SEARCH RESULTS

YOU WERE LOOKING FOR :Socioeconomic System Origins

Technical Characteristics of Signaling System 7

In eighteen pages SS7 is examined in terms of modern telephone network applications and its technical requirements. Twelve source...

Corporate Management and Information System Security

In seventy five pages this paper discusses IS security training and computer crime issues. Fifty five sources are cited in the bi...

Russell Corporation's Information Management

In eight pages the Russell sportswear corporation is examined in a consideration of how it manages its systems of information tech...

Are Expensive Information Systems Worth It?

A case study analysis of Stratex is presented in twelve pages as the company struggles with deciding whether or not investing in e...

Overview of Data Warehousing

In five pages this research paper considers data warehousing in terms of the communications and technology history, definition of ...

Selecting an Appropriate Database Management System and Oracle

In nine pages various types of systems for database management are discussed in this overview of Oracle. Ten sources are cited in...

Information System Evaluation

In five pages the FPbase information system software package of Pawtucket Heart Health Program is featured in a productivity evalu...

Marketing Research and MIS

In four pages this paper examines Management Information Systems as they relate to market research in a consideration of startup, ...

Proposal for a Small Business Management Information System

In fifteen pages this paper examines how a small business can create a management information system to meet its need in a proposa...

History, Design, and Usage of Neural Networks

In sixteen pages this paper discusses neural networks in a consideration of history, design, uses as systems of decision support a...

Impact of Information Systems

In six pages this research paper discusses how the corporate sector is impacted by information systems with an emphasis upon compe...

Internet and IT

In eighteen pages this paper discusses business information systems and the increase in Internet technology uses. Twelve sources ...

Case Study on Video Vision's IT

the scheduling issues for high quality titles. Second, the hotel has been able to provide the necessary information to distributo...

Information Systems and Ben and Jerry's Ice Cream Inc.

In a paper that consists of five pages an overview of Ben and Jerry's is presented with information systems examined by way of a S...

The Netherlands' Economy

In twenty three pages the Netherlands' economy is examined in an overview that includes its system of health care, unemployment ra...

Benefiting All with Canadian Immigration

existing immigrants (Cosh). In 1994 forty-three percent of Canadian immigrants were grouped into the economic class (Cosh). This...

Future Education and Computers

In ten pages future education is contemplated with a discussion of case studies and consideration of such topics as interactive me...

Television's On Demand Video

for small audiences (OBrien). Transport Standards Video on Demand is supported by two major systems...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Microsoft NT 4.0 and Hackers

In seven pages this paper offers a technical consideration of how Microsoft Proxy 2.0 and Microsoft NT 4.0 can be attributed to th...

Criminal Justice and Computers

In five pages the criminal justice system is examined in terms of the significant impact of computers with FBI investigations of o...

Discussion of Data Warehousing

computer has expanded our ability to access information to a global level from the comfort of our own home. The quantity and velo...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Tactics to Minimize Computer Crimes

'Cracking' and 'hacking' are among the topics discussed in this examination of computer systems and unauthorized access consisting...

Criminal Justice and the Role of Technology

In six pages this paper examines how criminal justice has benefited from technology in a consideration of various systems, analyti...

Home Computer System Purchase

In five pages this paper considers hardware, software, speed, and size as each pertains to buying a home computer. Four sources a...

Workplace and IT

In fifteen pages 3 sections designed to answer student posed questions regarding information technology and the workplace includes...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Brief History of Computer Operating Systems

In five pages this research paper discusses OS in terms of history and through a comparative analysis of MS DOS and UNIX. There i...