SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology Role in Business Process Reengineering

Essays 1291 - 1320

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Wireless Future, 3G, and Europe

In thirty five pages this paper considers Europe and wireless technology's future in review of relevant literature, pro and con an...

Choices of Data Storage

In five pages data storage and its many choices are examined in terms of the data transfer, durability of storage capacity, and co...

Client Server Technology's 2 Phase Commit

In ten pages this paper discusses client server technology's 2 phase commit in an overview of how it functions, how it can be appl...

Postmodern Music

In five pages Farmclub and Napster are featured in a consideration of technology's impact upon contemporary music. Four sources a...

Diplomatic Organization and the Effects of Internet Technology

In eleven pages this paper examines diplomatic organizations in an assessment of Internet technology's pros and cons. Twelve sour...

Class Size Reduction and Technology

In eight pages this paper discusses whether instruments of technology technology are more important than class size with an argume...

Technology Uses in Accounting

In this paper consisting of six pages using technology to automate accounting procedures is examined by determining a correlation ...

Telemedicine Application of Network Architecture

In ten pages this paper discusses the telemedicine application possibilities of Lucent Technologies' WaveStar and LambaRouter and ...

Print Media Impact of Current Technologies

Not unlike other enterprise that relies upon a positive bottom line to remain competitive, small and large media companies alike a...

The Technological Evolution of Computers

term was used broadly to reference any machine which handled data (even manual calculators and the like) (New York Public Library,...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

SAS 99 Compliance and Lucent

financial information and balance sheet, its first a good idea to examine what, exactly, compliance means under Sarbanes-Oxley and...

Digital Technology's Pros and Cons

fact play a significant role in terms of the emerging 3G wireless appliances. It could in fact be that telephones could double as ...

Factors That Influence Strategic Implementation

that value is added to the customer and more custom gained. If a weakness is location then this may be the opportunity for change....

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

The Non-Neutrality of Technology

comes to dealing with the junk mail, both snail mail and email, that comes pouring into our homes, it is something else when the i...

Uses of Technologies in the 2008 Presidential Campaigns of Barack Obama and John McCain

encourage the sharing of videos on YouTube and Brightcove (Yadav). Early in his campaign, Barack Obama acknowledged the importanc...

The Concept of Learning

along the details of a high-profile news story that illustrates the person has discovered something he did not previously know. T...

Ports; the Impact of Changing Ship Technology

of many countries. However with the emergence of the mega ships the way this takes place will not be the same. Today there are shi...

Cognitive Psychology as a Neurological Framework

of cognitive neuropsychology finds its contemporary origins in the 1960s, there are famous cases in history that appear to substan...

Society and Technology

of political life" (1969, 55). Mesthene sees technology as detrimental and provides examples. For instance, cities have mass trans...

Electronic Commerce Trading Accessibility and Security Dichotomy

computer. Electronic commerce also includes buying and selling over the World-Wide Web and the Internet, electronic funds transfer...