Information-technology

Here you can browse through all of our example academic content.

View our services

There are 2412 articles categorised as "information-technology".
Showing page 2 of 25

Title: Steps Involved in Value Stream Mapping Published: (18th May 2020)
Title: Ethical Principles in IT Services Published: (18th May 2020)
Title: Evaluation of Long Term Evolution (LTE) for Network Speeds Published: (8th Feb 2020)
Title: Annotated Bibliography on Nursing Informatics Published: (8th Feb 2020)
Title: Evolution of Electronic Ink Technology Published: (8th Feb 2020)
Title: Technological Advancement of Personal Health Records and How they Could be Used to Stop the Opioid Crisis in the United States Published: (8th Feb 2020)
Title: Implementing Protection Strategies for Security Companies Published: (8th Feb 2020)
Title: Software Defined Network Information and Configuration Gather by Implementing Secret Attack Published: (8th Feb 2020)
Title: Human-Robot Interaction: Design of Adaptive Automation in Teamwork Increasing Trust Published: (8th Feb 2020)
Title: Distributed Denial of Service (DDoS): Attacks and Defence Mechanisms Published: (8th Feb 2020)
Title: Incognito Browsing and Risks to Data Security Published: (8th Feb 2020)
Title: Factors for Developing IT Security Published: (8th Feb 2020)
Title: Challenges and Opportunities of GDPR Published: (8th Feb 2020)
Title: Integration of Artificial Intelligence Applications on the Supply Chain Published: (8th Feb 2020)
Title: Taxi Driving Fraud Detection Technology Published: (8th Feb 2020)
Title: Why Personal Computer Users Should Choose Cloud Storage Published: (8th Feb 2020)
Title: Implications and Opportunities of Artifical Intelligence Published: (8th Feb 2020)
Title: The Impact of Cybercrime & How to Prevent It Published: (8th Feb 2020)
Title: Advantages of an IT Compliance Program Published: (8th Feb 2020)
Title: Evaluation of International Business Machines Corporation's Watson Published: (8th Feb 2020)
Title: Developing IT Compliance Program Published: (8th Feb 2020)
Title: Recommended Action to Address a Recent E-Commerce Threat: GameStop Case Study Published: (8th Feb 2020)
Title: Google Duplex Operations Management Published: (8th Feb 2020)
Title: Decentralized Cloud Storage Utilizing Blockchain Published: (8th Feb 2020)
Title: Health Information Technology for Economic and Clinical Health (HITECH) Act Published: (8th Feb 2020)
Title: A Technical Comparison of Standards IEEE 802.11n and 802.11ac Published: (8th Feb 2020)
Title: The Impact of Big Data on Smart Parking Published: (8th Feb 2020)
Title: Patient Engagement Successes and Challenges with Health Information Technology Published: (8th Feb 2020)
Title: Proposal for Secure Video Conferencing System Published: (8th Feb 2020)
Title: Intrusion Response Systems (IRS) Published: (8th Feb 2020)
Title: Multimedia Security in Cloud Computing Environments Published: (8th Feb 2020)
Title: New Lightweight RFID Security Mutual Authentication Protocol Published: (8th Feb 2020)
Title: Motion Detection in Smart Home Environment Published: (8th Feb 2020)
Title: Protecting Medical Data: Database Security Research Paper Published: (8th Feb 2020)
Title: Technological Advancement in the Life Insurance Industry Published: (8th Feb 2020)
Title: Data Analytics in Healthcare Industry Published: (8th Feb 2020)
Title: Challenges of Android and iOS Forensics Published: (8th Feb 2020)
Title: Challenges Facing IT and Security Professionals Published: (8th Feb 2020)
Title: Improving Accuracy of SMS Spam Detection using Machine Learning Published: (8th Feb 2020)
Title: Evaluation of the Virtual Private Network Published: (8th Feb 2020)
Title: BlockChain as an Operating System Published: (8th Feb 2020)
Title: Impact of Virus' and Government Protection Strategies Published: (8th Feb 2020)
Title: Consumer Privacy and the Internet of Things Published: (8th Feb 2020)
Title: Overview of Denial of Service Attacks Published: (8th Feb 2020)
Title: Challenges and Issues in Using SBC in Internet of Things Published: (8th Feb 2020)
Title: Content Analysis Report of Business IT Management Published: (8th Feb 2020)
Title: Potential Impact of Data Mining on the Clothing Industry Published: (8th Feb 2020)
Title: Overview of the Equifax Data Breach Published: (8th Feb 2020)
Title: Automatic Traffic Control Using Real-time Vehicle Detection Published: (8th Feb 2020)
Title: Bangladesh Bank Heist – An Ethical Overlook Published: (8th Feb 2020)
Title: Programming Model for Internet of Things Published: (8th Feb 2020)
Title: Security Issues and Database Fundamentals Published: (8th Feb 2020)
Title: University IT Disaster Recovery Plan Published: (8th Feb 2020)
Title: Security Concerns and Cybercrime Published: (8th Feb 2020)
Title: Clinical Data Management in Health Care Technology Published: (8th Feb 2020)
Title: Blockchain Technology for Voting Systems Published: (8th Feb 2020)
Title: Cloud-based Artificial Intelligence for Everyone Published: (8th Feb 2020)
Title: Should We Blame People for Cybersecurity Errors? Published: (8th Feb 2020)
Title: Use of IoT in Digital Business Published: (8th Feb 2020)
Title: Comparison of MS project 2016 & Oracle Primavera 6 Published: (8th Feb 2020)
Title: Implementing a Patient Portal in the Clinic Setting Published: (8th Feb 2020)
Title: KYLOD Information Technology Strategic Plan Published: (8th Feb 2020)
Title: Cybersecurity for ABC Technology Published: (8th Feb 2020)
Title: Benefits of Medscape Smartphone Application in Clinical Practice Published: (8th Feb 2020)
Title: Research on Software Testing and Standards Published: (8th Feb 2020)
Title: Project Management & Information Technology: Cost Management Software Published: (8th Feb 2020)
Title: Consolidation of Servers to Maximize Resource Utilization Published: (8th Feb 2020)
Title: Study of the Use of Infographics in Educational Technology Published: (8th Feb 2020)
Title: Use of Visual Analytics for Big Data Published: (8th Feb 2020)
Title: Technologies for Reliable Data Acquisition Published: (8th Feb 2020)
Title: 3D Object Pose Tracking for Robotics Grasping Published: (8th Feb 2020)
Title: Comparison of Linux Server and Linux Workstations Vendors Published: (8th Feb 2020)
Title: Impact of Data Analytics and Developing Technologies on Businesses Published: (8th Feb 2020)
Title: Global System Mobile: Implentation, Architecture and Advantages Published: (8th Feb 2020)
Title: History and Development of White Hat Hackers Published: (8th Feb 2020)
Title: Social Engineering in Ransomware and Phishing Attacks Published: (8th Feb 2020)
Title: Network Virtualization: Techniques, Types and Benefits Published: (8th Feb 2020)
Title: TCP and UDP of Transport Layer Published: (8th Feb 2020)
Title: Organizational Countermeasures to Prevent IT Misuse Published: (8th Feb 2020)
Title: Handling Pedestrians in Crosswalks Using Deep Neural Networks Published: (8th Feb 2020)
Title: Role of Institutions in Maintaining Data Privacy Published: (8th Feb 2020)
Title: Are We Ready for Quick UDP Internet Connections (QUIC) Protocol? Published: (8th Feb 2020)
Title: Data Integration for Electronic Health Records Published: (8th Feb 2020)
Title: Arguments For and Against Data Mining Published: (8th Feb 2020)
Title: Prevention Techniques in Web Service Application Published: (8th Feb 2020)
Title: Benefits of the Internet of Things and Increased Connectivity for the Retail Industry Published: (8th Feb 2020)
Title: Chain of Custody Steps for Computer Crime Evidence Published: (8th Feb 2020)
Title: Evaluation of Information Technology Strategy: Tesco's Clubcard Scheme Published: (8th Feb 2020)
Title: Website Development: Features of Internet Technologies Published: (8th Feb 2020)
Title: Blockchain and IOT in Supply Chain Industry Published: (8th Feb 2020)
Title: Web/Application Based Cultural Awareness Game Published: (8th Feb 2020)
Title: Examining The Importance Of Computer Technology Information Technology Essay Published: (26th Nov 2019)
Title: Analysis of the communication process in KFC Published: (26th Nov 2019)
Title: Communication process and the correct message Published: (26th Nov 2019)
Title: Hand Gesture Detection and Conversion Published: (23rd Sep 2019)
Title: Cryptographic Protection for Hospital IT Systems Published: (23rd Sep 2019)
Title: Advances in the Technologies of Transmission Media Published: (23rd Sep 2019)
Title: Root Cause Analysis for IT Risk Management Published: (23rd Sep 2019)
Title: Sentimental Analysis of Twitter Dataset Using Python Published: (23rd Sep 2019)
Title: Selection of System and Application of Systems Thinking Published: (23rd Sep 2019)

2412 information-technology
Current Page: 2 of 25
Pages: [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25]