Six Thinking Hats

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 10 of 50 - About 500 Essays
  • Improved Essays

    Cox Communications Essay

    • 753 Words
    • 4 Pages

    early 2014, Cox Communications (also mentioned as ‘Cox’ in this article), the third largest cable and broadband company in the United States, was just a RHEL and JBoss EAP customer for Red Hat. They had invested about 1 million USD in JBoss EAP and weren’t familiar with any other middleware products offered by Red Hat. Today, along with EAP, Cox’s investment in JBoss includes Fuse, A-MQ, BPM, and BRMS. The account has grown by 300% to 4 million USD in one year through JBoss product purchases and…

    • 753 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Introduction I will be writing a Linux Implementation Proposal for the company Linx, LLC. This company has a new research and development group named LSDG. All the systems in the group LSDG will be running the Red Hat Linux operating system. These systems will access and share resources with the existing hardware in place. The existing hardware that Linx, LLC has implemented is a Microsoft active directory domain which contains numerous Windows Server 2012 R2 servers running services like DNS,…

    • 1252 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Hacktivism Analysis

    • 1372 Words
    • 6 Pages

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purposes.The phrase “Hacktivism” originated in 1996 by a hacktivist grouped named “Cult of the Dead Cow” (Denning, 2015, para. 5). Over the last few years, computer hacking has transitioned from being a small collective of computer enthusiast, into huge political platform.The first politically motivated hacking attack has been dated as far as 1987 (Dreyfus, 1997, p.2). This platform has…

    • 1372 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    On Jan 8, 1986, an essay known as "The Conscience of a Hacker," or "The Hacker's Manifesto" went viral, it was written by a computer security hacker who went by the name 'The Mentor'. His purpose was to demystify the motives of a hacker. In this essay, he described hackers as smart individuals who had a thirst for knowledge that they could not get from school. He points out that the computers do not judge them and are only controlled by code as compared to human beings. He then categorically…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Software Management, Linux on Your System #2 This week’s critical thinking assignment explores the software and process management capabilities incorporated in the current release of the Fedora operating system. To do this, multiple commands will be used such as rpm, yum, and wget, along with documentation of the install process. Finally, the kill and ps commands will also be used to view and manage running processes on the server. Pinging Google The first step in the assignment was to open a…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The year of 2008, the group became increasingly associated with international hacktivism, often with the goal of promoting freedom of speech and liberty of justice. Therefore, Anonymous have gained national attention in 2008 when the group had hacked many churches and people have learned who this enormous hacktivist group is and what they do. which is a modern form of protesters in which very intelligent programmers use their hacking skills to fight back against social and political injustice.…

    • 311 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Astroworld Research Paper

    • 1111 Words
    • 5 Pages

    I. Introduction: A. On October 30th, 2005, Houston, Texas lost its only major amusement park when Six Flags decided to close the gates to AstroWorld after operating since the summer of 1968. B. AstroWorld was once full of history and thrilling attractions, and although some of the rides have been taken elsewhere, it may soon be open for business under a new name. C. Now, unless you are a native Houstonian or visited Houston when AstroWorld was still up and running, then you probably weren’t…

    • 1111 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Operation Diamond Paper

    • 731 Words
    • 3 Pages

    The in-depth analysis of the MiG-21 and the discovery of its strengths and weakness led to air superiority during the Six Day and Yom Kippur Wars. The exploitation of strengths and weakness of the MiG-21 by the IAF allowed a less prominent aircraft, the Dassault Mirage III, to gain a competitive edge on the more advanced MiG-21. This aircraft was regarded as the most…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The two elements of thought that most significantly challenged the Israeli commander as he executed his mission to remove settlers from the occupied territory in Gaza are Point of View and Implications and Consequences. The element of Point of View posed the greatest challenge because the commander understood both the frustration of the settlers due to his emotional and personal ties to them and the strategic goals of his government. As a result of his compassion, he was further challenged by…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    first social media site that everyone remember is actually the website called Six Degrees. The name came from the ‘six degrees of separation’ theory which was from 1997 to 2001. Six Degrees allowed users to create a profile and friend other users. They also allowed people who didn’t register as users to confirm friendships and connected quite a few people this way. Even though the youth today do not know anything about the six degrees, they now be on the popular websites today that everyone…

    • 1121 Words
    • 5 Pages
    Superior Essays
  • Page 1 7 8 9 10 11 12 13 14 50