The chosen article discusses the contribution of an American computer scientist John McCarthy in developing computers and modern computer language architecture. He is famous as father of AI or artificial intelligence as he was the one who coined the term artificial intelligence. I have chosen this article as it provides a short description of the life and achievements of this world famous scientist in the field of computing and development of computer architecture.
McCarthy believed that it is possible for computers to have human like reasoning skills and common sense. He embarked on an extensive research in this field and developed the technology of artificial intelligence, which is termed as the backbone of new and modern computing.
Perhaps the most interesting aspect of this article is that, gives us an insight of McCarthy’s beliefs. McCarthy believed that every aspect of learning can be described and stimulated by a machine.
I found this chosen article useful as it gave a detailed description of development of LISP programming language by McCarthy, which is used even today. LISP is a standard programming language used in programming of AI, robotics and other scientific applications. Thus, his contribution in the field of modern computing is indeed phenomenal.
This chosen article discusses about one famous personality, Linus Torvalds, the developer of Linux operating system, Linus programmed his own driver for floppy controller. I have chose this article as it talks about the development and the history behind the development of one of the widely used operating systems Linux.
In the year 1991, the Minix operating system is most widely used in the schools and University. The article says that Linus used the operating system Minix in his university life but did not considered the terminal emulator program in Misnix quite acceptable and therefore, e decided to code and develop a better terminal emulator for personal use.
Perhaps the most interesting aspect of this chosen article is that, Linus while developing a better terminal emulator for an existing operating system MINIX, developed a altogether new operating system Linux. This was a gradual process according to the article as Linus while coding for a terminal emulator got the idea of developing an altogether new and enhanced operating system.
I found this chosen article useful as it discussed in detail the idea behind the development of Linux operating system. Another interesting concept about the development of Linux is that, although it has some features of Minix operating system, it is not an updated version of that operating but, but a completely new operating system with many enhanced features.
The chosen article discusses the evolution of the modern internet from an earlier network developed by the National Science Foundation. This network has been described as the driver of the growth of internet in its first period. I have chosen this article as it provided the detailed timeline and the evolvement of the national science foundation network or NSFNET. This network was mainly developed to link the computers that are no t connected to ARPANET. Therefore, this network was mainly developed for research purposes to provide a link for the supercomputers.
Perhaps the most interesting aspect of this chosen article is that, it discusses the use of NFSNET in high speed supercomputers to its commercial use as well. The NFSNET that was initially built had a network backbone of speed 56kbps, which is awfully slow in comparison to modern internet. Later this network was able to achieve a speed of 1.5 mbps aswell. According to the article, the military sponsored ARPNET was dissolved and replaced by the National Science Foundation Network.
I have found this resource helpful and useful as it provided a overview of National Science Foundation Network in details, which led the foundation of modern internet. In the year 1995 the national science foundation network again regained his roots and dissolved the commercial usage and limited the use of this network only for research purpose.
The chosen article gives an insight of a layer two data link protocol the token ring. Token ring is a standard layer two protocol operating the data link layer of OSI model and is used for transferring data among a set of interconnected devices. I chose this particular article as it provides a detailed explanation of the token ring protocol and explains the token ring architecture in brief. According to the article, it is one of the most widely used data link protocol in collision avoidance.
Perhaps the most interesting aspect of this chosen article is that, it explains in brief the structure and working of token ring. Among a set of different interconnected devices, only the node possessing the token is allowed to pass a message and therefore, collision is avoided in a token ring network. Only the node possesing the token is permitted to transfer a message because token contains all the details and information about the destination of the message.
I have found this article useful as it discussed in brief the protocol entire token ring protocol. The token ring protocol is rarely used now as the set up is very costly and the use of Ethernet provides a more cost effective solution as well.
The chosen article provides an insight of one of the famous hackers in the world. It discusses the different adventures of a white hat hacker Kevin Mitnick. I chose this article as it helped me in knowing about this hacker and his addiction towards hacking.
Perhaps the most interesting aspect of this chosen article is that it discusses about the mysterious life of this hacker, who although had access to people’ credit card, social security numbers, he never ever spent a dime on someone else’s money. His motive of hacking was mainly his curiosity and addiction. He even managed to hide from police for years by using fake identities. He is indeed and adventurous man.
It was thought and believed that Mitnick had the power to start a nuclear war by whistling on a phone. However, this hacker never stole any person’s identity or stole a line of Code
I found this resource useful and it described the life and adventures of the world famous hacker Kevin Mitnick. He applied his skills of social engineering in phone phreaking, which is considered as the predecessor of computer hacking. He was able to get hold of the unlisted phone numbers by impersonating as a personnel of a phone company.
The chosen article discusses one future networking technology that will most probably have a huge impact on the society. The article explains the essence of Web of things, which can be considered as an advanced version of internet of things.
I have chosen this article as it gave a detailed description of the web of things and the provided us an insight of the architecture of this future technology.
With the advent of Web of things, it would be possible for the connecting many physical devices to a single network and management of these physical devices, that are an integral part of human life will become more easier.
Perhaps the most interesting aspect of this chosen article is that it describes this technology of web of things as a refined version of internet of things and unlike internet of things, it does not require installation of many different devices for controlling the different physical devices. The layered architecture of web of things consists of different layers, which are access, find, share and compose. The article provides a detailed description of all these layers of web of things and therefore, I have found this article useful for the purpose of research about the future technologies that will impact the society is a large scale.
The chosen article discusses about the history of development of one of the popular social media platform. These social media platform has an increasing impact in the social business as it helps in wide range of data collection. The article discusses in brief, the story behind development of twitter.
I have chosen this article as it presented the story of developing twitter in a structured way, which had been a very great help for the research purposes.
Perhaps the most interesting aspect of this chosen article is that, it highlights, how a simple idea of building a medium for keeping in touch with friends and keeping a track of them, gave rise to one of the most popular and famous social media platform, which furthermore saved a somewhat dying company.
The idea of twitter was to make an advanced sms service and hence the character limit of any tweet is 140, which is less than the standard sms length, which is 160. Initially Twitter was named as twtrr and it was a trend of that time to drop the vowels from any company’s name. It has now almost 200 million active monthly user and the family is growing at rapid pace. The name of the twitter was derived from a photo-sharing site Flicker.
I found this article useful as it gave an insight of the development of the twitter.
With the advent of mass data collection, data mining and storage of data, use of this stored data in business has been increasing day by day. The article discusses the use of data mining in enhancing the business decision and knowing the preferences of the customers.
I chose his article as in analyses in brief the how Netflix strategically use data mining and refined algorithms for collecting a mass data. This data is analysed with an idea of improving the business process.
Perhaps the most interesting aspect of this chosen article is that it discusses how the business related Netflix largely depends on the data mined. The data that are collected for business purposes includes the shows customers are watching, the date of watching, the point of pause or rewind, the number of times a content is skipped and so on. Netflix is largest television streaming service and therefore data mining largely helps in improving their business processes. It helps in suggesting or serving the customers, the shows and contents according to their preferences. It further enhances the process of decision-making.
I have found this article of much use as it gave me a clear idea about the use and the process of data mining in improving the business and enhancing the process of decision making in business.
The chosen article discusses the story behind the successful mobile app developer named Jan Koum, who developed one of the most popular messaging platform the WatsApp. The growth of WatsApp have found a rapid pace since its launch and is one such application that is used worldwide.
I chose this article as I found it informative enough to do a research on a successful mobile app developer. The story of Jan Koum is inspiring and interesting.
Perhaps the most interesting aspect of this chosen article is that, it described how an idea of building a medium for sending notifications to friends resulted in the developed of one of the most famous apps of recent times. Watsapp was brought by facebook in the year 2015, which was indeed a special moment for the developer Jan Koum. This is particularly because; he was rejected for a job at facebook few years back. Jan Koum became successful with his app and WatsApp became popular because it is nor complex, secure and easy for using. It is simply the best messaging apps of all the time.
I found this resource useful as it gave a proper description of life and success of Jan Koum in development of WatsApp.
The chosen article discusses the adverse or negative effects of information technology and it outcomes that can severely affect the society or humans. The resource discusses about the negative effects the failure of implementation or ERP lay upon Hershey.
I chose resource as it clearly describes the outcomes of the improper implementation of Enterprise Resource Planning system in during the busiest time of business in Hershey.
The failure of ERP resulted in the not fulfilment of order worth $100 earning a huge reputational risk for the company. Perhaps the most interesting aspect of this chosen article is thta, it discussed how the damage could be avoided if the ERP software was not developed in a constricted time period. The software failed to perform as it was improperly developed and resulted in earning a huge loss for the company, which was 19% decrease in quarterly profit with the reduction of stock price by 8%. This could have been easily avoided if the testing procedure of the software was not skipped in the development phase.
I found this article useful for the research purpose as this case study proves that an information system can have negative outcome as well and ERP failure of Hershey is one such example.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download