Quotations

Famous Quotations

Sometimes it is difficult to be motivated and inspired to write a review, a persuasive formless essay, an article of reflexive investigation, etc. Plus, it can be difficult to find the right words that will better describe your ideas. DedicatedWriters.com is your top destination, since it provides students with an updated database of more than 150.000 quotations and proverbs of famous inventors, sportsmen, philosophers, artists, celebrities, businessmen, and the authors who certainly enriched and strengthen the world. This is perfect to become inspired and write book reports, essays, movie reviews, research papers, etc.

Try out our free search option and stay tuned.

Browse Authors

(Click a letter to view the authors)
A B C D E F G H I J
K
L M N O P Q R S T U V W X Y Z

Ken Dulaney Quotes

«They offer something Palm can't offer -- a broad, strong set of development tools to write custom apps and a large choice of hardware,»
Author: Ken Dulaney
«You've built this great firewall in front of your enterprise, but the back of your enterprise is like Swiss cheese,»
Author: Ken Dulaney
«For 3Com to take on Microsoft and all the other players would be suicide in my opinion,»
Author: Ken Dulaney
«We've had such a good wired infrastructure here that using a cell phone to do things probably kind of lets you down if you're used to a rich Internet experience and you're getting 1Mbps to the house over the Internet and then you go to a four-line-by-20-character [sized] phone and try to do Internet,»
Author: Ken Dulaney
«What you really want your phone to do is to alert you to things, ... So you tell the back-end systems what you're interested in, and then these back-end systems will watch for you and tell you when things get kind of out of kilter.»
Author: Ken Dulaney
«I'd say there's no business interest in wireless video today, ... Ask yourself why no one uses those little pocket TVs. Not enough people like it.»
Author: Ken Dulaney
«Because infrared has so little security when someone beams you their business card, there's no way to know what you're getting, ... Bluetooth [another short-range wireless data exchange protocol] has access permission security, but once you permit access, it's a hacker's delight.»
Author: Ken Dulaney
«Bluetooth is just now passing over the peak of inflated expectations,»
Author: Ken Dulaney
«Unfortunately, the only way to really secure a PDA is the lock it into a vault.»
Author: Ken Dulaney
«Hackers could infect your system or network with software that uses the PDA as a Trojan horse to get into the enterprise,»
Author: Ken Dulaney

Pages: « Previous 1 2 3 4 Next »