Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Don'T Sue As We Don'T Sue You
Rating
Don't Sue As We Don't Sue You Don't Sue As We Don't Sue You Introduction This paper focuses on the Microsoft case that was held in 2006, when Free and Open Source Software (FOSS) along with Linux kernel, samba and other violated the patents. Discussion According to Microsoft, Free and Open Source Software ...
Effects Of Smartphones
Rating
EFFECTS OF SMARTPHONES Effects Of Smartphones Effects Of Smartphones on the Social Lives of People Introduction Smartphones are part cellphone, part computer, part digital assistant, and part portable entertainment device. These advanced phones allow users to make phone calls, check emails and calendar appointments, surf the Internet, access multimedia, get driving directions, and ...
Consumerization Of I.T
Rating
CONSUMERIZATION OF I.T Consumerization of I.T and its Effects on the CIO Name of Writer Name of Institution Table of Contents Introduction3 Discussion4 I.T Revolution4 Root of I.T Consumerization6 I.T Personnel Living in Fool's Paradise7 I.T in the New World7 Security Challenges raised by Consumerization of I.T9 Effects on CIO11 Conclusion12 References14 Consumerization of I.T and its Effects on the CIO Introduction As technology works an ...
Computer-Based Crime
Rating
Computer-based Crime Computer-based Crimes Introduction Internet fraud includes a wide range of illegal behaviors in which various facets of the Internet play an integral role in the transmission of intentionally deceptive and/or false representations for personal or organizational gain (Holtfreter and Ehlen, 2005). Acts of Internet fraud typically involve the transfer of currency, ...
Cloud Computing As An Emerging Paradigm
Rating
Cloud Computing As An Emerging Paradigm Abstract The emergence of cloud computing provides many opportunities for academia, the information technology (IT) industry and the global economy as an information technology revolution. Compared to other distributed computing paradigms such as Grid computing and High Performance Computing (HPC), cloud computing provides broader inter operability ...
Information System
Rating
INFORMATION SYSTEM Midstate University Business Placement Office (B): Development of the System Abstract This case study is about the Midstate University Business Placement Office (B): Development of the System. As it was seen that in 1970's there was a huge increase in the graph of graduating students in business majors and a ...
Difference Between Management And Leadership In It
Rating
Difference Between Management and Leadership in IT Abstract The difference between Leadership and Management has been discussed many times and is still a question for researchers. Leadership is the process by which an individual has influence over people and inspires, motivates and directs its activities to reach the goals; the essence of ...
Civil Liberty
Rating
CIVIL LIBERTY Civil Liberty and Modern Technology Table of Contents Civil Liberties1 The Meaning of Civil Liberty1 Civil Liberty and Modern Technology2 Constitutional Values for Civil Rights6 The Value of Civil Liberty7 Debate over Civil theory9 The Meaning of Civil Liberty9 The Value of Civil Liberty10 References12 Civil Liberty and Modern Technology Civil Liberties To say Civil Liberty is instrumentally valuable is to ...
Virtualization
Rating
VIRTUALIZATION Desktop and Server Virtualization and impact on Information Security Planning, Policy and Strategy Table of Content INTRODUCTION1 VIRTUALIZATION IMPACT INFORMATION SECURITY PLANNING2 Management Of Resource Consolidation3 Control Of Risk Exposure3 Run: Administrative Security Operations4 HISTORY5 DESKTOP VIRTUALIZATION6 TYPES OF VIRTUALIZATION7 Emulation8 Native virtualization8 Hardware Virtualization9 Paravirtualization10 Virtualization using Virtual Machine Monitor (VMM)11 3 MAJOR VIRTUALIZATION SYSTEMS12 VMware12 New support for operating systems:13 Supports 64-bit operating systems:14 Management Interface ...
3d It Leadership Model
Rating
3D IT LEADERSHIP MODEL 3D IT Leadership Model Dell 3D IT Leadership Model Introduction Dell Computer has always been one of the most envied and no marks for its high level of sales, your income increases each year as lightning or large corporate image despite having no stores that offer a personalized service, but ...
141 - 150 of 287 Go To Page 10  11  12  13  14  15  16  17  18  19