StudentShare solutions

Result for Category Information Technology : 5984 papers

Free only
Studentshare can solve a range of IT problems. Just join our amazing database of Computer Science academic papers. Whenever you face a challenge in the face of scientific and practical approach to computation and its applications, the samples of other students’ works will help you to understand the essence of this subject. With the help of free Information Technology material such as personal statements, essays, research papers, case studies, problem solutions, and outlines, you will raise your skills worth of Massachusetts Institute of Technology, Stanford University or Carnegie Mellon University, Harvard or Berkeley.

Information Technology Positioning Nike Company for Competitive Advantage

3 pages (753 words) , Download 14
Free
Information Technology Positioning Nike Company for Competitive Advantage Introduction: The use of information technology (IT) in the modern times can be found to provide huge benefits in the functioning of an organization. The successful performance of the Nike Company to a large extent depends on the use of the information technology.

Microsoft Project Research Report

3 pages (753 words) , Download 6
Free
By identifying and influencing the durations taken to complete different milestones, project manager can steer the progress of project accordingly and divert resources to speed up the processes (Marmel, 2011). This software offers various tools that aid manager in devising plan and methodologies for project to follow throughout its life cycle for measurement of progress and recording proportionate costs.

Cloud computing

3 pages (753 words) , Download 4
Free
For along time, computers have dominated the business world. Computers have made business running quite easy and fast. However, business people without sufficient knowledge in information technology have suffered. There are occasional losses of important data and breakdown of machine and these things have brought businesses down.

Case Study 1: Florida Department of Management Services, Part I

3 pages (753 words) , Download 4
Free
The information system network transmitted the entire information that was collected from government agencies to a specialised data centre in Tallahassee. The system relied on proprietary network architecture as well as mainframe at the data centre, Tallahassee.

A Telemedicine opportunity or a distraction

8 pages (2008 words) , Download 4
Telemedicine is a health care delivery technique that applies high-speed telecommunications structures, computer technology and dedicated medical cameras to survey, diagnose, treat and instruct patients at a distance. This paper, therefore, will analyze Telemedicine a model company and in the process highlights its goals and strategies of implementing telemedicine in its processes.

People have become overly dependent on technology

3 pages (753 words) , Download 3
Premium quality
Computers, cell phones, Blackberries, iPods, fax machines, laptops or household gadgets like washing machines, robotic vacuum cleaners – it would be unheard of for the average American to go one day without using some of these gadgets.

Risk incidence occurrence solution

3 pages (753 words) , Download 3
In addition, poor information flow may result in improper patient identification, inadequate control and organization of the workforce, and improper documentation.Information flow is important in any health care facility because it ensure smooth communication between different departments and between patients and service providers.

Windows Server Deployment Proposal. New Features of Windows Server 2012

7 pages (1757 words) , Download 3
Premium quality
Installation of a Server Core provides performance and security advantages which in the past one had to make it a personal commitment. Windows Server 2012 has changed all this since currently we have choices.

Why Is It Said That Packet Switching Employs Statistical Multiplexing?

2 pages (502 words) , Download 3
Premium quality
Multiplexing refers to a resource that is shared among many users and they are of two types; The Time Division multiplexing where periodically only one user gains full capacity control at a time (TDM) and the Frequency Division Multiplex (FDM) where all users get exclusive control of the link capacity.

Sony: The World's largest Data Breach?

4 pages (1004 words) , Download 3
Free
The internet has become vulnerable due to presence of many hackers ready to pounce on any control and security breach in systems, to make a fortune. Though the internet is a strange world that has not been perfectly maneuvered, firms have tried to incorporate different security systems though sophisticated hackers still get access to such systems.

Computer Science

4 pages (1004 words) , Download 3
Free
I always fancied myself with computers since my childhood. Because I grew up in a small town in Vietnam, a place where computers was not introduced to the fullest at the time of its inception and was considered wholly as a luxury instead of a necessity, it was curiosity plus a self driven need to learn about this new technology.

Substantive literature review on the issue(s) presented;pervasiveness of technology, technological dependence, privacy, autonomy, security of data, democracy online, freedom of expression online, technological euphoria

5 pages (1255 words) , Download 3
This rapid change comes as a result technological advancement that changes the day-to-day technological devices from less to a more powerful device of smaller sizes than the personal computer. This change has recorded progressive production of natural products that

Human computer interaction

15 pages (3765 words) , Download 2
Bush The author of this paper is a respected scientist in the scientific community of the Allies. The paper is set in the immediate aftermath of the Second World War and the author concentrates on the large amounts of learning and research produced during the war effort and the inaccessibility posed by the large volumes of information available.

Advantages and disadvantages of measures use to protect operating system

7 pages (1757 words) , Download 2
Information technology is one of the most important fields in computer science. Basically, operating system is the system software. Software supports the basic functions of a computer. Operating system consists of data and programs that manages and run the computer hardware and provide common services for the execution of application efficiently.

Identifying Success Factors of Implementing ERP in Small Organisations

48 pages (12048 words) , Download 2
The findings of this study identified the success factors, grouping them into three chronological categories; project foundation, project team, and project implementation. Table of Content CHAPTER ONE: INTRODUCTION Background ERP systems are computer software packages that enable companies to manage all of their operations, such as sales, manufacturing, inventory, accounting, etc.

Develop business aptitude skills

3 pages (753 words) , Download 2
Free
In relation to the concept of business networking, the process can be termed as a practice of building mutual and beneficial relationships with different business organizations along with potential customers within a particular marketplace (Wickham & Wickham 3-78).

Facebook

3 pages (753 words) , Download 2
Free
Facebook was launched in the year 2004 by Mark Zuckerberg, since then the company has grown from a small firm that served some of the most prestigious institutions in the united states of America to the publicly traded company presently with an estimated net worth of about 50 billion dollars.

How To Build Your Own Computer

6 pages (1506 words) , Download 2
Hardware components like processor, motherboard, memory and hard disk drive are the most significant parts of a PC. Other components like CD Rom/DVD Rom/CD writer/DVD writer, speaker, printers and scanners can be used according to requirement of user. However, keyboard, mouse and monitor are input and output devices that are equally crucial to run a computer.

Information Systems in Healthcare

6 pages (1506 words) , Download 2
The aspect of Information Technology (IT) is considered to be quite imperative for healthcare units as it helps to detect or identify the problems being witnessed by a particular patient. This definite aspect also helps the healthcare units to serve the patients with appropriate form of treatments (Bose, 2003).

Software Development

5 pages (1255 words) , Download 2
Free
The development process of a software product entails a lot of steps. All these steps should be followed up in its entirety to ensure that all the processes are captured in the development process. The paper says that SDLC also helps as a guide in collecting data that is used to design the software.

Internet Firewall Security

8 pages (2008 words) , Download 2
Websites like Amazon and Ebay have taken online selling to the next level. When there are so many pros, one ought to fine cons too. There have been several instances of hacking in the past; recently the American intelligence website was hacked, credit card numbers are stolen on a regular basis.

Windows Server Deployment Proposal

6 pages (1506 words) , Download 2
This essay will therefore examine infrastructure server aspects including DHCP and DNS which drive the servers to the application servers which will enable the firm to bring to reality its advertising needs. The essay has set out an active directory schema that will not

The Impact of the Cloud on Mobile Devices

14 pages (3514 words) , Download 1
A cloud is generally the processing hardware of the computational application. The use of mobile devices for such applications has substantially increased. This paper will evaluate the impacts of the cloud on the mobile devices as well as pros and cons of this application.

Cloud Computing

19 pages (4769 words) , Download 1
Abstract Technology has integrated deeply in the lives of humans. The number of internet users increase exponentially every year. It is due to this reason that companies face difficulty in meeting the increasing requests of their customers. Companies need to expand their IT infrastructure to meet the amplifying needs of the customers; however, the increased infrastructure might only be useful for a limited time period.

ERP Systems For Small And Medium Size Companies

12 pages (3012 words) , Download 1
In previous few years, commercial Enterprise Resource Planning (ERP) systems and packages in the form of international e-business and e-commerce arrangement have been adopted by many businesses.

Iphone Network and Technology

10 pages (2510 words) , Download 1
The indigenous features and offers of the Apple company, however, make sure that few competitors can match the product in terms of quality, features, cost, and ease of operation. Apple is a relatively new player in the field, and a few years back it was not even predicted to enter the game.

IT Coursework Based on the Research Topic

3 pages (753 words) , Download 1
In this age of information technology, computer software has become a very important element of almost all the kinds of business. In this scenario, software engineering is linked with advanced technology.

IIS Networking Infrastructure Design.

11 pages (2761 words) , Download 1
Intelligent Imaging Solutions (IIS) is a corporate organization that designs, engineer, manufacture and distribute consumer-oriented navigation systems (GPS). There are two basic divisions of the corporate operations; consumer products and military products.

The Impact of Social Media on the Education Sector

14 pages (3514 words) , Download 1
t active and prevalent of the trends of the society. The phenomenon of Social Media can very well be termed as a trend setter as the norms of the human society. This research is aimed at analyzing what Social Media is and what integral importance it has when embedded with the education sector.

Wireless Security

12 pages (3012 words) , Download 1
Wireless networking offers wonderful advantages and opportunities to get easy access to communication and collaborative services. Due to this reason, it has been evolving quickly around the world. In addition, most of the modern technologies today are completely reliant on wireless communication.

Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements

10 pages (2510 words) , Download 1
This chapter therefore, focuses on the research methodology and design employed to achieve the objectives of this study. The research methodology employed assisted in obtaining data relating to the current business processes in the Department of Human Settlements (DHS), that is to capture the functional requirements of the system and the users’ perceptions of the proposed system to develop an internet based housing demand database system for the KwaZulu-Natal DHS for improved housing service provisioning.

UNIX Operating System History

10 pages (2510 words) , Download 1
UNIX Operating System History Likewise, primary objective of Ken is to provide a user friendly environment to his subordinates who are associated with computing research along with a provision of time sharing environment (Fox 1807-1814). Ken and his subordinates improved the UNIX code for several years by integrating utilities and functionality for enhancing user interface along with rewriting the code in C language (Fox 1807-1814).

Profit Implications of Malware

15 pages (3765 words) , Download 1
Elizondo, Computational Intelligence for Privacy and Security). However a malware will not specifically fall into either these groups as some malwares fall into more than one category. The most common groups are virus, worms Trojan horse, rootkit, spywares and adware.

Two Financial Giants Merge

3 pages (753 words) , Download 1
Majority of these links required for integration are created between process components, as well as the control layer, in which control of the systems via supervision receives data from devices across the two companies. For example, where component Y needs information or data from component Z, a new link is formed on the control and business management layers of the two systems.

Your thoughts concerning an intranet where employees can learn and mutually inspire each other

7 pages (1757 words) , Download 1
Intranets Name: Institution: Introduction An intranet is an internal computer network used within an organization. Unlike the internet that connects computers globally through the World Wide Web, intranets use computers among other similar media to connect different departments and sections of the organization to a central database thus facilitate the sharing of information among other resources.

Specification and Design Report 2

3 pages (753 words) , Download 1
Free
The people who are expected to use this VoIP service are the nurses who respond to emergencies, fire fighters, the police and the victims of the emergencies. The sponsors of this project who are an emergency response unit found out that they almost always reached the scene of the emergencies being late, and when they arrived there, they had to wait to in order for other stakeholders to arrive.

Information Systems Management in E-Government

8 pages (2008 words) , Download 1
Online governance in UK is not a simple unitary process; it is a multidimensional information and communication technology (ICT) framework which has to be adjusted with the existing complex government structure. This structure consists of various organisations with their respective targets.

Introduction About Information Technology in Education

6 pages (1506 words) , Download 1
According to the paper Information Technology is progressing so rapidly that occasional workshops are not enough for training. Teachers need constant awareness and training sessions to utilize Information Technology resources in institutes. Consequently many universities have proposed that this problem can be resolved by introducing another faculty for training teachers.

Organizational Structures

4 pages (1004 words) , Download 1
Hence, there is no denying the fact that the organizational structures play a pivotal role as to whether the specific organizations are able to meet their organizational goals or not. The earlier organizations were woven around hierarchical structures that no wonder stand to be anachronistic in the contemporary context where the storage, processing and exploitation of data play a key role in assuring organizational profitability and sustenance.

Data Warehousing & Data Mining

3 pages (753 words) , Download 1
Free
The process is similar to the extraction of valuable metal hence the term “mining” (Jackson, 2003). Data mining is the process of analyzing extensive data with the aim of establishing correlation between different variables. Consequently, data warehousing is the process of storing data in relational databases that facilitate such queries and analysis.

IT and the Worklife/Homelife Balance

3 pages (753 words) , Download 1
Free
There have lots of benefits associated with the arrival of technological advances, but there have been consequences as well. In the past employees enjoyed the freedom of knowing that once that clock hit the 5:00 P.M. the workers were out the door and into their comfort of their homes.

Case Sudy - Incident Response, Business Continuity and Disaster Recovery Plans

19 pages (4769 words) , Download 1
15 In an organization significant services as well as products must be provided in order to ensure sustainability, reduce negatives and to gather business requirements. Real world Example-?Business continuity planning is based on the practical planning that provides important services as well as significant products during disruption.

HEB Grocery Company

3 pages (753 words) , Download 1
HEB Grocery Company. H E Butt Grocery Company is a household name in southern Texas and Mexico owing to their aggressive marketing strategy and engagement with customers. In an effort to increase sales, diverisify their business and to counter their competitors, the company embacked on a state of the art onslaught into online retail in what came to be known as E-retailing.

SAP ERP Implementation [ A Case Study of Nestle USA]

4 pages (1004 words) , Download 1
This perception proves to be true a lot of times, though not always. Adopting an ERP system for a company helps the firm transform itself by business process reengineering. ERP implementation also helps the company synchronize the systems and working even when the systems are separated by distance.

Harley-Davidson Technology Strategies

3 pages (753 words) , Download 1
# 1 Talon, a proprietary dealer management system, handles inventory, vehicle registration, warranties and point of sale transactions in all Harley-Davidson dealerships. Talon aids in performing time-saving tasks such as checking dealer inventory and generating parts orders, as well as allowing the company to review and analyze information globally.

Personal Security and The Internet

12 pages (3012 words) , Download 1
The internet has made the traditionally manual works simpler and cost effective. However, the internet has its ugly side too. Ranging from its vulnerability of attacks by viruses and malware to intrusion of personal information by fraudsters for malicious reasons, the internet can prove to be a dangerous tool.

Professional Ethics and Responsibilities in Computer Technology

6 pages (1506 words) , Download 1
(2011, August). Legal Ethics. Retrieved February 19, 2012, from http://www.law.duke.edu/lib/researchguides/legale 10 Introduction Every aspect of information and communication technology focuses on at least one ethical dilemma. From email services to Facebook websites, information technology developers and users are unacquainted with the balance between ethics and revenue struck by service providers.

research paper

8 pages (2008 words) , Download 1
OS comprises of certain characteristics which are briefly explained as the multiuser functionality helping two or more users to execute the program simultaneously. Multiprocessing function, as a major feature of OS, supports a process which is running on more than one computer.

Research

4 pages (1004 words) , Download 1
The current and future state of the communications industry depends solely on these applications. It is, therefore, particularly vital to have the groups and people involved address some of the constraints that face this field. They may have the field’s scalability, efficiency and flexibility improved so as to facilitate better functioning of all the operations in place.

Advanced Information Systems Management

7 pages (1757 words) , Download 1
Ku (2010, p. 1085) explains that advancement in information and communication technology has led to increased adoption and implementation of information systems within business organizations, institutions, public agencies, companies and small businesses. The implementation of information system is basically motivated by the efficiency and effectiveness which is provides in the management of data and information and the enhancement of communication processes (Khodakarami and Chan, 2011, p.
There are no free documents on this page. Please proceed to the next page and filter your search results again.
1 - 50 results of 5984 items