Papers On Hardware, Software & Industry
Page 22 of 31
|
|
Properties Which Affect Computer Performance / CPU Properties
[ send me this paper ]
A 5 page examination of the current hardware and operating system factors which affect computer performance. Emphasis is on the differences in Pentium processors. Bibliography lists four sources.
Filename: Cpuchar.wps
Purchasing a New Computer and Software
[ send me this paper ]
An 8 page paper which discusses various
computers and anti-virus software, examining the costs and capabilities of various brands
and models. The three computers examined are Dell OptiPlex GX400, Gateway
E-1600XL, and Sys Performance 1333TD. Bibliography lists 6 sources.
Filename: RAcomptr.wps
Recent Technologies For Computer Software
[ send me this paper ]
A 10 page paper. Software developers have recognized the need to create higher quality software in less time. This has led to new developments in the field. One of the recent developments was the adoption of UML as a standard language. This allows the use of component iteration, which saves a great deal of time in producing a new application. UML and other aspects are discussed. Bibliography lists 6 sources.
Filename: PGuml.wps
Reconciling Mintzberg and the Hybrid Manager
[ send me this paper ]
A 4 page paper weighing the concept of the hybrid manager for consistency with Mintzberg’s stance that managers should know all facets of their business. The hybrid manager is one who has the ability to manage but who also is technically competent and can provide management direction in problem resolution. The paper concludes that the concept absolutely is consistent with Mintzberg’s position, especially in IT. Bibliography lists 5 sources.
Filename: KSmgmtMintz.rtf
Remote File Logging Systems
[ send me this paper ]
This 7 page paper looks at the role of remote file logging, the way in which it works and the security advantages in the case of a disaster. The bibliography cites 4 sources.
Filename: TEfillog.wps
Research Proposal; Why Do Collage Students Have a Permissive Attitude Towards Piracy?
[ send me this paper ]
This 10 page paper is an outline research proposal, put together to look at why collage students appear to be very accepting of piracy in software, music and video/DVD formats. The paper has a research question, justification of the question, a literature review and a methodology. The bibliography cites 13 sources.
Filename: TEpiracy.rtf
Review of "Can Ethernet Span LAN, MAN and WAN?"
[ send me this paper ]
A 5 page paper
discussing the possibility of Gigabit Ethernet becoming as standard in long-distance data
communications as it has been in far more narrow applications. The author of the article
addresses what superficially appears to be a far-fetched notion and examines it with clarity from
several perspectives. He considers LAN, WAN, MAN, cost, and the fact that more people are
familiar with Ethernet than with other approaches, yet manages to present a balanced view. He
compares Gigabit Ethernet with packet over SONET, ATM, DTM and DPT. Bibliography lists 7
sources.
Filename: KSEtherArt.wps
Reviews of Linear Programming and Queueing Application
Articles
[ send me this paper ]
A 7 page paper analyzing two journal articles for the presence and treatment
of critical points. The first article discusses a linear programming article, "Stripping
Coupons with Linear Programming" (Allen, Thomas and Zheng, 2000); the second is a
report on a queueing application, "Optimization of discrete event systems via simultaneous
perturbation stochastic approximation" (Fu and Hill, 1997). The same analysis steps are
applied to each article. Bibliography lists 2 sources.
Filename: KS-ITreview.wps
Secure IT systems for an airline company
[ send me this paper ]
A paper which considers various aspects of security when setting up a database for a company branching into e-commerce, with specific reference to the protection of customer data and the extent to which individual users should have access to the system as a whole. Bibliography lists 8 sources
Filename: JLnetsec.rtf
Security Blankets and Computers:
[ send me this paper ]
This 7 page paper discusses the importance of using security blankets to prevent the circumventing of computer security and protecting digital copyrights. Furthermore, this paper offers insight into the vulnerabilities of security blankets and determining the appropriate countermeasures. Biblioography lists 10 sources.
Filename: GSSecure.rtf
The Paper Store Enterprises, Inc. Gladly Accepts:
Request A Free
Excerpt From Any Paper Before Ordering!
|