SEARCH RESULTS

YOU WERE LOOKING FOR :Cultural Impact of Computer Technology During the Past Two Decades

Essays 1321 - 1350

The Societal and Industrial Transformation to Digital Television

U.S. households and the average number of hours devoted to the medium by each household make it the ideal medium for a number of a...

The Benefits of New Technologies on E-Commerce

1995 world wide only 1 financial institution had web banking, by 2002 this increased to 6,000 had this. In 1995 only 50 financial ...

Racism in Othello

seem that Desdemona is having an affair with Cassio, the man that Othello favored for promotion over Iago. Convinced that Desdemon...

Women in the Church: A Historical Overview

embraced by the church. Although it is true that some denominations do not allow women to run things, many denominations such as t...

Importance Of Multicultural Skills In Business

an ingrained attitude and behavior among Americans but in many other cultures, there is a far greater emphasis on collaboration an...

Cross-Cultural Management

norms and behavioral traits that they were raised with (Wade, 2004). These are deep-rooted and may be difficult to change (Wade, 2...

Civil Rights and the NAACP During the 1960s

This paper is written in the form of a fictitious letter from a NAACP attorney during the 1960s. The attorney represents an Afric...

Employee Relations in Japan from 1850 until 1950

The country managed to achieve industrialisation in only a few decades. The major period of development was between 1868 and the f...

Cultural Composition of Germany

Eating for the Germans is more than a physiological requirement; rather, the very act of sharing food symbolizes many things, incl...

Analyzing the Gulf War Leadership of President George H.W. Bush

prices, cut the legs off of this machine. Iraq claimed that Kuwait had to be drilling diagonally across the border and tapping the...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Reviewing an Article on Managing Across Cultures

the author says little and claims that there is no direct literature to report. Of course, this is not unusual because sometimes s...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Economy During the Civil War and Reconstruction Era

many have recognized, war can be good for the economy and it was at the time. Agricultural industries also saw an increase in pro...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Overview of Inter Cultural Communication

importance of human relationships and interactions over stringent social boundaries. "Many things may occur at once (since many p...

Telemedicine Application of Network Architecture

In ten pages this paper discusses the telemedicine application possibilities of Lucent Technologies' WaveStar and LambaRouter and ...

Organizational IT Growth and Management

In five pages this paper examines an information technology's growth and management and considers how success is dependent upon le...

DaimlerChrysler and IT

In seven pages DaimlerChrysler and Daimler Benz are examined in a consideration of information technology's benefits, challenges, ...

Technology and Contemporary Civilization

In twelve pages an analysis of contemporary civilization and technology is considered with the effects of military technology and ...

3 Articles on IT Reviewed

In six pages this paper reviews 3 articles researching various information technology aspects such as new system development for t...

Educational Uses of the Internet

In five pages this paper examines how the Internet has been integrated into the classroom in a consideration of this technology's ...