Modernization Of Air Warfare
.... "Stealth gives us back that
fundamental element of war called surprise" (Goodall 9).
After it was found that aircraft could be very useful in war, it
was used for large scale reconnaissance. Then people started to add bombs
to aircraft and then airplanes started to become an essence of war. After
World War 2, new bombers were developed with fast speed, and could travel
far distances. They could also carry nuclear bombs and missiles. The use
of the bomber aircraft then led to the fighter, which was e .....
|
|
INTEL Knows Best? A Major Marketing Mistake
.... computers containing the defective Pentium chips. Intel's stock
dropped 5% following this bold move by IBM. IBM's main contention was that it
puts its customers first, and Intel was failing to do this.
Intel's handling of this defective chip situation gives rise to many
questions. During the course of this paper I will address several of them. The
first of which is how did a company with such a stellar reputation for consumer
satisfaction fall into the trap that the customer does not know best? .....
|
|
Can Computers Think? The Case For And Against Artificial Intelligence
.... soul and a whole
slew of other unprovable ideas. Since neither reader nor writer is a scientist,
for all intents and purposes, we will say only that thought is what we (as homo
sapien) experience.
So what are we to consider intelligence? The most compelling argument
is that intelligence is the ability to adapt to an environment. Desktop
computers can, say, go to a specific WWW address. But, if the address were
changed, it wouldn't know how to go about finding the new one (or even that it
should). So .....
|
|
The Y2K Problem
.... solutions to the problem,
and present the author's ideas on how a systematic approach to the
"millennia virus" can prevent doomsday from becoming a reality for many
information technology managers and their corporations.
What, specifically, _is_ this "millennia virus" to begin with? There has
been much talk about it, and most people know it has something to do with
the date formats and how they are processed by the computer. How it is
affecting that processing is what the key to implementing a soluti .....
|
|
Censorship On The Internet
.... customs of the Vietnamese people." on June 4,
1996. It is also impossible to ban all things that are prohibited in a country.
For instant, some countries, such as Germany, have considered taking measures
against the U.S. and other companies or individuals that have created or
distributed offensive material on the Internet. If the United States government
really wanted to censor the net, there is only one solution - shut down all
network links of other countries. But of course that would mean no I .....
|
|
The Cuckoo's Egg: Cliff's Persistence
.... The crew does not what to believe that it would be
Seventek, so they start to look what the impostor is doing. Cliff hooks up a
few computers to the line that comes from the Tymnet. Tymnet is a series of
fiber-optic cables that run from a major city to another major city. So if you
were in LA and wanted to hook up to a computer in the Big Apple you could call
long distance, have a lot of interference from other callers and have a slow
connection, or you could sign-up to Tymnet and dial loc .....
|
|
CMIP Vs. SNMP : Network Management
.... look. You see a network diagram
overview of all the computers your company has within California. Two systems
are flashing, with an X on top of them indicating that they are experiencing
problems. Tagging the two systems, you press enter, and with a flash, the screen
displays all the statitics of the two systems, including anything they might
have in common causing the problem. Seeing that both systems are linked to the
same card of a network switch, you pick up the phone and give that branch offic .....
|
|
Virtual Reality: What It Is And How It Works
.... to create very real
applications for medical, space, physical, chemical, and entertainment
uses among other things.
In order to create this alternate reality, however, you need to find
ways to create the illusion of reality with a piece of machinery known as
the computer. This is done with several computer-user interfaces used
to simulate the senses. Among these, are stereoscopic glasses to make
the simulated world look real, a 3D auditory display to give depth to
sound, sensor .....
|
|
Cognitive Artifacts & Windows 95
.... work. Making sure everything is setup properly
without the errors that could occur in configuring the task yourself. The
wizard performs all the functions on its little to-do list without having the
user worrying about whether he/she remembered to include all the commands. On
the side of personal views the user may see the wizard as a new task to learn
but in general it is simpler than having to configure the application yourself
and making an error, that could cause disaster to your system. The wizar .....
|
|
Networks
.... of
special hardware which often have low use rates. By setting up several
computers to share these resources, money is saved from having to provide
(for example) each user with their own printer. Fewer peripherals also can
translate into lower maintenance costs and lower capital investments on the
system as a whole.
TYPES OF NETWORKS
Networks fall into two categories: Server-Client, and Peer-To-Peer.
Server-Client is often the fastest (and more expensive) of the two
systems. In this setup .....
|
|
Communication Over The Internet, And The Effects It Will Have On Our Economy
.... the local phone company approving the use of the internet
for any means.
· How phone companies are going to bring them selves down.
-I feel that because of this phone companies will be the cause to their own
downfall.
· Methods of communication over the net
-There are many ways of communicating over the net: Inter relay chat (text only)
-Video/Audio: there are many net applications which allow the user to simply
plug in a mini video camera( which can be purchased anywhere from $150+) and
speakers and .....
|
|
Production Planning
.... Scientific laws govern how much a worker can produce in a day. b. It is the
function of management to discover and use these laws in operation of productive
systems. c. It is the function of the worker to carry out management's wishes
without question.
Many of today's method's of operation management have elements of the
above stated principles. For example, part of Material Requirement Planning
system (MRP) is learning how workers to hire, fire, or lay idle. This is
because it we realize the a w .....
|
|
Parts Of A Computer And What They Do
.... current has increased
and reacts accordingly and the same when the current is depressed and the
current decreases.
Over the years many new types of keyboard have been thought up
these are mostly more ergonomically designed than there older counter parts
this is done in order to reduce R.S.I a problem that effects a lot of
typists
One of the most interesting keyboard is a device called a data hand
this will take a combination of hand movement and clicks and convert them
in to working comma .....
|
|
Computer Scientist/Programmer
.... Programmers are often categorized as technicians because of the
work they do. Many programmers are involved in updating, repairing,
modifying and expanding existing programs. They are often grouped into two
types. These two types are Applications programmers and Systems
programmers. Applications programmers usually are oriented towards
business, engineering, or science. They write software to handle specific
jobs within an organization such as a program used in a place of business
were a lot .....
|
|
Floating Point Coprocessors
.... system
should be as simple as possible and require a minimum overhead in terms of both
hardware and software. There are various techniques of arranging a coprocessor
alongside a microprocessor. One technique is to provide the coprocessor with an
instruction interpreter and program counter. Each instruction fetched from
memory is examined by both the MPU and the coprocessor. If it is a MPU
instruction, the MPU executes it; otherwise the coprocessor executes it. It can
be seen that this solution .....
|
|
|
|