|
Papers on Technology
Computer Security
Number of words: 2026 | Number of pages: 8.... hazard. For example, a cashier in a bank can transfer some
money from one of his customer's account to his own account. Nonetheless,
the most dangerous thief are not those who work with computer every day,
but youthful amateurs who experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon
for classmates who labored nights in the computer lab. In the beginning,
hackers are not so dangerous at all. They just stole computer time from the
university. However, in the early 1980s, hackers became a group of
criminals who steal information from other peoples' computer.
For pre .....
Get This Essay
|
|
Implementing A CAD System TO Reduce Costs
Number of words: 1503 | Number of pages: 6.... be
received in an electronic format such as a math model. These models are
currently in use by customers such as GM, BMW and Mercedes. The effect of
having math models of all new products would enable a quicker turnaround in both
quoting and production of products. CAD Vendors & Hardware Suppliers: Upon
observing the various systems used by several customers and suppliers, the major
CAD vendors worth consideration have been identified. Manufacturers of high
quality workstations which have been distinguish are: Hewlett Packard (HP) IBM
Silicon Graphics (SGI) SUN Premium, fully functional CAD solutions are: CATIA
(Dassault / I .....
Get This Essay
|
|
INTEL Knows Best? A Major Marketing Mistake
Number of words: 1773 | Number of pages: 7.... main contention was that it
puts its customers first, and Intel was failing to do this.
Intel's handling of this defective chip situation gives rise to many
questions. During the course of this paper I will address several of them. The
first of which is how did a company with such a stellar reputation for consumer
satisfaction fall into the trap that the customer does not know best? Secondly,
what made this chip defect more of a public issue than other defective products
manufactured and sold to the public in the past? Finally, how did Intel recover
from such a mistake? How much did it cost them and what lessons can o .....
Get This Essay
|
|
Changes From Technology
Number of words: 570 | Number of pages: 3.... it a massive amount of hope,
but also despair. Kids are growing up with computers. They are learning more and
faster than other generations could. This is wonderful, right? Maybe not. Will
computers deplete the social skills kids need to mature? Will being a member of
America OnLine rather than a youth group prove to be helpful or the opposite?
Our generation will need to lead this technological revolution in the right
direction. We need to offset the obstacles in our path. We need to make sure the
flow of change is going to be a positive one. The answer lies in our hands.
We need to utilize the technology given to us, and mak .....
Get This Essay
|
|
The Utilities Confront Y2K
Number of words: 1524 | Number of pages: 6.... are very much affected by Y2K. Problemed areas are found throughout the water infrastructure. Most obviously water utilities' computer systems will be affected by Y2K unless compliance is fulfilled. If the computers fail, the main areas affected would include customer service, accounts payable and receivable, databases, and management systems. Problems of this type are usually easily fixed, however the computer systems that crash or stop working may be erased of all memory. In other words, a whole system of customer information such as payments that are due or received may be lost.
Not only are the water utilities' comp .....
Get This Essay
|
|
Computer Viruses
Number of words: 466 | Number of pages: 2.... and then displaying sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that performs an activity on a particular date A logic bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no memory or disk space remains.
To identify computer viruses, antivirus programs have been developed. Besides detecting viruses, antivirus programs also have utilities to remove or repair infected programs and files. Some damaged files cannot be repaired and must be replaced with .....
Get This Essay
|
|
The First Generation Of Computers
Number of words: 312 | Number of pages: 2.... it
was used on a televised newscast to project the winner of the Eisenhower-
Stevenson presidential race with stunning accuracy. That same year Maurice V.
Wilkes (developer of EDSAC) laid the foundation for the concepts of
microprogramming, which was to become the guide for computer design and
construction.
In 1954, the first general-purpose computer to be completely
transistorized was built at Bell Laboratories. TRADIC (Transistorized Airborne
Digital Computer) held 800 transistors and bettered its predecessors by
functioning well aboard airplanes.
In 1956, the first system for storing files to be accessed randomly was
comp .....
Get This Essay
|
|
Information Management
Number of words: 3225 | Number of pages: 12.... in a position to manufacture and sell its own PC’s. By moving into its own premises, the firm was now able to make substantial profit margins by building and pre-configuring a small range of machines. Lanway began to trade with other firms in 1994, at which point they were forced to expand both their existing premises and staff. They also began to diversify, moving into new areas such as networking technologies, the internet and more specialised hardware and software.
Lanway currently has a turnover of approximately 5 million and over 40 staff, both of which are expected to continue in growth. They manufacture around 200 PC’ .....
Get This Essay
|
|
Will Computers Control Humans In The Future?
Number of words: 866 | Number of pages: 4.... by computer tapes.
Putting in knowledge would take less time than reading books and memorizing
something that would take almost no time using a computer in the futuristic
world that Asimov describes. Humans might began to rely on computers and
allow them to control themselves by letting computers educate people.
Computers would start teaching humans what computers tell them without
having any choice of creativity. Computer ould start to control humans'
lives and make humans become too dependent on the computers.
Another point that is criticized by Asimov is the fact that people
might take their knowledge for granted allowi .....
Get This Essay
|
|
Computer Security
Number of words: 2496 | Number of pages: 10.... as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in the computer lab. In the beginning, hackers are not so dangerous at all. They just stole computer time from the university. However, in the early 1980s, hackers became a group of criminals who steal information .....
Get This Essay
|
|
|