The story of IBM in India is surrounded by several myths and folklore‚ particularly relating to its infamous exit in 1978. George Fernandes‚ who was industry minister in the Janata government‚ is often credited for throwing out IBM over foreign exchange rules‚ but the trouble for IBM had started way back in 1967. It had a good run of the Indian market for two decades after its entry into India in 1951‚ facilitated by Jawaharlal Nehru himself. See: IBM’s 100-year journey‚ from clocks‚ scales
Premium Computer IBM Jawaharlal Nehru
INTRODUCTION……………………………………………………...………..04 3.WHAT IS Surface computing............................................................05 4.HISTORY OF Surface computing........…………………………..…06 5.ESSENTIAL FEATURES……………………………………………………..…08 6.TECHNOLOGY BEHIND Surface computing ………………….….09 7.HARDWARE……………………………………………………………………..10 8.APPLICATIONS OF Surface computing …………………........…12 9. Surface computing IN FUTURE.……………………..........……...18 10. REFERENCES…………………………………………………………
Premium Microsoft User interface
Mid-Term Project: Green Computing Janiqua Thompson Digital World Mid-Term Project Green Computing In chapter one‚ it talks about Green computing practice. Green Computing is basically trying to save energy by reducing electricity and environmental waste. I can apply this to how I use my computing practices by listing ways that I can lessen my power usage at home doing my schooling and for people at work. With this I will acknowledge how often I use a printer to print documents as such. I will
Premium Personal computer Laptop Desktop computer
What Is Software Testing? And Why Is It So Hard? James A. Whittaker‚ Florida Institute of Technology IEEE Software 17(1)‚ pp. 70-79‚ Jan-Feb 2000 Avital Braner Basic Seminar of Software Engineering Hebrew University 2009 Software testing The process of executing a software system to determine whether it matches its specification and executes in its intended environment. When the user reports a bug: The user executed untested code The order in which statements were executed in actual use differed
Premium Software testing Software engineering
By XYZ INTRODUCTION International Business Machines‚ abbreviated IBM and nicknamed "Big Blue"‚ is a multinational computer technology and IT consulting corporation headquartered in Armonk‚ New York‚ United States. The company is one of the few information technology companies with a continuous history dating back to the 19th century. IBM manufactures and sells computer hardware and software (with a focus on the latter)‚ and offers infrastructure services
Premium IBM Computer
Grid Computing-High level computing to access Internet facility Gaurang v.Lakhani‚Nimesh V.patel‚Prof.J.S.Dhobi Department of Computer Science and Engineering(M.E.) Government Engineering College‚ Modasa‚ Gujarat Technological University‚India Email: gvlakhani1@gmail.com Abstract: Recently we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading‚ there is a chance that the system hangs up or slows down the performance
Premium Grid computing
SWOT analysis From Wikipedia‚ the free encyclopedia Jump to: navigation‚ search A SWOT Analysis is a strategic planning tool used to evaluate the Strengths‚ Weaknesses‚ Opportunities‚ and Threats involved in a project or in a business venture or in any other situation of an organization or individual requiring a decision in pursuit of an objective. It involves monitoring the marketing environment internal and external to the organization or individual. The technique is credited to Albert Humphrey
Premium SWOT analysis Strategic management Management
A secure computing environment is having a system in place that controls the storage and use of information. A secure environment is used to defend against personal or confidential information. Network security can be classified as an function that intended to protect the network assuring safety‚ reliability and integrity of information. Locking the authorization level assist in keeping the server safe. Setting wrong permissions on the files present in the server may lead to data leaking. To avoid
Premium Computer security
An improved pre-processing technique with image mining approach for the medical image (Found in Endoscopy) classification. Rational and Significance The proposed system mainly concentrates on the diagnosis of Endoscopy Images . This work gives the Endoscopy Surgeons a second option for the easy identification of interior images of esophagus. The important data mining concept that has been included in the proposed work consists of pre-processing of the Endoscopy Images. The method used for
Premium Data mining Sampling
What is Soft Computing ? (adapted from L.A. Zadeh) Lecture 1 What is soft computing Techniques used in soft computing • Soft computing differs from conventional (hard) computing in that‚ unlike hard computing‚ it is tolerant of imprecision‚ uncertainty‚ partial truth‚ and approximation. In effect‚ the role model for soft computing is the human mind. 1 2 What is Hard Computing? • Hard computing‚ i.e.‚ conventional computing‚ requires a precisely stated analytical model and often a lot of
Premium Artificial intelligence Neural network Fuzzy logic