We are improving our search experience.

As we work to add all features, to check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. The IBM Personal Computer

    The introduction of the IBM personal computer was a major milestone in the computing field. The introduction of the IBM personal computer was a...
    Gerard O’Regan in A Brief History of Computing
    Chapter 2021
  2. IBM

    IBM (International Business Machines Corporation) ist eines der renommiertesten Unternehmen in der Technologiebranche. In vielerlei Hinsicht könnte...
    Anders Lisdorf in Grundlagen des Cloud Computing
    Chapter 2024
  3. IBM

    IBM (International Business Machines Corporation) is one of the most illustrious companies in the tech industry. In many ways, an argument could be...
    Anders Lisdorf in Cloud Computing Basics
    Chapter 2021
  4. Computer Access (1980–)

    With the advent of the personal computer, the Trace Center’s primary focus shifted from communication to computer access.
    Gregg Vanderheiden, Jonathan Lazar, ... J. Bern Jordan in Technology and Disability
    Chapter 2023
  5. At the Confluence of Software Engineeringand Human-Computer Interaction:A Personal Account

    In this chapter, I review how the fields of Human Computer Interaction (HCI) and Computer Science have come together over the last 60 years to create...
    Chapter 2024
  6. The IBM System/360

    The IBM System/360 was a family of mainframe computers designed and developed by IBM. It had a major impact on technology and on the computing field,...
    Gerard O’Regan in A Brief History of Computing
    Chapter 2021
  7. Computer Crime

    Computer crime (or cybercrime) is a crime that involves a computer and a network. The computer may be the vehicle by which the crime is conducted.
    Chapter 2024
  8. The rise of “security and privacy”: bibliometric analysis of computer privacy research

    The study of security and computer privacy has become a significant focus in security and privacy research. To reflect a website's, service's, or...

    Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh in International Journal of Information Security
    Article 31 October 2023
  9. Computer-Aided Design

    Before you can make anything with a computer-controlled machine, you’ll have to “tell” the machine what you’d like to fabricate. Any object you like...
    Jean-michel Molenaar, Daniele Ingrassia in Mastering Digitally Controlled Machines
    Chapter 2024
  10. Willingness to grant access to personal information among augmented reality mobile app users

    The main aim of this research is to gain understanding of the motives and factors that influence users’ willingness to share personal information,...

    Gilad Taub, Avshalom Elmalech, Noa Aharony in Personal and Ubiquitous Computing
    Article 19 November 2022
  11. Computer Technologies for Drug Safety

    Computer technology plays a crucial role in ensuring drug safety by facilitating the collection, analysis, and dissemination of drug-related data....
    Yaser Mohammed Al-Worafi in Technology for Drug Safety
    Chapter 2023
  12. Performance Analysis of the IBM Cloud Quantum Computing Lab Against MacBook Pro 2019

    Quantum Computing is the conjunction of Quantum Physics, Computer Science, Mathematics and Nanotechnology. While this technology is extremely complex...
    Alvaro Martin Grande, Rodrigo Ayala, ... Tauheed Khan Mohd in Intelligent Human Computer Interaction
    Conference paper 2022
  13. Technical Foundations: Computer Systems

    The following chapters introduce the technological basis of business informatics, computer systems and computer networks. The focus of the third...
    Peter Weber, Roland Gabriel, ... Katharina Menke in Basics in Business Informatics
    Chapter 2022
  14. Unveiling competence in the classroom: A multidimensional assessment of computer science teachers’ self-efficacy in coding education

    The significance of teachers’ self-efficacy in coding education within K-12 settings has grown substantially. However, the literature lacks...

    Mustafa Sat, Zafer Kadirhan in Education and Information Technologies
    Article Open access 05 February 2024
  15. Computer-Supported Cooperative Work

    Computer-supported cooperative work (CSCW) is an interdisciplinary research area concerned with develo** computing technologies that facilitate,...
    Luigina Ciolfi, Myriam Lewkowicz, Kjeld Schmidt in Handbook of Human Computer Interaction
    Living reference work entry 2023
  16. Learner success and the factors influencing it in computer programming MOOC

    Learners’ success in Massive Open Online Courses (MOOCs) and the factors influencing it have previously been examined mainly upon completion of the...

    Marili Rõõm, Piret Luik, Marina Lepp in Education and Information Technologies
    Article 26 December 2022
  17. Birth of Software Industry and Human Computer Interaction

    The vast majority of software produced in the early days of computing was proprietary and developed by commercial vendors such as IBM and UNIVAC....
    Gerard O’Regan in A Brief History of Computing
    Chapter 2021
  18. A Personal Historical Perspective on Abstract Interpretation

    Following an historical perspective, and restricted to my work with Radhia Cousot, I discuss the origin and evolution of concepts in abstract...
    Chapter 2024
  19. Using Linux – The Personal Case

    After reading this chapter, you will be able to
    David Both, Cyndi Bulka in Linux for Small Business Owners
    Chapter 2022
  20. Emotion in the Neutral Face: Applications for Computer Vision and Aesthetics

    Oftentimes “neutral” is classified as a baseline for other emotive categories such as angry, happy, or sad. Yet, neutrality has been the least...
    Daniel N. Albohn, Joseph C. Brandenburg in Modeling Visual Aesthetics, Emotion, and Artistic Style
    Chapter 2024