SEARCH RESULTS

YOU WERE LOOKING FOR :Documentation in the Digital Age

Essays 241 - 270

Computers and Usage of Security Blankets

the "intangible traces" of traditional learning, there are now electronic "artifacts" that can be owned, reproduced, and marketed....

Amending the Digital Millennium Copyright Act

text but also encryption devices and other electronic tools, to be copied. The range of purposes that can be cited are wide and in...

Medical Imaging and the Impact of Technology

there was destined to be a change with regard to the overall application in order for computers to become significantly more user-...

Internet Media and the Digital Revolution

the ability to virtually encapsulate each man, woman and child with carefully constructed and controlled images and value statemen...

How the U.S. Government is Bridging the 'Digital Divide' Gap

those who do not (Henderson, 2002). However, the meaning is larger than this Henderson (2002), describes this as the difference be...

Overview of Knowledge Management

in such a way as to be accessible and available to those who need it. Knowledge management is, like the term suggests, a necessary...

Digital Camera and Sony Corporation

1957; the company changed its name to Sony Corporation a year later. "It beat the competition to newly emerging markets for trans...

Digital Divide Issues and Impacts

manner to ensure it is as up to date as possible. With all of these limitation in mind the paper aims to give a balanced and unbia...

PDAs as a Home Nursing Boon

In a research paper consisting of nine pages the ways in which personal digital assistance can be used as home nursing support are...

Traditional Film Methods and Digital Film of the Future

In twelve pages this paper examines traditional film methods and the increased reliance upon digital technology in a contrast and ...

Analog and Digital Animation Realism

definition carefully says nothing about film, cameras, frames, projection, screens, laser beams, computers or even drawing. It cou...

Copyright Violations and Business Ethics with Issues of Computer Software and NAPSTER

In five pages reproducing unauthorized computer software and digital music are featured in this examination of business ethics wit...

Precision Rectifiers and Circuit Design

In sixty pages this paper examines precision rectification circuits that are high speed in terms of design, uses, and also conside...

Overview of MIDI

In twenty six pages this paper presents an overview of Musical Instrument Digital Interface, its control and how it can be control...

Renaissance Art

during this period that Europe began to recover from the repercussions of the Black Death, as well as rampant political disorder a...

Digital And Psychological Profiling Of Cyber Crime

still in its infancy; only in the recent past have inroads been made in overcoming the boundaries inherent to such undesirable tec...

Advantages and Disadvantages of Analogue and Digital Communication

2001). The computer actually transitions the input to a number of zeros and ones accordingly (Poster, 2001). Computers in fact tak...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

Copyright, Google and Its Digital Library

in which Google does business with authors and publishers (Waters, 2009). The most important part of the scenario appears to be ...

Protecting Digital Material

download a property and make a copy of it that is so good its impossible to tell it from the original; they could then sell the co...

Educational Equity And Diversity: Technology And The Digital Divide

for this special group with the intervention of technological advancement in the school setting. Current generations of exception...

Digital Tools and the Forensic Process

THE MODERN STATE OF SPEECH RECOGNITION CAN BE CREDITED TO THE EXPONENTIAL RATE WITH WHICH COMPUTER TECHNOLOGY IS CHANGING. IT WAS...

The Impact of the Digital Ecosystem among Businesses

matter, goods are seen on the web pages of the internet and tare then sent out, where the goods are digital they can be delivered ...

Digital Crime and Punishment

In a paper of three pages, the writer looks at cybercrime issues. The evolution of law and punishment is examined. Paper uses four...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Integrated Services Digital Network

In eight pages an overview of ISDN is presented in terms of what it is, its functions, costs, suppliers, equipment that is require...

Business Consideration of Digital Content Delivery Through DVD

and commonplace. The introduction or more channels that was made possible as a result of the digital age made these practices even...

Digital Resistance and Electronic Disobedience of Critical Art Ensemble

Throughout their publishing efforts, CAE has continued to present numerous multimedia events throughout the United States and Eur...

Various Formats of Digital Audio

MPEG (Motion Picture Experts Group) format is "a type of audio and video compression with several standards. MP3 is a popular file...