Tech & Engineering Essay Examples and Topics. Page 26

5,747 samples

The Development of the Vanguard Web

After sometime, during the use of the Vanguard website, the managing director noted a problem with the employees web interface and proposed the employees use the same web interface with the customers.
  • Subjects: Programming
  • Pages: 2
  • Words: 594

The Multimodal Theme of Information Technology

This report compares the integration of the multimodal theme of information technology in the strategic, learning process and belief system of an organization in order to determine the feasibility of information technology integration in organizational [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 2005

Comparison Ontology Modeling With Other Data-Based Model

This is the organized representation of the information that the database requires including the information objects, the linkages in between the information objects and the guidelines that are used in the running of the relevant [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2172

Upgrades Using Project Management Techniques

To begin with, it should be stated that the concepts of network security and information security are similar, and they are often used interchangeably.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 516

Employee IT User Acceptable Policy

That is why the policy of the company is according to the usage of informational technologies and assets which they encompass.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1119

Multi-Touch Touch Screen Controls in Military Aircraft

The attitude indicator is in the centre of the top row, the Airspeed indicator is to the left, the altimeter on the right, and the gyrocompass or heading indicator in the centre of the second [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1338

The Internet is a Democratic Technology

As opposed to what in the media channels of communication where the information let out to the public is filtered and influenced by what the government want the people to know, the Internet is free [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 890

Computational Knowledge in Wikipedia

The paper employs the articles of Wu and Weld "Automatically Refining the Wikipedia Infobox Ontology" and article of Syed, Finin and Joshi "Wikipedia as an Ontology for Describing Documents" in providing better knowledge for Wikipedia [...]
  • Subjects: Data
  • Pages: 3
  • Words: 855

Low-Cost Carriers and Secondary Airports

LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
  • Subjects: Aviation
  • Pages: 2
  • Words: 929

Open Search Standard in Windows

A standard definition for OpenSearch as given by its website, opensearch.org, says that "OpenSearch is a collection of simple formats for the sharing of search results".
  • Subjects: Data
  • Pages: 6
  • Words: 1432

Design of Object-Oriented Programming

The objective of this paper is to design a network that will be appropriate for the Wembley and Harrow sites, which are approximately 3 miles apart and are within line of sight of each other.
  • Subjects: Programming
  • Pages: 2
  • Words: 605

How to Use Speech Recognition Program

The objective of the paper is to provide insightful research on how to make use of the Microsoft speech recognition engine.
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Implementing Management Software System Using SDLC

The feasibility will involve the identification of the expected costs that will be needed to complete the project. Planning: At this phase, we will need to develop a planning phase for the project.
  • Subjects: Applications
  • Pages: 2
  • Words: 673

Context-Aware Applications

In particular it is necessary to discuss the peculiarities of the solutions which are able to respond to the changes in environment and show how the emergence of such programs impacts the process of design [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 622

Life, Achievement, and Legacy to Computer Systems of Alan Turing

Turing was quite influential in computer science development, in addition to setting the framework for the formalization of the algorithm concept, in addition to the use of the Turing machine that he developed, for computation.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 536

Information systems tools

The first step is to add the Person Specification in the sheet named "Essential & Desirable Criteria". Add all the Essential Criteria in column C and Desirable Criteria in column E.
  • Subjects: Project Management
  • Pages: 8
  • Words: 761

Best Buy Enterprise Network Design

Analysis of the existing network technology of Best Buy reveals that its network infrastructure cannot connect to all the locations that the company is operating.
  • Subjects: Project Management
  • Pages: 6
  • Words: 2098

WorkShop Report: Client-Server Technology Bco-5502

However, on the framework of TCP/IP configuration, it is possible to locate the IP name resolution under the parameters of the NetBIOS resolution and with the use of the Windows NT 4.0.
  • Subjects: Programming
  • Pages: 3
  • Words: 2212

Product Break Down Structure

The Product Breakdown Structure, based on the principle of dividing the products by their origin, is aimed at highlighting this type of product as the basis of the business activity, and the result of the [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 368

SAP Software Solutions Systems

The role of a Basis Administrator in an organization implementing an R/3 system is crucial as it is the Basis Administrator who runs the system, introduces it to the organization and all its employees, provides [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2318

Information Security in Company’s Financial Operations

According to findings of a research published by Symantec "2009 Storage and Security in SMBs survey", despite the awareness of small and medium businesses of cyber risks and the existence of firm goals regarding security [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1204

Video Distribution: MPEG-4, Multicasting, Encoding

MPEG-2 is a version which incorporated the ability to transmit and compress files with the speed of 6 to 40 megabit per second range; this format is appropriate even for HDTV and DBS and is [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 616

Rapid Product Development Technology

In the 21st century this is not the case because today, one of the major goals of businesses is cost-efficiency and the need to reduce time-to-market.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2128

Embedded Blue Wireless Serial Port

The main features of the embedded blue are that its easy connection establishment is very simple and its FHSS technology with 2.
  • Subjects: Engineering
  • Pages: 2
  • Words: 576

Identifying a Power Plant Problem

Having carried out the requested inspection of the power plant of the Baldur Agricultural Chemicals Company in Gordontown, 1450 Disraeli Crescent, I have found out the following issues that might cause the issues of the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1089

A Unique Bag with the Sun Inside

So, the unique sun bag is the best variant of power during the traveling to the uninhabited places, moreover, it is going to be not so expensive, small, easy to fix and very useful.
  • Subjects: Engineering
  • Pages: 2
  • Words: 552

Information Security for “Astra-World”

In that regard, our company -"IS Consulting", provides a full complex of services of information protection and a wide spectrum of solutions for the provision of the security of the information systems of any difficulty.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2224

Clubs’ Relationship With Fans and Internet

Despite this great implication of the internet on the sports industry, some critics in the football world have argued that the contribution of the internet in the formation of a strong relationship between clubs and [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2966

Internet Streams Types: General Analysis

In order to demonstrate the work of a sniffer to identify streams, the example of the program Ethereal will be used. Additionally, other equipment, such as routers, can be configured to simulate the work of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 555

Industrial Communication Protocol

To give response to the users the suppliers are using the processors for improving the functions. It is a communication network planned for industrial environment and time critical applications.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2642

International Uses of Relational Technology

To begin with, it should be stated that the development of the IT sphere and the spread of communication technologies have changed the image of business management essentially.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 534

Characteristics of the Web 3.0

Additionally, it might be argued whether the new addition, in terms of metadata, is worthy of a new number in the web 3.
  • Subjects: Internet
  • Pages: 2
  • Words: 621

Untangle Software: A Firewall and Virus Blocker

Untangle uses protocols and IP addresses to filter traffic allowing the administrators to execute NAT and produce DMZs, designate the services and systems that are publicly accessible and complement hardware by running as transparent bridges.
  • Subjects: Applications
  • Pages: 4
  • Words: 1122

Fiber Optics Laboratory Experiments

The aim of this report is to introduce the process and the results of the laboratory experiments on fiber optics. The choice of the fiber cable and the waves will define the theoretical optical loss.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1349

Data Communication and Management Issues

Because it operates at the data-link and network layers, it can be implemented as a basis network that offers services to a standard that has a network layer.3.
  • Subjects: Data
  • Pages: 2
  • Words: 890

Analogue to Digital Sound Effect Processor

Nonetheless, unlike analog documentation that is importantly dependent on the long term durability of the fidelity of waveforms documented on the standard, the tangible standard stockpiling digital samples is fundamentally immaterial in replaying of the [...]
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5052

Extensible Business Reporting Language (XBRL)

The important factors using XBRL as the efficiency of the process, simplicity of information and the important cost savings come together with distribution and analysis.
  • Subjects: Data
  • Pages: 4
  • Words: 1579

MilkChurn Firm’s Security Policy

The objective of this policy is to provide the management of the firm a sense of direction to help the smooth performance of essential information security.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4212

Global System for Mobile Communication

According to the International Engineering Consortium, the three functional components or systems that constitute the GSM architecture are: the network and switching system, the base station system, and the operation and support system.
  • Subjects: Phones
  • Pages: 2
  • Words: 634

Fixed-Base Operators in the Aviation Industry

Most of the business conducted within the airdrome environs as well as those that require a straight linkage to an airdrome in order to subsist yet their chief commerce is not associated to aviation.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2216

Risks Related to Tunnel Engineering

Engineers should be apprehensive that tunneling is rather a challenging phenomenon, owing to the sensitivity of the railway haulers above, in addition to the fill substance the conduit would require while constructing.
  • Subjects: Engineering
  • Pages: 3
  • Words: 856

Modern Engeneering Tichnologies: Fiberglass

This resulted in marking the dawn of a new era, where use of a crude spinneret in processing of glass gave birth to man-made fibers and fiberglass, as a result.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1583

Reverse Engineering for Software Maintenance

To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences.
  • Subjects: Computer Science
  • Pages: 14
  • Words: 4361

Network Admission Control

The factors over which the networks can be categorized include the size of a network, the complexity of a network, a distance of a network, security of a network, access of a network and how [...]
  • Subjects: Computer Security
  • Pages: 14
  • Words: 3623

Building a PC, Computer Structure

The choices available are Western Digital 320GB and Seagate 320GB and my advice would be to go for Western Digital as it is a good performer all along.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 910

Moral Issues Surrounding the Hacking of Emails

The devises to enter into another people's email and steal information in the email is called Email Hacking. It should noted that stealing of valuable information through email hacking has become a phenomenon in both [...]
  • Subjects: Cyber Security
  • Pages: 9
  • Words: 2896

Research Critique of Management of the Difficult Airway

The reasons for this reading were to broadly assess a large legion of patients experiencing prehospital endotracheal intubation with and without rapid sequence intubation, and especially illustrate the incidence, presentation, and management of the difficult [...]
  • Subjects: Aviation
  • Pages: 9
  • Words: 2813

Provide Energy From Fusion Analysis

Energy conversion, for instance, is a foundational activity that is very critical in mechanical engineering now and even in the past."At first it was the steam engines, then a graduation to internal combustion systems of [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1580

Hf Rfid Electromagnetic Emissions and Performance

The research methods used in this work include the combination of the quantitative and qualitative methods with the study of the relevant previous research on the topic of HF proximity RFID systems.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 660

Introduction to Legal Technology

According to the facts presented in this case, Paul Jones was the first person to make contact with the attorney concerning his intention to divorce his wife.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1106

Simulink Broadens Video, Runs Simulations for Real-Time

Simulink broadens video as well as image processing with a wide range of provisions that are able to offer rich, customizable structure for swift authentication, execution, replication as well as the blueprint of video and [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1343

Information Technology System

Some important reasons for the IT projects failure in United Kingdom are From the above illustrated diagram it is clear that for the failure of an IT Project there are many reasons. Lack of skilled [...]
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2961

Analog to Digital Sound Processor

Variations in human voice pitch and tone affect a lot in the functionality of Analogue to digital converter. Generally, analog to the digital processor is used to convert the analog voltage or current in to [...]
  • Subjects: Other Technology
  • Pages: 25
  • Words: 6090

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

IT Security: The Problems Analysis

A major problem like Hacking for IT and its related fields is hazardous to the security of organizational secrets since if a person can gain access to confidential information, that information can be used for [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 666

Linux OS: Review and Analysis

The Linux Operating System is a general term that refers to a Unix-like Operating System and it is based on Linux kernel.
  • Subjects: Internet
  • Pages: 2
  • Words: 557

Advantages of Voice Over IP Technology

This can be transferred to the information technology staff that is more skilled in using it. The company will also be able to intensify its business activities in the internet through this technology that allows [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1152

Effective Project Management

Leadership and effective management help the project manager to direct and guide human resources and establish a positive culture and morale inside the organization The core of effective project management is effective control of all [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 868

Comparison of Privacy and Security Policies

Beth permits occasional and limited personal use of information technology resources subject to the condition that such use does not interfere with the user's or any other user's work performance and result in the violation [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 505

Information Needs and Data Inputs, Processes and Outputs

In order to improve the communication among the healthcare team members, it is imperative that the processes are converted into value-added processes so that the information inputs can be converted into valuable outputs that help [...]
  • Subjects: Data
  • Pages: 2
  • Words: 623

The Fire Protection Services

Occupational safety of buildings is one of the most challenging phenomena in the modern world take for example the recent fire at twin world center caused by a terrorist act of hijacking airplanes and destroyed [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2737

Protecting Computers From Security Threats

To ensure the safety and protection of our computer we should always install those antivirus software and firewalls, which automatically updates itself for at least a year after we install it.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 557

China and the Internet: Assessment of the Situation

The Chinese government is posing problems in terms of privacy and secrecy for the people of China in terms of internet access. The form of government in China is of communist nature and people are [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 555

Software and Tech Support: Powerpoint Program

In conclusion, it would be relevant to state that for effective use and implementation of software it is important to follow the steps indicated by the SDLC planning mode.
  • Subjects: Programming
  • Pages: 2
  • Words: 510

The Pros and Cons of Implementing the Main GCP Principles

The purpose of the principles of GCP is to ensure that these trials remain with the required ethical standards and the results come from the scientific inquiry that upholds the standards of quality, irrespective of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 841

PGP Encryption System as a Good Idea

It is of great significance to the organizations because PGP allows the sender to send a single encrypted message to various recipients.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 1020

Advanced Antenna Technology

To date, antennas are available in a variety of sized, shapes, and provide for a number of operations; their geometry is designed by the use of varying level of electromagnetic computational functions.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2136

Advent of Information Technology in Business

This article also talks about the need to tie together the bonds of a business manager and an IT manager. Based on this article and the analysis I have made, I personally believe that each [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Cybercrime and Legislation Margin

Originally, there are several types of cybercrimes: Against persons Against Business and Non-business organizations Crime targeting the government The fact is that all the three types are described in the legislation, nevertheless, it should be [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 512

Hackers’ Role as Information Security Guardians

This article points out the fact that information technology has enabled increased efficiency, increased effectiveness, and an increased amount of IT-enabled processes within the personal and industrial fields.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1966

XO Laptop Version 2.0 Analysis

The main consideration, represented in the article is associated with the fact, that the new model of laptops for children is a very successful and highly potential solution of the educational issues, and the maters [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1063

Telecommunications Design Project: From 1G to 3G

The initial activity for this communication system is the installation of a suitable number of base stations to be put up into operation to form a network The report covers the different aspects in location [...]
  • Subjects: Other Technology
  • Pages: 27
  • Words: 7185

Tech & Engineering: System on Chip

The team has realized that for the design reuse to succeed, they must have a clear method of developing macros that are easily integrated into the system-on-chip.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2328

Fluorescent High Bay Technology

The improved technology of fluorescent lamps and the invention of new HIF fixtures have composed the most cost effective choice as fluorescent lighting for indoor areas like warehouses, big retail stores, factories and athletic facilities.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1123

Peer-to-Peer Computing Technology

Complexity This is another important issue the developers of the routing have to keep in mind. Napster is an important application of the peer to peer routing systems.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2863

Video Distribution Systems

The decoding of the various distributions of streams is accomplished through the use of a Windows media player, thereby enabling the users to not only watch these streams, but also listen to them.
  • Subjects: Programming
  • Pages: 2
  • Words: 691

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1686

Social Media Within Academic Library Environment

The main focus of these web pages is interactive information sharing among users, user centered design of the page that can be modified and edited by the user and whatever changes are made to the [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 3102

Comparison UML and Modelscope

The main objective of library system implementation is to support the readers as well as the management in the process of borrowing and reserving books.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1043

Maintaining GNP by Using Smart Technology

A consumer survey by the Centers for Disease Control and Prevention has shown that a majority of North Americans are not aware of the infectious diseases they are at risk neither of nor of the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

The Monitor Convergence and the Television Consumption

Explain what those are used for, history on what development on TV and monitor and how the 2 have in common and how they are different The monitor and the television are both viewing devices [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 1366

Kinds of IP-Servers and Their Characteristics

The IP addresses allocation in the new IT infrastructure model for Acme is based on the guidelines and policies of the IANA and ARIN in relation to IP addresses allocation as well as the routing [...]
  • Subjects: Internet
  • Pages: 20
  • Words: 1751

Digital Certificates Generation

The article features the research findings by Internet Security experts from different countries enlisting USA, Switzerland and Netherlands who have experiment with the functionalities of a popular internet security encryption method known as MD5 to [...]
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1675

Automation of Accounting and Monitoring Procedures

Therefore, the integration of IT into auditing functions contributes to the promptness in transactions' ascertainment processes and the validation of the accounting and financial information prepared from relevant records.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 913

Hot-Mix Asphalt and Portland Cement Concrete

The purpose of this paper is to compare and contrast the two materials based on their properties, requirements, production, and the use in road construction.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 639

Daily Workouts App Evaluation

I will be discussing the free version in terms of the features which it has to offer, the functions of the app, and its overall convenience.
  • Subjects: Applications
  • Pages: 3
  • Words: 873

Certification Related to Electrical Engineering

In addition, in the future, the license will be an advantage in earning the clients' trust and the ability to take a superior level of responsibility for the employer.
  • Subjects: Engineering
  • Pages: 2
  • Words: 638

DMCA and Unlawful Cloud-Based Filesharing Issue

Nevertheless, it is hardly applicable to cloud-based filesharing of copyrighted products, as the only reason one can store the copy is to replace the original in case of damage and loss.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1450

Control Philosophy. Variable Speed Drives

The second one is the management and provision of adequate and stable pressure connected to all the identified stakeholders in the project.
  • Subjects: Engineering
  • Pages: 1
  • Words: 396

What’s Hot in Digital Media

The digital marketing practices continue to evolve with companies and individuals who uphold innovation achieving its benefits. Only organizations and individuals who follow innovative digital methods that provoke diverse engagement can flourish in the market.
  • Subjects: Internet
  • Pages: 2
  • Words: 461

Top Companies in the Virtual Reality Industry

Currently, Google is the leading search engine company, and there are signs that the company might emerge as one of the heavyweights in the virtual reality industry.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 626

COBIT5 vs. ITIL4 in Cybersecurity

Significantly, ITSM is the alignment of information systems and enterprise IT services with business and the needs of the customer who is the end-user.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2318

The Problem of Childrens’ Cyberbullying

The rapid spread of the Internet and children's easy access has facilitated the promotion of traditional bullying by granting it an opportunity to expand from the school grounds into the vast and complex cyberspace, which [...]
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2075

The New Software Implementation

The new software had to organize the work of three teams: the PM team, equipment reliability team, and information and communications technology team.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 576

Overview of Computer Languages – Python

A computer language helps people to speak to the computer in a language that the computer understands. Also, Python Software Foundation, which is a not-for-profit consortium, directs the resources for the development of both Python [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 818

Benefits of WPA3 over WPA2 Analysis

The attackers' purpose is to obtain the credentials of a Wi-Fi network. It appears to have the name of the Wi-Fi network the user is trying to connect to.
  • Subjects: Internet
  • Pages: 3
  • Words: 860

MTC: Strategic Use of Technology

Due to the necessity to introduce more rigid control tools for the target setting, it will be necessary to incorporate innovative tracking and monitoring tools as the means of supervising the production process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 611