SEARCH RESULTS

YOU WERE LOOKING FOR :Media Convergence and the Computer

Essays 1771 - 1800

Counterculture and the Computer 'Hacker Community'

community as "a shared culture" and in many ways, because of the language, ideology and mores expected of hackers, they could be c...

Overview of Computer Database Structures

(George Mason University, 2003). Furthermore, the flat file database is familiar to most users -- meaning it is more familiar and ...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

APPLE COMPUTER AND SWOT ANALYSIS

music players business (Datamonitor, 2008). For example, in July 2007, iTunes downloads topped three billion songs (Datamonitor, 2...

Speech Recognition as a Tool for Human and Computer Interaction

were made in the 1950s, in fact. Bell Labs, for example, developed the capability within the telephone industry to recognize spok...

COMPUTER SECURITY AND BRUCE SCHNEIER

be shared. Schneier points out, for example, that China, though not exactly our ally, also has computers, and has the same securit...

Computer Environment and Making Smart Networking Choices

For example, a peer-to-peer network might be right for some firms but not for others. Such a network allows all workstations and t...

Dell Computers An Analysis

great deal more than foreign companies. There are strict laws and regulations that govern things like using the Internet (Morato)....

AN EXAMINATION OF COMPETITIVE PRICING THROUGH QUASAR COMPUTERS

the kneejerk reaction of moving pricing in response to competition is a sure way to failure. Price wars, the authors note, benefit...

A Culture for Innovation at Apple Computer

environment in which innovating and creativity will flourish (Armstrong, 2001). Anyone who knows the history of Apple knows that...

Computer Operating Systems at Huffman Trucking

The machines are located across a number of different departments including sales, accounting and human resources. These are areas...

APPLE COMPUTER INC. - AN ANALYSIS

an application for Rhapsody on the iPhone). There are also mp3 players that compete, most noticeably, Microsofts Zune. Furthermore...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Dell Computer Strategies

This is a report about Dell Inc., founded in 1984. Dell offered a unique experience to consumers at the time. The paper considers ...

Employers Monitoring Computer Use

There is no single comprehensive law that covers employee privacy rights or what types of privacy an employee should expect. Due t...

Legality of Computer Ethics

In a paper of five pages, the writer looks at legal issues of computing. Ethics and security issues are examined as well. Paper us...

Super Computers Inventor Danny Hillis

In five pages the history of supercomputers, their inventive creator, and their current uses, are examined. Three sources are cit...

Computer Music and its Social Effects

This paper discusses how digital or computerized music and its technology have significantly affected society in five pages. Four...

Carol Gould's Edited The Information Web Ethical And Social Implications Of Computer Networking Reviewed

In five pages this essay compilation first published in 1989 are reviewed in a consideration of information abuses and the importa...

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...

Computer Gambling and Marketing Campaign Management

In five pages this paper discusses how to creatively and successfully market Internet gambling casinos in the United States in a p...

A Fiscal Investigation of Apple Computer, Inc.

In ten pages this research paper conducts an Apple investigation that includes financial reports, company setbacks, SWOT analysis ...

Computer Problems and Concerns Resulting from the New Millennium Transition

In six pages this paper presents an overview of Y2K that considers problems, issues, theories, and preventative measures. Five so...

Computer Technology and the Accounting Profession

In this paper containing six pages different areas within the field of accounting are considered along with the contention that qu...

Comparative Analysis of Computer Industry Giants

In five pages Compaq, Dell, Gateway, IBM, and Hewlett Packard are compared and examined in terms of a five year forecasting of est...

Computers and HR Training

In about twelve pages this concept paper discusses manufacturing and the effectiveness of interactive training with the use of CDs...

History of the UNIX Computer Operating System

various programs written by many companies to distribute information between multiple computers within the network. This minimize...

Brief History of Computer Operating Systems

In five pages this research paper discusses OS in terms of history and through a comparative analysis of MS DOS and UNIX. There i...

Overview of the Uniform Computer Information Transaction Act Law

An overview of this proposed law and its impact on America's corporate sector and consumers are presented in a paper consisting of...

Reviews of Articles on Various Computer Subjects

In four pages article reviews of approximately two paragraphs each consider such varied topics as robotics, software policy, Inter...