Collaborative software

Sort By:
Page 48 of 50 - About 500 essays
  • Decent Essays

    General description of what I worked on I’m currently employed as Portal Programmer I in Xtivia Inc. in Austin, TX. It is a tech company which provides a technology solutions and support for different companies. "Xtivia creates smart Information Technology solutions for companies in every industry"[1]. Currently, I’m working on creating a web application which displays the data from a Salesfore API in interactive and user friendly web portlet. The Salesforce has different sales opportunity data’s

    • 1075 Words
    • 5 Pages
    Decent Essays
  • Satisfactory Essays

    Indonesia VPN Analysis

    • 1091 Words
    • 5 Pages

    Top 7 Indonesia VPNs - Fast & Secure VPNs for Indonesia 2018 Description: Indonesia VPN – secure and flexible to use. Want to know the exact salient feature? Read the article for the detailed explanation. You will be more informative after reading it. Introduction: Indonesia is one of the very peculiar and private countries in South East Asia. So are the telecommunication and broadcasting laws and orders. You all must have heard the news that the Indonesia’s Ministry of Information and Communication

    • 1091 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    3. THE WEB BASED IOT SERVICE PLATFORMS The web-based IOT service platform provides a significant working and development environment for application developers, application experimenters, visitors and users. This system converges many kinds of development platforms to satisfy different needs of developers. It also builds the demonstration platform and experimental platform in industrial park scale for the test run of applications. The test platforms provide the test equipment to test the compatibility

    • 1127 Words
    • 5 Pages
    Good Essays
  • Better Essays

    language. machine language. C program. algorithm. system. programmer. A Which of the following is NOT considered to be one of the three basic features of a program? (A) (B) (C) (D) input processing output store D 5. Software refers to the people who work with computer

    • 1228 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Personal Project

    • 4460 Words
    • 18 Pages

    Personal Project: Book Review Blog - Phase 4 Searage Arabi 10A Supervisor: Miss Oznur Australian International Academy Tables of Contexts Introduction …………………………………………………………………………................….. Page 3. About My Personal Project ………………………………………………………………………. Page 3. Area Of Interaction (AOI) Used ………………………………………………………………… Page 4. Plan Layout ……………………………………………………………………………………………….Page 4. Summary …………………………………………………………………………………………………

    • 4460 Words
    • 18 Pages
    Best Essays
  • Decent Essays

    symmetric block association matrix. Eigen vectors are then drawn to examine and extract summaries. Finally, Temporal Similarity (TS) function is used to calculate the event dependencies. This had given me an opportunity to expose my knowledge in Software Engineering and Data Mining. This also helped us to gain domain knowledge and also enhance technical skills like Servlets and JSP, used for implementing main logic, while JDBC for back end database connection and performing basic operations of database

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    OneNote for Mac 2016 Training Guide Remembering and recording important information or just something you saw can be quite difficult, especially in a world where everything is going so fast. How about jotting down an idea or a sudden inspiration? Imagine having all this in one place, while on the go. You probably would have known about OneNote for Mac since last year and a recent update has been released, OneNote for Mac 2016. This guide will provide all the details, guidelines, features and so forth

    • 6005 Words
    • 25 Pages
    Decent Essays
  • Decent Essays

    internet criminals or hackers to hack and take over computers and mobile devices. All of these different terms can be simply called malware. We can simply say that malware is a software, a computer program used by hackers to perform malicious actions. In fact, the word malware is a combination of two words malicious and software. The end goal of most hackers is to install a malware on your device. And once it’s installed, these hackers can potentially take control of that device. Many people have this

    • 1599 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Methods of Data Collection Author's name Author's institutional affiliation Author's note Methods of Data Collection My supervisor has asked me under what circumstances I would use a questionnaire as opposed to an interview. One circumstance in which I would use a questionnaire instead of an interview would be in a situation where I knew a lot of the background information about my subjects already. For instance, if I were a teacher that knew my students very well, or if I worked for a small

    • 790 Words
    • 3 Pages
    Decent Essays
  • Better Essays

    Java Essay

    • 1358 Words
    • 6 Pages

    MYSQL: MySQL is the most popular Open Source Relational SQL Database Management System. MySQL is one of the best RDBMS being used for developing various web-based software applications. MySQL is developed, marketed and supported by MySQL AB, which is a Swedish company. MySQL is the most popular Open Source Relational SQL Database Management System. MYSQL Enterprise edition includes the most comprehensive set of advanced

    • 1358 Words
    • 6 Pages
    Better Essays