SEARCH RESULTS

YOU WERE LOOKING FOR :History of Computers and Personal Computing

Essays 31 - 60

1990s' Industrial Marketing

In eighteen pages the 1990s is examined within the context of the changes in industrial marketing with the personal computing indu...

The New Software at the York Police Department

and schedules. Stair, Reynolds & Reynolds (2009) explain in respect to York: "No longer do officers need to spend hours waiting on...

Profiles IBM Apple Dell

This essay provides a brief history and recent performance of IBM, Dell, and Apple Computer. The paper begins with a discussion of...

Medical Technology and Computers

In seven pages medicine and its computer history are considered with such concepts as telemedicine, computer aided surgery, and 'v...

Saudi Arabia and Apple Computers

of extremely successful computers, which brought its U.S. market share back up to 10%. Overseas, it has maintained dominance, howe...

Computer Aided Graphic Design

foci) is constant. The parabola is a set of points in a plane that are equal distances from a given line (the directrix) and a gi...

Education and Computer Uses

In five pages the evolution of computers in the field of education is traced to the 1944 MARK 1 installation as discussed in the J...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Animation in 3D

for a 2D presentation is called cel animation (Doyle, 2001). The third dimension is added through the processes of modeling, text...

End User Computing Risks and Benefits

track a users every move. Some do not like to use such tactics as it seems to be underhanded and trust can then become an issue. A...

Windows: A Key Technology in the Development of Multimedia Computing

Such was not to immediately be the case, however. DEC canceled the project in its preliminary stages and the world would have to ...

Art History Questions

content, concept and style of art used during another chosen time in history. Michelangelo Buonarroti (1475-1564) was one of the...

Dell Computer's Corporate History

Dell had reached the opportunity to go public, which occurred in 1988. It was during that year that Dell had as many as six hundr...

'Reason as the law of the World' According to Hegel

In five pages this paper examines Hegel's philosophy within the context of the statement 'The sole thought which philosophy brings...

The Rise and Fall of the Third Reich by Shirer

In fifteen pages Shirer's text is critiqued in terms of the way in which the author uses his own personal experiences along with v...

Wild Swans and the Realities of Communism

"Slaves Who Have No Country of Your Own-Ruled by Different Masters (1945-1947)" (Chang, 1991, p. 75). This title conveys the attit...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

Administrator Dilemma

university policy that clearly states personal business is not to be conducted upon school computers. Nick had more than enough r...

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Overview of the Merger Between IBM and Lenovo

The sharp decline in sales was expected following the turn of the new century as many businesses rushed to replace aging PCs with ...