SEARCH RESULTS

YOU WERE LOOKING FOR :Communication and Technology

Essays 1561 - 1590

Radar's Role in World War II

the war" (Heywood, 1998; history.html). This lab was only one division of National Defense Research Committee (NDRC), for "in Jun...

Howard Schultz and Starbucks Leadership Strategy

By 1985 he has managed to convince the founders of the coffee company that it is worth trying out the new format of a coffee bar. ...

Communication and Interaction Course's Benefits

example argues that instead of creating progress in the Third World, the mass media instead perpetuates a relationship of dependen...

Motivation and the Building of Teams

those skilled have become more specialised. In effect the ultimate team maybe compared to the single craftsman, and the modern tea...

Mammalian Hepatic Estrogen Receptor Function and Expression

up of hormone levels in the liver can lead to serious side effects, it can be stated. In fact, there is some evidence to show that...

Federal Communications Commission's Cable Television Rules for Program Access

for the consumer. However, since the original Act was introduced the market has seen an increase in fees for the consumer and a de...

Comparative Analysis of Japan's Matsushita Group and the Netherlands Philips Electronics

the Netherlands and Matsushita Electronic in Japan, and to determine if their longevity and staying power can help get them back t...

IT Outsourcing

emerging service companies to deliver accounting, human resources, data processing, internal mail distribution, security, plant m...

Workplace Technology and its Negative Aspects

In five pages this paper examines the negative impacts of workplace technology in a consideration of piracy and hacking problems a...

Courts and Communications

deceptive pricing, comparative superiority and safety-related claims (FDA Consumer, 1993). Media Access to the Courts The ...

Internet Technology and Morality

compromising of principles much more likely. For example, it is noted that the Internet opens the doors of pornography and cyber a...

Technology and Application of Rapid Prototyping

any time in the past, a trend that is only expected to continue for the next several years. Competitive advantage is a quality th...

December of 2000 White Paper on Communications in the United Kingdom

allow the British population to have access to the widest possible choices of the diverse communications industry (Byers and Smith...

Overview of Knowledge Management

in such a way as to be accessible and available to those who need it. Knowledge management is, like the term suggests, a necessary...

Technological Connections and 'Cyberfeminism'

this Cyberfeminism, 2002). Cyberfeminism got its start in Australia during the early 1990s, when a group of artists and ac...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

Appendicitis and CT Scans

of Computerized Tomography Scans (CT) in diagnosing abdominal conditions is highly debated. Baker emphasizes that the procedure p...

Technology and Its Impact Upon Management and Production Operations

the risk manager concerning the high rate of assembly accidents, some of which have been quite serious. The number of accidents h...

Hotel Industry and IT

a joint venture called The Hotel Industry Switch Co (THISCO). THISCO linked airline computer reservation systems and a majority of...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

Istanbul and Megacities

on the European shore. It is on both the land and sea routes of Asia and Europe. Istanbul has the advantage of being on the Blac...

Technology in Government, Its Responsibility and Role

In six pages this paper discusses the relation of Internet technology and the role the government should play regarding the protec...

National Health Service Information System Implementation Methodology

this thesis makes use of the Actor Network Theory it is appropriate to use a research paradigm that may be seen as able to cope wi...

Post Second World War and Global History

that the Russians "made very serious mistakes" (Booth 37). In an attempt to avert a secret attack, President Kennedy ordered Prem...

Can Computer Crime Be Effectively Fought?

attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent ba...

Communication and Self Perception

this particular look at loneliness, much does have to do with the fact that individuals who are lonely have poor self perceptions....

Relational Databases and JDBC Driver Types

within the database stores one sort of data that is relevant to the application (Spruit, 2002). As an example, an address book mig...

Industrial Effects of IT

is still perceived as strong, and the use of computers has moved from being seen as a source of competitive advantage., to a neces...

A Corporation's Adoption of Internet Technology

the level of competency -- that will exist at each individual location. It can be argued that computer design is only as technolo...

Cultural Traditions and Technology

had to change some things, in his heart he is, perhaps, doing exactly what he and those before him have always done: worship The M...