SEARCH RESULTS

YOU WERE LOOKING FOR :Change and Geocast Network Systems

Essays 721 - 750

Overview of Neural Networks

In twenty five pages the process of neural networking is considered in an overview that includes its history, applications, and de...

An Overview of ATM or Asynchronous Transfer Mode

In five pages ATM and ATM networks are examined in terms of advantages, disadvantages, and their implications. Six sources are ci...

Don Tapscott's Promise and Peril in the Age of Networked Intelligence

The 'digital economy' is the focus of this paper consisting of five pages with computer networking's advantages viewed within the ...

Electronic Data Transfer Evolution Through the Internet

In ten pages this paper examines how EDI has evolved as a result of the Internet and considers the future of business computer net...

Internet Congestion

or simply down, to please try again later. For many users, trying again later is an acceptable alternative, for others it is not....

Protocols of the Current and Next Generation

In ten pages computer networking is examined in terms of an overview of current and next generation protocols and a comparative ev...

Security Issues and Computer Network Management

In thirty pages this research study examines corporate computer network management and issues related to security and information ...

Internet and Education

In twenty pages the Internet and its impact on education are considered with a discussion of such relevant topics as Internet rese...

Nonprofit Organizations and Communication

In five pages such topics as hierarchical, vertical, horizontal, and interactive communication concepts, various communication tec...

Digital Radio Developments

their shapes and forms, which is why there is more background noise and interference with their transmissions. Two other ...

Networking Action Plan

educator-leader networking and principal-to-principal networking. He also interjected that while state networking systems were in...

National Security Threat Levels

needs to prepare. The standard protocol for a green national threat conditions includes taking this otherwise down time to re-eva...

Case Study: Decision Time at Lotus Corporation

1994). Not coincidentally, it also made Lotus the leader in the application software sector (Case study, 1994). Lotus believed th...

Legal, Ethical and Regulatory Considerations for B2B and B2C Sites

Network security. By 2002, there had been few lawsuits in this area, but even then it was recognized as one "where the potential ...

The Internet Significantly Contributes To Social Democracy: Opinion

in which people live, work and interact seems a logical succession for maintaining mans existence throughout the coming centuries,...

Corporate Network Optimization

In a paper of three pages, the writer looks at the optimization of corporate networks. Examples are given in a 9-slide Power Point...

WIRELESS NETWORK AND HOSPITAL

Aside from security risks, there are other problems with going wireless - one of which is, believe it or not, interference from te...

Racism in Contemporary America

investigations that "successfully demonstrate the unfairness that only Affirmative Action can begin to redress" (Bradley 450). Spe...

Currency Swaps and the Swap Network

company might not simply choose to issue a bond in the currency they would prefer to use to make the repayments. There are differe...

Pitching a TV Series

and still garner high ratings. Lets try and invent a different sort of reality show. Devising the concept is the hardest part of ...

Nursing Leadership Scenario

defining the leadership characteristics that would be the focus of this educational effort (Pintar, Capuano and Rosser, 2007). As ...

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

Developing the Academic Persona

The author emphasizes the importance of networking and taking every opportunity to associate your name with your chosen profession...

Public Health, Social Networks

This research paper pertains to social networking from a public health practice perspective. Three pages in length, five sources a...

Discussion Questions on Network Security

In a paper of five pages, the writer looks at network security. A variety of topics are addressed via discussion questions. Paper ...

Identity Formation and the Impact of Online Social Interactions

This research paper pertains to the relationship between social networking sites and identity formation in adolescence and young a...

Example of Statistical Hypothesis Testing

The writer demonstrates the use of a hypothesis test with date that was collected by a student. The test is to determine if Faceb...

Social Networking Pros and Cons

In a paper of three pages, the writer looks at the pros and cons of social networking. A negative view is ultimately established. ...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Traffic Network Analysis, Seattle

This research paper focuses on traffic network analysis in the City of Seattle and is associated with a sixteen slide power point ...