Verified Document

Computers/Internet What Is Particularly Interesting Term Paper

From a general public perspective, the computer user tends to focus less upon competition than user utility. As a general user, for example, I would therefore not use the term "Killer Application" to define Microsoft's Web browser. Instead, the way in which my friends and I view such a browser is an extremely useful tool to find as much information as possible in as short a time as possible. The focus is upon utility and end result.

In terms of competition, I would use the browser that offers the best results in the shortest time. I would also use the one that is easiest and fastest to download. I would therefore not invest in an application that is inferior to one already offered as part of a wider application such as windows, or that would prove more difficult and time consuming to download. When compared to all other similar application, Microsoft's browser is superior primarily due to its ease of use and secondarily as a result of its usability in terms of related applications. Microsoft Internet Explorer is by far the easiest to use, because it is part of the Microsoft Windows application, which is the most widely used application on current computers.

In general, the main difference between business-driven and user-driven views regarding the definitions of the web browser basically one of focus. From Microsoft's point-of-view, the web browser is an application that is useful to literally every computer and Internet user. As such, it can be innovatively used to gain a competitive edge in the computer market.

Apart from the business and...

According to the opposition to Microsoft's stance, the company has monopolized a market that should be open to all who wish to enter it. However, the larger business context of the issue should also be kept in mind. Microsoft, as asserted by both the company and its supporters, have innovated their products within the protocol of business paradigms. Other companies are free to offer their products in this highly competitive environment. However, in my view as user, Microsoft's browser product is far superior and I will use this for as long as it is legally available.
Whatever the conclusion, or whichever position is the right one, usability and competition work hand in hand for or against the success of a product. Dialogue about the various definitions have the effect of informing the end user of terms, such as "Killer Application," that they may not have otherwise been aware of or concerned with. What is most interesting is that such revelations continue to help the end user make more informed and beneficial choices, while helping business owners to conduct their affairs more effectively.

Sources

Online News Hour. "Microsoft On Trial." Oct. 22, 1998. http://www.pbs.org/newshour/

Microsoft Monopoly." Oct. 19, 1998. http://www.pbs.org/newshour/

Seltzer, Wendy. "Openlaw: The Microsoft Case." Oct., 2002. http://cyber.law.harvard.edu/msdoj/trial.html

Wikipedia. "United States v. Microsoft." 5 Nov. 2006. " http://en.wikipedia.org/wiki/United_States_v._Microsoft

Sources used in this document:
Sources

Online News Hour. "Microsoft On Trial." Oct. 22, 1998. http://www.pbs.org/newshour/

Microsoft Monopoly." Oct. 19, 1998. http://www.pbs.org/newshour/

Seltzer, Wendy. "Openlaw: The Microsoft Case." Oct., 2002. http://cyber.law.harvard.edu/msdoj/trial.html

Wikipedia. "United States v. Microsoft." 5 Nov. 2006. " http://en.wikipedia.org/wiki/United_States_v._Microsoft
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Surveillance: Qualitative Attempt to
Words: 4976 Length: 19 Document Type: Term Paper

Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions

Computer Viruses: A Quantitative Analysis
Words: 2542 Length: 10 Document Type: Term Paper

This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.

Computer Network Security Issues Computer
Words: 1894 Length: 6 Document Type: Research Paper

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in

Computers Internet General
Words: 968 Length: 3 Document Type: Term Paper

Business Internet Dot.com Comparison of a Leader and an Upstart Red Hat.com vs. Microsoft.com Two prominent dot.com companies within the same industry of recent note may be found in the competing personages of Red Hat Software and the successful brand name of Microsoft. Although Red Hat Software is not nearly as well-known as the Titanic brand name of Microsoft, it offers an interesting and different software business perspective to Microsoft's better-known strategy business.

Computer Science and the Different Scientific Domains
Words: 1459 Length: 5 Document Type: Essay

computer science and the different scientific domains at MIT Fortunately for myself, MIT's computer science division is closely related to many other scientific divisions in that institution. MIIT's Electrical Engineering and Computer Science Department offer students the opportunity to interface between Computer Sciences and the Life sciences so exposure in this field may open me up to the disciplines of (amongst other areas) computational biology, synthetic biology, medical image analysis,

Censorship of Information on the Internet
Words: 1557 Length: 4 Document Type: Essay

Internet Censorship One of the most publicized debates or controversial issues in the recent past is whether information on the Internet should be censored. The controversy associated with the issue is centered on whether the censorship is necessary towards the maintenance of a specific ethical standard in the society. Controversies regarding Internet censorship have also been fueled by the development and enactment of certain legislation that seeks to censor information on

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now