SEARCH RESULTS

YOU WERE LOOKING FOR :21st Century Computing

Essays 181 - 210

Gore Vidal: “Creation”

Herodotus (Vidal). Herodotus was an actual historical figure, known as both the "father of history" and the "father of lies." Here...

Nanotechnology and Its' Use in the Human Body; It is Desirable or Ethical?

potentially large number of benefits there are also a wide range of ethical and acceptability issues that need to be considered a...

Mattel; Financial Assessment

fall. In many companies this would have resulted in share prices plummeting and investor confidence declining sharply. However, in...

Ethics and Radiology

thereby avoid "the use of ionizing radiation entirely" (Lozano). Patients are seldom provided information regarding the risks an...

One-To-One Computing

recent literature. However, in order to appreciate the significance of the one-to-one midwifery model, which the McCourt, et al, s...

Early US Penitentiaries and 3 Concepts

In three pages this paper examines 3 concepts on 18th century penitentiaries with Pennsylvania and the Quaker influence the primar...

Report on Distributed Object Computing

between separate and independent distributed objects while still providing for encapsulation and hiding of the internal object str...

Parallel Computing and its Evolution

"first commercial machine with floating-point hardware ... capable of approximately 5 kFLOPS" (Wilson, 1994; p. Parallel), or oper...

Windows: A Key Technology in the Development of Multimedia Computing

Such was not to immediately be the case, however. DEC canceled the project in its preliminary stages and the world would have to ...

Henrik Ibsen's A Doll's House as a Reflection of 19th Century Social Issues

In four pages this paper examines how the playwright represents social issues in this 19th century dramatic play....

Storage Capabilities and the Impact of Quantum Computing

In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capab...

1990s' Industrial Marketing

In eighteen pages the 1990s is examined within the context of the changes in industrial marketing with the personal computing indu...

Peace, Power, Leadership, Vladimir Lenin and Mohandas K. Gandhi

In five pages this paper discusses the obvious differences but also notes surprising similarities between these 20th century leade...

John Stephens' Incidents of Travel in Yucatan

This 19th century text is analyzed in ten pages. Three sources are cited in the bibliography....

Historical Significance of Heart of Darkness by Joseph Conrad II

In five pages the twentieth century relevance of Heart of Darkness is considered in this historical perspective of Joseph Conrad's...

Digital Dentistry and X Ray Techniques

In four pages this essay focuses upon CDR, or the Computed Dental Radiography process. Seven sources are cited in the bibliograph...

Supervision In The Workplace: Teamwork And Communication

and teamwork. For the most part, the concept of business communication - when implemented correctly - can be the difference betwe...

Diagnostic Capabilities of CT Scans

with acute appendicitis may be admitted to the hospital for observation, this period of observation can often be the time that is ...

New Business and Thin Client Computing

the business itself, which is customer-driven. A large number of patient insurance billing records need to be processed and gener...

Examination of Computer Ethics

an apparatus for automatic control; and that its input and output need not be in the form of numbers or diagrams. ...... Long befo...

Business Computer Sales Outlook

In ten pages this paper examines small to medium size business in a consideration of the impact of computing changes on them. Elev...

P2P Connections, Grid Computing, and Their Impacts

In five pages this paper discusses how the future of computers has been impacted by P2P connections and grid computing. Ten sourc...

IRA Actions in Great Britain and Terrorism

are made define an abstract concept, there will always be some groups who are able to find exceptions to the definition because of...

Internet Terrorism and Freedom

In twenty pages this paper examines the Internet's anonymous servers in terms of advantages and disadvantages and discusses releva...

Twentieth Century Women's Changing Roles

This paper considers 20th century women's changing social roles with employment and family position among the topics discussed in ...

Background and Analysis of the UNIX OS

and users the opportunity to use their computer systems to their maximum advantage. Its probably safe to say that if not for UNIX,...

Peer to Peer Network and Client Server Network Computing

there need to be security feature to protect from external hackers as well as the need to ensure that information is only availabl...

Magdelena and Balthasar by Steven Ozmet and Religious Controversies

Redeemer" (Ozment 14). As a result, Magdalena and Balthasar not only put their faith in good health in the various medical remedi...

Differences in Gender in the Peasant Residences of Central Europe and Southeast Asia

tended to marry much earlier in Europe than in Asia. Both peasant groups seemed to have grown grain crops: rice in Asia and whea...

Review of Cotton Belt to Sun Belt by Bruce Schulman

in Southern states, rather than Northern ones). But Roosevelt wasnt helping the South out of the goodness of his heart - h...