Magoosh GRE

RSSCategory: Information Technology

A Comparison of the Merits of using Software or Hardware Transactional Memory, against Traditional ‘Semaphore’ Locking

| February 7, 2017

1. Introduction Transactional memory is poised to take parallel programming a step higher by making it more efficient and much easier to achieve, compared to traditional ‘semaphore’ locking.  This is because transactional memory is easier to handle when tasks are divided into several free threads, especially when these threads do not have common access to […]

Continue Reading

Smartphone Industry

| February 3, 2017

Executive summary Smartphones have ushered in a new generation of modern communication.

Continue Reading

Has UK become a digital nation?

| January 19, 2017

Abstract Information Technology has become more prevalent making it indispensable in the day to day activities of not just individuals or businesses but to the nation as a whole. There are more government initiatives to move from paper-based record keeping to a digital record management.

Continue Reading

The Market for Online Education

| January 14, 2017

Introduction Traditional education is designed around face-to-face communication in a physical classroom. Educational institutions are required to pay for costly inputs, the costs of which are spread out over a limited number of students. It is no surprise then that this education delivery model has produced a 550% increase in the cost of tuition at […]

Continue Reading

Information Privacy Security: TJX Data Breach Crisis and Lessons

| January 14, 2017

Introduction Protecting the privacy of consumer personal information continues to pose significant challenges for organisations. The complexity is aggravated by consumers’ vulnerability that comes about when they are unable to control the usage of personal information they share with business organisations.

Continue Reading

Green IT at City University – City Green Monitor

| January 13, 2017

Abstract One of the main initiatives that have been employed by the City University within the Information Technology (IT) department is that of the Green Monitor where a computing room has been set up by a group of students aimed at recording data from an environmental perspective (Green Dragons, 2014).

Continue Reading

Green IT at City University – City Green Monitor

| January 12, 2017

Abstract One of the main initiatives which have been employed by the City University within the Information Technology (IT) department is that of the Green Monitor, where a computing room has been set up by a group of students aimed at recording data from an environmental perspective (Green Dragons, 2014).

Continue Reading

ITStrategy and Positioning for Volkswagen Financial Services (UK)

| January 11, 2017

Introduction This assignment is constructed to consider a case study of an existing business and analyse its IT strategy and positioning for competitive advantage. A few hours were spent researching ideals into companies of interest to which I had to make sure it fitted in line with the assignment objective.

Continue Reading

Cultural representation in the Media

| December 13, 2016

Abstract The relationship between the media and culture has long been a topic of controversial debate. This study addresses this concern by evaluating two United Kingdom media outlets coverage of the same event throught the lens of cultural and ideology. 

Continue Reading

The End of the Cold War and the New Threats to Global Security

| November 24, 2016

1.Introduction The end of the Cold War marked a new beginning for the international security agenda, and the demise of the simple bipolarity brought forward a revised agenda for human rights, international peace and cooperation and stability.

Continue Reading

How have mobile phones and Internet changed contemporary art?

| November 8, 2016

Introduction The main aim of this essay is to investigate the impact of  technology on  contemporary art. In a more detail, this essay will exploref the impact of mobile phones and the Internet on  contemporary art.  This essay will include theoretical foundation, backed up with examples.

Continue Reading

Introduction to Computing A Review of Google Android OS and Apple iOS Mobile Platforms

| November 7, 2016

Abstract This paper presents a review of Google Android OS and Apple iOS mobile platforms. Comparative analysis was applied in order to examine the similarities and/or differences between the two. This paper provides a comprehensive review by analyzing Android OS and iOS based on the following criteria: (a) Major features and functionalities; (b) Advantages and […]

Continue Reading

Event proposal for Conference & Event Planning at the Roof Gardens, Kensington

| October 5, 2016

Abstract When planning an event which is targeted at a professional body of individuals within the hospitality industry, there are several questions which need to be answered, not least where the best venue to host such an event is likely to be located. In this case the “Roof Garden” is seen as a particularly appropriate […]

Continue Reading

To produce a critical assessment of the role that Information system plays in organisations in their pursuit of gaining competitive advantage.

| August 25, 2016

Abstract United Parcel Service (UPS) is the subject of this report. The report starts off by highlighting the company’s profile in the parcel, funds and information delivery industry. It is evident through Porter’s five forces model that UPS is stable in the market and enjoys a sound competitive advantage over its competitors.

Continue Reading

New developments in digital crimes and the challenges to computer forensics

| August 22, 2016

Abstract Computer forensics as a field of study carefully collects and examines electronic evidence to assess the damage to computers caused by electronic attacks, recover the lost information and prosecute those responsible for such attacks.

Continue Reading

New developments in digital crimes and the challenges to computer forensics

| August 19, 2016

Abstract Computer forensics is becoming an increasing important field as technology continues to bring the world closer.  This literature review assesses the new developments and challenges in the field of computer forensics with the goal of identifying potential strengths and weaknesses. The evidence presented here illustrates that technology and cyber-crime are intertwined, and it will […]

Continue Reading

Individual Critical Reflection Report

| August 18, 2016

Abstract This individual report provides a clear description and justification of the modeling decisions that were taken as well as a reflection on how the models relate to each other and the potential strengths and weaknesses of the team’s work.  The paper covers the two models which are the requirements model and the analysis/ design […]

Continue Reading

Using Technology as a Tool to Improve Teaching and Learning Processes

| August 11, 2016

Abstract A research proposal setting out a planned study concerned with the use of ICT in education, and looking particularly at how ICT can be used to make teaching the classics of English literature more relevant to today’s teenagers. An introduction looks at the background for the study, and its rationale, while subsequent sections set […]

Continue Reading

Cloud Computing: Effectiveness, Shortages and Prospects for small businesses

| May 1, 2014

Abstract Cloud computing, in its present form, is a fairly new and evolving paradigm and as an industry it is showing huge growth potential. This is due mainly to the sheer attractiveness of providing very expensive server computing technology to smaller businesses that find it completely impractical to invest in this type of infrastructure when […]

Continue Reading