SEARCH RESULTS

YOU WERE LOOKING FOR :Financial Management and Technology

Essays 2461 - 2490

Amazon.com and the Competitive Advantage Represented by Technology

In five pages this paper discusses how Amazon.com achieves competitive advantage through technology in an overview of company deve...

Technology and the Mortal Kombat Video Game

In seven pages this paper analyzes the technology employed in the creation of the Mortal Kombat video game. Six sources are cited...

Mobil and Communication Through IT

In ten pages this report discusses how Mobil utilizes information technology for communication purposes. Nine sources are listed ...

Globalization, Technology, and Graphic Design

and the popular culture of mass communications. There has been a tendency to dismiss computer art as being in some way inferior to...

War Journalism and the Effects of Global Communication and New Technology

This paper examines how journalistic coverage of war has been affected by global communication and new technology in 15 pages. Fi...

Olympics and Impact of Technology

In five pages the Olympic Games are examined in a consideration of the impact of technology regarding communications, transportati...

Computer Advantages and Disadvantages

In five pages this paper discusses computer technology, its pros and cons, uses, and human genome project programs. Five sources ...

Notes on Marketing and Strategy

In eight pages this paper examines acquisition advantages over startup, Porter's Competitive Strategy, and the marketing effects o...

Business World and Changing Technology

In five pages corporate America is examined in view of the impact of technology changes with retail, banking, and entertainment in...

Travel Agencies and the Impact of Technology

In seventeen pages this paper examines how travel agencies are becoming increasingly influenced by Internet technology. Sixteen s...

'Mariners and Machines' by Lance Buhl Reviewed

In five pages the author's views regarding technology changes and social stratification are critically analyzed. There are no oth...

Resource Dependency Theory, Contingency Theory and Core Technology

over a great deal with social exchange theory and the study of politics in the workplace (Huczyniski and Buchanan, 2003). The use ...

External Environment And Dell

of software programs (Ransford et al, 2003). This is a very real threat to the company and something that needs to be considered. ...

The Dissemination and Marketing of Music from Tin Pan Alley to the Modern Day

publishing of magazines or stationary (Tawa, 1990). The main method of distribution involved composers approaching the publishers...

Basic Skills Initiative

2007). These are considered the foundation skills for success in college level education (Illowsky, 2007). The BSI itself is inten...

Abortion, Surrogacy and Men

providing women with more civil, political and social rights, the traditions of patriarchy and male control of reproduction still ...

Allocating Health Services

saving technology. This may seem cruel but the doctors and hospitals surely do not work for free and as such monetary issues are c...

The Importance of Fiber Optics

("Basic Principles of Fiber Optics," 2008). While there are many well known companies making use of fiber optics in telecommuni...

Video Surveillance and Stun Guns Should Not Be Used by Police

injury and even death. In some way, the police have a false sense of security in using these devices. Stun guns are thought to b...

Technology and Changes in American Culture

were large multi-branched entities and several generations typically lived under one roof. This was, in fact, a necessity in thes...

HEALTH CARE AND FUTURE TRENDS

that telemedicine is already having an impact on how healthcare is being delivered (Kohler, 2008). Kohler points out that technolo...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Adoption of Technology in Classrooms

so frequently that it is simply accepted as a maxim. However, data from the third annual "Teachers Talk Tech" survey, which was ta...

Analysis/Paterson Public Schools Tech Plan

which will provide teachers with "new student data management systems," and also provide "dynamic technology-based environments an...

Developing a Workshop

computer applications to gather and organize information and to solve problems" (NJDOE, 2006). Students should master the basic co...

CRACKING THE MURDER CASE

them that revenge isnt the best method here. Select the gangs leader and work with him. Potential Technology Uses In this...

Technology Criticized in A Connecticut Yankee in King Arthur's Court by Mark Twain

In six pages this paper examines how industrialization and technology are assailed by Mark Twain in this novel. Six sources are c...

Research Proposal for IT

In eight pages this paper discusses a research proposal that determines the most effective type of strategic planning for an organ...

Metaphysical Civilization And Its Discontents by Sigmund Freud

In fifteen pages this essay examines Freud's work in a basic overview and then offers a comparison between the society Freud was w...

Business and Future Communications Innovations

In ten pages this paper discusses present and future business in a consideration of the connection between business communications...