Make
Your Selection Below:
Papers On Hardware, Software & Industry
Page 3 of 55
|
|
Threats & Protections For Computer Operating Systems
[ send me this paper ]
A 15 page paper discussing and analyzing computer security and measures that must be taken in order to protect a computer's operating system. Bibliography lists five sources.
Filename: Comptp.doc
Low-Voltage Circuit Design
[ send me this paper ]
A 42 page paper discussing basic designs enroute to
devising a project focusing on voice recognition circuitry and control. The intended application is
not ultimately intended to be that used for voice-to-text designs, though it could be. Rather, the
project focus is more that designed as a security measure, such as that ensuring that the user of a
cellular telephone is indeed the subscriber to the cellular service on which that specific telephone's
service is billed. Voice recognition can be seen to be approaching a standard in the future. That
standard seems to be far in the future, but it likely will be attached to natural language and context
sensitivity. In order to be truly useful, it will need to be based on the simplest circuits achievable.
Includes 16 figures, bibliography lists 25 sources.
Filename: KSlowVcirc.wps
Sound Wars: Which New Technology Will Succeed?
[ send me this paper ]
A 7 page research paper that examines the current technological innovations to the home recording industry. The writer examines several digital formats including MiniDiscs and recordable CDs as well as discussing the factors that will affect which format eventually will prevail. Bibliography lists 5 sources.
Filename: 90record.rtf
MICROSOFT, SECURITY AND PALLADIUM
[ send me this paper ]
This 5-page paper, modeled after the technique of a white paper, analyzes Microsoft's new venture, Palladium. The essay describes the concept and its impact and also examines the downsides and criticism of Palladium. Bibliograpy lists 2 sources.
Filename: MTpallid.rtf
Software Programs for Security on the Internet
[ send me this paper ]
This 9 page report discusses security issues relating to the Internet both in terms of protecting a web site and in providing secure data transmission for customers. Consumers want to assure that their credit card numbers do not fall into the hands of crooks. Vendors want to assure that they are paid for their services and products without concerns relating to credit card fraud. Numerous security issues related to Internet sits and the companies that maintain them. Bibliography lists 7 sources.
Filename: BWsecure.wps
Influences of the Economy on Intel and AMD
[ send me this paper ]
A 5 page paper discussing how economic
conditions between 1995 and 2000 affected both companies. The economic conditions of those years were more than kind to both AMD and Intel, but it is likely that both will post much lower
profits in the current fiscal year and perhaps beyond. As are their PC-manufacturing customers, both companies are searching for new directions. Prosperity in the near term will depend as much on sound management practices as on continued PC sales. Bibliography lists 5 sources.
Filename: KSIntel-AMD.wps
Intel's Pentium Microprocessor Family
[ send me this paper ]
An 8 page discussion of the Pentium microprocessors that had been introduced by Intel since 1993. Includes performance information for Pentium, Pentium Pro, Pentium MMX, and Pentium II. Particular emphasis is placed upon the merits of Pentium II. Bibliography lists six sources.
Filename: Pentiums.wps
New Developments in the High-Tech Race
[ send me this paper ]
2 pages in length. Reviews an article by Keith Diefendorff describing Intel’s race on the new x86 architectural extensions. Intel, normally the leader in all the high tech races that appear on a daily basis, is now actually running to catch up to a new leader. Close on the heels of AMD in the x86 architectural extension race, it looks like Intel will be catching up quickly if they have not already.
Filename: JGA3view.rtf
The Intel Corporation
[ send me this paper ]
This 5 page paper provides an overview of this well known firm and pays particular attention to its role as a socially responsible company. The company's mission statement is included and several financial quotes are provided. Bibliography lists 6 sources.
Filename: SA007tel.rtf
Gender Bias In Computer Conferencing
[ send me this paper ]
The new technology, specifically
computer technology, is growing exponentially. The number of women able
to access and utilize this technology is also increasing. World Wide
Web, fax, video and e-mail enable the quick dissemination of information
and immediate communication worldwide. This 10 page paper argues that
women are at a decided minority within in the growing field of computer
technology and information technology . The inclusion of women will
require a concerted effort to overcome the gender bias and stereotypes
that have haunted those wanting to become involved in aspects of the
field on a managerial level, such as conferencing. Bibliography lists
12 sources.
Filename: KTntbias.wps
The Paper Store Enterprises, Inc. Gladly Accepts:
Request A Free
Excerpt From Any Paper Before Ordering!
Be
sure to also visit:
Term Paper Help On
File, 12000 Papers,
Research Papers Dot Net,
Essay Site, Paper
Geeks, Paper or Essay
Finder, The Essay Page,
Reports and Papers,
Report Finders, 12000
Papers, Real Papers, E
- Coursework, Choose
a Paper,
Pick a Paper, Paper
Download, & Expert
Term Paper Advice
(Click Here For MORE Term Paper &
Research Paper Help Sites!)
|