SEARCH RESULTS

YOU WERE LOOKING FOR :Ethics and Technology

Essays 2701 - 2730

Information Technology and VMS Operating Systems

"is a 32-bit, multitasking, multiprocessing virtual memory operating system" (Article 73391, 2001). OpenVMS Alpha is the 64-bit v...

Dakota and Uptown Brands of R.J. Reynolds and Ethics

of those who have been more materially successful. When news leaked of the Dakota brand intended for poor women, the outcry was s...

Libra Information Technology System Project for the Welsh and English Magistrate Courts

the Conservative Chancellor of the Exchequer launched the Private Finance Initiative (PFI) (Timmins, 2000). The aim was to bringi...

Questions on Information Technology and Management Supply

goal of SCM is to integrate many of the aspects of Total Quality Management (TQM) that contribute to increased manufacturing effic...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...

Time Phased Budget and Work Breakdown for an Information Technology Project

20 hr 1 Networking analyst - 10 hr Duration of project Personnel time $27,755 Indirect admin costs est. $24,332 Train 12 users...

The Growing Significance of Mass Customisation Technologies

relevant information about the customers needs, then matches available information or products against those needs....

Project Management and Ethics

a tool to help prevent crisis (Jacobs, 1999). There are many tools advised for the prevention of crisis, and whilst many my advo...

Dental Schools' 'Outreach' Programs and Isuses of Ethics

moral philosophy and ethical behaviors begin with the proposition that there are certain responsibilities that individuals must a...

Business and Christian Ethics

short cuts are not. In order to create a business enterprise based on Christian morals, one may want to follow the six basic busin...

Position Paper on the Ethics of Organ Sales by Living Donors

vendors: the exploited poor, who need to be protected against the greedy rich. However, the vendors are themselves anxious to sell...

Economics and Technology Transfer as it Relates to Cisco Systems

and Duffy, 2003; p. 1). Because they are based on a common source, there are no compatibility issues with these applications. Th...

Business Questions Relating to Information Technology

is facilitated by a remote procedure call vehicle that is considered a fundamental middleware piece of the DCE (Compaq, 2001). T...

Canada's Changes in Technology and Labor

future of Canadian unions. The economic environment present during the 1980s and 90s served to promote human dislocation and org...

Overseas Offshoring Information Technology Services

century. What is the impact of such significant outsourcing to small business and American workers? For one thing, globali...

Ethics and Science of Stem Cell Research

of public controversy for the past several years. Research is not limited to such activities as dissection, examination, en vitro...

Software Development and Ethics

desire to increase revenue to allow further development and facilitate increased benefits to the users. The errors may not be as s...

Chuang Tzu, Confucius, and the Theories of Ethics

because to do so promotes safety, but it is also a most efficient way to move large numbers of people from point A to point B. Li ...

Overview of Becoming an Information Technology Consultant

obtaining the job they can do well (Smith, 2001). There are some ways in which a person can find their market niche (Smith, 2001)...

Information Technology Consulting

regarding success/failure rates of consultants. These data do not seem to be available. It would be impossible to calculate the ra...

Adult Learning Environment and Code of Ethics Establishment

discern professional behavior from non-professional behavior, others simply operate on a loosely defined set of rules. Dougherty ...

XYZ University Core Values and Psychologists' Principles of Ethics

B: Fidelity and Responsibility: "Psychologists establish relationships of trust with those with whom they work" (American Psycholo...

Coca Cola Enterprises and Ethics

global enterprises (such as CCE) to secure good and strong relationships with the local community - as doing so would improve the ...

Information Technology Professionals and the Effects of Information Searching

his or her computer checks into a "third-party machine" and this is something that is controlled by a network administrator (Lee, ...

MANAGEMENT, SECURITY AND INFORMATION TECHNOLOGY

man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/pat...

Developments and Impact of Healthcare Technology

and innovation and the ability of different field to cross over, so that developments from one area may be applied to another and ...

Information Technology and Resource Management

Street Journal, Intel is selling its Centrino Wi-Fi chips for its cost to fabricate them. Why? For one thing, turning Wi-Fi techno...

Implementing Information Technology Compliance

comparison IT application controls are designed to ensure that specific applications are functioning correctly, which may include ...

Management of Avid Technology

growth stages, with a new way of satisfying customer demands. The main strength here has to be seen as the technical knowledge tha...

Computer Technology - Considering ISM Bands and Thyristors

current present: once the current is no longer there, the thyristor will switch off....