Verified Document

My Personal Interest In A Career In Information Technology IT  Term Paper

¶ … information technology skills I acquired through the military are transferable to civilian situations. The 20 years I gave to the military have placed me in a wide variety of situations quite different from what others might encounter in civilian life. My experience in the U.S. Navy has allowed me to learn new skills in the information technology field and I have been able to apply them in new situations. The future for me after the military has been decided after a careful analysis of the way the military is currently structured and how a projection into the future bodes for me. I know that a career in the information technology field is the best choice for me because of my experiences in the Navy and on the job. It is important for me to continue to grow in this field and learn more when I transfer into the civilian sector.

In 1984, I attended Fire Control school, which provided me with the knowledge and skills of basic electronics theory and basic electronic maintenance. In the Navy, I have been trained to operate and configure high frequency (HF), very high frequency (VHF), ultra high frequency (UHF), and satellite secure and non-secure communications equipment. My previous assignments in the Navy included...

Money and manpower were big factors in getting these jobs completed. In addition, I have attended Command/Control/Communication/Computer and Intelligence (C4I) system engineering courses. These courses taught me the basic understanding of applicable system hardware and connectivity, applicable system software, primary system support organizations, system documentation and data communications that is a part of intelligence. Examples of systems include shipboard Global Command and Control System-Maritime (GCCS-M) and Advanced Tomahawk Weapons Control System (ATWCS), Tactical Data Processor (TDP) ship platforms. While on board, I am known as the "C4I supervisor," in which I serve as a technical advisor on problems that occur in the C4I architecture on board ships. Examples of the types of problems are: connectivity of ultra high frequency circuits, connectivity of extremely high frequency circuits, connectivity of Unix-based and Microsoft network computers, and connectivity of all routers and switches.
Officials said, that among the devices being hurried into the development pipeline is foliage-penetrating radar sensors, micro-drones and microwave antipersonnel guns that stun, rather than injure or kill." (Freedburg, 1378) These are all the new technology used for the security, maintenance and knowledge…

Sources used in this document:
Works Cited

Freedberg, Sydney J. "IT Changes Everything." National Journal. 34.19

2002): 1378.

Loeb, Vernon W. "Afghan War is a Lab for U.S. Innovation; New

Technologies Are Tested in Battle." The Washington Post. 26
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology -- Network Administrators
Words: 1306 Length: 5 Document Type: Thesis

This tremendous range of business enterprises that rely heavily on their it systems also presents many additional opportunities for anybody aspiring toward a career in it network administration. Many times, the wide range of organizations that now employ it professionals such as network administrators means that it is possible to combine several different types of interests within the choice to work in it network administration. For example, the law enforcement

Information Technology It Hope to
Words: 792 Length: 2 Document Type: Case Study

Even if the vendor himself were honest, further character requirements should include professionalism, and punctiliousness with his tasks so that damaging errors, abuse, and misuse are not perpetrated due to sloppiness. An example, here, would be the password falling into the wrong hands due to the vendor's negligence in sufficiently protecting it (White Paper, 2004). The vendor, also, has to demonstrate concern for his client's objectives; there have been too many

Information Technology and White-Collar Crime
Words: 2216 Length: 7 Document Type: Research Paper

Given the virtual ubiquity of information technology (IT) today, it is not surprising that while collar crime using these resources has assumed new importance and relevance (Dervan, 2014). As discussed further below, white collar crimes are by definition nonviolent in nature but the enormous amount of funds that are derived from such unlawful activities are increasingly being diverted to fund violent terrorist organizations that target the interests of the United

Future of Outsourcing Information Technology
Words: 4450 Length: 16 Document Type: Term Paper

3)." Corporate Reform Understandably, information technology caused experts to rethink successful business models. The 1990s represent a nearly clean slate in the remodeling of business because of information technology. Scott and Morton have identified five markers that serve analysts and experts in creating the business model which now emanate from information technology outward, and links other entities and customers in a seamless way. The markers of the revolution in corporate structure and

Professionalism in the Information Technology IT Industry
Words: 2108 Length: 6 Document Type: Essay

IT Ethics Professionalism denotes a higher degree of knowledge and behavior that promotes a well being amongst similar people performing similar jobs. Adopting and fostering a spirit of professionalism portends a greater materialization of success and fulfillment. The purpose of this essay is to explore the idea of professionalism within the Information Technology profession itself. To assist in this effort, the use of professional codes of conduct will be explored and

Investigates Why Women Are Not Attracted to the Information Technology...
Words: 3998 Length: 15 Document Type: Term Paper

Women and the Information Technology Industry: Where is the Attraction? Opportunities in technology companies are fueling the economy, yet few women pursue them. A recent Pittsburgh Technology Council panel discussion revealed that there are many reasons for women's lack of interest in IT, as were personal priorities (Czetli, 2003). "It might be an issue of self-selection -- women might not be risk takers," said Robin Steif, chief financial officer of Maya

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now