SEARCH RESULTS

YOU WERE LOOKING FOR :Business Process Reengineering and Information Technology

Essays 451 - 480

Global Companies and Lotus System and Application Implementation

In fifty pages this paper discusses how a global company would introduce an information technology communications system in this c...

Heineken and Information Technology Organizational Issue

In seven pages this report discusses IT capabilities and the management and expansion efforts of Heineken Brewery. Ten sources ar...

Direct Marketing and IT's Influence

In thirty two pages this paper discusses relevant topics and cases in this examination of how direct marketing has been affected b...

Banking Industry and Computer Technology

banking, and so on. Workplaces are good places to examine how the dreams and dilemmas of computerization really work out for larg...

Information Technology System Standardization and Streamlining 2

In fifteen pages this is a continuation of the same titled paper that includes several charts including network and Gantt. Eighte...

Media and IT

In forty pages an introduction and 3 chapters on the topic of information technology and its impact upon the media, society, and t...

Product Development and the Roles of Communication and Information

In nine pages this research paper discusses the development of products and the roles played by communication and information tech...

ITM Application of Company Manufacturers

within the same system. A typical example would be a company which has businesses spread over many manufacturing environments. I...

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

Information Techology Outsourcing Trends

Outsourcing is becoming more and more prevalent. The purpose of outsourcing is to achieve optimum results for the functions that a...

Overseas Offshoring Information Technology Services

century. What is the impact of such significant outsourcing to small business and American workers? For one thing, globali...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

IT Project Tender Invitation Case Study

to support the window operating system and alternate operating systems on the computers in the network. The system will also need ...

Information Technology Consulting

regarding success/failure rates of consultants. These data do not seem to be available. It would be impossible to calculate the ra...

DEC Compaq Merger and Information Technology Integration

had occurred during the meetings. The two companies were very different in their approach to business. They sought to comp...

Steinway's Supply Chain

chain, they are firm infrastructure, human resource management, technological development and procurement (Porter, 1985). At all l...

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Overview of IT Project Process Stages

and also who it is that will be using the system and who it is that this use will impact on, for example, in a hospital this will ...

Assessment of Value Creation

the values that may be gained. If they were not then these were tools which could have been used. The first tool...

Making Management Decisions and IS Technology

a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...

Information Technology and VMS Operating Systems

"is a 32-bit, multitasking, multiprocessing virtual memory operating system" (Article 73391, 2001). OpenVMS Alpha is the 64-bit v...

Information and Communications Technology Interview and Interpretation

a predicable change as may be expected if we were to apply the theories of Clark (et al, 1988). In terms of identify there are m...

Competitive Advantage and Technology

and Millar (1985) noted some 20 years ago that information technology ends up creating a competitive advantage by offering the bus...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

Questions on Information Technology Acquisitions

should not conflict, and may also help to achieve the goals. The way the project is planned and undertaken will need consider othe...

Implications of the Sarbanes-Oxley Act

of the marketplace by big business (Bittlingmayer, 2002). Catanzaro (2000) accuses President Richard Nixon of using antitrust law ...

Optimum Make or Purchase Information Technology Decision Making

323). The stories of any industry professional certainly can bear out this view. One such company, IMT Custom Machine Comp...

Software Design Systems Analysis and Ethics

of a good systemic approach): 1) state the ethical nature of the problem; 2) state the alternatives; 3) by the use of the laws of...