SEARCH RESULTS

YOU WERE LOOKING FOR :Controlling New Technologies

Essays 1981 - 2010

U.S. Politics and the Impact of Technology

In five pages this paper discusses the problems associated with the U.S. presidential election of 2000 in this consideration of th...

Technical Processes and DSL Technology

In twelve pages DSL technology is defined and examined in terms of various types, process, positive and negative DSL factors along...

Precision Rectifiers and Circuit Design

In sixty pages this paper examines precision rectification circuits that are high speed in terms of design, uses, and also conside...

Educational Computing Instructional Strategies

In fifteen pages this paper examines the integration of information technology into different kids of educational units. Ten sour...

Computer Education and Doorsteps or Deliverance by Gary Bloom

classrooms across the world. However, as you ably point out, for all its glitter, computer technology is not pure gold. The Allia...

Comparison of CPU Standards

the two connected devices. History will always recall that system administrators spent a great deal of time making cables with pre...

Online Security

confidential information, hackers have found other ways to make trouble. In February of 2000, a Michigan-based medical products f...

Educator Evaluation of Technology Needs

in classroom focus relative to the introduction of technology, but also suggests the problem of gender bias may come into play in ...

Case Study of DaimlerChrysler

to see why and how this merger was seen as one that could add a great deal of value to both companies. However, it may be argued t...

The Battle for God by Karen Armstrong

radicalism and there is no way of rationally communicating our way out of entanglements with those having this mindset. H...

Bear Gram and the Vermont Teddy Bear Co.

to protect against the fall in sales due to economic factors. The company started in 1981, and have grown by using differentiati...

Food Production and Gene Technology

that can produce food which is argued to offer many benefits to people, and the planet. "This includes foods with better nutrition...

Information Age and Social 'Technophobia'

who created the buggy whip? Many believe that technophobia is a modern syndrome, but in fact, it is not. During the Indust...

National Security and the Important Role of Technology

example of why the United States needs a national security strategy for technology. There are hundreds more. Since the Sep...

Brief Company Analysis of Vermont Teddy Bear Co.

sees the companys competitors not as other toy or plush doll/animal companies but as companies who sell greeting cards, chocolates...

Business Process Reengineering and Information Technology

has come to embrace a more enlightened perspective with regard to addressing the ever-changing needs of commercial interchange, wi...

Classrooms, Computers, and the Educational Tool Known as Technology

tools currently in use in the classroom and in the home. In just the last decade some $9 billion has been spent in U.S. schools t...

Supply Chain Management and Warehousing

employee in a company has the responsibility to improve production. Under kaizen, a company takes ideas from its employees, along ...

Siemens AG Marketing Audit

The company and its subsidiaries employ 417,000 people in 192 countries (Cella, 2004). Ten of the companies worldwide businesses, ...

The Success of Avid Technologies

sales are outside North America (Meyer, 2004). William Warner launched Avid in 1987 to develop a prototype digital editor ...

An IT Organization Accounting System

with each component of that task broken down and costed by way of the different resources that it consumes or requires. With this ...

19th and 20th Century Naval Power

is particularly noteworthy in the period spanning from 1862 to 1914. It was during this period that many ships underwent a transf...

Teachers and Tutors of ESL Adult Learners and a Phonemic, Web Based Instructional Approach Preproposal

and phonological similarity of verbal items in memorized sequences" (Mueller, et al., 2003; p. 1353). The phonological-loop model...

A Scenario of Company Plunged into Chaos

as the CEO becomes too ill to continue. In this situation, the current CEO should be able to identify which executive is best able...

IT Use in Hotels; The Impact on Room Rates

al, 2000). The IT is being used with the aim of increasing productivity of the staff and enhance the revenues rather that to aid w...

MSCIT Career Essay

in a department in a larger company. For example, I might enjoy working for a large insurance company in the IT department. In suc...

Bluetooth Technology

with seven more, then very quickly were up to hundreds of individual devices that can communicate with one another via Bluetooth. ...

Final Master’s Project in Change Management

physicians prescribe for them can change frequently. As drugs increase in number, they narrow in focus and applicability but pati...

“The Tools of Empire: Technology and European Imperialism in the Nineteenth Century”

use of both primary and secondary sources are used throughout the book and the message if the interdependent link between imperial...

JP Morgan Chase IT Strategic Plan

In this case, an anecdote about JP Morgan is relayed which serves as an introduction for how this firm might approach the subject ...