Computing Technology Essays (Examples)

1000+ documents containing “computing technology”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
How Businesses Can Use Cloud Computing Technology
Pages: 8 Words: 3405

organizations can do to protect client data comprehensively and how they do this. It will also examine the most common forms of data customers generate, and take a look at some of the contemporary hardware and software that organizations protecting and handling data in the cloud use presently.
Common Types of Customer Data

Data Identity:

The individual is at the core of any database, so gaining an insight into how a person is, and having the ability to maintain a homogenous point-of-view for customers is the first step in the identification of data. This should embrace all the information that can make it possible for a person to be specially identified (oberts, 2013)

Such information should include:

Personal information -- Date/place of birth, gender etc.

Postal Address -- Address line, street, name of building, number of building etc.

Identity -- Title, first name (Surname), forename, designation, letters etc.

Contact -- Work telephone number, home number, mobile number,…...

mla

References

Angeles, S. (2013, May 1). Business News Daily: Small Business Solutions & Inspiration. Cloud Computing - A Small Business Guide - BusinessNewsDaily. Retrieved May 27, 2015, from  http://www.businessnewsdaily.com/4427-cloud-computing-small-business.html 

Berry, R., & Reisman, M. (2012). Policy Challenges of Cross-Border Cloud Computing. Journal of International Commerce and Economics, .Retrieved, from  http://www.usitc.gov/journals/policy_challenges_of_cross-border_cloud_computing.pdf 

Drew, J. (2012). Technology and CPAs: Visions of the future. Journal of Accountability. Retrieved, from  http://www.journalofaccountancy.com/Issues/2012/Jun/20114844.htm 

King & Raja. (2012). Protecting the privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28 (3), 308-319. Retrieved, from  http://www.sciencedirect.com/science/article/pii/S0267364912000556

Essay
Wireless Computing Technology E G Remote Access to
Pages: 2 Words: 849

wireless computing technology, e.g., remote access to the company or corporate network creates many benefits for an enterprise, such as increased mobility and flexibility, but anonymity almost always also makes a network vulnerable. An intruder might attack from thousands of miles away and never come into direct contact with the system, its administrators or users (Pfleeger and Pfleeger, 2007, p. 397).
Therefore authentication, e.g., a process of determining that a system user is the person who he declares to be is required. It must be handled carefully and correctly in a network because a network involves authentication not just of people but of businesses, servers, and services only loosely associated with a person (Pfleeger & Pfleeger, 2007, p. 398).

Authentication is most commonly done by the use of log-on passwords. Knowledge of the password is assumed to guarantee that the user is the person he purports to be. Nevertheless, passwords are…...

mla

References

5 Essential Steps for Implementing Strong Authentication in the Enterprise. (2011) (pp. 1 -- 22). Derived 16 August 2011 from www.verisign.com/authentication/.../authentication.../whitepaper-strong.

National Committee on Security Systems (CNSS) Instruction No. 4009 of 26 April 2010. Derived 16 August 2011 from www.cnss.gov/Assets/pdf/cnssi_4009.pdf.

Hunt, T.K. (2010). Strong authentication eliminates risks intrinsic to the use of wireless technology. (pp. 1-3). Derived 16 August 2011 from www.connect-world.com/.../11047-strong-authentication-eliminates.

Pfleeger, C.P. & Pfleeger, S. (2007). Security in Computing (4th ed.). (pp. 376-507). Saddle River, New Jersey: Prentice Hall.

Essay
Ethics of Computing Technology's Effects
Pages: 2 Words: 669

These displaced workers need to have the opportunity to re-invent themselves and discover additional core strengths they can transition into new careers with. In effect the programs essential for transitioning workers misplaced by automation need to resemble the processes in technology incubator (Cooper, Park, 2008) where core strengths of new technologies are found and applied to problems. The same development and nurturing process needs to happen for these workers as well. To give them income, healthcare or any "safety net" is to invite them to give up on improving themselves. Instead, the focus needs to be on giving them an opportunity to contribute in organizations again and get focused on pursuing a new career. During the training period financial assistance needs to be provided, yet to completely subsidize their lives due to their jobs being replaced by automation is a mistake. Incenting these workers to go after entirely new…...

mla

References

Richard a Cobert (2005). 21st century jobs. Economic Development Journal, 4(4), 34-39. Retrieved October 22, 2008, from ABI/INFORM Global database. (Document ID: 969154121).

Sarah Y Cooper, John S. Park. (2008). The Impact of 'Incubator' Organizations on Opportunity Recognition and Technology Innovation in New, Entrepreneurial High-technology Ventures. International Small Business Journal, 26(1), 27. Retrieved October 22, 2008, from ABI/INFORM Global database. (Document ID: 1432610151).

Marion Jansen, Alessandro Turrini. (2004). Job Creation, Job Destruction, and the International Division of Labor. Review of International Economics, 12(3), 476-494. Retrieved October 21, 2008, from ABI/INFORM Global database. (Document ID: 689737151).

Jeff Finkle (2004). Grabbing While Holding on: Job Creation and Retention During the Recession. Spectrum, 77(1), 5-7. Retrieved October 21, 2008, from ABI/INFORM Global database. (Document ID: 628321111).

Essay
Java Network Computing Technologies
Pages: 8 Words: 2035

Internet Inter-OR Protocol (IIOP)
Java Network Computing Technologies

Internet Inter-OR Protocol (IIOP) is a protocol that enables distributed programs located anywhere in the Internet to communicate with each other. It is an interoperability protocol that supports heterogeneous environments. IIOP offers possible communication between applications regardless of the platform and programming elements used in their development.

IIOP is an element of Object Management Group's (OMG) standard architecture called CORA (Common Object Request roker Architecture). It is a TCP/IP-based protocol and a GIOP mapping that provides standard communication methods between ORs. OR (Object Request roker) is a communication mediator used by CORA during requests and data interchange between clients and servers.

CORA/IIOP is a solution to the complexity that web applications are now becoming. efore, protocols are specifically developed on the basis of applications to allow compatibility in communication. ut with CORA/IIOP, communication is possible between diverse application platforms.

IIOP technology is an element of Internet applications…...

mla

Bibliography

Curtis, David. IIOP: OMG's Internet Inter-ORB Protocol.

OMG. 08 June 2003.  http://www.omg.org/library/iiop4.html 

Golding, Michael. Java Socket Programming.

UEL.AC.UK. 09 June 2003. http://homepages.uel.ac.uk/2795l/pages/javaapps.htm

Essay
Technology and Project Management There Has Been
Pages: 2 Words: 662

Technology and Project Management
There has been steady development in technology over recent years and this does not look as if it is going to stop any time soon. Technology is still advancing and organizations are incorporating what technology has to offer. This helps them remain relevant and efficient in their activities. Project mangers have a major role to play when it comes to the life cycle of a project. Technology is seen to have an important role in streamlining the roles and speeding up the completion time of projects. How valuable technology in project management is totally dependent on how it is utilized. This can only happen if the appropriate tools are used in a proper way. This presentation is on how technology affects project management.

Technology can help in the improvement of communication; make assessments of risks as well as controlling and scheduling. ecently there has been a trend towards…...

mla

References

Emilijia, K. (2012). 5 Technologies that can Optimize your Project Management. Retrieved May 20, 2013 from  http://pmtips.net/5-technologies-optimize-project-management/

Essay
Technology in Management the Fargus
Pages: 6 Words: 2751

The modeling environments was so accurate it could deliver results that aligned at a 95% accuracy rate with the actual results achieved. Another advantage was the use of knowledge management to orchestrate multichannel selling, marketing and service scenarios across the client's specific requirements and needs. The analytics and knowledge management systems were also combined successfully to create a constraint-based engine as well. All of these factors were critical to the success of the system.
The cons of this modeling approach were the lack of precision on pricing ands the ability to model the more finely-tuned aspects of the programs. There was not enough data to create a profitability measurement and the use of constraint modeling at times could leave out the more unpredictable aspects of the marketing mix. hile the virtual marketplace proved effective for testing message, media and defining audience, it lacks the precision necessary for making long-term, highly…...

mla

Works Cited

Ball, Leslie D. "IT Education Success Strategies for Change Management." Information Systems Management 17.4 (2000): 74-7.

Benamati, John, Albert L. Lederer, and Meenu Singh. "Information Technology Change: The Impact on IT Management." The Journal of Computer Information Systems 38.4 (1998): 9-13.

Bordum, Anders. "The Strategic Balance in a Change Management Perspective." Society and Business Review 5.3 (2010): 245-58.

Eastman, Doug, and Claire McCarthy. "Embracing Change: Healthcare Technology in the 21st Century." Nursing management 43.6 (2012): 52.

Essay
Technology in Instructional Delivery The Case of
Pages: 3 Words: 879

Technology in Instructional Delivery: The Case of Capella University
The use of technology, particularly Internet technology, in instructional delivery in educational institutions has revolutionized the way people access and utilize educational information. Online instructional delivery, either in mixed (combination of traditional and online modes of instruction) or purely online formats, have made learning more interactive, not only between the learner and the tool, but also between the teacher and learner and among learners themselves. This increasing demand for an online mode of instruction delivery in educational institutions is a reflection of the need to not only adopt the new technology, but also to 'manipulate' this technology to suit the users' learning needs (oschmann, 1996:8). The following description of the technology of instructional delivery at Capella University demonstrates this point.

In addition to its traditional format of instructional delivery, which is face-to-face classroom setting, Capella University has an online learning system that is…...

mla

Koschmann, T. (1996). In CSCL: Theory and Practice of an Emerging Paradigm. NJ: Lawrence Erlbaum Associates.

Merrill, G. And C. Galbraith. (2010). "Learning outcomes and instructional delivery method in professional and business related courses: An empirical study controlling for course and instructor differences." Journal of Business and Behavioral Sciences, Vol. 21, No. 2.

Reiser, R. And J. Dempsey. (Eds.). (2007). Trends and Issues in Instructional Design and Technology. NJ: Pearson.

Essay
Technologies Impact on Healthcare Level
Pages: 5 Words: 1489

This is necessary to provide a seamless platform on which health solutions can be effectively integrated and deployed. Without using such a platform, the development of electronic health care facilities will be more difficult to deploy. In other words, Tele-health is part of the overall healthcare ICT (Information Communications Technology) solutions that enables healthcare to be pushed out to the edge, for local delivery, and to be more evenly, efficiently and effectively distributed.
Broadband communication is the underlying technology of choice when discussing electronic applications. It is certainly important for inter-healthcare provider communications delivering sufficient bandwidth capacity between sites. The delivery of home care electronic should not rely on the broadband technology is not universally accessible, particularly in rural and remote areas, and it can also be prohibitively expensive. Some broadband technologies can be delivered to remote locations, such as satellite-based technology, but this is impractical and too costly to…...

mla

References

Goldberg, a. (2002, April 29). Internal Report: Telehealth, Privacy, & Health Care: Review, Expectations & Proposals. Goulston & Storrs, Boston, MA.

Lovata, F. (2000, May 21-24). Telemedicine via the Internet: Successful Program Strategies. American Telemedicine Association Conference,

Puskin, D., Mintzer, C., & Wasem, C. (1997). Chapter 14, Telemedicine: Building Rural Systems for Today and Tomorrow. In P. Brennan, S. Schneider, & E. Tornquist (Eds.), Information Networks for Community Health. (p. 276). Computers in Health Care Series. Springer-Verlag.

Telecommunications: Protecting the Forgotten Frontier. (2001, August). SC Magazine-Info Security News, 12 (8), 36-40.

Essay
Technology in Innovation the Role
Pages: 2 Words: 608

The cloud computing platform has also made it possible for companies to integrate their information technologies and services into a common strategy; a goal that had not been attainable in the past (Buttol, Buonamici, Naldesi, inaldi, Zamagni, Masoni, 2012).
A second strategic technology that is driving a high level of innovation in organizations is mobility and the rise of mobile computing, incouding the latest generation of operating systems in this area. Apple's iOS, Google's Android and many other operating systems are the foundation of disruptive innovation throughout many enterprises today. The early advances in mobile technologies are a case in point, as are the continued development of medical applications for the Apple iPad (Wickramasinghe, Sharma, Goldberg, 2003). Mobility is also showing the potential to be a technology that can support precise geo-positioning and analysis of the best delivery routes for courier services and supply chain-based companies as well. The rise…...

mla

References

Arinze, B., & Anandarajan, M. (2010). Factors that determine the adoption of cloud computing: A global perspective.International Journal of Enterprise Information Systems, 6(4), 55.

Buttol, P., Buonamici, R., Naldesi, L., Rinaldi, C., Zamagni, A., & Masoni, P. (2012). Integrating services and tools in an ICT platform to support eco-innovation in SMEs. Clean Technologies and Environmental Policy, 14(2), 211-221.

Kleis, L., Chwelos, P., Ramirez, R.V., & Cockburn, I. (2012). Information technology and intangible output: The impact of IT investment on innovation productivity. Information Systems Research, 23(1), 42-59,280,282-283.

Nambisan, S., Bacon, J., & Throckmorton, J. (2012). The role of the innovation capitalist in open innovation. Research Technology Management, 55(3), 49-57.

Essay
Technology Challenges Explanation Initiating Technology
Pages: 3 Words: 1078

It should also be noted that adults are life, task or problem-centered in their course to learning. They want to see the applicability of what they are learning to their life, a task they need to perform, or to solving a problem. Technology-based instruction will be more effective if it encompasses real-life examples or circumstances that adult learners may come across in their life or on the job. While adult learners may respond to exterior motivators, internal priorities are more significant. Incentives such as improved job satisfaction, self-esteem and quality of life are vital in giving adults a purpose to learn. If any of these can be related as part of technology-based instruction adults will act in response more positively.
Challenges of technology

Adult learners can have need of specialized support, both on campus and at a distance. In the campus environment, they occasionally lack the technology skills and motivation necessary…...

mla

References

Knowles, M.S. (1980). The Modern Practice of Adult Education; From Andragogy to Pedagogy. Englewood Cliffs, NJ: Cambridge Adult Education.

Knowles, M.S. et al., (1998). The Adult Learner. Houston: Gulf Publishing.

Lawler, P.A. (1991). The Keys to Adult Learning: Theory and Practical Strategies. Philadelphia:

Research for Better Schools.

Essay
Technology's Negative Affect on Our
Pages: 5 Words: 1892

The efforts of the federal government have been thoroughly and extensively backed up by fiscal funds given by the numerous states, districts, businesses, and parents (NCES, 2000). However, the overall literacy and literature education of students with the incorporation of technology has been primarily negative and this needs to change with time as the overall long-term impact of this negative pattern will be very damaging to the mindset of students and the overall literacy activities that they engage in.
eferences

Anderson, .E., & onnkvist, A. (1999). The presence of computers in American schools. Center for esearch on Information Technology and Organizations.

Becker, H.J., & Sterling C.W. (1987). Equity in school computer use: National data and neglected considerations. Journal of Educational Computing esearch, 3, 289 -- 311.

Becker, H.J. (2000). Who's wired and who's not. University of California, Irvine. Available: http://www.gse.uci.edu/doehome/DeptInfo/Faculty/Becker/packard/text.html

Cuban, L. (1998). High-tech schools and low-tech teaching. Journal of Computing in Teacher Education,…...

mla

References

Anderson, R.E., & Ronnkvist, A. (1999). The presence of computers in American schools. Center for Research on Information Technology and Organizations.

Becker, H.J., & Sterling C.W. (1987). Equity in school computer use: National data and neglected considerations. Journal of Educational Computing Research, 3, 289 -- 311.

Becker, H.J. (2000). Who's wired and who's not. University of California, Irvine. Available: http://www.gse.uci.edu/doehome/DeptInfo/Faculty/Becker/packard/text.html

Cuban, L. (1998). High-tech schools and low-tech teaching. Journal of Computing in Teacher Education, 14(2), 6 -- 7.

Essay
Technology Support Building Effective Technology Support Teams
Pages: 5 Words: 1626

Technology Support
Building Effective Technology Support Teams: A esearch Thesis

The effectiveness of technology support teams depends on the ability to combine theoretical and contextual technology support (Harich, 2006), as well as to share understandings with different kinds of specialists (Koutsoulis, 2006). In addition, the conduciveness of the social context for realizing intrinsic work goals-especially learning and mastering new technology support and skills-is an important aspect of the job.

ecruitment

Hiring is especially important since organizations often rely on the exploitation of technology support to achieve competitive advantage and the difference between hiring an average and a high-potential candidate can significantly affect an organization's reputation and profitability.

Graduates were hired on an annual basis, while experienced persons were recruited when vacancies arose. The emphasis in the workflows we studied was on hiring for immediate organizational requirements, so that, compared with the number of experienced hires, there were relatively few recent graduates. Positions requiring experienced employees…...

mla

References

Harich, J. (2006). Analytical activism: A new approach to solving the sustainability problem. Clarkson, GA: Thwink. org.

International Technology Education Association. (2003). Advancing excellence in technological literacy: Student assessment, professional development, and program standards. Reston, VA: Author.

Koutsoulis, M. (2006). The characteristics of the effective teacher in Cyprus Public High School: The students' perspective. Paper presented at the annual meeting of the American Educational Research Association. Chicago, IL. (ERIC Document Reproduction Service No. ED478761).

Ploof, R. (2004). The Edison effect: Success strategies for the information age. Leawood, KS: Cypress Publishing group.

Essay
Technology Briefly Describe the Four
Pages: 3 Words: 886

Vertically integrated information systems then are key to many company's competitive advantage in being able to respond quickly to the needs of their distribution channel partners and customers. Supply chains are the most complex type of vertically integrated information system in manufacturing firms.
3. What is a client/server system? What is a client? What is a server? Why would an organization choose to implement a client/server system?

A client/server system is also referred to as a client/server network as it relies on a series of integrated systems in which the processing power is distributed between a central server and a number of client computers (Brown, DeHayes, Hoffer, Martin, Perkins, 2009). A client can be either an application, as is the case with Salesforce.com accessing customer data for example on a remote server through a Web browser, or a complete computer system accessing a server. Increasingly clients are Web browser-based and rely…...

mla

References

Alnoor Bhimani, & Mthuli Ncube. (2006). Virtual integration costs and the limits of supply chain scalability. Journal of Accounting and Public Policy, 25(4), 390-408.

Brown, C.V., DeHayes, D.W, Hoffer, J.A., Martin, W.E., Perkins, W.C. (2009). Managing information technology: (6th ed.).Prentice Hall. ISBN: 9780131789548

Scott M. Lewandowski. (1998). Frameworks for Component-Based Client/Server Computing. ACM Computing Surveys, 30(1), 3-27.

N GPC Mahalik, & SK Lee. (2002). Client server-based distributed architecture for concurrent design of DCS networks: A case study. Integrated Manufacturing Systems, 13(1), 47.

Essay
Technology in the Elementary Classroom
Pages: 5 Words: 1607

As a result, there is greater flexibility in creating individualized learning plans and isolating the contribution this specific interactive technology allows for increasing student retention and long-term learning. The bottom line is that interactive technologies such as the smart board can deliver statistically significant increases in student performance when their scores are compared before and after the introduction of scaffolding and interactive instruction (Halden, 258, 259).
Summary

At the intersection of process improvement and teaching technologies is the definition of solutions which are significantly increasing the effectiveness of teaching. The reliance on scaffolding strategies both in small groups and individually, when combined with technologies, shows significant potential to re-order the productivity of teaching elementary school students.

eferences

Butler, Kyle a., and Andrew Lumpe. "Student Use of Scaffolding Software: elationships with Motivation and Conceptual Understanding." Journal of Science Education and Technology 17.5 (01 Oct. 2008): 427-436. EIC. EBSCO.5 Mar. 2009

Campbell, Monica L., and Linda…...

mla

References

Butler, Kyle a., and Andrew Lumpe. "Student Use of Scaffolding Software: Relationships with Motivation and Conceptual Understanding." Journal of Science Education and Technology 17.5 (01 Oct. 2008): 427-436. ERIC. EBSCO.5 Mar. 2009

Campbell, Monica L., and Linda C. Mechling "Small Group Computer-Assisted Instruction with SMART Board Technology: An Investigation of Observational and Incidental Learning of Nontarget Information." Remedial and Special Education 30.1 (01 Jan. 2009): 47-57. ERIC. EBSCO.]. 5 Mar. 2009

Haldane, Maureen. "Interactivity and the Digital Whiteboard: Weaving the Fabric of Learning." Learning, Media and Technology 32.3 (01 Sep. 2007): 257-270. ERIC. EBSCO.5 Mar. 2009

Katherine Lawrence.. "Fostering Learning in the Networked World. " EDUCAUSE Review 43.6 (2008): 90. ABI/INFORM Global. ProQuest, 5 Mar. 2009

Essay
Technology High Tech and Exponential Change
Pages: 3 Words: 1063

Technology
(a) Technology is "the branch of knowledge that deals with the creation and use of technical means and their interrelation with life, society, and the environment, drawing upon such subjects as industrial arts, engineering, applied science, and pure science" (Dictionary.com, 2014). 1)(b) High-technology is "scientific technology involving the production or use of advanced or sophisticated devices especially in the fields of electronics and computers" (Merriam-Webster, 2014). 1)(c) A can opener, an electric can opener, and a radio are all examples of technology. They involve mechanical parts and some simple electronics or electronics that have been in use for a substantial period of time, and are not considered advanced or sophisticated. A 3D printer, a drone, a satellite radio, and a 3D TV all rely upon advanced computer technology to work and would be examples of high technology because they would be unable to work without supporting advanced technology and, even…...

mla

References

Apple. (2014). Watch. Retrieved October 1, 2014 from:  https://www.apple.com/watch/ 

Dictionary.com. (2014). Technology. Retrieved October 1, 2014 from:

 http://dictionary.reference.com/browse/technology 

Kurzweil, R. (2001, March 7). The law of accelerating returns. Retrieved October 1, 2014

Q/A
Seeking guidance on formulating a strong technology thesis statement. Share your expertise!?
Words: 360

Formulating a Strong Technology Thesis Statement

1. Define the Scope and Context:

Clearly state the specific technology or technological domain your thesis will address.
Establish the context by outlining the broader technological landscape, industry trends, or societal implications related to the topic.

2. State the Central Argument:

Express your main argument or hypothesis regarding the technology in a concise and assertive manner.
Avoid vague or speculative language; instead, provide a specific claim that can be supported by evidence.

3. Outline Supporting Evidence:

Briefly mention key pieces of evidence or insights that support your argument.
These may include research findings, case studies, industry data,....

Q/A
How has computer science fundamentally changed the way we communicate and interact with technology?
Words: 478

Computer science has revolutionized the way we communicate and interact with technology in numerous ways. Some key ways in which computer science has fundamentally changed our interactions with technology include:

1. Instant communication: Computer science has enabled the development of various communication technologies such as email, instant messaging, and social media platforms that allow people to communicate with each other instantly regardless of geographical location.

2. Mobile technology: The development of mobile devices such as smartphones and tablets has allowed individuals to access and communicate through technology on the go, leading to increased connectivity and convenience.

3. Voice recognition technology: Advancements in computer....

Q/A
How has cloud computing enhanced e-Learning and e-Teaching in South African schools post-COVID-19?
Words: 683

The Impact of Cloud Computing on e-Learning and E-Teaching in South African Schools during the COVID-19 Pandemic
Cloud computing has revolutionized the way e-learning and e-teaching are conducted in South African schools, especially during the COVID-19 pandemic. As schools around the world were forced to close their doors and transition to remote learning, the use of cloud computing technology became essential in ensuring continuity in education. In South Africa, where access to technology and reliable internet connectivity is not universal, cloud computing has played a crucial role in bridging the digital divide and providing students and teachers with the tools they....

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now