I. Current Situation (1991-1993) Essay

This essay has a total of 3801 words and 23 pages.

IBM

I. Current Situation (1991-1993)
1. History of IBM:
IBM is a multinational corporation that started its activities in 1911. But its origins
can be traced back to 1890, during the height of the Industrial Revolution. It was first
known as the Computing-Recording Company, and then in 1924, it took the name of
International Business Machines. Nowadays, this multinational company is known as the
¡§Big Blue¡¨

2. Mission statement
IBM main activity is to find solutions to its wide range of clients using advanced
information technology. Its clients are individual users, specialized businesses, and
institutions such as government, science, defense, and spatial and educational
organizations.


To meet and respond to its customers needs, IBM creates, develops and manufactures many of
the worlds most advanced technologies, ranging from computer systems and software to
networking systems, storage devices and microelectronics. Indeed, IBM has various product
lines and services a few of which are: the Personal Computer that was first created in
1981, AS/400 business system, RS/6000 family of workstations and server systems, S/390
enterprise server, groundbreaking ThinkPad notebook computer; the award-winning IBM
Netfinity and finally, PC Servers. It is an important supplier of hard disks, random
access memories, and liquid crystal monitors.


IBM has created the image ¡§Solutions for a Little World¡¨. Its products and
components in other firm products are so widespread that people around the world associate
the name IBM with computing functions.


3. Organization

IBM is a global information system and computing company. It is organized in 5 worldwide
regions, and the following business units:

1. Application Business Systems
2. Application Solutions
3. Enterprise Systems
4. Networking Systems
5. Pennant Systems Company
6. Personal Systems
7. Programming Systems
8. Storage Products
9. Technology Products
4. Past and current performance:
For many years, IBM succeeded in holding a very good market position. In fact, the company
achieved a very high market share and huge profits. However, this situation did not last
forever. In 1990, IBM experienced its first quarterly loss of $2billion due to some
unexpected accounting charges. However, revenues increased from $62.7 billion in the
previous year to $96 billion. In 1991, the company faced a net loss of $2.83 billion that
was mainly due to downsizing and restructuring costs. In addition, total hardware sales
were down by 16%. The years 1992 and 1993 knew a slight increase in revenues that reached
$13.4 billion and a net loss of $399 million that changed to a net profit of $392 million
in the first quarter of 1994.

5. Industry trends:
IBM¡¦s old belief was that personal computers are a vital part of their overall strategy
to link personal computers, minicomputers, and mainframes, their preferred product in this
line. It was not quick in adapting this belief to the new reality and importance of the PC
potential, so during the 1980s and early 1990s, IBM was thrown into turmoil by
back-to-back revolutions in the trends of the computer industry. The PC revolution placed
computers directly in the hands of millions of people, and then, the client/server
revolution sought to link all of those PCs (the "clients") with larger computers that
labored in the background (the "servers" that served data and applications to client
machines). Both revolutions transformed the way customers viewed, used and bought
technology, and both fundamentally rocked IBM.


6. Tactics at IBM were as follows:

Marketing at IBM has often been based on recycling and updating older proprietary systems
architectures in which it had a vested interest. It was a product rather than consumer
oriented strategy.


 IBM has made modest moves towards more industry specific approaches to problem
solutions in an effort to better meet customer needs.


 1988 attempt to restructure decision making from HQ to 6 group executives failed.

 Due to its size, IBM makes sure that when introducing a project, worldwide
capacity is available to manufacture it, and those foreign manufacturing requirements are
met.


7. 1991-1993 CEO Akers undertook a major overhaul of IBM: he believed the problem was high
centralization, so he followed a decentralizing strategy that would greatly reduce
employee levels. Layoffs were as follows: 1991 20,000, 1992 20,000. Although a $3 billion
charge was made against 4th quarter earnings, IBM expected savings of $1 billion in 1992,
followed by $2 billion in later years.


Restructuring objectives:

a- Accelerate product deliveries.
b- To avoid or minimize costly delays and disruptions IBM would have to completely
separate its units into distinct independent divisions with greater control over
development strategies, including financial independence. IBM HQ would become a holding
company with 6 autonomous divisions reporting to senior vice presidents. Divisions are to
present annual plans to executive committee, set goals for return on investment, share in
profits, issue stocks in some cases. Each individual unit to report its results separately
thus allowing managers to gain responsibility for controlling costs and developing
competitive product marketing strategies. Emphasis to be placed on return on invested
capital. Executive pay to be tied to unit profits

c- Encourage 3d party relationships
d- Reduce staff.
e- Reduce product prices to match competitor prices. For example, IBM's lap top model
costs about $2,500 more than Dell or AST models.




8. Gerstner's strategy is to maintain IBM's broadness to take advantage of consumer
confusion in the market. Consumers will recognize IBM's name in different products and
purchase it. This will keep costs high however because the different units need to stay
coordinated. According to him, IBM's challenge is to develop good working relations across
the various operating units. It doesn't need an overall vision but a series of tough
minded, market driven strategies for each of its businesses. Balancing shareholder needs
of higher margins with customer needs of lower margin open system products. Gerstner
brought with him a customer-oriented sensibility and the strategic-thinking. He tried to
rebuild IBM's product line, to reduce the workforce and to make significant cost
reductions. Despite mounting pressure to split IBM into separate, independent companies,
Gerstner decided to keep the company together. He recognized that one of IBM's enduring
strengths was its ability to provide integrated solutions for customers -- someone to
represent more than piece parts or components. Splitting the company would have destroyed
a unique IBM advantage.




II. SWOT analysis:

 External environment:

1.OPPORTUNITIES:

1.1. E-business: the use of the Internet is rapidly becoming an important distribution
method for multinational companies, and a source of products for businesses and consumers.
it is a way of doing business electronically using new concepts. By emphasizing on
marketing this kind of operations, IBM will increase its presence in world operations, by
making easier for a company to trade with another one, without any physical contact.


1.2. Strategic alliances: three days ago, IBM announced its alliance with a huge IT
company, DELL. This constitutes an opportunity for IBM to become stronger and acquire new
knowledge. This part will be discussed later in the presentation.


1.3.As a third point, it seems that IBM should change its image among customers: when you
think of IBM, the first image that comes to you is that of a computer, whereas IBM
manufactures much more products: servers, mainframes, supercomputers, Internet services,
and so on. Therefore, a good opportunity for the Big Blue would be to change this
conception and make its diversified range of products better known. There must be more
advertising made about the other products in order to make people aware of IBM diversity.


2. Threats:

2.1.IBM most important competition is not within the mainframe market, but outside it, in
the increasing range of other machines that can do much of what a mainframe does.

 Indeed, throughout the first half of the 1990s, the apparition of very small PCs
attacked and reduced demand for mainframes, and this drove IBM almost to bankruptcy.
However, the company responded by slashing prices and developing new mainframes that
shared many of their components (such as memory) with PCs, thus benefiting from the PC
industry's economies of scale.


2.2.It seems that customers are beginning to buy products from different companies, due to
a decrease in the confidence put in one single company. Their belief is that if their
hardware come from different manufacturers, they will have a more open system, and
diversified configurations. However, this trend leads to problems of compatibility among
the different products. IBM is now trying to discourage customers from switching to other
suppliers, by striving to improve the connectability of its computers.


2.3.Y2K: the Y2K issue arises because many computer hardware and software systems use only
two digits to represent the year. As a result, these systems may not process dates beyond
1999, which may cause errors in information or system failures. According to its CEO, IBM
is considered to be Y2K ready. However, the Y2K readiness of the company's customers
varies, and the company continues actively to encourage its customers to prepare their own
systems. While this behavior may increase demand for certain of IBM products, it could
also soften demand for other offerings or change customer buying practices from past
trends.

 while IBM continues to believe that the Y2K matters discussed above will not have
a material impact on its business, financial condition or results of operations, it
remains uncertain whether or to what extent the company may be affected.



 Internal environment:

1. Strengths

1.1 IBM is the largest IT company in the world:
 It has 240,600 employees
 It has commercial activities in 164 countries
 It is the 6th company ranked in Fortune magazine


1.2. Education and training are key factors in providing IBM partners with the necessary
skills to sell and support IBM software products. The delivery of this education can be
done through many formats, from traditional classroom settings to seminars and satellite
broadcasts. IBM provides education and certifications on both IBM software products and
other software technologies.



1.3 Industry knowledge: before launching any product, IBM managers completely understand
the industry organization, key contacts, strategies and offerings, in order to be fully
integrated in the organization.


1.4 IBM marketing approach consists of analyzing market and competition, performing
segmentation and developing plans and solutions that respond to End User/market needs and
competitive trends, and finally differentiating IBM/Business Partner solutions in the
marketplace.


1.5 IBM have at its customers?disposal consultants that will advise them if they want to
buy new material or change their equipment. IBM employees do their best to satisfy the
client and to understand his/her needs.


1.6 Helping businesses optimize their IT infrastructure
A Total Systems Management (TSM) solution leverages IBM skills, services and systems
expertise to help customers increase the business value of their IT solutions.

 TSM brings IBM Global Services systems management experts together with a
customer's IT executives to assess the customer's information technology environment
against its business goals and identify the key IT areas that are critical to achieving
those objectives.

IBM develops a customized services solution to enhance the customer's system-wide
operations and enable its IT infrastructure to better support its business goals, such as
e-business.


Continues for 12 more pages >>




  • Biography
    biography BIOGRPAHY OF BILL GATE William H. Gates Chairman and Chief Executive Officer Microsoft Corporation William (Bill) H. Gates is chairman and chief executive officer of Microsoft Corporation, the leading provider, worldwide, of software for the personal computer. and employs more than 20,000 people in 48 countries. Born on October 28, 1955, Gates and his two sisters grew up in Seattle. Their father, William H. Gates II, is a Seattle attorney. Their late mother, Mary Gates, was a schooltea
  • Dr Grace Murrary Hopper
    Dr Grace Murrary Hopper Dr. Grace Murray Hopper was born on December 9, 1906. As a child Grace Hopper enjoyed learning about machines, technology and other countries cultures. Following her mothers love for mathematics and her fathers love for literature, Grace had high expectations for herself. Family life was large influence as she grew up, from the close relationship she had with her grandfather, a surveyor in New York City, she learned about real life at a young age. Her father, Walter Fle
  • A Change in Direction at Continental Airlines
    A Change in Direction at Continental Airlines What words come to mind when you think of Continental Airlines? Successful company, preferred airline, good service, on-time airline, top carrier, financially solvent, happy employees. These are all true; however, this was not always the case. Just six short years ago, probably not one of those descriptions would even be said in the same breath as Continental Airlines. In fact, in 1994, Continental was facing its third bankruptcy; that bankruptcy wou
  • ADP Security Evaluation
    ADP Security Evaluation Valuation of a Security Automatic Data Processing, Inc. ADP by: Katie S. McCarthy April 7, 1999 Spring Hill College Management of Financial Resources Dr. Ralph Sandler ADP Automatic Data Processing, Inc. (NYSE:AUD) ADP is one of the largest independent computing services firms in the world with more than .5 billion in annual revenues and more than 425,000 clients. Founded in 1949, ADP provides computerized transaction processing, data communications, software, and inf
  • Advanced Micro Devices
    Advanced Micro Devices Table of Contents Table of Contents 1 Corporate Overview 2 Company History 2 Products 3 Financial Information 4 Market Conditions and Competition 5 Strategies & Goals 6 Foreign Operations 6 International Production Facilities 6 Fujitsu Alliance 7 Foreign Currency Translations 8 Hedging 8 Problematic Issues & Their Solutions 9 Lawsuits 9 Taiwan Earthquake 9 Outlook 10 Appendix A Balance Sheets 11 Appendix B Income Statements 12 Appendix C Foreign Subsidiaries 13 Corpo
  • Analysis of BoozAllen and Hamilton
    Analysis of BoozAllen and Hamilton Introduction Booz-Allen & Hamilton is one of the world\'s largest management consulting firms. Traditionally, the firm had decentralized regional offices serving clients independent of other offices. This made cooperation between offices difficult, which was hurting company\'s overall performance. To overcome this problem they came up with a Vision 2000 plan under which the company was divided into three regions which were further sub-divided (see exhibit 1). T
  • Analysis on Booz Allen and Hamilton
    Analysis on Booz Allen and Hamilton Introduction Booz-Allen & Hamilton is one of the world\'s largest management consulting firms. Traditionally, the firm had decentralized regional offices serving clients independent of other offices. This made cooperation between offices difficult, which was hurting company\'s overall performance. To overcome this problem they came up with a Vision 2000 plan under which the company was divided into three regions which were further sub-divided (see exhibit 1).
  • Computer fraud
    computer fraud As much as billion are lost every year due to flourishing computer crimes. In 1993 alone, Internet, the world wide system of computer networks, was swindled out of approximately billion, and about million were stolen from various companies such as GTE Corp., AT&T, Bell Atlantic and MCI ( Meyer and Underwood 45). Ironically these same organizations have been collaborating with software manufacturers for an expanded software production ( Cook 53 ). Multinational corporati
  • Critique of The Limited INC
    Critique of The Limited INC Critique of The Limited INC. Overall, we think that our classmates, Melissa and Jay, did a good job in their paper. Here are just few comments and suggestion that we think our classmates have missed. History: The management of the Limited relies heavily on the shoulders of CEO Leslie Wexner. The analyst has criticized him that he is frequently creating new businesses that evidently fails. The underperforming stores are as follow: *sum* 1995 Limited Inc. own 84% of Int
  • Ecommerce
    Ecommerce E-Commerce E- Commerce is another name for Electric- Commerce. Electronic-commerce offers what many people believe to be an effective property of the Web. That property is the ability to adjust sites to the different needs, wants, desires and, even personalities of each individual customer. This ability is known to many experts as "cognitive computing," a blend of behavioral sciences and computer science. Increasing competition worldwide, increasing demands made by customers, and the r
  • Gates world
    Gates world Gates World Congrats to the man of the millennium Mr. Bill Gates. Bill developed the wonderful software that makes computing so much fun! As his company, Microsoft, surges for domination in the computing industry, I picture Bill installing little buttons under his desk for possible world take-over. Forget the Y2K bug, thats nothing! Through Windows I see Bill using Microsoft much like a chess move for world-wide Gates time! But dont worry, Im sure Bill has some pretty exciting pla
  • GenesisYour vision for the Future
    GenesisYour vision for the Future Introduction: GENESIS Your Vision for the Future GENESIS Corporation is a company that deals with production of computer software and business applications that are essential for successful conduct of business today. We strive to provide affordable, innovative software solutions to users worldwide by applying creativity, experience and teamwork. The result of our efforts is production of high quality business solutions that make our customers live easier
  • HewlettPackard Strategy
    HewlettPackard Strategy Strategy Paper Hewlett Packard, Inc. (NYSE: HWP) TABLE OF CONTENTS SECTION 1 2 BACKGROUND 2 SECTION 2 2 MISSION, GOALS, AND STRATEGIES 2 Company Mission 2 Company Goals 2 Company Strategies 2 Management By Wandering Around. 2 Management By Objective. 2 Open-Door-Policy 2 Open Communication 2 SECTION 3 2 STAKEHOLDERS 2 Stockholders: 2 Employees: 2 Competition: 2 Major suppliers: 2 SECTION 4 2 EXTERNAL ENVIRONMENT 2 Industry Environment 2 Differentiation versus Commodity 2
  • History of Intel Corp
    History of Intel Corp I. History of Intel Corporation [Back to Top] Robert Noyce and Gordon Moore, who had left Fairchild Semiconductor, founded Intel Corporation in 1968. The current chairman of Intel, Andy Grove, had also come from Fairchild to become Intel\'s 4th employee. Their first commercial product was the 3101 Schottky bipolar 64-bit static random access memory (SRAM) chip, and it was moderately successful. The success of Intel didn\'t come until the early 1970\'s. Intel was a company f
  • IBM company
    IBM company I. Current Situation (1991-1993) 1. History of IBM: IBM is a multinational corporation that started its activities in 1911. But its origins can be traced back to 1890, during the height of the Industrial Revolution. It was first known as the Computing-Recording Company, then in 1924, it took the name of International Business Machines. Nowadays, this multinational company is known as the Big Blue . 2. Mission statement IBM main activity is to find solutions to its wide range of cl
  • MIS Development
    MIS Development MIS Development The term Management Information Systems (MIS) has come to refer to a wide range of applications of computers to data processing and analysis problems in the private and public sectors. The pace of developments in computing in general, and MIS in particular, is breathtaking. Traditional concepts of how computers can and should be integrated into businesses are being challenged by worldwide telecommunications and transmission of sound, graphics, and video alongside
  • None Provided2
    None Provided2 Running head: The Edge of Excellence The Edge of Excellence Kathleen P. Munn Community College of Philadelphia Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing profession
  • What Computer Skills Do Employers Expect From Rece
    What Computer Skills Do Employers Expect From Recent College Graduates What Computer Skills Do Employers Expect From Recent College Graduates? By: Philip Davis, Instructional Technology Librarian Cornell University Ithaca, N.Y. Table of Contents Cornell University 2 Cornell Library Conducts Study 2 Research Methodology 3 A Review of the Results 3 Rankings, Groupings, and Correlations 4 Ranking Computer Skills: 4 Grouping Computer Skills: 4 Other Computer Skills 4 Comments From Employers 5 Variab
  • A certification
    a certification REQUIREMENT #2 A + CERTIFICATION THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL CERTIFICATIONS. THIS CERTIFIES THE COMPENTENCY OF ENTRY-LEVEL (6 MONTHS EXPERIENCE) COMPTER SERVICE TECHNICIANS. CERTIFICATION PROVIDES THE CREDIBILITY, RECOGNITION OF ACHIEVEMENT, AND QUALITY ASSUANCE OF THE INDIVIDUAL TO THE HIREING ORGINIAZITION. THE CERTICATION IS OPEN TO ANYONE WHO WISHES TO TAKE IT. THERE IS NO SPECIFIC REQUI
  • A Certification Requirements
    A Certification Requirements REQUIREMENT #2 A + CERTIFICATION THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL CERTIFICATIONS. THIS CERTIFIES THE COMPENTENCY OF ENTRY-LEVEL (6 MONTHS EXPERIENCE) COMPTER SERVICE TECHNICIANS. CERTIFICATION PROVIDES THE CREDIBILITY, RECOGNITION OF ACHIEVEMENT, AND QUALITY ASSUANCE OF THE INDIVIDUAL TO THE HIREING ORGINIAZITION. THE CERTICATION IS OPEN TO ANYONE WHO WISHES TO TAKE IT. THERE IS NO S
  • Advancements in Peripherals1
    Advancements in Peripherals1 Recent Developments in Computer Peripherals Including an in-depth look at Multimedia Input Devices A Report by Mr Matthew James Smith HNC BIT Year One Contents Title Page Number Introduction Two Section One - Development in Peripherals Three Section Two - Multimedia Input Devices Five Section Three - An in-depth look Digital Cameras Six The History of the Digital Camera Six How Digital Cameras Work Seven Conclusion Nine Appendix / References Ten Glossary Eleven Intro
  • Alan Turing
    Alan Turing Alan Turing was born in London on 23 June 1912. He was the son of Julius Mathius Turing and Ethel Sara Stoney, the youngest of three children, he was born to a distinguished family. His family background includes diplomats and engineers, three of which succeeded to the Royal Society. Alan turing was educated at Sherbourne school, from 1923 to 1931. After which he studied mathematics at Kings College, Cambridge, graduating in 1935 with a B.A. He was elected a fellow of the college on
  • Apple vs The World
    Apple vs The World Apple vs. The World In past years, Apple was on a downward spiral, but now the Mac is back on the right track. The interim CEO Steve Jobs has brought them from expected quarterly loses to now, first quarter net income of some 150 millions dollars. The question still remains, is Apple back to stay? With the Windows driven world of today, can Apple assert them self to claim market share? Apples stunning new hardware, user-friendly operating system, and drive for incredible new
  • Artificial Intelligence
    Artificial Intelligence ABSTRACT Current neural network technology is the most progressive of the artificial intelligence systems today. Applications of neural networks have made the transition from laboratory curiosities to large, successful commercial applications. To enhance the security of automated financial transactions, current technologies in both speech recognition and handwriting recognition are likely ready for mass integration into financial institutions. RESEARCH PROJECT TABLE OF CO
  • Artificial Intelligence1
    Artificial Intelligence1 Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing professionals? Medical facilities, police departments, and manufacturing plants have all been changed by AI but
  • Building a computer
    Building a computer BUILDING A COMPUTER With increasing popularity of computer games, and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets, and operating system to provide maximal gaming performance. Computers are often called number manipulators, because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers, which allows them to operate
  • Case about Yahoo
    Case about Yahoo 1. Success as a Web Search Engine a. Why was Yahoo! such an early success on the Web? Yahoo was an early success due to a combination of factors such as timing, hard work, and a good understanding of Web surfers tastes and needs.. In early 1995, Net mania was just flowering. It was a great time to be a young entrepreneur with an Internet idea. Dave Faldo and Jerry Yang saw a consumer need for classifying and differentiating web sights. Resting the urge to automate this process,
  • Censoring the Internet
    Censoring the Internet Censoring the Internet The internet offers a huge wealth of information both good and bad, unfortunately the vary nature of the internet makes policing this new domain practically impossible. The internet began as a small university network in the United States and has blossomed into a vast telecommunications network spanning the globe. Today the internet is ruled by no governing body and it is an open society for ideas to be developed and shared in. Unfortunately every so
  • Charles Babbage
    Charles Babbage Charles Babbage is often called the "father of computing" because of his invention of the Analytical Engine. However, many people do not know the details of this very important mans life. Charles Babbage was born on December 26, 1792, just about that same time that the industrial revolution was beginning. He was born in Teignmouth, Devon shire. Although not much is really known about his childhood, it is known that he had many brothers and sisters, but many of them died before a
  • Clientserver
    Clientserver Client/server is the combination of three major technologies: Relational database management systems (RDBMSs), networks, and client interfaces. Clients execute specific local tasks with local resources. Servers provide shared resources and fulfill broad tasks. Communication enables definition and completion of full work processes. Client/Server software Infrastructure With competing paradigms-SQL databases, TP monitors, groupware, and distributed objects-the middleware that connects
  • Computer Crimes
    Computer Crimes Computer crime started in the early 1970s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a computer system. These are the people that usually steal data and cause data loss by vandalism. The most common kind of computer crime is espionage committed by people who work for a company, but this is also the one that you rarely hear about. They usually enter false data that will end up making money for them. Hackers are
  • Computer programer
    computer programer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data processing industry that includes companies that write and sell software. Allot of programmers can also be found working for companies that provide engineering and management services, manufacturers of computer and office equipment, financial institutions, insurance carriers, educational institutions, and government agencies
  • Computer Programmer
    Computer Programmer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data processing industry that includes companies that write and sell software. Allot of programmers can also be found working for companies that provide engineering and management services, manufacturers of computer and office equipment, financial institutions, insurance carriers, educational institutions, and government agencie
  • Computer underground
    computer underground The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast t
  • Computerization of a Company
    Computerization of a Company The word ubiquitous means ever present or occurring everywhere. This term could be used to describe the use of the computer in the business. The business worlds benefit alone is enough to make a head spin. Every time a person goes to the grocery store, the bank, the local ATM, or even the neighborhood gym the benefit by the use of computers in modern society is unforeseen by most civilians. Many fields in business depend on the convenience, speed, accuracy, and reli
  • Computers2
    Computers2 Computers This paper is about the computer. Today computers are used by hundreds of millions of people. There have been many advances in the computer. The computer used to weigh 30 tons and filled warehouse size rooms, but today can be as light as 3 pounds and fit in a persons pocket. There were basically three times the computer was mentioned. One as a mechanical computing device, in about 500 BC The other as a concept in 1833, and the third as the modern day computer in 1946. The fi
  • Computing now
    computing now GUIDE TO (mostly) HARMLESS HACKING Beginners Series #2, Section 3. Hacking from Windows 3.x, 95 and NT ____________________________________________________________ This lesson will tell you how, armed with even the lamest of on-line services such as America Online and the Windows 95 operating system, you can do some fairly serious Internet hacking -- today! In this lesson we will learn how to: Use secret Windows 95 DOS commands to track down and port surf computers used by famou
  • Computing Power Unleashed
    Computing Power Unleashed This article mainly deals with the microprocessor chip, which is the computer\'s brain. This computer chip is responsible for the majority of the computers functions, it\'s commonly referred to as the Central Processing Unit (CPU). It receives and executes your instructions and determines if your computer understands software written for a Personal Computer (PC) or a Macintosh (MAC). The CPU chip size is small, about half the size of a business card, and just as small a
  • Computing professional
    Computing professional A Formal Comprised Interview of Devin Blank Computing Professional Compiled by Damon Blank 10-01-00 Intro to Programming ITSE 1402 A Formal Interview of Devin Blank The computer industry has taken a remarkable turn over the past 10 years. The foundation of multi-million dollar companies rest on the hands of those skilled to handle the demands of todays business networks. Email, fax and file services, print sharing and remote file access, are among the many vital fun
  • DESIGNING A NETWORK
    DESIGNING A NETWORK I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important issu
  • Dna Computing The Future or the End
    Dna Computing The Future or the End DNA Computing, The Future or the End? The future of computers is in the hands of the next century. The evolution of the Computer Age has become a part of everyday life, and as time proceeds, people are depending more and more on computer technology. From controlling a small wrist watch to the largest super-computers that can calculated the center of the universe, computers are essential for everyone in modern societies. Even most societies outside of the civil
  • Electronic Commerce
    Electronic Commerce Table of Contents Introduction2 History of E-commerce..4 Economic Impact5 Advantages of E-commerce5 Disadvantages of E-commerce...7 The Future of E-commerce.9 Summary...11 References.12 Electronic Commerce Electronic commerce, or e-commerce has developed very rapidly in the last few years and has left some
  • Hacking
    hacking Recently, the word \'\'hacker\'\' has fallen into disrepute, coming to signify in the popular media the perpetrators of various forms of computer-aided crime. But most of the people who call themselves hackers, who have proudly borne that title since the 1950\'s, are not criminals--in fact many are among the intellectual and entrepreneurial elite of their generations. The word \'\'hacker\'\' and the culture it connotes is too rich to sacrifice on the altar of the evening news. Bob Bickfo
  • History of Computer Industry
    History of Computer Industry History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been a
  • History of computers1
    history of computers1 Early Computational Devices Somewhere around 3000BC the first mechanical counting device created was the abacus. The abacus is still used today and, amazingly to me, with great speed and accuracy. In 1642 another mechanical device was created called the Pascaline (after Blaise Pascal, a famous French mathematician). The Pascaline used gears and wheels ("counting-wheels") to perform the calculations. The interesting thing to note is that the counting-wheel design was used in
  • How Can Artificial Intelligence Help Us
    How Can Artificial Intelligence Help Us Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing professionals? AI has changed medical facilities, police departments, and manufacturing plants,
  • How To Computerize Your Accounts
    How To Computerize Your Accounts Mark Demayo OUTLINE THESIS: I will explain the steps that need to be taken to computerize business accounts. The steps are planning and informed selecting of hardware, software, and training. I. Making the decision to computerize II. Choosing the correct tools A. Software B. Hardware C. New and old technology III. Installation and training In the normal course of a day our lives are affected by the technology of computers in ways we can only begin to imagine. Th
  • How to design a network
    how to design a network I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important
  • How Will We Use Tomorrows PCs
    How Will We Use Tomorrows PCs How Will We Use Tomorrow\'s P.C.s? Tomorrow\'s PCs are going to be different in many ways; they will be more powerful, they will include more facilities for multimedia, and looking further ahead, they may have features such as three dimensional displays, or wrap around virtual reality. These changes will shape the way which we use our PCs, but even without such advances, there are changes that can and will take place in the operating systems that enable us to make b
  • Interactive class
    Interactive class How to Go From Class-Room to Web-Room as Painlessly as Possible By Rik Hall, University of New Brunswick, Fredericton, New Brunswick 1.0 ABSTRACT Getting your course onto the World Wide Web (WWW) is best done using a systematic approach. There are a number of steps that need to be taken prior to starting any of the actual web work. Meetings should be held with various groups within your institution. Once the actual coursework is begun, there are some essential components and so