NAVIGATE |
|
|
MEMBERS |
|
|
SUBJECTS |
|
|
|
Software Piracy
Number of words: 460 - Number of pages: 2.... has no real
control over america since they can't even control themselves , software is
protected from the moment of its creation . As soon as that software hits the
store it is protected by the United States Federal Government . Yet , thousands
of software titles have been put out there , and the government hasn't protected
a fucking thing from happening . What a joke , how can we let such morons run
this nation . The law in the USA states that a person may who buys the software
may (I) copy it to a single computer and (II) make a copy for “archival purposes”
. This also holds true in c .....
Get This Paper
|
|
Facing Reality
Number of words: 950 - Number of pages: 4.... for he states that Americans experience of war in the past has created an attitude of "it can't happen here" to grow.
Weizenbaum tries to say the military is not an evil or technology is not evil because it has been adopted by the military, but we are becoming increasingly militarized. I think he states this in an effort not to make direct negative statements towards the government in fear of the possibility of prosecution. Although the computers' personal uses are fine he believes that the principal applications and intelligence within are devices intended to kill people.
Artificia .....
Get This Paper
|
|
Data Security
Number of words: 1173 - Number of pages: 5.... on The Internet 12). The corporation Citibank also had an
incident in 1995 in which Russian hackers stole over 10,000,000 dollars in
fraudulent wire transfers by exploiting a hole in it's systems provision
for money transfers. It cost the Italian government over 225,000 to repair
a glitch in The Rome Air Force Base's system. The telecommunications giant
of the west Southwestern Bell had a problem with a hacker named
Christopher Schanot that cost them around 100,000 dollars. According to
the CSI FBI Computer Crime and Security Survey, 246 organizations
reported over 100,000,000 d .....
Get This Paper
|
|
Parts Of A Computer And What They Do
Number of words: 2549 - Number of pages: 10.... when the current is depressed and the
current decreases.
Over the years many new types of keyboard have been thought up
these are mostly more ergonomically designed than there older counter parts
this is done in order to reduce R.S.I a problem that effects a lot of
typists
One of the most interesting keyboard is a device called a data hand
this will take a combination of hand movement and clicks and convert them
in to working commands.
Another type of keyboard is the virtual keyboard this removes the
physical keyboard and replaces it will a digital interpretation that .....
Get This Paper
|
|
Hackers
Number of words: 10104 - Number of pages: 37.... USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77
Introduction
The proliferation of home computers has been accompanied by a corresponding social problem involving the activities of so-called "computer hackers." "Hackers" are computer aficionados who "break in" to corporate and government computer systems using their home computer and a telephone modem. The prevalence of the problem has been dramatized by the media and enforcement agents, and evidenced by the rise of specialized private security firms to confront the "hackers." But despite this flurry of attention, little research has e .....
Get This Paper
|
|
Computer Crime: A Increasing Problem
Number of words: 2548 - Number of pages: 10.... the use of computers. Banks transfer
trillions of dollars every day over inter-linking networks, and more than one
billion pieces of electronic mail are passed through the world's networks daily.
It is the age of the computer network, the largest of which is known as the
InterNet. A complex web of communications inter-linking millions of computers
together -- and this number is at least doubling every year. The computer was
originally designed as a scientific and mathematical tool, to aid in performing
intense and precise calculations. However, from the large, sixty square foot
ENIAC .....
Get This Paper
|
|
Data Warehousing
Number of words: 2756 - Number of pages: 11.... in conjunction with this paper. In his June 1997 paper, Marc
comments on how little extended discussion of politics there is in the data
warehousing literature. As of the writing of this paper, to the best of my
knowledge, that situation still has not changed. This in unfortunate
because ambitious data warehousing projects are rife with political issues.
My working definition of a data warehousing "political issue" is a
situation where the equally valid and reasonable goals and interests of two
or more parties collide with each other. That is, these are situations
where the .....
Get This Paper
|
|
The Microsoft House
Number of words: 1077 - Number of pages: 4.... house will include the following:
· A high-speed wireless home network that enables users to play music and videos, or display family photographs anywhere they want on any intelligent device.
· Windows Media™ Audio Player, which downloads twice as fast as MP3 and has double the music storage, plus powerful anti-privacy protection.
· The evolution of WebTV Network™ service with on-demand programming, personalized viewing, Web-enhanced content and powerful communications built in.
· The next generation of gaming, offering online competition with voice interaction, immersive audio, un .....
Get This Paper
|
|
Macintosh Vs. IBM
Number of words: 3121 - Number of pages: 12.... to supply its chips for the first IBM personal
computer. When the personal computer hit the market it was a major hit and IBM
became a strong power in electronic computers. Phoenix Technologies went
through published documentation to figure out the internal operating system
(BIOS) in the IBM. In turn, they designed a BIOS of their own which could be
used with IBM computers. It stood up in courts and now with a non IBM BIOS, the
clone was created. Many manufacturers jumped in and started making their own
IBM Compatible computers, and IBM eventually lost a big share in the desktop
computer .....
Get This Paper
|
|
Ibm
Number of words: 1295 - Number of pages: 5.... Atomic Energy Commission; close parallels existed between products made for government use and those introduced by into the public marketplace. In the late 1950s distinguished itself with two innovations: the concept of a family of computers (its 360 family) in which the same software could be run across the entire family and a corporate policy dictating that no customer would be allowed to fail in implementing an system. This policy spawned enormous loyalty to “Big Blue,” as came to be called.
From the 1960s until the 1980s dominated the global mainframe market, although in .....
Get This Paper
|
|