|
Enter your query below to search our database containing over 50,000+ essays and term papers
Search results 2161 - 2170 of 8374 matching essays
- 2161: The Arrival of Email
- ... prove that Microsoft sought to crush competitors and monopolize access to the Internet." However, Microsoft is not alone. Morgan Stanley Dean Witter & Co. recently agreed to settle a discrimination lawsuit initiated by employees. "The smoking gun: an E-mailed joke, playing on stereotype s about African- American speech patterns, that a colleague had zapped around the office." ("When the Devil is in the E-Mails," BusinessWeek, June 8, 1998, pp. 72-74) The critical problem facing companies: How do you manage E-mail? What E-mail content should be kept? How long should it be kept? How do companies control what employees do with E-mail? As with any problem that develops as a result of new technology or new organizational processes, the fix must be multi-faceted. Companies with creative cultures fear that monitoring ...
- 2162: The Y2K Problem
- ... date format. This problem is not only limited to personal computers and mainframes, however. Most electronic devices that make use of dates will have serious unpredictable problems. The micro controllers that are in car ignition control systems, clocks, microwaves, and even nuclear weapons all suffer from the same problem. The unpredictable effects come from both the microprocessor sed in the device and the compiler or linker used to generate the code ... information can be facilitated between systems. Why is this important? Most computer systems are networked and sharing information between many different operating systems and programs through the use of common protocols, like TCP/IP (Transport Control Protocol/Internet Protocol). Thus many systems are sharing largely incompatible and/or incomplete (the source of the 2000 problem) date information. The solution for this is to provide the complete date information in the form ... paper needs to demonstrate is that there is no silver flyswatter to kill this bug with for most medium and even small enterprises. Any corporation with in house software developed to handle inventory or database control will almost inevitably have to deal with this on some level which will involve a re-engineering or replacement situation, and will probably be very costly in terms of both dollars and man hours, ...
- 2163: A System Analyst
- ... system, which is to make a 'skeleton' of the project. They write specifications, of what is to be in the final report. They do flow charting, specifications for the programmers of the report, and development control. Development control is where the Systems Analyst works with the programmers along a critical path. A critical path is like a due date, if the report is to be done in thirty days, the Systems Analyst makes ... also helps the programmers along. After the development is finished and a prototype of the report is finished, the Systems Analyst helps the programmers in testing the program for bugs. This is similar to quality control. The Systems Analyst helps to makes sure the work is done until the final report is achieved. Once the final report is finished and free of bugs, it is sent to the user. The ...
- 2164: The vast cyber-frontier is being threatend with censorship from the government
- ... experts in our nations families," remarked a concerned Rep. Senator of India Dan Coats.5 Although in reality, censorship would do little to stop the pornography problems. The bill is a nation legislation trying to control a international network, which is virtually impossible. According to the First Amendment, Americans were granted to write anything they please, whether it's indecent or not, several series of judicial decisions also helped the freedom ... of the rights of adults to communicate with each other," House speaker Newt Gingrich shared.28 In a Time/CNN poll conducted by Yakelovich Partners, 1000 people were involved and 42% were for FCC-like control over sexual content on the computer networks, but 48% were against it. Towns supports the effort which Reps. Christopher Cox (R-Calif) and Ron Wyden(D-Ore) are working for. Cox and Wyden encourage development ... proposal would make individuals responsible for censorship, this would prohibit the governments interaction. Based on a poll takes in Black Enterprises 32% of those in the poll think the a new Internet governing body should control online services while another 32% say the users should followed by 16% saying a private enterprise should, and 15% saying none should, then lastly 6% believe the government is the right system for the ...
- 2165: Computer Simulation
- ... modules for linking WARSIM 2000 to other simulation models to expand the training environment for joint force training exercises. (3) Databases. (4) Computer systems to run the simulation models and support the databases. (5) Technical control systems/workstations for use by personnel in an exercise support function e.g., simulation controllers, analysts, and opposing/ surrounding forces role players. (6) Flexible and responsive terrestrial/satellite communications gateways and media for transmitting voice ... specific threat, WARSIM will provide a training environment capable of representing threats from across the operational continuum. 3. Shortcomings of Existing Systems. Current simulations were designed for training corps and division staffs on command and control techniques for Army operations in mid-intensity combat. Current software is bound to proprietary operating systems and hardware. The software design, especially the underlying representation of terrain, precludes representing the detailed functionality required for resolving ... training from battalion up to theater level. While the major simulation models of WARSIM 2000 will run on computers housed in fixed regional facilities, transportable Simulation Support Modules (SSMs) will provide support functions under the control of a senior controller at locations near the training unit. Users of the simulation will train under the guidance of a senior trainer, usually the unit's commander, the next higher level commander, or ...
- 2166: Robotics
- ... thought of by the word robot is that of a mechanical being, somewhat human in shape. Common in science fiction, robots are generally depicted as working in the service of people, but often escaping the control of the people and doing them harm. The word robot comes from the Czech writer Karel Capek's 1921 play “ R.U.R.” (which stands for "Rossum's Universal Robots"), in which mechanical beings made ... be slaves for humanity rebel and kill their creators. From this, the fictional image of robots is sometimes troubling, expressing the fears that people may have of a robotized world over which they cannot keep control. The history of real robots is rarely as dramatic, but where developments in robotics may lead is beyond our imagination. Robots exist today. They are used in a relatively small number of factories located in ... figures of this sort are rarely made any longer, but many of the so called robots built today for promotional or other purposes are still basically automatons. They may include technological advances such as radio control, but for the most part they can only perform a set routine of entertaining but otherwise useless actions. Modern robots used in workplaces arose more directly from the Industrial Revolution and the systems for ...
- 2167: Natural Language Processing
- ... Wilensky created PAM (Plan Applier Mechanism). PAM interpreted stories by linking sentences together through a character's goals and plans. Here is an example of PAM (Daniel Crevier, 1994): John wanted money. He got a gun and walked into a liquor store. He told the owner he wanted some money. The owner gave John the money and John left. In the process of understanding the story, PAM put itself in the shoes of the participants. From John's point of view: I needed to get some dough. So I got myself this gun, and I walked down to the liquor store. I told the shopkeeper that if he didn't let me have the money then I would shoot him. So he handed it over. Then I left. From the store owner's point of view: I was minding the store when a man entered. He threatened me with a gun and demanded all the cash receipts. Well, I didn't want to get hurt so I gave him the money. Then he escaped. A new idea from MIT is to grab bits and parts ...
- 2168: Stealth Technology
- ... very important to the military service to make aircraft as invisible to radar as possible. By building aircraft in certain ways or out or out of certain materials like exotic plastics, it is possible to control the direction or deduce the amount of radar energy they reflect. This prevents energy radar systems from spotting or tracking '' stealth'' aircraft and from using weapons like anti-aircraft missiles to destroy them. There were ... of lift. The resulting increase in drag reduces flight performance. "Stealth" shapes, such as the faceting found on the Lockheed's F-117 stealth fighter, also tends to be aerodynamically destabilizing. This is brought under control only through the use of highly sophisticated computers that serve to electronically balance the aircraft while it is in flight through it's autopilot and control system. Because range is reduced by many of the "stealths" physical constraints, "stealth" aircraft sometimes need to be bigger than the designers of the craft would like in order to carry sufficient fuel. "Stealth" ...
- 2169: The First Generation of Computers
- ... by a design team at MIT. The "Whirlwind Computer," as it was called, was a revamped U.S. Navy project for developing an aircraft simulator. The Whirlwind used a cathode ray tube and a light gun to provide interactively. The Whirlwind was linked to a series of radars and could identify unfriendly aircraft and direct interceptor fighters to their projected locations. It was to be the prototype for a network of ... Computer) held 800 transistors and bettered its predecessors by functioning well aboard airplanes. In 1956, the first system for storing files to be accessed randomly was completed. The RAMAC (Random-Access Method for Accounting and Control) 305 could access any of 50 magnetic disks. It was capable of storing 5 million characters, within a second. In 1962, the concept was expanded with research in replaceable disk packs.
- 2170: "A Wrinkle in Time"
- ... up in blue (L'Engle 133)." The man with the red eyes then led them to their father who was trapped inside a glass column. Everyone on the planet Camazotz including Father was under the control of IT. While being led down a hallway on route to IT, Meg felt a rhythmical pulsing that was starting to take over her own functions. She managed to escape IT's power. Getting closer Meg discovered that IT was just an oversized disembodied brain. IT had total control over everyone's actions and thoughts on the planet Camazotz except for Meg and Calvin. After much attempt and struggle to free father it was now time to attempt the journey back home. Meg was ... Handout). As a result of a fairly smooth return Meg was once again on the planet of Camazotz in the presence of the boy who looked like Charles Wallace still seemed to be under total control of IT. Through the constant struggle to avoid hypnotism herself Meg somehow was able to get through to her brother with many words of love. "Charles. Charles, I love you. My baby brother who ...
Search results 2161 - 2170 of 8374 matching essays
|