|
» Technology Essays and Papers
Computer Viruses
<view this essay>.... criminals claim that information should not be suppressed or protected and that the crimes they commit are really not crimes at all. What they choose to deny is that the nature of their actions are slowly consuming the fabric of our country’s moral and ethical trust in the information age.
Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defen .....
Number of words: 1753 | Number of pages: 7 |
|
Laws Must Be Passed To Address The Increase In The Number And Types Of Computer Crimes
<view this essay>.... thieves crosses all
races, age groups and economic strata. Computer criminals tend to be
relatively honest and in a position of trust: few would do anything to harm
another human, and most do not consider their crime to be truly dishonest.
Most are males: women have tended to be accomplices, though of late they
are becoming more aggressive. Computer Criminals tend to usually be
"between the ages of 14-30, they are usually bright, eager, highly
motivated, adventuresome, and willing to accept technical
challenges."(Shannon, 16:2)
"It is tempting to liken computer criminals to other criminals, ascribing
characteristics somehow different from
'norm .....
Number of words: 1340 | Number of pages: 5 |
|
Smart Cards
<view this essay>.... speeding transportation by using electronic ticketing.
The most common uses of today are: banking and retail, mo-bile communications, information technology, identity and health, park-ing, public telephony, mass transit and campus ID solutions; and areas of use increase every day.
One of the most fast developing areas of use is Banking and Retail. For business of financial transactions is very competitive and fast-changing, banks are always seeking for new valuable services for their customers. give an ability to deploy and manage multiple ap-plications on a wallet-size plastic card. Smart card technology also prom-ises to resolve the security problems t .....
Number of words: 216 | Number of pages: 1 |
|
Internet Addiction
<view this essay>.... falls into
is the problem. There are no real answers yet because research in this area
is at the beginning stages. While lost in this so called 'Cyber Community'
for long periods of time, people are neglecting other important activities
like; time with the family, socializing, work and health concerns.
One of the most extensive studies on Internet Addiction to date was
conducted by Dr. Kimberly S. Young of the University of Pittsburgh at
Bradford. In her study, she revealed concrete evidence supporting the
Internet Addiction claim. However, help for web addicts is available. There
are several web sites available for the treatment of Internet addiction, as
w .....
Number of words: 1880 | Number of pages: 7 |
|
A Tour Of The Pentium Pro Processor Microarchitecture
<view this essay>.... and implemented to produce the Pentium Pro microprocessor. This unique
combination of architectural features, which Intel describes as Dynamic
Execution, enabled the first Pentium Pro processor silicon to exceed the
original performance goal.
Building from an already high platform
The Pentium processor set an impressive performance standard with its pipelined,
superscalar microarchitecture. The Pentium processor's pipelined implementation
uses five stages to extract high throughput from the silicon - the Pentium Pro
processor moves to a decoupled, 12-stage, superpipelined implementation, trading
less work per pipestage for more stages. The Pentium Pro proces .....
Number of words: 2646 | Number of pages: 10 |
|
Hacking
<view this essay>.... energy to ingenious exploration of the computers. Rules and the law were
disregarded in their pursuit for the 'hack'. Just as they were enthralled with
their pursuit of information, so are we. The thrill of the hack is not in
breaking the law, it's in the pursuit and capture of knowledge.
To this end, let me contribute my suggestions for guidelines to follow to
ensure that not only you stay out of trouble, but you pursue your craft without
damaging the computers you hack into or the companies who own them.
I. Do not intentionally damage *any* system. II. Do not alter any system
files other than ones needed to ensure your
escape from dete .....
Number of words: 3551 | Number of pages: 13 |
|
How Technology Effects Modern America
<view this essay>.... about 7% for those with some college education. Only
the wages of college graduates are up.
Of the fastest growing technical jobs, software engineering tops the list.
Carnegie Mellon University reports, "recruitment of it's software engineering
students is up this year by over 20%." All engineering jobs are paying well,
proving that highly skilled labor is what employers want! "There is clear
evidence that the supply of workers in the [unskilled labor] categories already
exceeds the demand for their services," says L. Mishel, Research Director of
Welfare Reform Network. In view of these facts, I wonder if these trends are
good or bad for society. "The dan .....
Number of words: 1221 | Number of pages: 5 |
|
New Eye Tracking Techniques Improve Realism Of Aircraft Simulators
<view this essay>.... of addi
to improve image quality significantly throughout the whole viewed scene.
However, based on the visual properties of the eye, realism can be
obtained by providing a high-resolution 'area of interest' insert within a
large, low-resolution field of view. If the image-generating computer
'knows' where the pilot's fixation is, it mage there.
The technology to make this possible was developed by a research team
headed by Professor Richard Frecker and Professor Moshe Eizenman. The work
was carried out in collaboration with CAE Electronics Ltd. of Montreal with
financial support from the Natural Sciences and Engineering Research
Council of Canada .....
Number of words: 458 | Number of pages: 2 |
|
|