Distributed computing

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 32 of 38 - About 375 Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application,…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Stochastic Mortality Models Fitting mortality rates and hence longevity risk quantification dynamically continues to be a challenge especially in the developing countries. Earlier development relied on one-factor model by Lee and Carter (1992). Lee and Carter model is widely applied since it has been found to provide fairly accurate estimations and population projections for both the academicians and practitioners. Later on, Renshaw and Haberman and Halzoupoiz(1996) and Renshaw and Heberma…

    • 2594 Words
    • 11 Pages
    Superior Essays
  • Improved Essays

    Continental drift was an idea raised in early 17th century by Sir Francis Bacon, as he wrote of the apparent shoreline fit of opposite sides of the Atlantic which was much like pieces of a puzzle (Figure 1). The fit was computed by Sir Edward Bullard in 1960s later (Figure 2). Later in 1912, Alfred Wegener, a German geophysicist who was the first to propose the continental drift theory with a mechanism, suggested that all the lands were once joined together as a supercontinent – Pangaea, which…

    • 1161 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    market (Altermatt,n.d.,p.1). Then briefly after, Windows created the software that is arguable responsible for popularizing personal computing. Which in result sparked “The New Age of Creativity”. Friedman (2005) describes it as a platform of intellectual work, intellectual capital, could be delivered from anywhere that could be disaggregated, delivered, distributed, produced, and put back together again (Friedman, 2005,p.7).This can be seen with computers becoming cheaper, more readily owned,…

    • 1153 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Furthermore, a suggestions have been made towards enhancing the broadband connectivity and develop a cloud computing services due to the fact that UAE has achieved an advanced and complex stage of eGovernment development. In addition, the Laws and legislations that concerened the ICT sector were revised and updated to be more efficient. The work patterns across…

    • 1260 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Direct Cyberbullying

    • 1183 Words
    • 5 Pages

    Cyberbullying is a type of aggressive behavior that occurs when social communications such as phone calls, text messages, emails, and social networking sites are used repeatedly by individual(s) for harassment, embarrassment, invasion of privacy, black mailing, spreading false rumors, and social exclusion. It mainly consists of two major forms: direct cyberbullying, the online harassment activity is done by the perpetrator, and indirect cyberbullying, in which an instigator is enlisting others…

    • 1183 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    A camera in your kitchen, living room, bedroom, bathroom, toilet—being under constant surveillance will make anyone more aware of their actions and how others may perceive them. At the turn of the millennium, Josh Harris, a dot-com kid who rose to his wealth with his company Pseudo, attempted to model the privacy loss that occurs as a result of the Internet with his two experiments: Quiet and We Live in Public. Quiet was a closed, underground community in which the participants were followed by…

    • 1183 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Walmart Case Study

    • 10116 Words
    • 41 Pages

    How is RFID technology related to Wal-Mart’s business model? How does it benefit suppliers? Wal-Mart’s basic business model is “low cost.” RFID promises to reduce supply chain costs and improve the availability of items on store shelves. The world’s biggest retail chain wants RFID readers installed at store receiving docks to record the arrival of pallets and cases of goods. Software uses sales data from its point-of-sale systems and the RFID data about the number of cases brought out to…

    • 10116 Words
    • 41 Pages
    Great Essays
  • Improved Essays

    Right To Privacy

    • 1365 Words
    • 6 Pages

    But, is it the first time law enforcement agencies asked for help or backdoor in the system? No, this is not the first time and not the last time for sure. From the beginning of computing and Internet, Government has kept pushing such technologies that will allow them to do data mining about people, and the tech companies should cooperate with the law enforcement. In 1993, Clinton administration mandated that hardware manufactured…

    • 1365 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Intel Xeon Phi Case Study

    • 1200 Words
    • 5 Pages

    The Intel Corporation made the Xeon Phi in November 2012 with adaptable programming, energy viability etc. This is an alternate stage and which uses the vector changing unit and interconnections. The High execution machines essentially uses the Intel Xeon phi coprocessor and the Nvidia tesla coprocessors. The Nvidia tesla coprocessor mostly uses the GPU’s, which will eat up low essentialness. To make these programming models we make usage of OpenMP for Intel Xeon and for Nvidia we make use of…

    • 1200 Words
    • 5 Pages
    Great Essays
  • Page 1 29 30 31 32 33 34 35 36 38