Enter Topic  

» Get Technology Papers

DVD VS. DIVX: Consumer Product Investigation

... to utilize them as well as get better cleaner crisper video signals through their television. In just over a year the consumer technology DVD (Digital Versatile Disc) has made huge wages in the consumer home video market. This paper will explore the benefits of DVD as well as explore some the technical possibilities that are made available to consumers with DVD. It will also look at the latest features of DVD, DIVX (Digital Video Express) and let the reader make the decision if it's an option that is really all that necessary. DVD is a r ...

Number of words: 1440 | Number of pages: 6

The Y2K Problem

... designed a system whereby the program would be aware of the century, regardless of the data records used. Hindsight is always 20/20 however, and this was almost never the case. Regardless where you address the problem from, the year 2000 problem is a huge, expensive and international one. In many cases it is a problem lined with doubt as to it's effects. This paper will analyze the various aspects to the year 2000 problem, classical and software solutions to the problem, and present the author's ideas on how a systematic approach to the "mi ...

Number of words: 4210 | Number of pages: 16

Government Intervention Of The Internet

... carrier for long distance voice calls and video conferencing, this network is key to the future of the knowledge society. At present, this net is the epitome of the first amendment: free speech. It is a place where people can speak their mind without being reprimanded for what they say, or how they choose to say it. The key to the world-wide success of the Internet is its protection of free speech, not only in America, but in other countries where free speech is not protected by a constitution. To be found on the Internet is a huge coll ...

Number of words: 2350 | Number of pages: 9

Advancement Of The Computer

... we classify them into different generations. In every generation the computer was greatly improved on. 1951-1959 were the years of the first generation of computers. In 1951 Computers were only owned and used by scientists, engineers, and the military. They had not even been introduced for business use, and not many people knew about them. These computers ran on vacuum tubes. They were very large, slow, and produced a lot of heat. The vacuum tubes that the computer ran on failed frequently. They were down and not running for most of the time. ...

Number of words: 604 | Number of pages: 3

The Arrival Of The Internet

... deviants, to depression. They have caused some people to fear and avoid the Internet. The Internet, despite its problems, is a very useful and relatively safe technology. Many of the problems seem much worse than they really are. There are certain precautions one must take to avoid some of the dangers associated with the Internet. If these precautions are taken, the Internet should prove safe. The Internet, simply put, is a bunch of computers that can communicate with one another via telephone lines, optical fibers, radio and satellite ...

Number of words: 2978 | Number of pages: 11

The Origins Of The Computer

... bloomed with trading cities ten times the size of their predecessors with public amenities previously unheard of courts, theaters, circuses, and public baths. And these were now large permanent masonry buildings as were the habitations, tall apartment houses covering whole city blocks. This architectural revolution brought about by the Romans required two innovations: the invention of a new building method called concrete vaulting and the organization of labor and capital on a large scale so that huge projects could be executed quickly ...

Number of words: 993 | Number of pages: 4

Computer Viruses

... in the name of "free speech." These new breed of criminals claim that information should not be suppressed or protected and that the crimes they commit are really not crimes at all. What they choose to deny is that the nature of their actions are slowly consuming the fabric of our country’s moral and ethical trust in the information age. Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They ...

Number of words: 1753 | Number of pages: 7

Usage Of The Internet

... the largest nations." (Anderson, July 1, 1995, p. S4) Additionally, according to Nielsen, the number of users who have gone online looking for product information grew from 19% in 1995 to 39% today. Still, only 15% of Internet users have actually purchased products online, indicating that the business value of the Internet is in promoting products, not in sales. (Associated Press, March 13, 1997) According to survey results released by DeWitt Media in February 1997, almost two-thirds of all marketers have advertised on ...

Number of words: 819 | Number of pages: 3

Integrated Software Application

... with all the help that has been given to us, we haven't done anything for software and the people who write it. Software by nature is completely defenseless, as it is more or less simply intellectual property, and not a physical thing, thus very easily copied. Copied software does not make money for its creators, and thus they charge more for whats not copied, and the whole industry inflates. There are two categories of intellectual property. The first one is composed of writing, music, and films,which are covered by copyright. Inventions ...

Number of words: 2676 | Number of pages: 10

Computers: Nonverbal Communications

... to be found in those environments known as Internet MUDs, or Multi-User Dimensions. These text-based virtual realities are presently available to students and faculty at most learning institutions, as well as anyone with a computer and a modem. Though the term "virtual reality" has become connected for many with visions of fancy headgear and million dollar gloves, MUDs require no such hardware. They are, however, a form of virtual reality, "because they construct enduring places, objects, and user identities. These objects have characteristic ...

Number of words: 4524 | Number of pages: 17

Computing Machinery And Intelligence

... is “can machines think?”(p.443) This question is then sought by proposing an imitation game which would serve to draw a “fairly sharp line between the physical and the intellectual capacities of man”(p.444). Turing explains that the “idea behind digital computers…these machines are intended to carry out any operation which could be done by a human computer”(p.436). In effect, these machines are supposed to imitate the things a human being can do. For example, a computer learns how to receive, analyze and store information. ...

Number of words: 515 | Number of pages: 2

The Linux Operating System

... everyone. This however, doesn't mean that Linux and it's assorted distributions are free -- companies and developers may charge money for it as long as the source code remains available. Linux may be used for a wide variety of purposes including networking, software development, and as an end-user platform. Linux is often considered an excellent, low-cost alternative to other more expensive operating systems. Due to the very nature of Linux's functionality and availability, it has become quite popular worldwide and a vast number of software p ...

Number of words: 747 | Number of pages: 3

Pages: 1 2 3 4 5 6 7 8 9 10 11 next »