SEARCH RESULTS

YOU WERE LOOKING FOR :technology research papers

Essays 1831 - 1860

Need a Brand New Custom Essay Now?  click here
Communications and Technology

on the other hand, are also good for long-distance conversations (almost anywhere and any time), and again, if you want to get inf...

Technopoly by Neil Postman

exists; "neo-Luddites" are anti-technology, both in general and in particular) ("Neo-luddism," 2005). Postmans objection is appar...

Business IT System Determination

down time in terms of badly recorded or lost data would end up helping the company save in expenses. As of now,...

Business, Technology, Science, and The Bible

and those regarding the sciences, technology, and business. The difference is that although we "sense" our religious beliefs we d...

IT and the Implications of Outsourcing

results, the National Health Service in the UK has outsourced many services to a high level of criticism as has the London Ambulan...

Signage Industry and Applied Technology

the meaning and context of the written word (Calnon, 2004). When this purpose is accomplished successfully, it attracts attention ...

Nursing and Technology

a much greater burden of responsibility and knowledge than was previously the case. Even nurses in highly specialised fields are o...

Technology and Trends in E-Marketing

has introduced customer relationship management as a way to build and maintain markets. In this paper, well examine some fa...

Technology and Organizational Change

The authors have pointed out that the conventional research of the time had worked toward obtaining evaluations of other proposals...

ICT School Strategies Development

tackled by many studies. The concept of the digital divide with the technically able and the technical unable creating a social an...

Social Issues and Robots

(Isom). Skipping ahead passing other inventions, we find that in 1898, Nikola Tesla built and demonstrated a robot boat that was r...

Dana Corporation Operations and Staffing

the company... * "Break down barriers between departments... * "Remove barriers that rob the hourly worker of his right to pride o...

Manufacturing and Cutting Edges

materials (Tsai et al, 2003). The resulting cut is similar to an extension of a crack, but is controllable (Tsai et al, 2003). Ho...

Intellectual Property Rights and Visual Communications Technology

means they will be safer. Such paradigms have been used to control crime, but there are a myriad of legal issues when it comes to ...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Case Studies on the Integration of Technology

to Point B overnight. Where FedEx has led the way is in the area of value add, in other words, using technology to help provide mo...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

Women's Rights and the Impact of Technology

little time for themselves, or to think about doing anything rather than staying ahead of what needed to be done. Because ...

Modern Economic Globalization and Changing Technology

part of the globalisation process over the last fifty years this is supported by the way the actual output increase has remained c...

Technologies of eBusiness

(Odell, 2005). With this level of growth in such a short period of time the development and background to the rise of i-mode shoul...

'Fault Line' and Intel

structure optimally designed to implement the new corporate strategy? By 2002, Intel had five business units, with only thr...

Defining Technology Due Diligence

of four teaching hospitals in San Francisco, UCSF Stanford Health Care abandoned the merger in large part because of the difficult...

1990s' Intel Strategy

against foreign competitors. Though Intels position in the EPROM market appeared to be strong, the market was being artificially ...

Enterprise Resource Planning and Supply Chain Management

made (Harrington, 2002). In managing the supply chain there are many aspects that may be amended or adjusted to create val...

Internet Technology and Security Issues

clock and waiting in long lines are becoming a thing of the past. There is no question that the concept of Electronic Funds Trans...

China v. Western Europe Expansionism

to the brink of a new world direction. Interestingly, however, that direction would end abruptly as the leadership of China fell ...

Higher Education Instruction and Virtual Education

an time line for the correction of these deficiencies and a date for a reassessment of their performance (Vacca and Bosher, 2003)....

Information Technology Knowledge Needed by a Risk or Security Manager

nuts and bolts of I.T., or is a cursory knowledge sufficient? In part, the answer lies in management ideology. Do managers need to...

Classroom Technology Integration

their writing" (p. 155). This was an urban multicultural classroom of 27 students, eight of whom were included in the study (Fletc...

Vulnerabilities of Windows and Possible Solutions to These Problems

a GUI or Graphical User Interface. While Windows had become increasingly popular for mainstream purposes, it was something that wo...