Facebook Pixel Code
x
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Information Technology Thesis

Development of Cloud Computing Technology
However, these terms are avoided and not accepted globally, due to variation (ARMBRUST, FOX et al. The Commerce Department’s National Institute of Standards and Technology (NIST) have illustrated some helpful definitions that focus on three concepts (Ryan & Loeffler, 2010):The core components of a cloud are consists of the data center hardware and software. When these resources are made available to the public, they are referred as public clouds and the service provided by the cloud is called
Pages: 5 (1250 words), Thesis
Preview Essay
Cyber Crime Complaint Center (in United Arab Emirates)
The research articles with the latest information are published in International Journal of Cyber Criminology. There are number of books by Wall, Jewkes, McQuade and Yar have been written on this topic. Still as this research topic is fresh so the depth study is required as mentioned in the recent work of Nhan and Bachmann (2010).The cyber crime increases as the growth of internet connectivity increases in any area and as we know that the new technology is wholly dependent upon the internet so
Pages: 8 (2000 words), Thesis
Preview Essay
Extend order about ((Identifying and Evaluating a Model for Integrating Physical and Virtual Identity Access Management Systems) )
Woodworth discussed virtual identities and stated that “virtual spaces and the tools within” that are used for “identity construction and the self-presentation” of the individual [84]. With respect to the definition by Woodworth [84], it can be stated that if the tools within the virtual spaces are used to authenticate the users on the basis of any proof of identity then it can be termed as a virtual identity. For example, a smart card is a physical identity, however if this identity is
Pages: 43 (10750 words), Thesis
Preview Essay
More Chapters in my topic ((Identifying and Evaluating a Model for Integrating Physical and Virtual Identity Access Management Systems) )
Values in them that exist independent of the research study, whereas interpretivism believes that every research object is perceived in the light of the personal experiences of the researcher [112]. It is due to these differences that different research methods are used to attain data regarding the objects that are under study:Mackay and Fayard stated that deductive models aim to deduce the characteristic of aspects and objects found in real life from theories, whereas inductive model attempts
Pages: 20 (5000 words), Thesis
Preview Essay
HTML5 Adoption
Of web-based software engineering and development (Sheldon, 2012).This paper critically analyzes the expected benefits that will come with the adoption of HTML5 with particular focus to some of the key issues that the new technology is likely to solve.The recent announcement of future launch of HTML5 has made a significant impact in the web and graphic communication industry and many analysts have speculated that HTML5 is likely to be the future standard of web design. In view of the
Pages: 9 (2250 words), Thesis
Preview Essay
Network with Wi-Fi concept
Moreover, it is possible to provide a simplified illustration of IP-based WiMAX network architecture.WiMAX Forum NWG developed the network reference model and defined numerous functional integrative parts and connections/interfaces between them (Information Security Tops CPA Tech Issues in 2005). WiMAX equipment can be found in two main forms – in the form of base stations, implemented by service providers to involve the innovative technology in a certain area, and receivers, installed in
Pages: 4 (1000 words), Thesis
Preview Essay
The Cloud Computing in Business Security
The explanation given above looks at the concept of loud computing from the perspective of end users. From the viewpoint of the service provider, the data center is the major component of cloud. The hardware resources required for different computing and storage processes are contained in the data centre. They classify the cloud system as private and public (“Grid and Cloud Computing” 48). Cloud computing is a radical concept in the field of information technology and is capable of
Pages: 20 (5000 words), Thesis
Preview Essay
Single Phase Simulation in OBC
The contention was to apply various different computing models in order to decipher which models were best suited to OBC flow phenomenon. In addition, the primary area of investigation remained flow turbulence emulation since turbulence plays a vital part in mixing inside OBCs. Three different turbulence models were used namely LES, DES and k epsilon.The study was conducted to investigate the response of flow in OBCs as various parameters were modified. Three sets of geometry were used to carry
Pages: 15 (3750 words), Thesis
Preview Essay
E learning
Differences in policies and implementation because of administrative dimensions can affect e-learning diffusion. Poor professional development toward e-learning can be attributed to the organization because of lack of resources and/or political will and unity.Teachers may not adopt e-learning if they do not see that the administration as supportive to the skills training and other needs of e-learning platform. Poor alignment between e-learning goals and curriculum can hinder e-learning
Pages: 10 (2500 words), Thesis
Preview Essay
Lan design for medium-sized company order 4
However, CAT 5 cable can support up to 300 feet equal to 100 meters in distance. A requirement of the switch is mandatory for every 300 feet.Data switches perform packet distribution tasks within the local area network. Acting as a core backbone, XYZ Corporation network requires fast Ethernet switches to support the internet and external communication. The Cisco Catalyst 3750 v2 series switch is recommended to cater the requirements for the current scenario as well as for the future. The
Pages: 6 (1500 words), Thesis
Preview Essay
Integrate Agile Practices into Waterfall methodology
It is prerequisite and a necessity of any organization to embark on ‘a priori’ activity of estimation of the success of a software project before embarking on it. This is because it has been identified actually that the rate of failure of such undertakings and projects can be very high which has very detrimental outcomes overall. This has been backed up by research findings where research has shown that organizations undertaking projects of software development and improvement often face
Pages: 10 (2500 words), Thesis
Preview Essay
I don't have a topic yet
Bearing in mind the widespread embracement of information technology, a greater percentage of data is collected in the online and real time environments that bring forth large volumes of data. Experts can be in a position of aggregating such time ordered data using a desirable time interval, producing great volumes of time series data that is equally spaced. The data can then be explored followed by analysis through the use of multiple important tools or methodologies that are developed using
Pages: 60 (15000 words), Thesis
Preview Essay
Survey Of Agile And Waterfall Integration In Financial Services
SDLC has largely been used in direct association with software development. This notwithstanding, Leffingwell and Widrig (2010), actually emphasized that as a system development model, system development life-cycle is good for hardware configuration, as much as it is good for software configuration. Larman (2004) also wrote about the numerous benefits that SDLC offers software developers, emphasizing that it is integrative, meaning that it guarantees the fulfillment of several aspects of a
Pages: 6 (1500 words), Thesis
Preview Essay
Delay Tolerant Networking (DTN)/ Disruption Delay Tolerant Networking (DTN)
On the other hand, traffic and service rate are affected by queuing delays that are within the relay points. The clocking delays occur when erroneous data is received, though not recognized and resent until when all the right data is received. Vast ranges of environments are covered in DTN researches. Each of the particular entities in these environments has their own features and characteristics. For example, each hub or node in the space network may have a difference in their resource
Pages: 20 (5000 words), Thesis
Preview Essay
Passenger flow simulation using anylogic
This corresponds to processing 3,800 arriving passengers per hour and 3,500 departing passengers per hour (International Finance Corporation). The King Abdulaziz Airport serves as one of the busiest air hubs in the region, especially during pilgrimage season when passengers to Mecca are received through this airport. Since its inception, the King Abdulaziz Airport has had to handle larger passenger volumes for pilgrimage journeys every year. The lack of appropriate expansion has meant that
Pages: 6 (1500 words), Thesis
Preview Essay
A new generation Internet capable of intelligent adaptation: Possibilities to enhance network capacity
Their care, love, support, encouragement, concern and enthusiasm inspired me to achieve this goal.I highly appreciate the dedication and guidance of my supervisor DR/Prof……………. His unrelenting time to time supervision and directives are the milestones towards the success of this research paper. His tutorials, inspiration, re-reading and correcting my work have been an integral ingredient to the release of the refined copy. To my parents, thanksgiving cannot be enough to show how I am
Pages: 120 (30000 words), Thesis
Preview Essay
E learning
The objectives of this particular research study have been provided in detail hereunder.The objective of this particular research study is to determine the barriers experienced by primary public schools in Saudi Arabia when adopting e-learning. With this objective in mind, several research questions are framed below:In order to provide comprehensive set of answers for the research questions framed above, proper set of research objectives have been ascertained in this particular research study.
Pages: 5 (1250 words), Thesis
Preview Essay
Modularisierung von ERP-Dienstleistungen vor dem Hintergrund des Cloud Computing (Modularization of ERP-Services against the background of Cloud Computing (interviews)
Internationally operating SMEs and corporations this results in the ability of more efficient fulfillment of their different regional non-functional requirements. However, the lack of presence of successfully established and fully modularized ERP products let us suggest that not all possibilities are already exhausted. In this work we study and analyze such presumption as well as opportunities and risks and also possibilities for dealing with these risks and opportunities.According to the
Pages: 15 (3750 words), Thesis
Preview Essay
AN INTRODUCTION TO INFORMATION AND CYBER SECURITY
Global perspective in security entails the dynamic security environment and its intrinsic challenges. It includes all the current issues in information security and how they can be managed.Idealy, there are six major aims of security and they are divided into six major categories.There are various types of attacks that information security can come across. One of them is protocol stack, i.e fig 1.1[2] which has stratums or level and each level has a limitation. Levels like application and the
Pages: 4 (1000 words), Thesis
Preview Essay
E learning edit
Thus, in this regard, the projects of King Abdullah and National Centre for E-Learning and distance learning were deemed to be the prime ones that eventually developed the approach of e-learning of the nation. Correspondingly, when making recommendations, it can be affirmed that for attaining superior level of e-learning success, specifically in primary schools in Saudi Arabia, the approach of mobile learning must be developed with the establishment of several e-content centres. Besides, the
Pages: 12 (3000 words), Thesis
Preview Essay

More Information Technology Thesis

1 - 20 results of 34 items
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us