Papers 1591-1600 of total 11877 found.
Category: /Literature/English
…a look at what makes the Internet so vulnerable to electronic mischief: Unlike centralized networks operated by commercial online services such as Compuserve and Prodigy, the Internet is a decentralized system spread out cross millions of computers
Details: Words: 1825 | Pages: 7.0 (approximately 235 words/page)
…'The Cuckoo's Egg' is a story of persistence, love for one's work and is just plain funny! The story starts out with Clifford Stoll being 'recycled' to a computer analyst/webmaster. Cliff, as he is affectionately called, is a long-haired ex-hippie…
Details: Words: 1923 | Pages: 7.0 (approximately 235 words/page)
…sit at their cubicles dumbfounded, as they no longer have control over their computers. An incoming fax is received, and the sender is anonymous; "Your network is a f__ing mess." The message goes on to inform the bank of the critical attack that was just…
Details: Words: 1646 | Pages: 6.0 (approximately 235 words/page)
Category: /Literature/English
…themselves (through a process of scanning the brain into a computer). Those such as Moravec, who see the eventual result as "the universe extending to a single thinking entity" as the post-biological human race expands to the stars, base their views in the idea…
Details: Words: 4983 | Pages: 18.0 (approximately 235 words/page)
…beings will become machines themselves (through a process of scanning the brain into a computer). Those such as Moravec, who see the eventual result as "the universe extending to a single thinking entity" as the post-biological human race expands to the stars…
Details: Words: 4986 | Pages: 18.0 (approximately 235 words/page)
…1 Purpose 1 Source of Information 1 Authorization 1 Overview 2 The First Steps 3 Computer-Synthesized Senses 4 Visual Recognition 4 Current Research 5 Computer-Aided Voice Recognition 6 Current Applications 7…
Details: Words: 2755 | Pages: 10.0 (approximately 235 words/page)
…RESEARCH PROJECT TABLE OF CONTENTS Introduction 1 Purpose 1 Source of Information 1 Authorization 1 Overview 2 The First Steps 3 Computer-Synthesized Senses 4 Visual Recognition 4 Current Research 5 Computer-Aided Voice…
Details: Words: 2700 | Pages: 10.0 (approximately 235 words/page)
…        1 Purpose         1 Source of Information         1 Authorization         1 Overview         2 The First Steps         3 Computer-Synthesized Senses         4 Visual Recognition         4 Current Research…
Details: Words: 2753 | Pages: 10.0 (approximately 235 words/page)
…, proved during the dot.com era. Today, many of Sun's competitors have learned that by strategically networking small, and much cheaper systems together, that they can create a network of computers that is almost as powerful as Sun's servers. Now, you may ask…
Details: Words: 676 | Pages: 2.0 (approximately 235 words/page)
…Ryan Dunton English 1117 Dec. 11, 2000 Piracy is still a crime Software Piracy is the most common computer crime, it is the illegal coping of software. People wouldn't think of shoplifting software from a retail store, but don't think twice…
Details: Words: 549 | Pages: 2.0 (approximately 235 words/page)