Javascript is disabled. Please enable it for better working experience.

Research Papers on Technology

All technology students are required to write research papers multiple times in their educational tenure. This also requires much review of the past literature for a proper understanding of the topic. Researchomatic, therefore, provides its consumers with a wide range of research papers on technology and related topics to support and assist students in getting quality literature for secondary data.

Unix Operating System
Rating
UNIX OPERATING SYSTEM UNIX Operating System UNIX Operating system Introduction It is an operating system (OS) is software that manages the resources of a computer. It is a popular multi-user, multi-tasking OS. UNIX is considered one of the greatest achievements in computer science. It has been around since in the 1960s in various forms, ...
Cloud Computing
Rating
Cloud Computing Abstract This paper seeks to demonstrate the meaning, description, scope, impacts on network management, effectiveness, advantages and disadvantages provided by the technology of cloud computing on the field of networking as well as the users of cloud computing. Furthermore, the various methods of achieving cloud computing are also presented. Lastly, ...
Online Discourse
Rating
ONLINE DISCOURSE The Role of Website as an Element of Discourse Abstract The world of the Internet is shaped and sought by dynamism and changes that revolutionize the world of humans. The websites developed for communication and discourse; serve the purpose of interactions while giving the participants a unique platform to develop ...
Cloud Computing
Rating
Cloud Computing Table of Contents Introduction3 Discussion5 Some Working Definitions of Cloud Computing6 Layers of Cloud Computing7 IaaS Layer7 PaaS Layer8 SaaS Layer8 Implications of the Transition to Cloud Computing9 Cloud Performance and Security Concerns10 Cloud Computing Drives Creation of New Businesses10 Using the Cloud for Business Advantage11 Business Applications with the Greatest Potential12 Cloud Cost Considerations14 The Cloud is a Platform for Managing Business ...
Research The Pornography And Obscenity Laws
Rating
Research the pornography and obscenity laws Pornography For thousands of years man has created works with lewd purpose to arouse sexual desires. While there was a time when pornography was difficult to produce and therefore was more available to the rich and wealthy class, with the advent of large printing, photography and ...
Service-Oriented Architecture (Soa)
Rating
SERVICE-ORIENTED ARCHITECTURE (SOA) Service-Oriented Architecture (SOA) Service-Oriented Architecture (SOA) Abstract. Design patterns for Service Oriented Architecture (SOA) suggest solutions for architectural, design and implementation problems, but these changes also affect performance and other non-functional properties. A performance model can be generated from a SOA software model (plus some implementation and deployment advice) ...
Python In Network Security
Rating
PYTHON IN NETWORK SECURITY Python In Network Security Python In Network Security Introduction Communication between two machines via a network is done with special structures labeled socket. They designate points of entry / exit to the network, connected to an IP address and port number. We can distinguish two types of socket is: ...
Cyber War
Rating
CYBER WAR Information Warfare and Cyber Terrorism [Institution name] Information Warfare and Cyber Terrorism Introduction The network is becoming the ideal place for criminals and terrorists to carry out their actions and activities. Hence, cybercrime and cyber terrorism have become two of the most serious threats seem to haunt Western societies. For this reason, the ...
Groupware
Rating
GROUPWARE Advantages and Disadvantages of Groupware Advantages and Disadvantages of Groupware Introduction Groupware is the concept of Web-based software, which defines the groups of people using the application. It is based on the idea, because of the network connection; one must cooperate with each other over the network as a whole and team productivity. ...
Cyber Attacks And Critical Infrastructure
Rating
Cyber Attacks and Critical Infrastructure Abstract With the technological advancement, the information revolution by the internet has involved into our everyday lives. With these technologies, many advantages are offered to the users but besides these advantages, the users are also exposed to dangerous risks. These risks involve pies and terrorists and cyber ...
641 - 650 of 961 Go To Page 60  61  62  63  64  65  66  67  68  69