Viewing papers 31-60 of 688 for computer AND games AND research AND when AND considering

NOTE:  We can write a brand new paper on your exact topic!  More info.
1234. . .Last ›
X Filters 

Technology Evolution Research Paper

… It has the capability of providing 3-dimensional profile. Scanning microscopies that were invented in the recent past use the scanning technology developed for the STM. Gerd Binning and Heinrich Rohrer are the brains behind development of Scanning Tunneling Microscopy, a powerful microscopy technique capable of forming an image of individual atoms on a metal (Bellis, 2012).

In 1982, a human growth hormone was genetically engineered and produced by Eli Lilly and Company. It was then approved for use by diabetics. The Food and Drug Administration in this year approved the use of Humulin by diabetics. It was the same year, 1982, that University of Pennsylvania researcher created a super mouse by inserting human growth hormone into the genetic establishment of a mouse (Kotelinkova, 2012).

A…. [read more]


Virtual Technology: Social Interactions Research Paper

… Virtual Technology: Social Interactions

Traditionally, people attached a significant degree of importance to social interactions. Such interactions were considered the backbone of humanity; they came in handy in decision making and ensured that relatives and friends stayed connected to each other. The internet may, however, be slowly destroying all this; well, at least that is what the detachment brought about by virtual technology signifies. The internet may arguably be disconnecting us from the society and creating some imminent form of isolation. The traditional face-to-face conversations have more or less been replaced by instant text messages and e-mails. Social networks are an important aspect of internet technology. They, no doubt, provide great avenues for networking. However, they may drive people to spread themselves so thin, that…. [read more]


Internet Globalization Good or Bad Research Paper

… Internet

The globalization of the Internet has spawned a rash of cyberattacks on the U.S. Department of Defense and a number of its contractors. One such example was the Poison Ivy attack on Booz Allen Hamilton, which was designed to pull sensitive data out of the company's computer network via an email attachment (Grow, Epstein & Tschang, 2008). Poison Ivy, along with other trojans and viruses, represents a new class of e-espionage, one that threatens the security of the United States. The Internet cat cannot be put back into the bag -- it has gone global and we are past the point of debating the merits of that. The real issue is how the United States can deal with these threats.

The Department of Defense…. [read more]


Risk Management and Analysis Process and Policy Before Technology Research Proposal

… ¶ … released by the FBI and the Computer Security Institute (CSI), over 70% of all attacks on sensitive data and resources reported by organizations occurred from within the organization itself. Implementing an internal security policy appears to be just as important as an external strategy. The objective of this report is to highlight the necessity of internal processes and policy alongside technology when managing and mitigating risk. The author narrates the problems of security from the unseen forces in an individual that influence thought, behavior and personality. Once organizations truly understand the psychology behind the motivations of software engineers and developers, risk analysis and risk management strategies will become more efficient. The research contained in this report establishes that there is some connection between…. [read more]


Google and the IPO Process Term Paper

… Indeed, although Google will be by no means the only large company to adopt the dual stock model, there seems to be a trend among companies with "entrenched management" to "under perform rivals that are accountable to shareholders and vulnerable to hostile takeovers (Valdmanus)." In fact, in a recent study conducted by Harvard and Wharton, researchers Paul Gompers, Joy Ishii, and Andrew Metrick found that "buying companies with the best corporate governance and selling the firms with the worst would have yielded excess returns of 8.5% a year during the 1990s." Further, they also found that, "dual-class firms tend to invest too little, leading to lower sales growth and valuations (Valdmanus)."

Conclusions:

Although Google's method of making its initial public offering was revolutionary in the…. [read more]


Porter's Five Forces of Competition Research Paper

… Porter's Five Forces Of Competition

Imagine studying the biggest social network website in the world. As everyone knows this is Facebook. They are a giant when it comes to bringing people from around the world together that are family and friends. Each person has a unique characteristic that makes this company effective. One will discuss Porter's Five Forces with this organization, along with a SWOT analysis to put it all into perspective.

The first of Porter's forces includes that of competitive rivalry. Since the inception of Facebook in 2004, they have over "500 million users around the world" (The New York Times, 2011, para 2). After all, Mark Zuckerberg was a Harvard student when inventing this website and phenomenal company that continues to grow as…. [read more]


Facebook Versus Competitors Research Paper

… Facebook vs. competitors

Arguably, Facebook is one of the most promising business ventures in the world today and represents the new generation of business models, where the advertising source of revenues is based on social networking and, as such, even more targeted than precedents such as Google. Having grown from a simple social networking website at Harvard and initially being limited to student access only, it is now widely used by both businesses and consumers, as well as other organizations and economic entities aiming to better connect with their recipients and shareholders.

With that in mind, it is clear that Facebook is already positioning itself as a serious competitor not only within its own market segments, with companies such as My Space, but also outside,…. [read more]


Cloud Computing as an Emerging Research Paper

… According to the mentioned report, the major essence behind cloud computing technology is continuing to develop just like every other feature of the Internet is making advancement. It is not an easy task to envisage or foresee that what will happen in the future for the reason that adjustments are being made continuously when innovations and limitations are considered. However, a majority of the technological experts believe that the motivation to access information has become a worldwide phenomenon and the fast progression of the tools to do so will continue to bring an international revolution in technology (Skiba, 2011).

References

Blowers, H. (2012, May). Considering the Cloud and the Greater Computing Atmosphere. Computers in Libraries, 32(4), 29+. Retrieved February 19, 2013, from http://www.questia.com/read/1P3-2661304751/considering-the-cloud-and-the-greater-computing-atmosphere

Choo, K.K.R.…. [read more]


Free Speech and Content Controls in Cyber Space Research Paper

… Free Speech and Cyber Space

Annotated Bibliography

Carr, J. & Hilton, Z. (2009). Child protection and self-regulation in the internet industry: the UK

experience. Children & Society. National Children's Bureau. 23. 303-308. The UK has been successful in apprehending child predators because of restricting access on the internet. Internet providers have done little to stop the spread and sharing of sexual images of children online. Self-regulation has been the most successful tool in the fight against online predators and needs to be continued and furthered.

Frechette, J. (2005, Spring). Cyber-democracy or cyber-hegemony? Exploring the political and economic structures of the internet as an alternative source of information. Library Trends. In this article, the author finds that the internet has the power to provide information, but…. [read more]


Microsoft Company Background Microsoft Is a U.S Research Paper

… Microsoft

Company Background

Microsoft is a U.S.-based provider of personal and business software solutions, video game consoles and Internet media. The company's core product has long been its Windows operating system, which has seen a number of variants over the years. Microsoft's marketing share in operating systems is very high as a result of licensing to a broad range of computer manufacturers and the tie-up with Intel, who have provided the best processors in the industry for many years. In 2009, the company recorded $58.4 billion in sales and a net income of $14.5 billion.

The last two iterations of Windows were Vista, with a retail launch in January 2007 and Windows 7, with a retail launch in 2009. This paper will analyze Microsoft's global…. [read more]


Is the Internet Changing the Way We Think? Research Paper

… ¶ … Internet Changing the Way We Think?

Today, the internet has become a conduit of sorts for the exchange of information from all corners of the world. In a big way, the internet continues to ease access to information from a variety of sources. This is largely desirable. However, there are those who are convinced that such convenience has come at a price. With that in mind, questions are being raised on how the internet is impacting on our capacity for both contemplation and concentration.

In a way, the internet is increasingly becoming addictive for most people. According to Tun and Lachman, "...surveys show that adults of all ages have embraced the computer and the internet…" (560). Further, as GreenBlatt notes, were individuals to…. [read more]


Mobile Phone Trends and iPhone Research Paper

… Without question, this could be a life-changing solution for diabetic patients. Thus, with such revolutionary innovations in the works regarding healthcare, the possibilities seem endless. Presumably, the advancement of iPhone healthcare technology will increase doctor-patient communicative capacities and hopefully help keep patients out of the hospital for extended periods of time. Such extended hospital stays are quite common and often end with patients having to pay ghastly bills, while rarely being able to directly communicate with their doctors. Knowing the disadvantages and inefficiencies of the overpopulated hospital system, iPhone technology in this area may just help to curb this regrettable trend.

Yet another futuristic arena that iPhone researchers and retailers have ventured into is the world of virtual shopping. Things like virtual fitting rooms, manicures…. [read more]


Adolescents Disclose Information in Cyberspace Research Proposal

… Adolescents Disclose information in Cyberspace vs. how they communicate Face-to-Face in real Life in the United States of America.

Administration of Survey

Descriptive Data gender and Age 11

Ethnic background

Scoring and Analysis

Adolescents Disclose information in Cyberspace vs. how they communicate Face-to-Face in real Life in the United States of America

Research has benn displaying that Taiwanese adolescent males are more willing to communicate data about their sexual activity and relationship intimacy when they are disclosing information in cyberspace, as opposed to when communicating face-to-face in person (Yang, Yang, & Chiou, 2010). That is to say that there is not a strong correlation between the males' level of sexual disclosure and their real life relationship intimacy (Yang, et al., 2010). For Taiwanese female adolescents,…. [read more]


Social Media and Its Negative Impacts Research Paper

… .. I see people on their phones, and I just want to take these cookies and throw them. It's like 'Get off your f***ing phone, and get a life!'" (Scheffler, 2010). What these anecdotes describe is how social media can bully others, particularly celebrities. It can spread rumors, gossip, negativity and it can disintegrate the privacy of famous people who work very hard and want time to themselves.

Summary

Social media opens up a door for negativity that few people could have anticipated and that many people wrongly underestimate. Social media allows tensions to fester and grow between people, sometimes resulting in violent encounters. Social media can sometimes exploit cracks in relationships, putting them under undue stress. Social media can create skewed and unhealthy images…. [read more]


Competitive Strategies Research Paper

… Competitive Strategies

Corporate cultures

This study focuses on the corporate cultures of Apple and Microsoft operating in the same industry. Apple has been able to outdo Microsoft in the market share. The important thing to do is to gain full knowledge on what can be measured or not by market capitalization. Apple Inc. defines a market capitalization as the total market value of the dollar of the outstanding shares of a company. The key terms are shares and market value in this case. These two terms directly state that we have two issues to concentrate like investment community and the stock market. Market capitalization is one of the factors used in determining the size of a company without considering the figures like product penetration, employees,…. [read more]


Blogs and Social Networking Research Paper

… Blogs and social media have dramatically changed the ways people use the Internet in the business and commercial sector. One obvious way that social media has changed the way people use the Internet and the Web is with activities like job hunting and networking. Monster.com is no longer the only way to find work. LinkedIn and other social networks are encouraging people to advertise their skills so that they can find their dream job or maximize their contacts. Social media and blogging have also allowed creative people to use their blogs and profile pages as portfolios. This has enabled the building of small businesses, and the management of small businesses through social media. Facebook advertising makes it much easier for small businesses to market their…. [read more]


Social Media Networks Research Paper

… Social Media/Facebook

FACEBOOK:

A Vehicle for Political and Social Activism

Randi Zuckerberg, an older sister of the Facebook founder Mark Zuckerberg and a marketing director of Facebook until August 2011, told an interviewer last year that the social networking site Facebook would continue to help people around the world mobilize for activism. According to Ms. Zuckerberg, social media is in essence "democratic," as it helps people whose freedom of expression curtailed by laws of autocratic governments air their voices openly and join solidarity movements. Reflecting upon the use of Facebook as a place to organize collective action against injustice and oppression around the world, Ms. Zuckerberg said that Facebook facilitated events which would not otherwise have been possible. Facebook helps to raise money for worthy…. [read more]


Thai Consumer Perception Toward Using Mobile Phone Research Proposal

… ¶ … Consumer Perception Toward Using Mobile Phone

Thai Consumer Perception on Mobile Phones

The mobile phone market has significantly developed in the past few years. The trend characterizes developed countries, but developing regions also. Technological development has a significant impact on the activity of individuals and of companies.

Mobile phones have practically revolutionized communication. The role of mobile phones has significantly developed since the initial types of mobile phones were introduced on the market. This is because in the beginning, mobile phoned were used only for communication among individuals.

Then, people started listening to music on their phones, taking photos or video recording aspects that interest them. The mobile phone became popular for the entertainment purposes it also served.

In addition to this, mobile…. [read more]


Will Tablet Devices Replace the Laptop Computer Dissertation

… ¶ … Tablet Devices Replace the Latop Computer

Tablet Computers: Will They Forever Change the Way We Interact with Information?

In a dynamic world, technology is the key to evolution. Despite the creation of numerous gadgets, the computer remains the most popular device due to its role and functionality in both professional as well as leisure activities. Computers have suffered a tremendous process of evolution from the massive ENIAC to the small tablet. The aim of this research endeavor is that of identifying the ability of tablet computers to radically change the means in which information is managed. Specifically, the main research question is that of the ability of tablet computers to fully replace traditional computers. Several research questions have as such been developed, namely:…. [read more]


Forecasting Future Trrends in Digital Case Study

… Taylor, 2011). Technology is altering radically, until it's hard to keep up with the difficulties that seem to continue on an ordinary foundation.

Digital crime will keep developing for the reason of technology. Research makes the point that the more technology comes out the worse digital crime is going to get. It is to the point now you can use your cellphone to finish up transactions that are illegal (Eijkman, 2013). They are even making tools that are years in advance in fax machines, scanners, copiers, and printers. Everything is turning out to be more and well-organized for behavior that is considered to be criminal. These kinds of things criminals utilize in order to access whatever information or to finish a job that is documented…. [read more]


Life Case Study

… Life Span Case Study Project: An Analysis of How Computers Have Affected the Lives of Three Different Age Groups

This life span case study project interviewed three individuals from the following age ranges, representing a mother, father and child in the same family who all live together:

Interviewee No. 1: "Mary," age range middle and late childhood (age 12 years);

Interviewee No. 2: "Anne," age range early adulthood (age 35 years); and,

Interviewee No. 3: "Bill," age range middle adulthood (age 54 years).

All three interviewees were located by word-of-mouth requests to family members, neighbors and friends for suitable subjects until three individuals of appropriate age ranges were identified who agreed to participate in the study. The family containing an appropriate mix of ages was…. [read more]


Artificial Intelligence Term Paper

… " Most of these bits of information seem so nonessential, that people do not even think twice about them. For instance, "Children are younger than their mothers," or "You cannot see with your eyes closed." However, to give a computer common sense, it needs to store millions of such pieces of knowledge and link them together to make simple deductions. It has to be able to determine if A=B and B=C, then A=C.

Lenat's CYC project has involved hand-coding many millions of assertions. By the end of its first six years, over one million assertions had been entered into the KB. Lenat estimates it will require some two-person-centuries of work to increase this figure to the 100 million assertions necessary before CYC can begin learning…. [read more]


Computers Are an Underutilized Resource Term Paper

… This study will be of use to the physical education departments and administration of many school districts. It will serve as a springboard for them to develop their own plans and ideas.

The focus of the study will be on the high school level, but the concepts derived from it will be applicable on the Junior High and lower levels as well. They computer technology involvement may not be as extensive as on the High School level, but it will have some use. The focus of the study is on the high school level as these students are beginning to gain exposure to computers in other areas.

The study will encompass only high schools in my state of residence. The reasoning for this is that…. [read more]


Internet Has Grown Exponentially Term Paper

… For an educational institution, the ability to connect to various online journals and libraries as well as access resources of other universities can help improve and growth the curriculum and the courses supported by school is critical and all effort should be made to ensure that over-blocking does not happen.

Literature survey

There is no doubt that the Internet has impacted the way information is collected, disseminated and made available free of cost (mostly) to all users. As useful as the Internet has been with all the information that it provides, some of the content is not desirable for all sections of society that use the Internet. Research indicates that parents, schools and society are increasingly looking for ways by which they can restrict the…. [read more]


Violence in the Media TV Movies and Video Games Research Paper

… Violence in the Media and Children

Violence in media has become a serious problem. Children are heavily exposed to violence in films, TV shows, and video games from their early ages. This heavy exposure to violence may lead to aggressive and violent behavior, encouraging children to see violence as normal. And because of the popularity of violence in media and the fact that children today represent a very lucrative market, the entertainment industry takes advantage of this situation by targeting children for their products that glorify violence. In essence, the producers of violent media content and video games are guilty of child exploitation. To address the problem, the public needs greater regulation of violence in media to protect children.

Violence in Media: Why Greater Regulation…. [read more]


Impact of E-Community Term Paper

… ¶ … E-Community

When an e-community consists of positive components; constructs; consensuses, then the impact this virtual community wields upon its members will consequently prove to be positive. This researcher contends that this study ultimately confirms the validity of this statement, which constitutes the hypothesis for this study. Consequently, as this researcher relates results formulating the conclusion for this study, which deliberately focused on the impact of e-communities, recommendations (for further consideration) are also presented.

E-communities, with seemingly unlimited boundaries, encompass a myriad of similarities; yet reflect a range of differences from "real" communities, defined by geographical borders. Through the analysis of each of the five following research questions, explored during the research process, this researcher extracted pertinent points leading to the study's conclusion:

What…. [read more]


Concepts of Social Business and Social Media Dissertation

… " This point is also made by McGriff (2012, p. 49) who writes, "The emergence of social media platforms has expanded the communications reach of consumers who have become increasingly vocal through boycotts about the misdeeds or malfeasance of companies that market products or retail brands." In the past, companies have enjoyed exclusivity over communications control to improve brand equity; the emergence of interactive two-way online communications such as social media sites have exploded in growth in recent years, and it remains unclear just how much more growth the medium will experience before saturation levels are reached (McGriff 2012). According to McGriff (2012, p. 50), "The growth of the social media platform poses immediate communications challenges in the management of brand image and reputation."

Furthermore,…. [read more]


Computer IT Security Implementation Term Paper

… The project entails relying on the Open Systems Interconnect (OSI) Model defined by the International Organization for Standardization (ISO). The goals and objectives are to first create a Baseline Security Level and also to manage to Real-Time Security Metrics. This goal entails the objectives of defining an executive and corporate wide audit of the existing data security process and evaluating organizational performance for all major components and key security metrics to verify that they do or will meet industry standards. Next come the objectives for systematically developing sourcing and supplier criteria for potential or future purchasing agreements of all new products and services.

The second priority goal would entail defining and executing assessments of application-based security systems and process on a periodic schedule. This is…. [read more]


Apple Computer Term Paper

… Apple Computer

About the Company

Apple Computer, Inc. is a Silicon Valley company based in Cupertino, California, whose core business is computer technologies. Apple helped start the personal computer revolution in the 1970s with its Apple II and shaped it in the 1980s and since with the Macintosh. Apple is known for innovative software and hardware, such as the iMac its iPod digital music player and the iTunes Music Store.

Apple has been criticized for their vertically integrated business model, which runs against the grain of much of the perceived wisdom of economists, particularly for the computer industry. However, the company is profitable. Other criticisms have included that it has been very personality driven, especially in the two different eras of Steve Jobs' tenure; some…. [read more]


Smart Phones Essay

… This competition is providing the world with superior, more advanced smart phones and other such inventions in every passing year.

Market strengths and weaknesses

I personally think Smartphone industry is in star position although it has attained 75% market penetration the growth has not stopped yet and its market share is increasing. According to survey by nelson in third quarter of 2011, smart phone ownership has reached 43% in United States. In addition, according to 2012-second quarter survey android holds 51.8% of all U.S. smart phones.

What adds strength to this market is the fact it provides lots of features in a very compact size, features such as camera, video recording, web connectivity, spreadsheets and word processor, radio, games, music player, GPS and many with…. [read more]

NOTE:  We can write a brand new paper on your exact topic!  More info.