Result for Category Information Technology : 5290 papers

Free only
Studentshare can solve a range of IT problems. Just join our amazing database of Computer Science academic papers. Whenever you face a challenge in the face of scientific and practical approach to computation and its applications, the samples of other students’ works will help you to understand the essence of this subject. With the help of free Information Technology material such as personal statements, essays, research papers, case studies, problem solutions, and outlines, you will raise your skills worth of Massachusetts Institute of Technology, Stanford University or Carnegie Mellon University, Harvard or Berkeley.

Information Technology Positioning Nike Company for Competitive Advantage

3 pages (753 words), Download 12
Free
Information Technology Positioning Nike Company for Competitive Advantage Introduction: The use of information technology (IT) in the modern times can be found to provide huge benefits in the functioning of an organization. The successful performance of the Nike Company to a large extent depends on the use of the information technology.

Microsoft Project Research Report

3 pages (753 words), Download 4
Free
By identifying and influencing the durations taken to complete different milestones, project manager can steer the progress of project accordingly and divert resources to speed up the processes (Marmel, 2011). This software offers various tools that aid manager in devising plan and methodologies for project to follow throughout its life cycle for measurement of progress and recording proportionate costs.

Cloud computing

3 pages (753 words), Download 4
Free
For along time, computers have dominated the business world. Computers have made business running quite easy and fast. However, business people without sufficient knowledge in information technology have suffered. There are occasional losses of important data and breakdown of machine and these things have brought businesses down.

Case Study 1: Florida Department of Management Services, Part I

3 pages (753 words), Download 4
Free
The information system network transmitted the entire information that was collected from government agencies to a specialised data centre in Tallahassee. The system relied on proprietary network architecture as well as mainframe at the data centre, Tallahassee.

Why Is It Said That Packet Switching Employs Statistical Multiplexing?

3 pages (753 words), Download 3
Premium quality
Multiplexing refers to a resource that is shared among many users and they are of two types; The Time Division multiplexing where periodically only one user gains full capacity control at a time (TDM) and the Frequency Division Multiplex (FDM) where all users get exclusive control of the link capacity.

A Telemedicine opportunity or a distraction

8 pages (2008 words), Download 3
Telemedicine is a health care delivery technique that applies high-speed telecommunications structures, computer technology and dedicated medical cameras to survey, diagnose, treat and instruct patients at a distance. This paper, therefore, will analyze Telemedicine a model company and in the process highlights its goals and strategies of implementing telemedicine in its processes.

Sony: The World's largest Data Breach?

3 pages (753 words), Download 3
Free
However, in some cases, lack of proper security mechanism and controls are to blame for such hacking of sites. The Sony security breach on its online video game network may be considered as one of the cases, where companies fail to maintain the required security against such hacking threats, breaching client’s security as happened in one of the largest security breaches involving Sony Corp.

Identifying Success Factors of Implementing ERP in Small Organisations

48 pages (12048 words), Download 2
The findings of this study identified the success factors, grouping them into three chronological categories; project foundation, project team, and project implementation. Table of Content CHAPTER ONE: INTRODUCTION Background ERP systems are computer software packages that enable companies to manage all of their operations, such as sales, manufacturing, inventory, accounting, etc.

Advantages and disadvantages of measures use to protect operating system

7 pages (1757 words), Download 2
Information technology is one of the most important fields in computer science. Basically, operating system is the system software. Software supports the basic functions of a computer. Operating system consists of data and programs that manages and run the computer hardware and provide common services for the execution of application efficiently.

People have become overly dependent on technology

3 pages (753 words), Download 2
Premium quality
Computers, cell phones, Blackberries, iPods, fax machines, laptops or household gadgets like washing machines, robotic vacuum cleaners – it would be unheard of for the average American to go one day without using some of these gadgets.

Human computer interaction

15 pages (3765 words), Download 2
Bush The author of this paper is a respected scientist in the scientific community of the Allies. The paper is set in the immediate aftermath of the Second World War and the author concentrates on the large amounts of learning and research produced during the war effort and the inaccessibility posed by the large volumes of information available.

Risk incidence occurrence solution

3 pages (753 words), Download 2
In addition, poor information flow may result in improper patient identification, inadequate control and organization of the workforce, and improper documentation.Information flow is important in any health care facility because it ensure smooth communication between different departments and between patients and service providers.

Windows Server Deployment Proposal. New Features of Windows Server 2012

7 pages (1757 words), Download 2
Premium quality
Installation of a Server Core provides performance and security advantages which in the past one had to make it a personal commitment. Windows Server 2012 has changed all this since currently we have choices.

Facebook

3 pages (753 words), Download 2
Free
Facebook was launched in the year 2004 by Mark Zuckerberg, since then the company has grown from a small firm that served some of the most prestigious institutions in the united states of America to the publicly traded company presently with an estimated net worth of about 50 billion dollars.

How To Build Your Own Computer

6 pages (1506 words), Download 2
Hardware components like processor, motherboard, memory and hard disk drive are the most significant parts of a PC. Other components like CD Rom/DVD Rom/CD writer/DVD writer, speaker, printers and scanners can be used according to requirement of user. However, keyboard, mouse and monitor are input and output devices that are equally crucial to run a computer.

Information Systems in Healthcare

6 pages (1506 words), Download 2
The aspect of Information Technology (IT) is considered to be quite imperative for healthcare units as it helps to detect or identify the problems being witnessed by a particular patient. This definite aspect also helps the healthcare units to serve the patients with appropriate form of treatments (Bose, 2003).

Internet Firewall Security

8 pages (2008 words), Download 2
Websites like Amazon and Ebay have taken online selling to the next level. When there are so many pros, one ought to fine cons too. There have been several instances of hacking in the past; recently the American intelligence website was hacked, credit card numbers are stolen on a regular basis.

Computer Science

4 pages (1004 words), Download 2
Free
I always fancied myself with computers since my childhood. Because I grew up in a small town in Vietnam, a place where computers was not introduced to the fullest at the time of its inception and was considered wholly as a luxury instead of a necessity, it was curiosity plus a self driven need to learn about this new technology.

IIS Networking Infrastructure Design.

11 pages (2761 words), Download 1
Intelligent Imaging Solutions (IIS) is a corporate organization that designs, engineer, manufacture and distribute consumer-oriented navigation systems (GPS). There are two basic divisions of the corporate operations; consumer products and military products.

Iphone Network and Technology

10 pages (2510 words), Download 1
The indigenous features and offers of the Apple company, however, make sure that few competitors can match the product in terms of quality, features, cost, and ease of operation. Apple is a relatively new player in the field, and a few years back it was not even predicted to enter the game.

Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements

10 pages (2510 words), Download 1
This chapter therefore, focuses on the research methodology and design employed to achieve the objectives of this study. The research methodology employed assisted in obtaining data relating to the current business processes in the Department of Human Settlements (DHS), that is to capture the functional requirements of the system and the users’ perceptions of the proposed system to develop an internet based housing demand database system for the KwaZulu-Natal DHS for improved housing service provisioning.

IT Coursework Based on the Research Topic

3 pages (753 words), Download 1
In this age of information technology, computer software has become a very important element of almost all the kinds of business. In this scenario, software engineering is linked with advanced technology.

The Impact of the Cloud on Mobile Devices

14 pages (3514 words), Download 1
A cloud is generally the processing hardware of the computational application. The use of mobile devices for such applications has substantially increased. This paper will evaluate the impacts of the cloud on the mobile devices as well as pros and cons of this application.

Profit Implications of Malware

15 pages (3765 words), Download 1
Elizondo, Computational Intelligence for Privacy and Security). However a malware will not specifically fall into either these groups as some malwares fall into more than one category. The most common groups are virus, worms Trojan horse, rootkit, spywares and adware.

The Impact of Social Media on the Education Sector

14 pages (3514 words), Download 1
t active and prevalent of the trends of the society. The phenomenon of Social Media can very well be termed as a trend setter as the norms of the human society. This research is aimed at analyzing what Social Media is and what integral importance it has when embedded with the education sector.

Quantum: Computing the Future

20 pages (5020 words), Download 1
Quantum computing is a significant area of present-day research aimed at establishing computer related tools and machines based on the rules and regulations of quantum theory. In this scenario, the quantum theory outlines the environment and performance of material and energy on the quantum, both at the atomic and subatomic level.

Wireless Security

12 pages (3012 words), Download 1
Wireless networking offers wonderful advantages and opportunities to get easy access to communication and collaborative services. Due to this reason, it has been evolving quickly around the world. In addition, most of the modern technologies today are completely reliant on wireless communication.

Cloud Computing

19 pages (4769 words), Download 1
Abstract Technology has integrated deeply in the lives of humans. The number of internet users increase exponentially every year. It is due to this reason that companies face difficulty in meeting the increasing requests of their customers. Companies need to expand their IT infrastructure to meet the amplifying needs of the customers; however, the increased infrastructure might only be useful for a limited time period.

Your thoughts concerning an intranet where employees can learn and mutually inspire each other

7 pages (1757 words), Download 1
Intranets Name: Institution: Introduction An intranet is an internal computer network used within an organization. Unlike the internet that connects computers globally through the World Wide Web, intranets use computers among other similar media to connect different departments and sections of the organization to a central database thus facilitate the sharing of information among other resources.

Two Financial Giants Merge

3 pages (753 words), Download 1
Majority of these links required for integration are created between process components, as well as the control layer, in which control of the systems via supervision receives data from devices across the two companies. For example, where component Y needs information or data from component Z, a new link is formed on the control and business management layers of the two systems.

Specification and Design Report 2

3 pages (753 words), Download 1
Free
The people who are expected to use this VoIP service are the nurses who respond to emergencies, fire fighters, the police and the victims of the emergencies. The sponsors of this project who are an emergency response unit found out that they almost always reached the scene of the emergencies being late, and when they arrived there, they had to wait to in order for other stakeholders to arrive.

Information Systems Management in E-Government

8 pages (2008 words), Download 1
Online governance in UK is not a simple unitary process; it is a multidimensional information and communication technology (ICT) framework which has to be adjusted with the existing complex government structure. This structure consists of various organisations with their respective targets.

Develop business aptitude skills

3 pages (753 words), Download 1
Free
In relation to the concept of business networking, the process can be termed as a practice of building mutual and beneficial relationships with different business organizations along with potential customers within a particular marketplace (Wickham & Wickham 3-78).

Introduction About Information Technology in Education

6 pages (1506 words), Download 1
According to the paper Information Technology is progressing so rapidly that occasional workshops are not enough for training. Teachers need constant awareness and training sessions to utilize Information Technology resources in institutes. Consequently many universities have proposed that this problem can be resolved by introducing another faculty for training teachers.

Organizational Structures

4 pages (1004 words), Download 1
Hence, there is no denying the fact that the organizational structures play a pivotal role as to whether the specific organizations are able to meet their organizational goals or not. The earlier organizations were woven around hierarchical structures that no wonder stand to be anachronistic in the contemporary context where the storage, processing and exploitation of data play a key role in assuring organizational profitability and sustenance.

IT and the Worklife/Homelife Balance

3 pages (753 words), Download 1
Free
There have lots of benefits associated with the arrival of technological advances, but there have been consequences as well. In the past employees enjoyed the freedom of knowing that once that clock hit the 5:00 P.M. the workers were out the door and into their comfort of their homes.

The Office TV Show on

4 pages (1004 words), Download 1
Premium quality
Verbal communication is defined as the oral and written communication between people. Non-verbal communication is the type of communication that is neither spoken nor written.

SAP ERP Implementation [ A Case Study of Nestle USA]

4 pages (1004 words), Download 1
This perception proves to be true a lot of times, though not always. Adopting an ERP system for a company helps the firm transform itself by business process reengineering. ERP implementation also helps the company synchronize the systems and working even when the systems are separated by distance.

Harley-Davidson Technology Strategies

3 pages (753 words), Download 1
# 1 Talon, a proprietary dealer management system, handles inventory, vehicle registration, warranties and point of sale transactions in all Harley-Davidson dealerships. Talon aids in performing time-saving tasks such as checking dealer inventory and generating parts orders, as well as allowing the company to review and analyze information globally.

Personal Security and The Internet

12 pages (3012 words), Download 1
The internet has made the traditionally manual works simpler and cost effective. However, the internet has its ugly side too. Ranging from its vulnerability of attacks by viruses and malware to intrusion of personal information by fraudsters for malicious reasons, the internet can prove to be a dangerous tool.

research paper

8 pages (2008 words), Download 1
OS comprises of certain characteristics which are briefly explained as the multiuser functionality helping two or more users to execute the program simultaneously. Multiprocessing function, as a major feature of OS, supports a process which is running on more than one computer.

Professional Ethics and Responsibilities in Computer Technology

6 pages (1506 words), Download 1
(2011, August). Legal Ethics. Retrieved February 19, 2012, from http://www.law.duke.edu/lib/researchguides/legale 10 Introduction Every aspect of information and communication technology focuses on at least one ethical dilemma. From email services to Facebook websites, information technology developers and users are unacquainted with the balance between ethics and revenue struck by service providers.

Research

4 pages (1004 words), Download 1
The current and future state of the communications industry depends solely on these applications. It is, therefore, particularly vital to have the groups and people involved address some of the constraints that face this field. They may have the field’s scalability, efficiency and flexibility improved so as to facilitate better functioning of all the operations in place.

IT and Entrepreneurship

5 pages (1255 words), Download 1
If a gateway to the internet exists, then it can no longer be an intranet, but an extranet. It uses internet protocols, network connectivity and other systems to transfer data and information within an organization. The major use of intranet is in delivering applications and tools needed for internal communication.

Advanced Information Systems Management

7 pages (1757 words), Download 1
Ku (2010, p. 1085) explains that advancement in information and communication technology has led to increased adoption and implementation of information systems within business organizations, institutions, public agencies, companies and small businesses. The implementation of information system is basically motivated by the efficiency and effectiveness which is provides in the management of data and information and the enhancement of communication processes (Khodakarami and Chan, 2011, p.

Open Office Essay

5 pages (1255 words), Download 1
In this scenario, the source code is an actual code of a program written in a programming language. Basically, the open source code is normally developed as a shared effort in which programmers collectively work on the code and share the modification among the community.

Consider designing a system that needs to store information about vehicles and drivers employed by "Speedy wheels", a delivery c

3 pages (753 words), Download 1
These services may include but not limited to the provide the pick and drop services, goods transportation services, tour operations, event transportation services etc. In order to meet the business requirement, Speed Wheels has employed hundreds of drivers in various categories like full time, part time and freelance and operates on round-the-clock basis.

The changing nature of advertising from traditional print and broadcast to interactive and web based

5 pages (1255 words), Download 1
Over the years fundamental changes have been happening in the advertising industry where audiences are moving from mass media to niche media which have indisputable trends towards disintermediation, fragmentation and greater consumer control which are affecting the media.

Data mining

17 pages (4267 words), Download 1
It is vast finding its use in marketing, managing inventory, management of quality, and managing of risks associated with loaned money. Data mining application have also been seen in use in biological use as seen in DNA testing and gene analysis in living organisms.

Enterprise Architecture: Implementation Description

3 pages (753 words), Download 1
The environment under which companies or business organizations operate in is always in constant change. This means that the managers should always introduce new enterprise solutions, which can directly contribute to the linkage to the measures of improvement of business practices.
There are no free documents on this page. Please proceed to the next page and filter your search results again.
1 - 50 results of 5290 items