SEARCH RESULTS

YOU WERE LOOKING FOR :Adult Education and Technology

Essays 2341 - 2370

Learning Theories And Technology

conferencing, and interactive video and audio technologies. These are all student-centered technologies that can build upon prior ...

John Galtung/Theory and Methods of Social Research

located outside the social scientist himself, and we shall follow this tradition" (Galtung 9). As this indicates, Galtung does not...

Why My Space is Detrimental

a planned social event. Nobel (1995)criticizes technology in general. His main contention is not that technology is harming people...

Sociological Theory, Contemporary Culture, and Technology

the need to separate religion from science, to synthesize the basic principles of the various branches of the sciences into one in...

Orbitz

2008). The partnership was incorporated on the 24th of February 2000, as DUNC LCC, and DUNC Inc. was created on the fourth of May ...

LOCALLY FUNDED TECHNOLOGY - REX, GEORGIA

developed. The problem is, most districts must rely on grants, bond issues and philanthropy when it comes to supporting technology...

Is an IT Strategy Focused On Maintaining Cutting-Edge Technology the Most Effective Way to Support Any Kind of Overall Business?

business strategies (Deloitte Consulting, 2004). The problem is that although there may be benefits of IT gaining alignment...

The Value of Podcasts and RSS Feed in the Research Act

older formats, such as printed formats, video or radio. Pod casts are already being used by some universities in the United States...

TECHNOLOGY AND ISOLATION: TRUTH OR NOT?

technology is putting people in touch with strangers on the other side of the world, its also taking away "face time" from family ...

INTRODUCING SUNPOWER TO BRAZIL AND THE UAE

of its electricity (Kwintessential, 2008). In short, Brazil is looking for any and all opportunities to participate in ventures de...

TURNING POINT DRUG REHAB AND SOLUTION DESIGN

How Use Will Help System Analysis and Design Process As mentioned in the previous paper, use cases are ideal for determini...

Considerations in Journalism

the situation analyzed from a three pronged perspective, a perspective that Kidder prefers to call the "trilemma", a perspective t...

IT Project Analysis

The IT consultant reports that the hospital has more than 1500 personal computers and that anything they can do to improve them tr...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

TECHNOLOGY, CUSTOMERS AND THE EXAMPLE OF VOLVO

to paying customers. If paying customers are put off by an employees attitude (due to his/her frustration), its a sure bet the cus...

How Economic Considerations and Doctrine Influence Military Innovation

tactical assumptions as unrealistic (Murray and Millett 1996, 29). Instead of composing a doctrine for the future, which would ha...

Marketing Coca Cola in the National and International Market; Influences, Impact of Technology and Role of Social Responsibility and Ethics

between Coke and Diet Coke division of the firm, with the Coke firm apparently taking legal action against Diet Coke, as the produ...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

AMAZON, ORGANIZATIONAL CHANGE, AND TECHNOLOGY

change, because change takes effort. It forces them from their comfort zones, forces them to re-adapt and to take on new things....

International Inequalities and the 'Digital Divide'

part of the ocean -- the Mariana Trench -- or of a yawning abyss on land such as the Grand Canyon. And yet, a much larger chasm is...

Holocaust Role of IBM

disposed of. Although the killings could have been accomplished without state of the art technology, it seems that technology did ...

Overview of Brain Prosthetics

1995). Through these two books, we see striking similarities to the possible repercussions of brain prosthetics (Foucault, 1995)....

Contemporary Nursing's History

as how the profession has been viewed for at least a century. It was an honorable and respected position for a woman and one that ...

Network Security and Computers

than fifteen percent back in 1994. It can be argued that with the ever-expanding user-friendly applications over the past decade ...

Historical Functions of Museums

way in which museums present information historically and this is perhaps the most exciting point of all. That is, museums are abl...

Technology and Privacy Rights

and even peruse employee movement and behavior in the workplace utilizing closed-circuit TV (Benigno, 2002). As science-fiction s...

eCommerce and Information Systems

cultivating relationships with top automotive retailers that want access to the browsing car buyer, and sharpening its outreach to...

Student Supplied Readings on Being Human

the singing of cell phones. Nature has somehow gotten away from those who live in this brick and mortar and cyber society. Many ...

Analysis of Learning a Second Language

for science, technology, and international business" (Unz and Tuchman, 1997). In other words, this legislation was passed in order...

Medicine and Technology

patient shows up in a physicians office with symptoms resembling those associated with a rare bone infection, the physician can fi...