SEARCH RESULTS

YOU WERE LOOKING FOR :IBM Systems and Technology Marketing

Essays 271 - 300

Classrooms and the Obstacles to Technology Education

programs which are passive in nature, which equate to simple mouse clicks and button pushing did little to enhance the learning pr...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

A COMPARISON OF MEDICAL DATA SYSTEMS, NOW AND 20 YEARS AGO

is relying a great deal on up-to-date information systems and instantaneous information to ensure that patients can receive the be...

Overview of IT Systems Development

Some of the methodologies pointed out include STRADIS, IE, or information engineering, structured systems analysis and design (SSA...

The Function of Technology in a Grocer's IT System

peak hours, does it take longer for the customer to get through?). What role would a database play in this particular syst...

Technology and Applications Involved in Land Surveying

As will be elaborated on below, practically every resource manager is now familiar with the terms GIS and GPS and the capabilities...

Development of Automatic Speech Recognition Systems

who needs to be able to "talk" to his computer (Gallant, 1989). Gallant was writing in 1989, and there are more systems available...

The Use of the Clicker System

In a paper of eight pages, the author reflects on the use of technology in nursing education, specifically the use of a clicker sy...

Technology Implementation at SJMCH, A Case Study

This research paper presents a case study of the implementation of electronic technology at St. Joseph Medical Center at Houston, ...

Proposal Hospital Implement Electronic Management

Information technology plays a major role in mitigating different issues such as increasing demand, constrained resources, continu...

Security The Perimeter to the Innermost Recesses

whether it be private physical or commercial physical security is much more complex than it was just a few decades ago. Physical ...

Education and the Integration of Technology

as keeping track of grades and attendance records (Gray 2010). By the same token, at least 96% of teachers report the use of word ...

Requirement for a New IT System

involvement in the system, this will clarify the functionality requirements. Information will also be gathered from the users, suc...

Information System Case Studies

a greater advantage than ever before when it comes to project management and related processes. This is because these tools have t...

Choosing an Information Technology System

to evaluate the best course of action and to make the decision. This process may take seconds, or may take months, depending on th...

A Case of Trademark Confusion

properly! The development of trademark law was based on the desire to protect the interests of companies and to allow for distinc...

SOCIO-TECHNICAL SYSTEMS -- TELEBANK

In this day and age of technology, many companies are using the technology to monitor employees, even going so far as using comput...

Designing a Kiosk to Facilitate an Interactive Experience for Visitors to an Exhibition

from the proposal approval. The aim of this report is to identify suitable aspects of design for the kiosk and its installation,...

Riordan Information Technology Systems

is programmed in C . The Georgia facility also purchased software developed by vendor, but utilised a different vendor, with the s...

Proposal for a New Assessment Model Aimed at Analysis of Information Technology Use within a Firm

which an organisation competes. Porter (1985, p13) has designed two differing categories of competitive advantage; cost advantage ...

The Value of Customer Relationship Management for Web Based Retail Operations

and has only a few stores, but has found that the online retailing environment offers a large potential due to the lack of geograp...

Marketing Debates and A Marketing Plan

revenue and sales with a range of luggage, watches and even fragrances, but that this can be taken too far (Lane, 1998; 10). The p...

Home Health and Hospice Company Business Requirement Analysis

critical matters, employee requests for information often go unanswered for too long. Results can and have been employee frustrat...

Cafeteria Services Information Technology System Analysis

theft, especially when there is a large amount of exposure to non employees in the form of students. The risks of theft may be s...

Essays on Health Care

before, with the result that there is a "pill" for virtually any physical condition. Individuals taking any kind of ethical drug ...

Developing and Implementing IS and IT

IT and IS are accepted and adopted, The first tool to be used will be a PEST analysis. 2.1 PEST Analysis A PEST analysis looks ...

System Development Life Cycle and Information Technology

lead to the finished product; maintenance equates to the use of the finished product and ensuring it remains workable and useful t...

Vulnerabilities of Windows and Possible Solutions to These Problems

a GUI or Graphical User Interface. While Windows had become increasingly popular for mainstream purposes, it was something that wo...

MIS Case Study of Cathay Pacific Airways

2005). The company was initially headquartered in Shanghai but was subsequently moved to Hong Kong (Cathay Pacific Airways, About,...

Statement of the Problem of Managing Military Information Systems Technology

reliable and trustworthy information systems" (Wolthusen, 2004, p. 102). In fact, the development of military-based software and ...