Other Technology Essay Examples and Topics. Page 5

553 samples

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Pages: 18
  • Words: 5033

Green Computing in Botswana

The primary goal of green computing is to mitigate the use of harmful resources. Section B of the questionnaire focused on assessing how the respondents handle computers.
  • Pages: 2
  • Words: 550

Augmented Reality Technology

The cost effectiveness of this technology arises from its ability to keep a project on track, and this is the cost benefit of augmented reality.
  • Pages: 4
  • Words: 1291

People Attitude about Green Computing

The first category is composed of the direct effects of the information technology products on the environment. The country leads in terms of the wide use of computers and other information technology devices.
  • Pages: 3
  • Words: 837

The Samsung Galaxy Tab

It should be noted that the Galaxy Tab is based on the successes of the Galaxy S.whereas Apple's iPad was the first of such gadgets into the market; Samsung already had Galaxy S in the [...]
  • Pages: 8
  • Words: 868

How podcasts differ from radio

The internet is less subjected to the limitations on the scope of coverage that are radio experiences. The role of content creation is also easy for podcasts in comparison to radio broadcasts.
  • Pages: 2
  • Words: 557

Multimedia Hardware Key Devices

Differentiation multimedia devices and product evaluation The multi-communication tools are instruments that support the transfer of data from one standpoint to another. That is the devices influence image display, production of pictures, drawings, storage of [...]
  • Pages: 6
  • Words: 1692

Miniature Camera on Soccer Shirt

The issue is that some of the motions and rapid movements may lead to confusion, and it is paramount to take all the necessary measures to make sure that the level of stability of is [...]
  • Pages: 6
  • Words: 1664

ArchiMate Architecture, ArchiMate Series, and Related

The research carried out by Iacob and Jonkers sought to define the process of model integration for ArchiMate, and found that the language uses integration of detailed designs to visualize, and analyze enterprise architectures.
  • Pages: 7
  • Words: 2055

Tablet PC Product Analysis

Rutenbeck opines that "Tablet PC is cost effective, a mini- laptop device, and is designed with pen drive that makes it more useful especially to university students".
  • Pages: 6
  • Words: 1662

Miniaturization Process Associated Risks

Miniaturisation is the process of continued minimisation of the sizes of devices and products. Privacy The reduction of the size of technological devices has made stalking and invasion of privacy an easy process.
  • Pages: 5
  • Words: 1539

The influx of wireless technologies in organizations

This implies that wireless and mobile technologies plays a significant role in the expansion of the communication lines within the organization, which in turn increases the capability and the capacity of the organization to respond [...]
  • Pages: 9
  • Words: 2484

Wireless Sensor Networks

The set up of this topology is very organised in such a way that, every single node in the system has a unique number of nodes, which are interlinked to it, at the lower point [...]
  • Pages: 5
  • Words: 1618

Blu-Ray Triumph Over HD-DVD

HD-DVD war, Sony had an upper hand in their Blu-Ray discs that store 25GB on a single layer compared to HD-DVD having a capacity of 15GB on a single layer.
  • Pages: 3
  • Words: 702

The tale of two optical discs

The first flaw associated with the HD-DVD was disc capacity, whereas the HD-DVD disc had a maximum capacity of 15GB per side, the Blu-Ray disc has a maximum capacity of 25GB per side, hence, the [...]
  • Pages: 3
  • Words: 832

Computer Forensics Related Ethics

Due to advancement in technology, individual information can be kept in databases, the risk of accessing this data is evident and this necessity the need of such a law so as to ensure security.
  • Pages: 13
  • Words: 3655

Contemporary issues in Multimedia and IT

CSEA reduced the thoroughness of privacy and made it easier for the ISP to hand over information to the government whenever the relevant authority suspects unlawful dealing in the local networks.
  • Pages: 5
  • Words: 1602

Ethics in the IT Practice

These are among the issues which have necessitated the governments across the globe to collaborate and develop comprehensive and detailed laws regarding the use of information technology.
  • Pages: 5
  • Words: 1416

Current and Past Technology

Technology and marketing are inseparable in that marketing have to keep pace with the developing technology to ensure they use the most modern technology of the time.
  • Pages: 3
  • Words: 788

Technological impact of the Samsung NC215S Netbook

While many netbooks and laptops have been launched with great technological features, the thing that sets this Netbook apart from others is that its lid carries a solar panel on the top that allows the [...]
  • Pages: 2
  • Words: 601

Wireless Technology in IKEA

In case with wireless power, the focus is made on efficiency because it influences the extent by which the energy is sent to the receivers of the power.
  • Pages: 10
  • Words: 1910

Technology and Its Future Development

It is clear that technology is starting to become smaller but it is to the benefit of people and with careful control will not evolve into a great evil.
  • Pages: 2
  • Words: 559

Negative Impacts of Computer Technology

For instance, they can erase human memory, enhance the ability of human memory, boost the effectiveness of the brain, utilize the human senses in computer systems, and also detect anomalies in the human body. The [...]
  • Pages: 4
  • Words: 1103

Entrepreneurship, Creativity and Innovation

According to Freeman, the national system of innovation is defined as, "The network of institutions in the public- and private-sectors whose activities and interactions initiate, import, modify and diffuse new technologies".
  • Pages: 6
  • Words: 1575

Multiple Dimension of Value: Blu-Ray v. HD-DVD

The paper also outlines some of the techniques that a firm can apply to improve the overall performance of its technology and design. The Blu-ray technology, due to its compatibility with a number of technologies, [...]
  • Pages: 6
  • Words: 1632

Ethics and Nanotechnology

Although the development of nanotechnology is significant for the general technological progress of the contemporary science and it can meet the people's needs, from the perspective of their impact on humans, the achievements in nanotechnology [...]
  • Pages: 7
  • Words: 1884

Mitsubishi Projector Manual

The projector has a remote control which may be used to control the operations of the projector from a distance. The size of the picture on the screen is varied by changing the distance between [...]
  • Pages: 2
  • Words: 544

Emerging Technology in Wireless Networking

The volatile growth of wireless systems together with the proliferation of laptop and miniature computers points out a brighter future for wireless networks, both as independent systems and as part of the wider networking infrastructure.
  • Pages: 10
  • Words: 2753

Television as a Domestic Technology

Ever since the launch of digital television and the introduction of the set-top box as the modern consumer technology to replace the analogue television system, television has been cast into the limelight with respect to [...]
  • Pages: 4
  • Words: 1247

Analysis of Sony PS3

As a gaming console the PS3 promised, and subsequently delivered, games which would literally astound gamers with the depth of the graphics and the greater degree of in-game features not present in the previous generation [...]
  • Pages: 2
  • Words: 592

Macintosh Advantages and Disadvantages

Based on the various facts presented it can be seen that in terms of their overall ease of use, versatility when it comes to using media based applications, external aesthetic quality and the inherent stability [...]
  • Pages: 2
  • Words: 577

Capturing Images in the 21st Century

In the case of more complicated shots the cameraman has to work closely with the subject but in the 21st century the same thing can be achieved instantly and without the knowledge and consent of [...]
  • Pages: 2
  • Words: 530

The History of 3-D Film Making

Judging from the release of at least 3 3-D films a month this year, it seems that the 3-D format is here to stay and finally take its place in film making history.
  • Pages: 3
  • Words: 1001

DirecTV Organizational Technology Plan

In the contemporary world, technology has become an integral part of organizations; however, it has affected the society and the environment mainly due to the changes that come about with it, which people have to [...]
  • Pages: 3
  • Words: 967

Technology and Music Industry

The impact of file sharing technology in the music industry has been a major obstacle to its advancement. In a clearer way, the future purchase and sale of music is anticipated to be easier.
  • Pages: 6
  • Words: 1720

Description of Global Positioning System Device

Image 1 shows the positions of the various satellites that constitute the GPS. It is done to establish satellite clock and orbits profiles in order to update the navigational information of individual satellite.
  • Pages: 2
  • Words: 593

Process Description: 3D Printing

The material is the string-like strand of plastic coiled in the back of the printer. In turn, the movement of the print head is directed by the 3D file sent to the printer.
  • Pages: 2
  • Words: 539

Print Your Gun at Home

Modern researchers and public safety professionals agree that, coupled with the enormous information-disseminating power of the Internet, 3-D printers have the potential to turn gun manufacturing into a home-based industry, and banning 3-D-printed guns would [...]
  • Pages: 6
  • Words: 1650

Effects of Surveillance Technology on Privacy

The presence of surveillance devices and gadgets in public gathering places limits the use of the public places, as many people will tend to avoid such places in fear of exposing their privacy to their [...]
  • Pages: 6
  • Words: 1660

High Power DVDs: Product Analysis

The High Power Subwoofer will always have you daring to move closer to the beat and the vibration mode is enough to turn your house into a club.
  • Pages: 2
  • Words: 662

Digital Technology in Modern Society

From the above analysis, it is more evident that digital technology has a wide range of effects to our culture and to the young generation.
  • Pages: 3
  • Words: 1091

Wireless Technologies

In a bid to improve technology in the building, it is important to implement the wireless security devices. The cameras are also easy to hack into since the level of their security system is low.
  • Pages: 2
  • Words: 554

The Rationale of the Cryonics

The Egyptians hence tried to make sure that they preserved a person very close to immortality and this is the reason why they when to greater extent of building the pyramids and doing the mummification.
  • Pages: 6
  • Words: 2017

Biometric Technologies and Security

To achieve this, the assumptions that biometrics facilitate the invasion of privacy, may have dangerous health effects on the users, are discriminatory and are unnecessary expenses need to be laid to rest if the full [...]
  • Pages: 10
  • Words: 2830

Electronic Range Finder Technology Application

In the early 1960s, the devices were actively fitted in the most expensive cameras. Although more sophisticated auto-focus devices later outnumbered the range finders, some of these cameras are still in use today.
  • Pages: 2
  • Words: 546

The differences between e-readers and tablets

The spread of the innovative technologies pushes some people on the idea that books are going to disappear. First, the ancient books as the reminder of human history are going to remain.
  • Pages: 2
  • Words: 583
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.