998 Search Results for Computers in Space Science
This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information excha Continue Reading...
Outsourcing
The Impact of Outsourcing on Information Technology in the U.S.
The greatest impact of outsourcing has been the decrease in the number of jobs in U.S. And this is only a continuation of the process that had begun earlier with the contra Continue Reading...
Artificial Intelligence
What is AI?
Future of AI
The Expert System
What is an Expert System?
Three Major Components of an Expert System
Structure of an Expert System
Neural network
Fuzzy Logic
Chaos Engineering
Field and Benefit
Debate on Continue Reading...
Columbia STS-107 Crew
Introduction/Space Shuttle Columbia
History of Columbia
It's all in a Name
Previous Missions
Columbia's Final Flight
The Crew
Richard Husbands
William McCool
Michael Anderson
David Brown
Kalpana Chawla
Laurel Clark
Continue Reading...
Flight Deck Human-Machine Interface - "What to Expect in the Future"
This paper will analyze the issues associated with the flight deck human-machine interface. The data for this research will be collected through a number of secondary sources. Quan Continue Reading...
Teaching Journal
Today being a productive teacher is more challenging than ever. Children are much more used to varied classroom approaches, with the Internet, computers and other electronic equipment becoming the norm. Gone are the days when studen Continue Reading...
For second-tier PC manufacturers this is the phase of the product lifecycle where pricing becomes the competitive weapon of choice, and in many cases, the other aspects of the marketing mix are ignored. Pricing as the only differentiator used during Continue Reading...
e-Commerce
This project is about e-commerce and how it has helped Apple in its business objectives. The purpose is of the paper is to illustrate the wide-ranging ways in which e-commerce can provide opportunity to corporate entities. Apple makes a g Continue Reading...
Qualitative research is different from quantitative research methodologies on the premise that it does not rely on numerical data. Qualitative research rely on text and image since it's a type of scientific research that seeks to provide contextu Continue Reading...
Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrume Continue Reading...
"
Monitoring and enforcing a [CO.sub.2] treaty would be very difficult, if not impossible.
Reductions in [CO.sub.2] emissions by rich countries could be negated by increased [CO.sub.2] emissions in fast-growing developing countries (Udall, 1990)."
Continue Reading...
Engineers should focus on the improvement of the performance of the economy. This relates to the transformation of the theories of controlling the world and adopting new frameworks in the operating in conjunction with the planet. New engineers need Continue Reading...
On pp. 35-36 it is clear that the U.S. government wanted to keep the Navajos "away from the Hopis" but didn't want to "anger the Navajos by moving them." The failure to correctly administer a negotiated settlement in this ongoing dispute was, accord Continue Reading...
Computer Games Research
When considering the short history of computers, video and PC gaming are very recent on the timeline of technology. This is one of the reasons why there have not been many conclusive studies on the negative and/or positive ef Continue Reading...
Computer Technology, The Concorde Jet Liner, And Ethics
The issues of ethic in business practices in the age of increasing computer technology and the importance of managing information has come to the forefront of organizational management issues. Continue Reading...
Computer games have lamentably been kept to such niche, and exist under a false essence as being immature and a waste of time. While, beyond any doubt, there are in fact whimsical/childish computer games out there, that doesn't imply that there aren' Continue Reading...
Human-Computer Interface
The first question is what the definition of haptic feedback and why it is needed. The second is to define the various types of human memory and the impact of the same on the human/computer interface. The third is to describ Continue Reading...
" (Johnson, 2005) the notion of ruling against the defendant in all identity theft or related cases may establish the wrong precedent for future cases. "On the other hand, if liability is too readily assessed, it will have the power to bankrupt valua Continue Reading...
Digital Signature Scheme Based on Factorization
The objective of this study is to discuss an issue in cryptography or computer security. Digital signatures are described as "an analog of handwritten signatures" which are based on "the physically idi Continue Reading...
worst that could happen to an information system was a natural disaster destroying all information, nowadays, the category of risks has become thoroughly diversified and, because an increasing use of informational systems as data storage and process Continue Reading...
Network Security Management
From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data Continue Reading...
D. (http://www.cancernews.com/data/Article/210.asp).
The created a need to research and develop a better method of mammography, which lead to the development of the new digital machine.
What is digital mammography?
Conventional film screen mammogr Continue Reading...
Cyber Security Vulnerabilities
Single Most Important Cybersecurity Vulnerability Facing IT Managers Today
Cyber Security Vulnerabilities Facing IT Managers Today
At present, computers link people to their finances through online banking and a numb Continue Reading...
High Level Languages in Software Development
A software developer must by the very nature of interaction with a computer, utilize a programming language. The language is simply a means to organize and specify that algorithm functions occur when nece Continue Reading...
Assurance and Security (IAS) Digital forensics (DF)
In this work, we take a look at three laboratory-based training structures that afford practical and basic knowledge needed for forensic evaluation making use of the latest digital devices, softwa Continue Reading...
This lead was accomplished through a partnership nearly a half-century old among government, industry and academia. I member of that partnership was the National Science Foundation (NSF). As Strawn noted, early on, scientists and engineers at Americ Continue Reading...
"
Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior").
Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This a Continue Reading...
Robotics
The popular concept of robots has been colored by stories of mythical mechanical beings dating back to antiquity, and fictional robots (remember "R-2 D-2?") depicted in popular science fiction movies such as the Star Wars. Robotics, however Continue Reading...
Artificial Intelligence
Intelligence is the ability to learn about, to learn from and understand and interact with one's environment. Artificial intelligence is the intelligence of machines and is a multidisciplinary field which involves psychology, Continue Reading...
Science fiction and horror both offer narrative closure and "the restoration of the social order," as does Repo Men, only in this case the social order being preserved is completely amoral and evil (Grant 21). It does not end with the monster or ali Continue Reading...
It initially failed to attract the desired audience, but it is believed that the recent innovations of the re-launched tablet PC would ensure its success (Search Mobile Computing, 2010).
While Apple stated that they were the first creators of table Continue Reading...
The use of open-ended questions that require multiple items in the answering points were observed to lead to a sharp increase in the attrition rate (Crawford et al.,2001). The use of questions that are organized into tables in conducting the various Continue Reading...
82).
Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actua Continue Reading...
Computer scientists and it professionals have been greatly demanded. Thus, one of the best possible courses to focus on in getting a Masters degree is Computer Science.
Deeper understanding to computer science cannot be done in just one snap of a f Continue Reading...
The user, of course, sees a virtual service (appearing like the data is stored in certain icon), the actual storage could be anywhere, and could vary from day-to-day. This is an advantage to the overall efficiency of the system because storage resou Continue Reading...
" This approach would also help protect computer systems from unauthorized access by insiders as well, he says (3).
In the spirit of "fight fire with fire," Rowe says that because computer hackers typically use deceptive practices (e.g., impersonati Continue Reading...
Tablets Take Their Place in the PC Market
The invention of the personal computer (PC) has an impact on the technological progress of the world. The technology that came into force in the early 1980s began as bulky machines and has since evolved into Continue Reading...
Whereas adult obesity rates have always been present, they have never been so high. What is more worrisome is that youth is becoming increasingly obese. The American Heart & Stroke Association conducted a study, for instance, in which it found t Continue Reading...