|
» Technology Essays and Papers
The Computer Revolution
<view this essay>.... as the number of people employed in these roles in these larger companies was dramatically reduced. However society at large did not observe any real changes, as the number of people employed in the larger multinationals was small compared to the total workforce occupied in completing these tasks.
It had been shown through its usefulness in payroll applications that computing had the potential of larger cost savings in both those employed and what they did with their time. Menial, repetitive tasks could easily be carried out by computers with no loss of efficiency of effectiveness however long the tasks took. The only problem was the expense of the machines. .....
Number of words: 1190 | Number of pages: 5 |
|
Production Planning
<view this essay>.... would have taken Professor Moily's class in
production management the plant still might be running.
Modern production management or operation management (OM) systems first
came to prominence in the early half of the twentieth century. Frederick W.
Taylor is considered the father of operations management and is credited in the
development of the following principles.
a. Scientific laws govern how much a worker can produce in a day. b. It is the
function of management to discover and use these laws in operation of productive
systems. c. It is the function of the worker to carry out management's wishes
without question.
Many of today's method's of ope .....
Number of words: 2089 | Number of pages: 8 |
|
A Cray SuperComputer Comes To The University Of Toronto
<view this essay>.... - the first
'2' in the '22'. The Cray operates at a clock rate of 105 MHz (the regular,
run-of-the-mill IBMPC has a clock rate of 4.77 MHz). By quick calculations,
you would be led to believe the Cray is only about 20 times faster that
the PC. Obviously, this is not the case. The Cray handles data
considerably differently than the PC. The Cray's circuits permit an array
of data (known as a 'vector') to be processes as a SINGLE entity. So,
where the IBMPC may require several clock cycles to multiply two numbers,
the Cray performs everything in one clock cycle. This power is measured in
Millions of Floating Point Operations Per Second (MFLOPS) - which is to .....
Number of words: 680 | Number of pages: 3 |
|
Freedom Of Speech On The Internet
<view this essay>.... civil liberties that Americans have fought and bled over since the birth of our Constitution.
Four years ago, Congress approved the Communications Decency Act (CDA), which was designed to protect children by prohibiting “indecent” speech or images from being sent through cyberspace. One of the biggest groups that combated the censorship law is the CIEC (Citizens Internet Empowerment Coalition). The CIEC found and posted on their website some obvious problems with the CDA. “This law would prohibit texts of classic fiction such as the Catcher in the Ryer, Ulysees, “Seven Dirty Words” by George Carlin, and other materials which, although offensive to some, .....
Number of words: 1262 | Number of pages: 5 |
|
What Is A GDSS?
<view this essay>.... to perform as a DSS in that it allows multiple scenarios to be run with varying data inputs. Third, the GDSS records all inputs / comments so that all input is maintained for future discussion and evaluation. To achieve these three abilities, GDSS's are generally able to be divided into three basic configurations; the single-computer, software only, the single-computer and keypad response system, and the multiple computer / workstation network system (Donelan, 1993). Each with its corresponding unique architecture provides solutions to existing problems within the group dynamic at varying costs.
To provide a better view of what each of the three architec .....
Number of words: 788 | Number of pages: 3 |
|
What Really Is A Hacker?
<view this essay>.... most people who
consider the themselves to be a hacker. The first, which is universally agreed
upon is that access to computers should be free and unlimited. This is not
meant to be a invasion of privacy issue, but rather free use of all computers
and what they have to offer. They also believe that anyone should be able to
use all of a computers resource with no restrictions as to what may be accessed
or viewed. This belief is controversial, it not only could infringe upon
people's right to privacy, but give up trade secrets as well. A deep mistrust
of authority, some hackers consider authority to be a constriction force. Not
all hackers believe in this .....
Number of words: 409 | Number of pages: 2 |
|
Computer Software Piracy And It's Impact On The International Economy
<view this essay>.... Unauthorized duplication of software
is known as software piracy which is a "Federal offense that affects everyone”
("Software Use..." Internet). The following research examines software piracy
in its various forms, its impact on the end user and the international industry
as a whole, and the progress that has been made in alleviating the problem.
Software piracy harms all software companies and ultimately, the end
user. Piracy results in higher prices for honest users, reduced levels of
support and delays in funding and development of new products, causing the
overall breadth and quality of software to suffer” ("What is...” Internet). Even
the users .....
Number of words: 3356 | Number of pages: 13 |
|
Computer Security
<view this essay>.... intelligence of the military department. A lot of important information can be found in the memory of computer. So, people may ask a question: Can we make sure that the information in the computer is safe and nobody can steal it from the memory of the computer?
Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his .....
Number of words: 2496 | Number of pages: 10 |
|
|