SEARCH RESULTS

YOU WERE LOOKING FOR :Threading Development in a Network Environment

Essays 31 - 60

Afghanistan National Development Strategy (ANDS)

Security; Governance Rule of Law & Human Rights; Infrastructure & Natural Resources; Education; Health; Agriculture & Rural Develo...

Legal, Ethical and Regulatory Considerations for B2B and B2C Sites

Network security. By 2002, there had been few lawsuits in this area, but even then it was recognized as one "where the potential ...

Sustainable Development and Mainstream Development Thinking

way that promotes his own health and welfare; however, from the environmentalists point of view, humanity has damaged and consumed...

Peer to Peer Network and Client Server Network Computing

there need to be security feature to protect from external hackers as well as the need to ensure that information is only availabl...

Bruce D. Nordwall's Article 'The Use of IP and PKI in Avionics'

for avionics networks (Nordwall, 2003). IP security appears to allow a high degree of control, but this alone is not sufficient. T...

Failure Prevention and Development Problems Associated with Software Engineering

the heap only five years ago. Today, that list has evolved considerably. Companies like Microsoft, Adobe, and other leaders in t...

Primus Securities' Website Development

been successful in achieving its goals in this regard. Network Protocol Now an "old" technology, Transmission Control Proto...

IEEE 802.17 Resilient Packet Ring Working Party and the Contributions of Lantern Communications and Nortel Networks

is also a reduced requirement for external routers, as well as a reduction in the DS-1/VT-1.5 facilities between local area networ...

Cultural Control and Knowledge Workers' Research

seen with many of the older crafts, or knowledge transfer, though training (Polanyi 1973). This may also be seen as the acquiring...

Developments in Voice Over Internet Protocol

focus on VOIP for enterprise systems. VOIP can offer significant benefits to the organization using that approach to communicatio...

Communications of the Future and IT

In five pages this paper discusses information technology in a consideration of computer developments past, present, and changes r...

Anne Moody's 'Coming of Age in Mississippi'

This is a 5 page book review in which the author relates her own upbringing which is in sharp contrast to most members of American...

Digital Radio Developments

their shapes and forms, which is why there is more background noise and interference with their transmissions. Two other ...

Antitrust Issues and Internet Explorer of Microsoft

In five pages this paper examines the Department of Justice's antitrust case against Microsoft and issues regarding the Internet E...

Judaism in the Works of Franz Kafka

In five pages the ways in which Judaism ins represented in Franz Kafka's works are examined with an emphasis upon his story 'Metam...

Concept of Sustainable Development

The sustainable development concept is compared with other models of development in a paper consisting of 12 pages....

Routers and the History of Computer Networking

In five pages this paper discusses computer networking in an historical overview that includes routers and other types of hardware...

Organized Crime Syndicates and Commercial Burglaries

but commercial burglaries are up (Star Tribune 02B). For many reasons, burglars find commercial establishments a better target th...

Overview of PKI

In six pages this paper considers computer networking protection through public key infrastructure in this overview that includes ...

Homeland Security, INS and Epidemiology

problems, but refugees are perhaps most at risk, since many of them "come from areas where disease control, diagnosis and treatmen...

The Australian Business Environment and the Position of Telstra

to the geographical and climate factors of the inland areas (CIA 2007). Population density is relatively low as the country has an...

Civil Rights Movement and Civil Disobedience

being obedient. As the key Civil Rights moments mentioned above illustrate, civil disobedience is characterized by an abs...

Greensboro Sit-Ins

turned into many as the protest continued for almost 6 months.5 In addition, it sparked many other protests throughout the South a...

BADERMAN ISLAND RESORT AND TECHNOLOGY

in each room? Would the reservations be accessible through the hotels television sets? How would the remote systems work? This wou...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Social Networking and the Learning Organization

there are at least six characteristics common to all organizations that others can label as being attuned to learning from events ...

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

NBN and its’ Influence on Australia

Network is a white elephant waiting to happen" (quoted Tucker, 2010). Therefore, there are some significantly differing views on t...

Adult Learning Theories, An Article Summary/Chen

This article summary describes a study, Chen (2014), which pertains to nontraditional adult students and the application of adult ...

A DISH NETWORK OVERVIEW

Examines DISH Network's vision, mission and stakeholders, and how these hold up in the very competitive industry in which it's ba...