Rating
USER CENTERED DESIGN
User Centered Design
User Centered Design
Introduction
User Centered Design is a term that refers to the methodology to make use of “usability”. It is the technique employed for the controlled development of a product, engaging the end users all through the various stages of the development. The users and their ...
Rating
DATA STORAGE
Data Storage Assignment
Data Storage Assignment
Introduction
The capacity of a hard drive currently available on the market for domestic/commercial ranges from 10 to 3000 GB, as well as those available for businesses, more than 3 TB. The HD has evolved. The oldest had 5 MB (approximately 4 disks of 3 1/2 ...
Rating
Data Mining Technique Analysis
Data Mining Technique Analysis
Introduction
There are numerous major techniques of data mining two of these are, artificial neural network and decision tree analysis. Artificial neural network also called neural network, is a sort of network perceive the artificial neurons as nodes. Decision tree is a technique ...
Rating
Information Systems
Information Systems
Introduction
An organization's business process is majorly supported through an information system. The information systems must grow according to the growth of the business processes. Unfortunately, the business processes keeps on growing at a rapid pace, but the information systems tends to become old and does not keep on ...
Rating
LEGAL ISSUES OF OUTSOURCING
Legal Issues of Outsourcing
Legal Issues of Outsourcing
Introduction
Outsourcing has become a common practice with the emergence of networked IT infrastructure. Today, majority of the companies opt for outsourcing due to the associated cost and other benefits. However, IT outsourcing may raise legal issues in certain cases. This ...
Rating
Info System Theory and Practice
Info System Theory and Practice
Zombie Computers
Zombie computers are those computers which are not protected properly and get easily infected by viruses such as Trojan and usually a backdoor (backdoor). Such a computer can be controlled remotely by a hacker or to send spam (most spam ...
Rating
EVALUATION OF TECHNOLOGIES
Reflection and Evaluation of Technologies
Reflection and Evaluation of Technologies
Content Management Systems (content stored and retrieved from databases)]
Introduction
Content Management System (CMS) has become an essential requirement of the organizations that promote collaborative work environment. Using this computer system, the users can publish, edit and modify the content. CMS ...
Rating
UML
UML Diagrams for National Colorectal Screening Program
UML Diagrams for National Colorectal Screening Program
A flow chart of a case study of National Colorectal Screening Program
Use case for the hub
Use case for the local screening center
Sequence diagram for the hub
Sequence diagram for the local screening center
State diagram
Class Diagram of the ...
Rating
Leadership practices in IT Organizations
Leadership practices in IT Organizations
Introduction
Leadership skills and organizations are evolving by the second. Every single day, new and improved ideas and pieces of literature and research come forth in front of us, which not only changes the course of creating a better understanding regarding the ...
Rating
IT AND BUSINESS
Implementing IT in Business
Implementing IT in Business
Introduction
Technology's role cannot be avoided form the development of any business as today's rapidly changing technological advancements have given leverage to businesses as well as made things easier to individuals or consumers. The businesses in the present age function in a systematic ...