as a practice of building mutual and beneficial relationships with different business organizations along with potential customers within a particular marketplace (Wickham & Wickham 3-78).
Artificial Intelligence techniques used in autonomous car
5 pages (1255 words) , Download 2
In addition, an important mission of artificial intelligence paradigm is to create human like intelligence in machine to reinstate and assist humans in everyday tasks. The basic purpose of this paper is to present a detailed analysis of autonomous cars with a particular focus on AI techniques used in the development of these cars.
Chart the development of virtual reality from 1950 to 2050.
8 pages (2008 words) , Download 2
In the recent sphere, computer graphics have application in huge areas in life since each area finds it difficult to operate lacking a graphics workstation (Craig, 1998: 4). Definition Virtual reality has natural description since the description remains extracted from both the virtual and reality notion.
Data mining
17 pages (4267 words) , Download 2
It is vast finding its use in marketing, managing inventory, management of quality, and managing of risks associated with loaned money. Data mining application have also been seen in use in biological use as seen in DNA testing and gene analysis in living organisms.
3 pages (753 words) , Download 2
Facebook was launched in the year 2004 by Mark Zuckerberg, since then the company has grown from a small firm that served some of the most prestigious institutions in the united states of America to the publicly traded company presently with an estimated net worth of about 50 billion dollars.
How To Build Your Own Computer
6 pages (1506 words) , Download 2
Hardware components like processor, motherboard, memory and hard disk drive are the most significant parts of a PC. Other components like CD Rom/DVD Rom/CD writer/DVD writer, speaker, printers and scanners can be used according to requirement of user. However, keyboard, mouse and monitor are input and output devices that are equally crucial to run a computer.
Information Systems in Healthcare
6 pages (1506 words) , Download 2
The aspect of Information Technology (IT) is considered to be quite imperative for healthcare units as it helps to detect or identify the problems being witnessed by a particular patient. This definite aspect also helps the healthcare units to serve the patients with appropriate form of treatments (Bose, 2003).
Ethics of Artificial Intelligence & Machine Learning
10 pages (2510 words) , Download 2
These encompass robots and other similar machines whose behavior ought to mimic that of a reasoning person in quest of undertaking complex and even challenging tasks in the industrial sector. However, the possibility of devising machines, which are capable of reasoning like human beings raises numerous and varied ethical issues (Bostrom, & Yudkowsky, 2011).
Super Mario Game
3 pages (753 words) , Download 2
Unlike the past when we were presented with not so smooth graphics of NES version of Super Mario, the arrival of Nintendo 64 has changed everything. 3D and good visual effects have made playing Mario games a fascinating experience (Bueno, 2009). Describe the nature of the user interface in details for Super Mario game?
Network Architectures for Data Centers
10 pages (2510 words) , Download 2
This technology based trend is known as a centralized data center. As the central and major provisioning point of communication network, data storage, and compute support services, the corporate data center was established in the middle of the mission critical operational processes and functional areas for one basic purpose: The expenditures of offering huge scale, centralized technology based services to thousands of clients were extremely high that it could simply be managed and controlled by practically collecting and connecting that technology based resources in a common place.
Software Development
5 pages (1255 words) , Download 2
The development process of a software product entails a lot of steps. All these steps should be followed up in its entirety to ensure that all the processes are captured in the development process. The paper says that SDLC also helps as a guide in collecting data that is used to design the software.
Collaboration Systems at Isuzu Australia Limited
3 pages (753 words) , Download 2
The author states that groupware is typically used by corporations to allow for the furtherance of projects when those projects are worked on by employees located in different offices. There are many challenges that may be faced by a company when implementing groupware: issues with bandwidth, web presence, automation, and the establishment of an intranet.
Internet Firewall Security
8 pages (2008 words) , Download 2
Websites like Amazon and Ebay have taken online selling to the next level. When there are so many pros, one ought to fine cons too. There have been several instances of hacking in the past; recently the American intelligence website was hacked, credit card numbers are stolen on a regular basis.
A Survey of Advances in Biometric Security
10 pages (2510 words) , Download 1
This research paper intends to provide a comprehensive understanding about the aspect of biometric security solutions along with an evaluation of its performance efficacy in the present day context. This research is conducted in a systematic manner through depicting the functionality as well as the forms of existing biometric security network.
Cyber Incident Response for Blue Moon Financial
11 pages (2761 words) , Download 2
My company has also experienced an elevated amount of port scanning and other types of reconnaissance activities showing that the network intrusion attacks have become rampant and require
History of Informatics and Areas of Practice - Entity Ranking
5 pages (1255 words) , Download 1
Although the science of informatics is a varied discipline and as we shall see now has its own specialty, as with anything else there can only be three that are most important if they are indeed to be ranked. In order of importance to me are the American Medical
The Impact of the Cloud on Mobile Devices
14 pages (3514 words) , Download 1
A cloud is generally the processing hardware of the computational application. The use of mobile devices for such applications has substantially increased. This paper will evaluate the impacts of the cloud on the mobile devices as well as pros and cons of this application.
Cloud Computing
19 pages (4769 words) , Download 1
Abstract Technology has integrated deeply in the lives of humans. The number of internet users increase exponentially every year. It is due to this reason that companies face difficulty in meeting the increasing requests of their customers. Companies need to expand their IT infrastructure to meet the amplifying needs of the customers; however, the increased infrastructure might only be useful for a limited time period.
ERP Systems For Small And Medium Size Companies
12 pages (3012 words) , Download 1
In previous few years, commercial Enterprise Resource Planning (ERP) systems and packages in the form of international e-business and e-commerce arrangement have been adopted by many businesses.
Iphone Network and Technology
10 pages (2510 words) , Download 1
The indigenous features and offers of the Apple company, however, make sure that few competitors can match the product in terms of quality, features, cost, and ease of operation. Apple is a relatively new player in the field, and a few years back it was not even predicted to enter the game.
IT Coursework Based on the Research Topic
3 pages (753 words) , Download 1
In this age of information technology, computer software has become a very important element of almost all the kinds of business. In this scenario, software engineering is linked with advanced technology.
IIS Networking Infrastructure Design.
11 pages (2761 words) , Download 1
Intelligent Imaging Solutions (IIS) is a corporate organization that designs, engineer, manufacture and distribute consumer-oriented navigation systems (GPS). There are two basic divisions of the corporate operations; consumer products and military products.
Video Games and Artificial Intelligence
12 pages (3012 words) , Download 1
He states that the human intelligence is far more equipped and complex and this concept can be utilized firmly in the presentation of an analogy between an artificially intelligent computer infrastructure and simple structure. He goes onto add that a powerful application based Chess game would definitely have an equally powerful chess database but would know nothing about any other board game, which is contrary to artificially intelligent gaming techniques (2).
The Impact of Social Media on the Education Sector
14 pages (3514 words) , Download 1
The intention of this study is social media that is characterized by extensive boundaries and revolutionizing features that should be adopted in order to pace up with the revolutionizing of the restructured human civilization.The boom of information and communications technology in the late twentieth century has sparked a never ending chain of change in the human society.
Wireless Security
12 pages (3012 words) , Download 1
Wireless networking offers wonderful advantages and opportunities to get easy access to communication and collaborative services. Due to this reason, it has been evolving quickly around the world. In addition, most of the modern technologies today are completely reliant on wireless communication.
Analyzing the uses of scheduling methods in IT project management
13 pages (3263 words) , Download 1
The paper is meant to give scheduling the seriousness it deserves to ensure successful projects in information technology. Scheduling has been an important process when undertaking project management. Although this is an important process in project management, there has been limited analysis and ways of improving this important process of managing a project.
Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements
12 pages (3012 words) , Download 1
The target population for this study was the employees of the housing demand database section, municipality employees and the IT section of the DHS. The target population for the study comprised of 70 individuals. As it was impossible to focus on the entire population, it was necessary to use a sample to obtain the relevant data.
UNIX Operating System History
10 pages (2510 words) , Download 1
UNIX Operating System History Likewise, primary objective of Ken is to provide a user friendly environment to his subordinates who are associated with computing research along with a provision of time sharing environment (Fox 1807-1814). Ken and his subordinates improved the UNIX code for several years by integrating utilities and functionality for enhancing user interface along with rewriting the code in C language (Fox 1807-1814).
Profit Implications of Malware
15 pages (3765 words) , Download 1
Elizondo, Computational Intelligence for Privacy and Security). However a malware will not specifically fall into either these groups as some malwares fall into more than one category. The most common groups are virus, worms Trojan horse, rootkit, spywares and adware.
Cyber Bullying in Schools
12 pages (3012 words) , Download 1
The paper looks at the various methods that are used in perpetrating cyber bullying, including emails and social media sites. The study also looks at the various stakeholders who can act in order to create and implement legislation and school programs that will help in diminution or extinction of cyber bullying; these include governments and the school administrations.
1 - 50 results of 6324 items