essays. term papers, thesis

It is sometimes difficult to be inspired when trying to write a persuasive essay, book report or thoughtful research paper. Often of times, it is hard to find words that best describe your ideas. ResearchOver now provides a database of over 150,000 quotations and proverbs from the famous inventors, philosophers, sportsmen, artists, celebrities, business people, and authors that are aimed to enrich and strengthen your essay, term paper, book report, thesis or research paper.

Try our free search of constantly updated quotations and proverbs database.

QuotationsAuthorsTopicsKeywords
Browse Authors: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
(Click a letter to view the authors)
Letter "K" » Ken Dulaney Quotes
«They offer something Palm can't offer -- a broad, strong set of development tools to write custom apps and a large choice of hardware,»
Author: Ken Dulaney
«You've built this great firewall in front of your enterprise, but the back of your enterprise is like Swiss cheese,»
Author: Ken Dulaney
«For 3Com to take on Microsoft and all the other players would be suicide in my opinion,»
Author: Ken Dulaney
«We've had such a good wired infrastructure here that using a cell phone to do things probably kind of lets you down if you're used to a rich Internet experience and you're getting 1Mbps to the house over the Internet and then you go to a four-line-by-20-character [sized] phone and try to do Internet,»
Author: Ken Dulaney
«What you really want your phone to do is to alert you to things, ... So you tell the back-end systems what you're interested in, and then these back-end systems will watch for you and tell you when things get kind of out of kilter.»
Author: Ken Dulaney
«I'd say there's no business interest in wireless video today, ... Ask yourself why no one uses those little pocket TVs. Not enough people like it.»
Author: Ken Dulaney
«Because infrared has so little security when someone beams you their business card, there's no way to know what you're getting, ... Bluetooth [another short-range wireless data exchange protocol] has access permission security, but once you permit access, it's a hacker's delight.»
Author: Ken Dulaney
«Bluetooth is just now passing over the peak of inflated expectations,»
Author: Ken Dulaney
«Unfortunately, the only way to really secure a PDA is the lock it into a vault.»
Author: Ken Dulaney
«Hackers could infect your system or network with software that uses the PDA as a Trojan horse to get into the enterprise,»
Author: Ken Dulaney

Pages: « Previous 1 2 3 4 Next »


Research our database of over 800,000 top-quality pre-written papers plus 15,000 biographies for only $9.95/month.
Instant Account Activation. Register Now.