SEARCH RESULTS

YOU WERE LOOKING FOR :History of the UNIX Computer Operating System

Essays 181 - 210

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

Company and Product Review of PowerLeap

In five pages this paper discusses the PowerLeap company and its online computer systems upgrading products as featured on its web...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

The Development and History of Artificial Intelligence

and mathematicians. The conference took place in 1956 at Dartmouth College(Shipley 64). From that point forward the concept of art...

The History of the Modem

This paper examines the history and evolution of the computer modem. This five page paper has six sources listed in the bibliogr...

Youthful Computer Hackers

In five pages this paper examines the growing practice of young people hacking into computer systems in a consideration of whether...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

Computer Law Understanding and the Significance of System Administrators

act maybe hard for the system administrators as it is lengthy, with 75 sections and a total of 16 schedules. However, this...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Proposition for a School iBook Upgrade

time while currently gaining the greatest utility from the hardware it has and is about to acquire. The Mac OS X Server v10...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Dell Computers 2003 A SWOT Analysis

both computer components and actual PC computers. He did so by buying retailers surplus stocks at cost, powered them up with graph...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Computer Software and Hardware Assessment Questions

the collective skills of a workforce; categorize customers purchases during a single visit to a retail store; or other points pert...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Dell's New Strategy Plan

tag, it is hard to know whether or not the future will be just as kind to this firm that has done well so far. After all, the econ...

Prototype Model Building and Layer manufacturing

v4.3.2 from IBM and Solaris v2.6.0 from Sun Microsystems, all of these will require OpenGL. Various windows formats are also used...

Using Technology to Help Teach World History

This 5 page paper discusses ways to use the computer, Internet and other technology to teach world history. The writer argues that...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

The Computer Giant Apple

John Scully, who was CEO of Apple at the time, made a devastating mistake (Dohrman, 1997). In 1985, Scully confronted Bill Gates, ...

A Computer System and Purchasing Tickets Online

In five pages the ways of buying movie tickets online and the types of web pages, navigation, design and links needed to create su...

Replication of Data

is stored on computers within an organization would be a total nightmare; the business would be virtually unsalvageable in some ca...

Western Dental Clinic and Business Information Systems

to major transportation lines, people from outlying areas also come to see the dentists. The clinic itself was founded by ...

The Concept of Asynchronus Transfer Mode Examined

speak of be able to communicate with both legacy equipment as well as the new generation of operating systems. This is what permi...

A Revised Computer System and the Problems of Audio Visual Corporation

cut down on extra time and money the company did not need to be spending. In order to eliminate these wasted resources, Audio Vis...