|
Help With Computer Papers
Brief History Of Library Automation: 1930-1996
... in the library's collection. The miniature books were part of a
design that made it possible to determine if a book was in, out or overdue.
These and many more examples of early ingenuity in library systems exist,
however, this paper will focus on the more recent computer automation beginning
in the early twentieth century.
The Beginnings of Library Automation: 1930-1960
It could be said that library automation development began in the 1930's
when punch card equipment was implemented for use in library circulation and
acquisitions. During the 30's and early 40's progress on computer systems was
slow which is n ...
|
Outsourcing
... can be defined as a contract service agreement in which an
organisation hires out all or part of its IT responsibilities to an external
company.
More and more companies are leaning towards outsourcing it could be said that
this may be caused by the growing complexity of IT and the changing business
needs of an organisation. As a result, an organisation may find that it is not
possible to have all its IT services supplied from within its own company. Given
this, an IT manager may decide to choose to seek assistance from an external
contractor/company to supply their services the organisation lacks. ...
|
Quantum Computers Fact -or- Fantasy?
... individual particles behave like waves, these different places are different states that an atom can exist in simultaneously.
What’s the big deal about quantum computing? Imagine you were in a large office building and you had to retrieve a briefcase left on a desk picked at random in one of hundreds of offices. In the same way that you would have to walk through the building, opening doors one at a time to find the briefcase, an ordinary computer has to make it way through long strings of 1’s and 0’s until it arrives at the answer. But what if instead of having to search by yourself, you could insta ...
|
Internet Censorship
... censorship of the Internet. This rally has been met with mixed results.
People who support freedom of speech on the Internet quote from the first amendment of the Constitution. In addition, many groups are in favor of restricting the Internet, similarly to how television is regulated in the United States. In favor of this regulation are groups emphasizing values and some foreign governments. In the latter, often the government does not want the citizens being introduced to new ideas, which may cause discontent and unrest in some cases. Whether the Internet should and can be censored is one debate which affects mu ...
|
The Internet
... users to the backbone networks. Today,
there are more than fifty-thousand networks in more than one-hundred countries
worldwide. However, it all started with one network.
In the early 1960's the Cold War was escalating and the United States
Government was faced with a problem. How could the country communicate after a
nuclear war? The Pentagon's Advanced Research Projects Agency, ARPA, had a
solution. They would create a non-centralized network that linked from city to
city, and base to base. The network was designed to function when parts of it
were destroyed. The network could not have a center because ...
|
Isdn For Small Business
... BRI ISDN was developed to be the digital connection replacing the now existing phone lines from users to the telephone company. There are many considerations and alternatives to ISDN. This can range form regular phone connections to a digital satellite dish. The article is offers a worthy discussion for anyone contemplating a higher speed internet connection in the near future.
ABSTRACT ii
LIST OF ILLUSTRATIONS iv
INTRODUCTION 1
ISDN DEVELOPMENT 2
INTENTION OF ISDN 2
USES OF ISDN 2
TYPES OF ISDN 3
INTERFACES 3
Usage of PRI 3
How BRI Works 4
USAGE CONFIGURATION 4
EQUIPMENT NEEDED 4
RATES AND CHARGES 6
EX ...
|
Polymorphic & Cloning Computer Viruses
... day to make a living, the risk of catastrophe has increased tenfold. The
people who create computer viruses are now becoming much more adept at making
them harder to detect and eliminate. These so-called "polymorphic" viruses are
able to clone themselves and change themselves as they need to avoid detection.
This form of "smart viruses" allows the virus to have a form of artificial
intelligence. To understand the way a computer virus works and spreads, first
one must understand some basics about computers, specifically pertaining to the
way it stores data. Because of the severity of the damage that these viruses m ...
|
The Benefits Of Satellites
... If we wish to understand why artificial satellites are so useful, the contributions of each type of satellites will have to be outlined starting with satellites' part of the Global Positioning system (GPS), Reconnaissance Satellites, and finally Telecommunications Satellites.
The Global Positioning System provides users with accurate information about their latitude, longitude, velocity and altitude, as well as the time, anywhere in the world and works in all weather conditions. The GPS was initiated in 1973 by Navstar in the United States and then followed by the Soviet Union with their own GPS. Both GPS systems ...
|
Response To AOL Controversy
... given location can
choose from at least fifteen national companies, such as sprintlink, compuserve,
ameritech, erols and so on. Using these services are less expensive than
America Online. Per month for unlimited use they average at around $10 to $15
dollars as opposed to AOL's hefty $19.95 a month. AOLers are paying for the
appealing menus, graphics and services AOL uses to drive their customers to the
internet. These same features can be located anywhere else on the net with the
aid of any search device, such as infoseek, yahoo, microsoft network or web-
crawler. These sites are no harder to use and they pro ...
|
Networks
... a time, hence, several people could not use it simentinsouly. This type
of setup improves the use ratio of certain applications which are expensive.
Licensing agreements can often be purchased for additional users for less
than the cost of additional full copies.
Physical Resources Printers and backup systems are two examples of
special hardware which often have low use rates. By setting up several
computers to share these resources, money is saved from having to provide
(for example) each user with their own printer. Fewer peripherals also can
translate into lower maintenance costs and lower capital ...
|
Browse:
« prev
46
47
48
49
50
next »
|
|