YOU WERE LOOKING FOR :History of Computers and Personal Computing
Essays 31 - 60
In eighteen pages the 1990s is examined within the context of the changes in industrial marketing with the personal computing indu...
and schedules. Stair, Reynolds & Reynolds (2009) explain in respect to York: "No longer do officers need to spend hours waiting on...
This essay provides a brief history and recent performance of IBM, Dell, and Apple Computer. The paper begins with a discussion of...
In seven pages medicine and its computer history are considered with such concepts as telemedicine, computer aided surgery, and 'v...
of extremely successful computers, which brought its U.S. market share back up to 10%. Overseas, it has maintained dominance, howe...
foci) is constant. The parabola is a set of points in a plane that are equal distances from a given line (the directrix) and a gi...
In five pages the evolution of computers in the field of education is traced to the 1944 MARK 1 installation as discussed in the J...
the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...
for a 2D presentation is called cel animation (Doyle, 2001). The third dimension is added through the processes of modeling, text...
track a users every move. Some do not like to use such tactics as it seems to be underhanded and trust can then become an issue. A...
Such was not to immediately be the case, however. DEC canceled the project in its preliminary stages and the world would have to ...
content, concept and style of art used during another chosen time in history. Michelangelo Buonarroti (1475-1564) was one of the...
Dell had reached the opportunity to go public, which occurred in 1988. It was during that year that Dell had as many as six hundr...
In five pages this paper examines Hegel's philosophy within the context of the statement 'The sole thought which philosophy brings...
In fifteen pages Shirer's text is critiqued in terms of the way in which the author uses his own personal experiences along with v...
"Slaves Who Have No Country of Your Own-Ruled by Different Masters (1945-1947)" (Chang, 1991, p. 75). This title conveys the attit...
programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...
Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...
How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...
This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...
Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...
A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...
In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...
resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...
any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....
In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...
university policy that clearly states personal business is not to be conducted upon school computers. Nick had more than enough r...
a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...
do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...
The sharp decline in sales was expected following the turn of the new century as many businesses rushed to replace aging PCs with ...