Papers on Computers & Technology
Business In Computers
Words: 592 - Pages: 3.... these students move to, they are able to
link up and find everything they need. They can find links like "Creative
Ideas", a place they can go and retrieve ideas, innovations, inventions, patents
and licensing. Once they come up with their own products, they can find free
expert advice on how to market their products. There are easily accessible
links to experts, analysts, consultants and business leaders to guide their way
to starting up their own business, careers and lives. These experts can help
push the beginners in the right direction in every field of business, including
every way to generate start up revenue from better managemen .....
Download This Paper
|
The Birth Of Fiber Optics-To It's Popularity
Words: 1034 - Pages: 4.... Medical team, Roth and Reuss of Vienna used bent glass rods to illuminate the bodies' cavities.
In 1895, french engineer Henry Saint-Rene designed a system of bent glass rods for guiding light images in an attempt at early television.
In 1898, American David Smith applied for a patent on a bent glass rod device to be used as a surgical lamp.
In the 1920's, Englishmen John Logie Baird and American Clarence W. Hansell patented the idea of using arrays of transparent rods to transmit images for television and facsimiles respectively.
In 1930, German medical student, Heinrich Lamm was the first person to assemble a bundle of optical fi .....
Download This Paper
|
Secure Electronic Transactions
Words: 1023 - Pages: 4.... transactions with other country’s. Those countries can provide you with the best exchange rate of your currency into the exchange of your merchants currency.
Shopping online can be very private as long as you use a secure browser. This software allows you to navigate through the web. Your browser should have industry security standards, such as Secure Sockets Layer (SSL) or (SET) Secure Electronic Transaction. By having these security standards on your browser, it allows the transaction information being sent back and forth from the reseller to be encrypted. Most computers already come with this browser pre-installed. If this is n .....
Download This Paper
|
INTEL Knows Best? A Major Marketing Mistake
Words: 1773 - Pages: 7.... by Intel created an
uproar among users and owners of the defective chips. Six weeks after Mr.
Nicely went public, IBM, a major purchaser of Pentium chips, stopped all
shipments of computers containing the defective Pentium chips. Intel's stock
dropped 5% following this bold move by IBM. IBM's main contention was that it
puts its customers first, and Intel was failing to do this.
Intel's handling of this defective chip situation gives rise to many
questions. During the course of this paper I will address several of them. The
first of which is how did a company with such a stellar reputation for consumer
satisfaction fall into .....
Download This Paper
|
Private Cable TV
Words: 3180 - Pages: 12.... TV-broadcasting
system.
While we were searching for datas, we discovered the gap that exists in cable-
covering between France and the two other countries. What are the main reasons
of this delay? Are they political, financial or cultural? We will try to answer
these questions in our paper. But we will first define the different technical
terms that we are going to focus on. Then we will developp the birth of private
channels, their regulations, laws and financing in the different countries.
2. BASICS
In our paper you will find the following technical terms:
¥ terrestrial broadcasting: this is the basic technology used to broadcast rad .....
Download This Paper
|
Technology Spontaneously Approaching `Humanity' With The Passage Of Time
Words: 2045 - Pages: 8.... own unique way, rising
above their ‘specifications' to actually become human.
By definition, tools are designed specifically for certain tasks, and as
technological tools, the T800 and the replicant are deigned to meet specific
specifications. In Terminator 2, the T800 is a multipurpose cyborg assigned to
save John Connor, given a series of “mission parameters,” initially
characterized by his computer logic. He often advises John based on permutations
of the T1000's next move, similar to the way a chess computer decides what move
to make next. Just as the T800 is designed to perform solely as a unemotional
computer, the ‘replican .....
Download This Paper
|
Airbags - Pop Em' Or Keep Em'
Words: 1314 - Pages: 5.... that something is
drastically wrong. Mica is dead.
At last count, this scenario has happened 31 times. How many more times
does it have to happen before the automotive industry does something about it?
Children are not the only victims, though. Small women and the elderly have
also been killed as a result of airbags. The time has come to ask ourselves,
"Do airbags really work?"
First off, most people feel that airbags are a great safety device.
They let people walk away from an accident without a scratch, right? They
protect everybody, right? People don't need seatbelts if their car has an
airbag, right? Wrong. Airbags cause i .....
Download This Paper
|
The Internet
Words: 1386 - Pages: 6.... like Calvin Klein have webpages in which clothing can be purchased by just supplying a credit card number (Gorman 30).
can help with a lot of problems. For parents, can be extremely helpful. At certain websites, such as http://www.stlmoms.com, parents can get help about child illnesses, breast-feeding, pregnancy, childcare, or any other parenting problem that may arise (Licklider C1). Another thing that is very helpful is that if something were to go wrong with a computer, chat rooms area available that have many people in them to help fix the computer, as long as it is something within reason (Gay 1).
Internet in the classroom i .....
Download This Paper
|
The Computer Underground
Words: 10572 - Pages: 39.... that one
accept the realist textual readings of those with the power to interpret
and stigmatize behaviors as inappropriate. "Moral crusades" that lead to
definitions of criminalized deviance tend to reduce the meanings of
polysemic acts to unidimensional ones that limit understanding of both the
nature of the acts and their broader relationship to the culture in which
they occur. This has occured with the criminalization of computer
phreaking and hacking. In this paper, we examine the computer underground
as a cultural, rather than a deviant, phe- nomenon. Our data reveal the
computer underground as an invisi- ble commu .....
Download This Paper
|
Cyberspace
Words: 1330 - Pages: 5.... it. Though it appears to have sprung up overnight, the inspiration of free-spirited hackers, it in fact was born in Defense Department Cold War projects of the 1950s.2 The United States Government owns the Internet and has the responsibility to determine who uses it and how itis used.
The government must control what information is accessible from its agencies. This material is not lawfully available through the mail or over the telephone, there is no valid reason these perverts should be allowed unimpeded on the Internet. Since our initiative, the industry has commendably advanced some blocking devices, but they are not a substitut .....
Download This Paper
|
Navigate:
« prev
20
21
22
23
24
next »
|
|
Members |
|
|
|