Suggestion Needed

Posted on 2006-04-10
Last Modified: 2010-04-11
hi everyone,

  Experts Exchange is a great site ... I have to write a paper on IT trends and challenges. I have tried researching but have not found anything interesting. One the topic is too broad. I would like if anyone have any suggestions on a more narrow focus topic where I could find lots of information on it on the web
  Thanks for your help since I know this site has many knowledge people
Question by:MarcosMarin
    LVL 2

    Expert Comment

    It shouldn't be that difficult to write about IT trends and challenges -- lots of newspapers and magazines (PC Magazine, PC World) write regularily about such trends. You can also use Google to find articles about the topic field. If the area is still too large, you might want to try narrowing the topic field to a smaller time frame, taking only a certain field in IT (anything from software to hardware, or even narrower like programming and graphics capabilities). Google Scholar might be a place to start: .
    LVL 53

    Expert Comment

    by:Will Szymkowski
    An interesting area that you could write about is Wireless technology and how it has evolved. Also what is coming in the near future.

    Hope this helps...
    LVL 51

    Expert Comment

    by:Keith Alabaster
    Another is the move from standard computer models to the virtual computing model. Products such MS Virtual PC or VMware opposed to a single server doing a job(s) on a single box.
    LVL 3

    Expert Comment

    Marcos, good choice of topic.  You should have plenty of resources.  Does the teacher allow you to use web resources or does he/she only accept printed resources such as books or magazines?

    Author Comment

    hi everyone

     thanks for the comments and responses they are very good but I am looking for a new topic in security challenges I was reading about botnets ... something like this ...

    Yes I can use anything I am not limited to nothing

    Thanks again

    LVL 17

    Expert Comment

    Security challenges? Wireless security's an eternal challenge. But if you want something really different, but not mainstream, try looking at quasar encryption.

    You can poke and prod and see what you can learn about it.
    LVL 9

    Expert Comment

    LVL 24

    Expert Comment

    >  a paper on IT trends

    checkout the media (news), market (hype, a, some questions in the TA you ask about, and first thing stands out to me is:


    Many users having problems and while some of it is configuring systems correctly and getting them upgraded, there is still much ado about processes running on your computer without permission. You can narrow it down further if you want to, for virus or worm, for adware or spyware, for physhing or for spam, for identity theft or just for pranks, on and on, to remote control and stealing what they can, perhaps hoping to get a password that'll help them to improve their GPA
    LVL 2

    Assisted Solution

    LVL 9

    Expert Comment

    Oh ya some fun topics

    User education! lol

    social engineering. - New ways, with new technologies.....

    LVL 17

    Accepted Solution

    Recovery from Malware (MS says it's becoming impossible):,1895,1945808,00.asp

    Secure VoIP phone calls (perhaps Zimmerman will get hunted by government again):,70524-0.html

    Proof of concept cross platform virus:,10801,110330,00.html
    LVL 44

    Expert Comment

    Check googles new research on spybot infection of search engine results, VERY SERIOUS, big money, and very crucial to solve.  They are struggling to solve the SE Spybot infection right now.  see Google site blogs for info, very little talk, but very serious problem.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to improve team productivity

    Quip adds documents, spreadsheets, and tasklists to your Slack experience
    - Elevate ideas to Quip docs
    - Share Quip docs in Slack
    - Get notified of changes to your docs
    - Available on iOS/Android/Desktop/Web
    - Online/Offline

    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now