SEARCH RESULTS

YOU WERE LOOKING FOR :Changes in the Personal Computer Industry

Essays 1621 - 1650

Political Sensitivity and Spatial Products

earths surface, triangulating time and distance between one satellite, a position on earth, and another satellite. Reliable cover...

'Strategic Intent' and Company Operations

relentlessly targeted Southwest in demarketing efforts, Southwest not only continued to exist. Eventually, it surpassed all of th...

Prehistorica Computers and Case Study Analysis on eBusiness

programmers may have to work and maintain the site on an ongoing basis. It will likely mean buying new hardware and dedicating a s...

Description and Occupational Outlook of Computer Programming

In six pages the field of computer programming is examined in terms of its duties, salary, risks, and future occupational outlook....

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Technology and its Importance in Business

This paper considers the way technology is at the heart of every business. Computer technology is of particular importance in thi...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

3 Education Research Proposals

policies, implementation and use may occur, impacting different stakeholders. 2. Methodology To assess the way popular media a...

Why Linux is Better Than Windows

additional cost of hundreds of dollars. Linux is an open source file, which means it is completely free for downloading on its we...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

Acer

notebooks and net books, specifically the Aspire, with Acer selling 9.67 million units in the third quarter of 2008 alone, this wa...

John Galtung/Theory and Methods of Social Research

located outside the social scientist himself, and we shall follow this tradition" (Galtung 9). As this indicates, Galtung does not...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Laws and Regulations Governing the Use of Animals

be made for that ideology with some animals but "Virtually every major medical advance of the last century has depended upon resea...

PROCESSES IN COMPUTER PROGRAMMING

shrank in size), different programs were needed to keep up with the demand. These days, computers are still asked to calculate. Th...

Apple Computers Founder and Chief Executive Officer Steve Jobs

from a paltry $2 billion to over $18 billion and the stock shot up to $111 from an embarrassing $12(Jackson 2000) . "We shipped mo...

COMPUTER MOTHER BOARD

typically include functional units of a computer including the central processing unit, microprocessor, memory, the basic input/ou...