Result for Category Information Technology : 4560 papers

Free only
Studentshare can solve a range of IT problems. Just join our amazing database of Computer Science academic papers. Whenever you face a challenge in the face of scientific and practical approach to computation and its applications, the samples of other students’ works will help you to understand the essence of this subject. With the help of free Information Technology material such as personal statements, essays, research papers, case studies, problem solutions, and outlines, you will raise your skills worth of Massachusetts Institute of Technology, Stanford University or Carnegie Mellon University, Harvard or Berkeley.

Information Technology Positioning Nike Company for Competitive Advantage

3 pages (753 words), Download 7
Information Technology Positioning Nike Company for Competitive Advantage Introduction: The use of information technology (IT) in the modern times can be found to provide huge benefits in the functioning of an organization. The successful performance of the Nike Company to a large extent depends on the use of the information technology.

Microsoft Project Research Report

3 pages (753 words), Download 3
By identifying and influencing the durations taken to complete different milestones, project manager can steer the progress of project accordingly and divert resources to speed up the processes (Marmel, 2011). This software offers various tools that aid manager in devising plan and methodologies for project to follow throughout its life cycle for measurement of progress and recording proportionate costs.

Why Is It Said That Packet Switching Employs Statistical Multiplexing?

3 pages (753 words), Download 3
Multiplexing refers to a resource that is shared among many users and they are of two types; The Time Division multiplexing where periodically only one user gains full capacity control at a time (TDM) and the Frequency Division Multiplex (FDM) where all users get exclusive control of the link capacity.

Cloud computing

3 pages (753 words), Download 3
For along time, computers have dominated the business world. Computers have made business running quite easy and fast. However, business people without sufficient knowledge in information technology have suffered. There are occasional losses of important data and breakdown of machine and these things have brought businesses down.

A Telemedicine opportunity or a distraction

8 pages (2008 words), Download 3
Telemedicine is a health care delivery technique that applies high-speed telecommunications structures, computer technology and dedicated medical cameras to survey, diagnose, treat and instruct patients at a distance. This paper, therefore, will analyze Telemedicine a model company and in the process highlights its goals and strategies of implementing telemedicine in its processes.

Sony: The World's largest Data Breach?

3 pages (753 words), Download 3
However, in some cases, lack of proper security mechanism and controls are to blame for such hacking of sites. The Sony security breach on its online video game network may be considered as one of the cases, where companies fail to maintain the required security against such hacking threats, breaching client’s security as happened in one of the largest security breaches involving Sony Corp.

Advantages and disadvantages of measures use to protect operating system

7 pages (1757 words), Download 2
Information technology is one of the most important fields in computer science. Basically, operating system is the system software. Software supports the basic functions of a computer. Operating system consists of data and programs that manages and run the computer hardware and provide common services for the execution of application efficiently.

Identifying Success Factors of Implementing ERP in Small Organisations

48 pages (12048 words), Download 2
The findings of this study identified the success factors, grouping them into three chronological categories; project foundation, project team, and project implementation. Table of Content CHAPTER ONE: INTRODUCTION Background ERP systems are computer software packages that enable companies to manage all of their operations, such as sales, manufacturing, inventory, accounting, etc.

Human computer interaction

15 pages (3765 words), Download 2
Bush The author of this paper is a respected scientist in the scientific community of the Allies. The paper is set in the immediate aftermath of the Second World War and the author concentrates on the large amounts of learning and research produced during the war effort and the inaccessibility posed by the large volumes of information available.

Risk incidence occurrence solution

3 pages (753 words), Download 2
In addition, poor information flow may result in improper patient identification, inadequate control and organization of the workforce, and improper documentation.Information flow is important in any health care facility because it ensure smooth communication between different departments and between patients and service providers.


3 pages (753 words), Download 2
Facebook was launched in the year 2004 by Mark Zuckerberg, since then the company has grown from a small firm that served some of the most prestigious institutions in the united states of America to the publicly traded company presently with an estimated net worth of about 50 billion dollars.

How To Build Your Own Computer

6 pages (1506 words), Download 2
Hardware components like processor, motherboard, memory and hard disk drive are the most significant parts of a PC. Other components like CD Rom/DVD Rom/CD writer/DVD writer, speaker, printers and scanners can be used according to requirement of user. However, keyboard, mouse and monitor are input and output devices that are equally crucial to run a computer.

Case Study 1: Florida Department of Management Services, Part I

3 pages (753 words), Download 2
The information system network transmitted the entire information that was collected from government agencies to a specialised data centre in Tallahassee. The system relied on proprietary network architecture as well as mainframe at the data centre, Tallahassee.

Internet Firewall Security

8 pages (2008 words), Download 2
Websites like Amazon and Ebay have taken online selling to the next level. When there are so many pros, one ought to fine cons too. There have been several instances of hacking in the past; recently the American intelligence website was hacked, credit card numbers are stolen on a regular basis.

Wireless Security

12 pages (3012 words), Download 1
Wireless networking offers wonderful advantages and opportunities to get easy access to communication and collaborative services. Due to this reason, it has been evolving quickly around the world. In addition, most of the modern technologies today are completely reliant on wireless communication.

IIS Networking Infrastructure Design.

11 pages (2761 words), Download 1
Intelligent Imaging Solutions (IIS) is a corporate organization that designs, engineer, manufacture and distribute consumer-oriented navigation systems (GPS). There are two basic divisions of the corporate operations; consumer products and military products.

The Impact of Social Media on the Education Sector

14 pages (3514 words), Download 1
t active and prevalent of the trends of the society. The phenomenon of Social Media can very well be termed as a trend setter as the norms of the human society. This research is aimed at analyzing what Social Media is and what integral importance it has when embedded with the education sector.

Quantum: Computing the Future

20 pages (5020 words), Download 1
Quantum computing is a significant area of present-day research aimed at establishing computer related tools and machines based on the rules and regulations of quantum theory. In this scenario, the quantum theory outlines the environment and performance of material and energy on the quantum, both at the atomic and subatomic level.

Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements

10 pages (2510 words), Download 1
This chapter therefore, focuses on the research methodology and design employed to achieve the objectives of this study. The research methodology employed assisted in obtaining data relating to the current business processes in the Department of Human Settlements (DHS), that is to capture the functional requirements of the system and the users’ perceptions of the proposed system to develop an internet based housing demand database system for the KwaZulu-Natal DHS for improved housing service provisioning.

Profit Implications of Malware

15 pages (3765 words), Download 1
Elizondo, Computational Intelligence for Privacy and Security). However a malware will not specifically fall into either these groups as some malwares fall into more than one category. The most common groups are virus, worms Trojan horse, rootkit, spywares and adware.

IT Coursework Based on the Research Topic

3 pages (753 words), Download 1
In this age of information technology, computer software has become a very important element of almost all the kinds of business. In this scenario, software engineering is linked with advanced technology.

Iphone Network and Technology

10 pages (2510 words), Download 1
The indigenous features and offers of the Apple company, however, make sure that few competitors can match the product in terms of quality, features, cost, and ease of operation. Apple is a relatively new player in the field, and a few years back it was not even predicted to enter the game.

The Impact of the Cloud on Mobile Devices

14 pages (3514 words), Download 1
A cloud is generally the processing hardware of the computational application. The use of mobile devices for such applications has substantially increased. This paper will evaluate the impacts of the cloud on the mobile devices as well as pros and cons of this application.

Cloud Computing

19 pages (4769 words), Download 1
Abstract Technology has integrated deeply in the lives of humans. The number of internet users increase exponentially every year. It is due to this reason that companies face difficulty in meeting the increasing requests of their customers. Companies need to expand their IT infrastructure to meet the amplifying needs of the customers; however, the increased infrastructure might only be useful for a limited time period.

Two Financial Giants Merge

3 pages (753 words), Download 1
Majority of these links required for integration are created between process components, as well as the control layer, in which control of the systems via supervision receives data from devices across the two companies. For example, where component Y needs information or data from component Z, a new link is formed on the control and business management layers of the two systems.
There are no free documents on this page. Please proceed to the next page and filter your search results again.
1 - 25 results of 4560 items