Information Technology Essays

Result for Category Information Technology:
6174 essays
Studentshare can solve a range of IT problems. Just join our amazing database of Computer Science academic papers. Whenever you face a challenge in the face of scientific and practical approach to computation and its applications, the samples of other students’ works will help you to understand the essence of this subject. With the help of free Information Technology material such as personal statements, essays, research papers, case studies, problem solutions, and outlines, you will raise your skills worth of Massachusetts Institute of Technology, Stanford University or Carnegie Mellon University, Harvard or Berkeley.

Information Technology Positioning Nike Company for Competitive Advantage

3 pages (753 words) , Download 14
Information Technology Positioning Nike Company for Competitive Advantage Introduction: The use of information technology (IT) in the modern times can be found to provide huge benefits in the functioning of an organization. The successful performance of the Nike Company to a large extent depends on the use of the information technology.

Microsoft Project Research Report

3 pages (753 words) , Download 8
By identifying and influencing the durations taken to complete different milestones, project manager can steer the progress of project accordingly and divert resources to speed up the processes (Marmel, 2011). This software offers various tools that aid manager in devising plan and methodologies for project to follow throughout its life cycle for measurement of progress and recording proportionate costs.

A Telemedicine opportunity or a distraction

8 pages (2008 words) , Download 6
Telemedicine is a health care delivery technique that applies high-speed telecommunications structures, computer technology and dedicated medical cameras to survey, diagnose, treat and instruct patients at a distance. This paper, therefore, will analyze Telemedicine a model company and in the process highlights its goals and strategies of implementing telemedicine in its processes.

Risk incidence occurrence solution

3 pages (753 words) , Download 5
In addition, poor information flow may result in improper patient identification, inadequate control and organization of the workforce, and improper documentation.Information flow is important in any health care facility because it ensure smooth communication between different departments and between patients and service providers.

Windows Server Deployment Proposal. New Features of Windows Server 2012

7 pages (1757 words) , Download 5
Premium quality
Installation of a Server Core provides performance and security advantages which in the past one had to make it a personal commitment. Windows Server 2012 has changed all this since currently we have choices.

Computer Science

4 pages (1004 words) , Download 5
I always fancied myself with computers since my childhood. Because I grew up in a small town in Vietnam, a place where computers was not introduced to the fullest at the time of its inception and was considered wholly as a luxury instead of a necessity, it was curiosity plus a self driven need to learn about this new technology.

Cloud computing

3 pages (753 words) , Download 4
For along time, computers have dominated the business world. Computers have made business running quite easy and fast. However, business people without sufficient knowledge in information technology have suffered. There are occasional losses of important data and breakdown of machine and these things have brought businesses down.

Case Study 1: Florida Department of Management Services, Part I

3 pages (753 words) , Download 4
The information system network transmitted the entire information that was collected from government agencies to a specialised data centre in Tallahassee. The system relied on proprietary network architecture as well as mainframe at the data centre, Tallahassee.

Sony: The World's largest Data Breach?

4 pages (1004 words) , Download 4
This essay discusses the internet has become vulnerable due to presence of many hackers ready to pounce on any control and security breach in systems, to make a fortune. Though the internet is a strange world that has not been perfectly maneuvered, firms have tried to incorporate different security systems though sophisticated hackers still get access to such systems.

People have become overly dependent on technology

3 pages (753 words) , Download 3
Premium quality
Computers, cell phones, Blackberries, iPods, fax machines, laptops or household gadgets like washing machines, robotic vacuum cleaners – it would be unheard of for the average American to go one day without using some of these gadgets.

Why Is It Said That Packet Switching Employs Statistical Multiplexing?

2 pages (502 words) , Download 3
Premium quality
Multiplexing refers to a resource that is shared among many users and they are of two types; The Time Division multiplexing where periodically only one user gains full capacity control at a time (TDM) and the Frequency Division Multiplex (FDM) where all users get exclusive control of the link capacity.

Clarion School for Boys

3 pages (753 words) , Download 3
Clarion School for Boys is apparently facing several issues with its information system. The major issue in this case study is the effectiveness in the adoption and implementation of the information system. Even through the school’s information system is being used for various functionalities, it is evident from the case that employees are lacking adequate skills and knowledge in the use of the information system.

Substantive literature review on the issue(s) presented;pervasiveness of technology, technological dependence, privacy, autonomy, security of data, democracy online, freedom of expression online, technological euphoria

5 pages (1255 words) , Download 3
This rapid change comes as a result technological advancement that changes the day-to-day technological devices from less to a more powerful device of smaller sizes than the personal computer. This change has recorded progressive production of natural products that

Human computer interaction

15 pages (3765 words) , Download 2
Bush The author of this paper is a respected scientist in the scientific community of the Allies. The paper is set in the immediate aftermath of the Second World War and the author concentrates on the large amounts of learning and research produced during the war effort and the inaccessibility posed by the large volumes of information available.

Advantages and disadvantages of measures use to protect operating system

7 pages (1757 words) , Download 2
Information technology is one of the most important fields in computer science. Basically, operating system is the system software. Software supports the basic functions of a computer. Operating system consists of data and programs that manages and run the computer hardware and provide common services for the execution of application efficiently.

Identifying Success Factors of Implementing ERP in Small Organisations

48 pages (12048 words) , Download 2
The findings of this study identified the success factors, grouping them into three chronological categories; project foundation, project team, and project implementation. Table of Content CHAPTER ONE: INTRODUCTION Background ERP systems are computer software packages that enable companies to manage all of their operations, such as sales, manufacturing, inventory, accounting, etc.

The use of web bugs at Homeconnection

3 pages (753 words) , Download 2
They are symbolized as HTML tags. They are usually invisible in the web page or electronic mail so as to conceal the fact that the page is in fact being monitored. However, bugs are not always invisible because any images that are used in the web page can actually be considered web bugs.

Develop business aptitude skills

3 pages (753 words) , Download 2
In relation to the concept of business networking, the process can be termed as a practice of building mutual and beneficial relationships with different business organizations along with potential customers within a particular marketplace (Wickham & Wickham 3-78).


3 pages (753 words) , Download 2
Facebook was launched in the year 2004 by Mark Zuckerberg, since then the company has grown from a small firm that served some of the most prestigious institutions in the united states of America to the publicly traded company presently with an estimated net worth of about 50 billion dollars.

How To Build Your Own Computer

6 pages (1506 words) , Download 2
Hardware components like processor, motherboard, memory and hard disk drive are the most significant parts of a PC. Other components like CD Rom/DVD Rom/CD writer/DVD writer, speaker, printers and scanners can be used according to requirement of user. However, keyboard, mouse and monitor are input and output devices that are equally crucial to run a computer.

Information Systems in Healthcare

6 pages (1506 words) , Download 2
The aspect of Information Technology (IT) is considered to be quite imperative for healthcare units as it helps to detect or identify the problems being witnessed by a particular patient. This definite aspect also helps the healthcare units to serve the patients with appropriate form of treatments (Bose, 2003).

Software Development

5 pages (1255 words) , Download 2
The development process of a software product entails a lot of steps. All these steps should be followed up in its entirety to ensure that all the processes are captured in the development process. The paper says that SDLC also helps as a guide in collecting data that is used to design the software.

Internet Firewall Security

8 pages (2008 words) , Download 2
Websites like Amazon and Ebay have taken online selling to the next level. When there are so many pros, one ought to fine cons too. There have been several instances of hacking in the past; recently the American intelligence website was hacked, credit card numbers are stolen on a regular basis.

Windows Server Deployment Proposal

6 pages (1506 words) , Download 2
This essay will therefore examine infrastructure server aspects including DHCP and DNS which drive the servers to the application servers which will enable the firm to bring to reality its advertising needs. The essay has set out an active directory schema that will not

Cyber Incident Response for Blue Moon Financial

11 pages (2761 words) , Download 2
My company has also experienced an elevated amount of port scanning and other types of reconnaissance activities showing that the network intrusion attacks have become rampant and require

The Impact of the Cloud on Mobile Devices

14 pages (3514 words) , Download 1
A cloud is generally the processing hardware of the computational application. The use of mobile devices for such applications has substantially increased. This paper will evaluate the impacts of the cloud on the mobile devices as well as pros and cons of this application.

Cloud Computing

19 pages (4769 words) , Download 1
Abstract Technology has integrated deeply in the lives of humans. The number of internet users increase exponentially every year. It is due to this reason that companies face difficulty in meeting the increasing requests of their customers. Companies need to expand their IT infrastructure to meet the amplifying needs of the customers; however, the increased infrastructure might only be useful for a limited time period.

ERP Systems For Small And Medium Size Companies

12 pages (3012 words) , Download 1
In previous few years, commercial Enterprise Resource Planning (ERP) systems and packages in the form of international e-business and e-commerce arrangement have been adopted by many businesses.

Iphone Network and Technology

10 pages (2510 words) , Download 1
The indigenous features and offers of the Apple company, however, make sure that few competitors can match the product in terms of quality, features, cost, and ease of operation. Apple is a relatively new player in the field, and a few years back it was not even predicted to enter the game.

IT Coursework Based on the Research Topic

3 pages (753 words) , Download 1
In this age of information technology, computer software has become a very important element of almost all the kinds of business. In this scenario, software engineering is linked with advanced technology.

IIS Networking Infrastructure Design.

11 pages (2761 words) , Download 1
Intelligent Imaging Solutions (IIS) is a corporate organization that designs, engineer, manufacture and distribute consumer-oriented navigation systems (GPS). There are two basic divisions of the corporate operations; consumer products and military products.

The Impact of Social Media on the Education Sector

14 pages (3514 words) , Download 1
The intention of this study is social media that is characterized by extensive boundaries and revolutionizing features that should be adopted in order to pace up with the revolutionizing of the restructured human civilization.The boom of information and communications technology in the late twentieth century has sparked a never ending chain of change in the human society.

Wireless Security

12 pages (3012 words) , Download 1
Wireless networking offers wonderful advantages and opportunities to get easy access to communication and collaborative services. Due to this reason, it has been evolving quickly around the world. In addition, most of the modern technologies today are completely reliant on wireless communication.

Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements

10 pages (2510 words) , Download 1
This chapter therefore, focuses on the research methodology and design employed to achieve the objectives of this study. The research methodology employed assisted in obtaining data relating to the current business processes in the Department of Human Settlements (DHS), that is to capture the functional requirements of the system and the users’ perceptions of the proposed system to develop an internet based housing demand database system for the KwaZulu-Natal DHS for improved housing service provisioning.

UNIX Operating System History

10 pages (2510 words) , Download 1
UNIX Operating System History Likewise, primary objective of Ken is to provide a user friendly environment to his subordinates who are associated with computing research along with a provision of time sharing environment (Fox 1807-1814). Ken and his subordinates improved the UNIX code for several years by integrating utilities and functionality for enhancing user interface along with rewriting the code in C language (Fox 1807-1814).

Profit Implications of Malware

15 pages (3765 words) , Download 1
Elizondo, Computational Intelligence for Privacy and Security). However a malware will not specifically fall into either these groups as some malwares fall into more than one category. The most common groups are virus, worms Trojan horse, rootkit, spywares and adware.

Virtual Team success

12 pages (3012 words) , Download 1
In an attempt to support project management globalization and compete in this ever-increasing competitive world, organizations are more and more building and implementing virtual teams

Two Financial Giants Merge

3 pages (753 words) , Download 1
Majority of these links required for integration are created between process components, as well as the control layer, in which control of the systems via supervision receives data from devices across the two companies. For example, where component Y needs information or data from component Z, a new link is formed on the control and business management layers of the two systems.

Your thoughts concerning an intranet where employees can learn and mutually inspire each other

7 pages (1757 words) , Download 1
Intranets Name: Institution: Introduction An intranet is an internal computer network used within an organization. Unlike the internet that connects computers globally through the World Wide Web, intranets use computers among other similar media to connect different departments and sections of the organization to a central database thus facilitate the sharing of information among other resources.

Specification and Design Report 2

3 pages (753 words) , Download 1
The people who are expected to use this VoIP service are the nurses who respond to emergencies, fire fighters, the police and the victims of the emergencies. The sponsors of this project who are an emergency response unit found out that they almost always reached the scene of the emergencies being late, and when they arrived there, they had to wait to in order for other stakeholders to arrive.

Information Systems Management in E-Government

8 pages (2008 words) , Download 1
Online governance in UK is not a simple unitary process; it is a multidimensional information and communication technology (ICT) framework which has to be adjusted with the existing complex government structure. This structure consists of various organisations with their respective targets.

Introduction About Information Technology in Education

6 pages (1506 words) , Download 1
According to the paper Information Technology is progressing so rapidly that occasional workshops are not enough for training. Teachers need constant awareness and training sessions to utilize Information Technology resources in institutes. Consequently many universities have proposed that this problem can be resolved by introducing another faculty for training teachers.

Organizational Structures

4 pages (1004 words) , Download 1
Hence, there is no denying the fact that the organizational structures play a pivotal role as to whether the specific organizations are able to meet their organizational goals or not. The earlier organizations were woven around hierarchical structures that no wonder stand to be anachronistic in the contemporary context where the storage, processing and exploitation of data play a key role in assuring organizational profitability and sustenance.

Data Warehousing & Data Mining

3 pages (753 words) , Download 1
The process is similar to the extraction of valuable metal hence the term “mining” (Jackson, 2003). Data mining is the process of analyzing extensive data with the aim of establishing correlation between different variables. Consequently, data warehousing is the process of storing data in relational databases that facilitate such queries and analysis.

IT and the Worklife/Homelife Balance

3 pages (753 words) , Download 1
There have lots of benefits associated with the arrival of technological advances, but there have been consequences as well. In the past employees enjoyed the freedom of knowing that once that clock hit the 5:00 P.M. the workers were out the door and into their comfort of their homes.

Case Sudy - Incident Response, Business Continuity and Disaster Recovery Plans

19 pages (4769 words) , Download 1
15 In an organization significant services as well as products must be provided in order to ensure sustainability, reduce negatives and to gather business requirements. Real world Example-?Business continuity planning is based on the practical planning that provides important services as well as significant products during disruption.

HEB Grocery Company

3 pages (753 words) , Download 1
HEB Grocery Company. H E Butt Grocery Company is a household name in southern Texas and Mexico owing to their aggressive marketing strategy and engagement with customers. In an effort to increase sales, diverisify their business and to counter their competitors, the company embacked on a state of the art onslaught into online retail in what came to be known as E-retailing.

SAP ERP Implementation [ A Case Study of Nestle USA]

4 pages (1004 words) , Download 1
This perception proves to be true a lot of times, though not always. Adopting an ERP system for a company helps the firm transform itself by business process reengineering. ERP implementation also helps the company synchronize the systems and working even when the systems are separated by distance.

Harley-Davidson Technology Strategies

3 pages (753 words) , Download 1
# 1 Talon, a proprietary dealer management system, handles inventory, vehicle registration, warranties and point of sale transactions in all Harley-Davidson dealerships. Talon aids in performing time-saving tasks such as checking dealer inventory and generating parts orders, as well as allowing the company to review and analyze information globally.

Network Forensic: Information Technology Research Paper

4 pages (1004 words) , Download 1
As threats make their way from vulnerabilities, a mechanism is vital to monitor, eliminate and report these issues. Incident response plan (IRP) illustrates a security incident along with the related incident response phases. Likewise, the plan consists of documentation related to information channels.
1 - 50 results of 6174 items