SEARCH RESULTS

YOU WERE LOOKING FOR :An Overview of Fuel Cell Technology

Essays 1231 - 1260

'Fault Line' and Intel

structure optimally designed to implement the new corporate strategy? By 2002, Intel had five business units, with only thr...

Technologies of eBusiness

(Odell, 2005). With this level of growth in such a short period of time the development and background to the rise of i-mode shoul...

IT Project Assessments

of scoring with the scores weighted to reflect the needs of the business. We will assess each individual and then compare the scor...

South Korea and the Impact of Technology

2005). Since the 1960s, the economy did embrace high technology ("Korea, South," 2005). While that is the case, one question looms...

Critical Response to Educational Technology

needs of a constantly changing and always challenging new student population and maintaining a method for flexibility inherent in ...

Past and Present Treatment for Cancer

the first cancer-causing gene--an oncogene--which is shown to plan a role in human bladder cancer; more than 50 oncogenes have bee...

Personal Finance and the Impact of Technology and Computers

so he/she doesnt have to think about it); have paychecks deposited directly to bank accounts, and even buy other financial instrum...

Technology and Applications Involved in Land Surveying

As will be elaborated on below, practically every resource manager is now familiar with the terms GIS and GPS and the capabilities...

University Healthcare Call Center Construction and Implementation

nurse desk or to another location for prescription refill. Messages are recorded on paper message pads, after which the message i...

China v. Western Europe Expansionism

to the brink of a new world direction. Interestingly, however, that direction would end abruptly as the leadership of China fell ...

Higher Education Instruction and Virtual Education

an time line for the correction of these deficiencies and a date for a reassessment of their performance (Vacca and Bosher, 2003)....

Information Technology Knowledge Needed by a Risk or Security Manager

nuts and bolts of I.T., or is a cursory knowledge sufficient? In part, the answer lies in management ideology. Do managers need to...

Survey on Classroom Technology

increase productivity, and promote creativity; Students use productivity tools to collaborate in constructing technology-enhanced ...

Classroom Technology Integration

their writing" (p. 155). This was an urban multicultural classroom of 27 students, eight of whom were included in the study (Fletc...

Intellectual Property Rights and Visual Communications Technology

means they will be safer. Such paradigms have been used to control crime, but there are a myriad of legal issues when it comes to ...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Nursing and Technology

a much greater burden of responsibility and knowledge than was previously the case. Even nurses in highly specialised fields are o...

Overview of Multimedia and Social Culture

sense that more affluent nations will tend to display a high percentage of multimedia owners in relation to poorer ones: technolog...

New Media Technologies and Their Cultural Implications

currently exists does not give content providers absolute control over how users use their material, but it can place some prohibi...

Dana Corporation Operations and Staffing

the company... * "Break down barriers between departments... * "Remove barriers that rob the hourly worker of his right to pride o...

Manufacturing and Cutting Edges

materials (Tsai et al, 2003). The resulting cut is similar to an extension of a crack, but is controllable (Tsai et al, 2003). Ho...

Steinway's Supply Chain

chain, they are firm infrastructure, human resource management, technological development and procurement (Porter, 1985). At all l...

Frustrating Technology and Distance Learning

for their students. When an individual heads for college from the comfort of his or her home without the fundamental basics of co...

Progress and Technology

would soon desire to take the car everywhere instead of walking, maintaining his own bodys requirements. Mans pursuit of the dolla...

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...

Examination of Clean Coal Technology

Air Act (The Economist). Nonetheless, clean coal technologies have been a major topic in the energy industry for a few years, pri...

Culture and Social Change in China

introduced many economic reforms which took into account global markets and the output of China increased nearly four times. Overa...

Reproductive Technology and Identity

to be inferior (Chesterton, 1922). The idea behind this premise was to protect the American "identity" which in many ways was stil...

Workplace Impacts of Technology

customer inquiries and concerns (Olsten Forum Reports, 2002). And, in terms of organizational culture, the Internet allows compani...

21st Century Database Management

in large companies this is a monumental task. In older times, when companies were reliant on a paper trail, the work was not as da...