EssayZap  
Enter Topic  

» Get Technology Papers

So, How Does It Work? The Wankel Rotary Engine

... "Stroke") The RCE has four phases in its combustion cycle which means it is an Otto Cycle engine. Unlike the conventional piston engine, the fuel air mixture is swept along, so the four phases take place in different areas of the engine. This turns out to be an advantage for Hydrogen fuel. Java Demonstration of RC Engine Cycles (about 104 KB) There is a 1/5 scale model "Visible Rotary Engine", available from D and J Hobby and Academy (and undoubtedly others). There is also a .30 model Wankel engine from OS / Graupner. Rotor, Ecc ...

Number of words: 758 | Number of pages: 3

Propaganda In The Online Free Speech Campaign

... barriers within computer networks, and this has not been greeted with admirable commentary. This one part is called the Communications Decency Act (CDA), and it has been challenged in court from the moment it was passed into law. Many of the opponents of the CDA have taken their messages to the Internet in order to gain support for their cause, and a small number of these organizations claim this fight as their only cause. Some of these organizations are broad based civil liberties groups, some fight for freedom of speech based on ...

Number of words: 5040 | Number of pages: 19

Overview Of Video On Demand Systems

... for network integrators. Clients want the ability to retrieve and view stored video files asynchronously at near broadcast quality, on a local host. Some problems integrators face to achieve this goal include: video content preparation, server storage, network throughput, latency, client interfaces, quality of service, and cost. This paper addresses the design considerations for a private video on demand implementation. INTRODUCTION The Initiative for Worldwide Multimedia Teleconferencing and Video Server Standards The market for mul ...

Number of words: 4294 | Number of pages: 16

Effects Of The Year 2000 Problem

... the problem, and so far nobody's been able to come across an exact solution. What is the Year 2000 Problem? The Year 2000 problem is more commonly referred to as the Y2K problem or the Millennium bug. The Y2K problem has to deal with how computers keep track of the date. In almost every system before 1995 the date that the computer kept was abbreviated. An example would be that 1951 would be abbreviated as 51. So, as a result, computers will read 00 and think it's 1900 and not 2000. This seemingly small problem will result in a ...

Number of words: 1661 | Number of pages: 7

Will Computers Control Humans In The Future?

... control humans. One of the images which Asimov describes in the book is that humans might become too dependent on computers. In one of the stories, Profession, Asimov writes about people being educated by computer programs designed to educate effortlessly a person. According to the Profession story people would no longer read books to learn and improve their knowledge. People would rely on the computers rather than "try to memorize enough to match someone else who knows" (Nine Tomorrows, Profession 55). People would not c ...

Number of words: 865 | Number of pages: 4

CAD/CAM Systems

... computer, workstation, that can either be driven by a personal computer, or a high end workstation. This software package is used to create CAD (Computer Aided Design) models (Fuori 588). There are basically three types of CAD models. The first type is wire frame models, just a wire of zero thickness displaying the designed shape for the intended designer. The second type of model is the surface model, a series of small and large sheets connected to one another like a quilt blanket, displaying the shape the designer intended. Lastl ...

Number of words: 881 | Number of pages: 4

Use Of Non-Lethal Weapons

... not need to happen, and won't happen if weapons such as tasers are used in everyday life. Another problem in our society is violence such as riots and fights. These things can be controlled with sticky foam, water cannons, or rubber bullets. The main reason to choose tasers and new-age weapons over guns, is the fact that they are non-lethal. Every year about 500 police officers are killed by guns. This kind of death doesn't need to happen. In 1983, 10,895 people were killed by firearms. In 1973 over 100 innocent children were killed by ...

Number of words: 257 | Number of pages: 1

Even From It's Humble Beginnings, The Internet Has Always Been A Battlefield Between Phreaks And Administrators

... Voice Mail Box 2. Kevin Lee Poulsen 3. Tonya Harding 4. Mark Abene V. Prevention A. CERT B. Newer Security Systems 1. Not Effective 2. Part of the Game VI. Conclusion The Internet is a wondrous place. Practically anything you could ever want is available on the Net. It's like a big city, it has the highly prestigious areas, and the sex-ridden slums. It has the upstanding citizens, and it has the criminals. On the Net, crime is more abundant than in a large city, though, mainly because of the difficulties in tracking and pr ...

Number of words: 1773 | Number of pages: 7

Internet Censorship

... blessing. Today people pay ISP's or Internet Service Providers for internet access. ISP's usually have fast computers with dedicated connections to the internet. ISP's now more than ever are becoming the backbone of the internet. The average netcitizen uses their computer to call and ISP, and the netcitizens computer temporarily becomes a part of the internet. The user is free to browse or transfer information with others. Most ISP's even allow their users to set up permanent homepages on the ISP's computer for the whole internet community ...

Number of words: 2575 | Number of pages: 10

History Of The Internet

... being advertised to society. One of which was the Clinton Gore campaign of 1992 that took full advantage of the possibilities the technology could offer to society. Then with the heightened press, of the information super highway coined by their campaign, would only further catapult the development of the Internet. As this new technology momentum grew it made the world accessible to everyone and certain group's willingness to take advantage of the Internet. This would lead to need for regulation in what is acceptable content on the Internet ...

Number of words: 4930 | Number of pages: 18

Computer Crime

... or gasoline, or when a "computer virus"--a program capable of altering or erasing computer memory--is introduced into a computer system. As subjects of crime, computers represent the electronic environment in which frauds are programmed and executed; an example is the transfer of money balances in accounts to perpetrators' accounts for withdrawal. Computers are instruments of crime when used to plan or control such criminal acts as complex embezzlements that might occur over long periods of time, or when a computer operator uses a com ...

Number of words: 3398 | Number of pages: 13

Webhosting For An Online Store

... Reasons for changing usually fall into one of three broad categories: either your store outgrows the features and facilities your current Web host offers, or the performance of your Web host becomes unsatisfactory, or the worst possible scenario -- your Web host goes out of business. For a brick and mortar business, the biggest tragedy is probably a fire -- few people realise how large a proportion of businesses fail to re-open after a major fire. I would equate the failure of a Web host for an e-commerce site to that of a fire for a tradit ...

Number of words: 667 | Number of pages: 3

Pages: 1 ... 6 7 8 9 10 11 12 13 14 15 16 next »