Essays 301 - 330
has strong a weak forms (Cross et al, 1974). Question 2 The open source software movement may be seen in relation to the way th...
mover advantages and increased functionality are still goals that are achieved. The company wanted to grow, and as a core competen...
obtaining the job they can do well (Smith, 2001). There are some ways in which a person can find their market niche (Smith, 2001)...
art lovers from those merely looking for decorative art for their homes or galleries. A true patron of the arts, regardless of the...
regarding success/failure rates of consultants. These data do not seem to be available. It would be impossible to calculate the ra...
In eight pages this paper discusses how Victorian theater was impacted by new technology in terms of staging and social culture. ...
form, telecommunications is the way in which data is transmitted, either voice data or visual data. As such, telecommunication can...
and Duffy, 2003; p. 1). Because they are based on a common source, there are no compatibility issues with these applications. Th...
is facilitated by a remote procedure call vehicle that is considered a fundamental middleware piece of the DCE (Compaq, 2001). T...
they occur on a continuing and regular basis. This is the case for risk management; personnel database and skills inventory...
Work, Leisure, Community and Everyday Life" author Richard Florida (2002) contends that we have changed because we have sought ch...
future of Canadian unions. The economic environment present during the 1980s and 90s served to promote human dislocation and org...
century. What is the impact of such significant outsourcing to small business and American workers? For one thing, globali...
planning in the manufacturing sector. Product Data Management (PDM) was created in the 1980s as a means of storing CAD document...
Though the request for this paper was to focus on technology in film during the past 50 years, no paper on this would be complete...
best for them. * Provides a "full picture" result that standard approaches may not be capable of illustrating meaningfully....
the computer overwhelmingly favors the visual learner. As long as the individual can read, it makes little if any difference how ...
a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...
about the impacts of specific instructional methodologies and motivational elements. As a result, Cohen called for the expansion ...
information is good. However information is only useful if it can be acted upon. Where there is information overload there may b...
courtroom, and communicated to the public". Cyberspace, in particular, has become an integral part...
Guglielmo Marconi (Weightman, 2003). This inventors name is well related with the radio and the development of crude wireless comm...
"is a 32-bit, multitasking, multiprocessing virtual memory operating system" (Article 73391, 2001). OpenVMS Alpha is the 64-bit v...
toiletries was what Anita saw as the lack of integrity in the beauty industry (Chryssides and Kaler, 1999). The market that Anita ...
to the public". Information access is more critical than ever before to the global...
read due to the speed at which news articles are published. The BBC also publishes news though the day. This has changed...
wealth was not distributed as equally and people were born in one place and mainly stayed put for much of their lives. Yet these d...
also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...
line of demarcation between e-commerce and common sense. Technology stocks were selling at greatly inflated prices reflecting ama...
issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...