Javascript is disabled. Please enable it for better working experience.

Research Papers on Technology

All technology students are required to write research papers multiple times in their educational tenure. This also requires much review of the past literature for a proper understanding of the topic. Researchomatic, therefore, provides its consumers with a wide range of research papers on technology and related topics to support and assist students in getting quality literature for secondary data.

The Future Of Energy
Rating
The Future of Energy Introduction The recent earthquake in Japan and the earthquake in Chile showed that energy security is essential for the development of a country and beyond offers of the generators and their potential investment is necessary to define state policies to diversify the energy matrix without sacrificing ecological security ...
Information Management
Rating
Information Management Information Management Introduction In this study we try to explore the concept of information security and management in a holistic context. The main focus of the research is on information security and its relation with organizational efficiency and the development of warehousing and storage of relevant information. The research ...
Cell Phone Technology
Rating
CELL PHONE TECHNOLOGY Cell Phone Technology Cell Phone Technology The development of mobile technology has much of its history in the evolution of the cellular phone. From simple cell phones to modern smartphones, this technology still dominates the marketplace for devices used to connect with other phones and to the Internet. Phone technology ...
Airport Scanners And Radiation Concerns
Rating
AIRPORT SCANNERS AND RADIATION CONCERNS Airport scanners and radiation concerns Airport scanners and radiation concerns Introduction For the reliable detection of explosives, potential security threats and bomb making components at the airports, whole body scanners are required. Responding to the need of these whole body scanners, Transportation security Administration placed them for airport checkpoint ...
Ethics Of Computer Games
Rating
Ethics of Computer Games Ethics of Computer Games Introduction It is generating a repetitive speech in the media about "school violence". Without discussing the opportunity of the term and the ideological connotations it entails, what we ask in this paper is whether certain climates of violence that occur in classrooms will not be ...
Cloud Computing
Rating
CLOUD COMPUTING Why do companies still refrain from implementing cloud based ERPs Why do companies still refrain from implementing cloud based ERPs Thesis Statement “Financial difficulty of cloud computing service provider can result in high level data loss”. Introduction Cloud Computing is efficient and time saving because of the centralized storage, huge memory, speed ...
Cloud Computing
Rating
CLOUD COMPUTING Cloud Computing Cloud Computing Introduction Cloud computing is Internet-based computer system and remote data centers to manage information services and applications. Cloud computing allows consumers and businesses use to manage files and applications without installing them on any computer with Internet access. This technology offers a much more efficient use of resources ...
Client Side Architecture Vs. Server Side Architecture
Rating
Client side architecture vs. Server side Architecture Introduction Client-server architecture allows simultaneous access to data for multiple users. Database based on SQL-server, in most cases support the optimistic locking (optimistic locking) - an approach that allows multiple users at one and the same time work with the same data. Conflict resolution is ...
Fiber Optic
Rating
Fiber Optic Fiber optic cable innovation Fiber optic cable innovation Introduction In fiber optic communication the data is transferred from one place to another by sending pulses of light through the optic fiber cable. The cable of fiber optic is a thin glass tube. The glass is 100% pure and as thin ...
Data Security
Rating
Data Security Data Security table of contents 1ABSTRACT3 2INTRODUCTION4 3DISCUSSION5 3.1 Data independence 5 3.1 Data security5 3.2 Data integrity6 3.3 Concurrency Control6 3.4 Recovery7 3.5 SQL server database security policies7 3.6 SQL Server Security Configuration7 3.6.1 Use a secure password policy7 3.6.2 Account of the use of safety strategies8 3.6.3 Strengthen the database log records9 3.6.4 Management extended stored procedure9 3.6.5 Use protocol encryption10 3.6.6 Do ...
361 - 370 of 961 Go To Page 32  33  34  35  36  37  38  39  40  41