Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Green Computing Project In Information Technology
Rating
Green Computing Project in information technology Abstract This research paper includes the evaluation of project on the green computing in information technology. The research paper will include the description of green computing in information technology along with the methods needed to plan, maintain, evaluate, monitor, and control the project. Contents Abstract2 Introduction5 Discussion6 Green Computing Technology6 Role ...
The World Of Voice Over And Its Impact On The Entertainment Industry
Rating
The World of Voice Over and its impact on the Entertainment industry Introduction Voice over is one of the latest and most acclaimed addition to the entertainment industry. Dubbing closely related, often used in video production to replace the audio content that is not delivered by an actor in a particular scene. ...
Mobile Payments Systems
Rating
MOBILE PAYMENTS SYSTEMS Mobile Payments Systems Abstract In this paper, we have examined the concept of mobile payments systems. Although the study has focussed on the mobile payments systems in a broad context, however, we have also examined the hindrances in the implementation of the mobile payments systems, risks involved in the implementation ...
Ethics
Rating
ETHICS Computers and Web Ethics Computers and Web Ethics Introduction For centuries, different codes of medical and legal ethics have evolved that have governed their activities, representatives of these professions. They lined up in detail and logical. In contrast, the disposal of specialists in computer technology and, more generally, web was only a ...
Technology Invading Privacy
Rating
Technology Invading Privacy Abstract Privacy can be described as a state in which no one is monitored or disturbed by others. Computers and networks are used for storing vast amount of information. The advanced technology is providing strategic benefits to commercial enterprises. There are three major drivers which are affecting the perceptions ...
Database Management System
Rating
Database Management System [Name of the Instructor] Database Management System Introduction Technology has taken data recording from the filing system to automation of keeping records of the customers, inventory, salary, commission and several other records. Organisations have to record, collect and store large amounts of data for which now organisations can use database management ...
Cloudswitch, Inc
Rating
CloudSwitch, Inc CloudSwitch, Inc CloudSwitch, Inc. is a developer of software focusing on cloud computing. CloudSwitch, with its creative cloud software suites, safeguards enterprises from the risks, complexity, and possible lock-in of cloud-computing; aiding the enterprises to take advantage of cloud computing in business agility and cost. With the availability of ...
Data Mining And E-Business
Rating
DATA MINING AND E-BUSINESS Data Mining and E-Business Table of Contents Introduction1 The Stepping Stones of Data Mining1 Modeling Procedures Used in Data Mining2 Decision Trees5 Rule Induction6 Neural Networks7 Genetic Algorithms7 E-Business Concept7 Enhance e-business Through Web Data Mining7 DM In Customer Profiling8 Conclusion9 Data Mining and E-Business Introduction Data mining is the extraction of the related information with respect of the industry usage ...
Issues In Outsourcing
Rating
ISSUES IN OUTSOURCING Issues in Outsourcing Abstract The main purpose of this research proposal is to understand the different issues which the companies face in information technology outsourcing. Information technology is growing day by day, and companies are going for the adoption of information technology outsourcing. Along with it's so many advantages, ...
Risk Management
Rating
RISK MANAGEMENT Risk Management involving Security Breaches Risk Management involving Security Breaches Introduction A general term that encompasses all aspects of the measures taken to safeguard computer systems and the data they contain from losses attributable to any kind of attack, whether initiated by people or natural elements. A given system's security boils ...
201 - 210 of 287 Go To Page 16  17  18  19  20  21  22  23  24  25