SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology Uses by Managers

Essays 2071 - 2100

Discussion of Biometric Security Measures

In a paper consisting of seven pages scanning technologies of iris, finger, retina, and hand along with their applications are con...

Government Involvement and Laws of Technology Transfer and Intellectual Property Rights

In twenty five pages this report discusses the government's invovlement in protecting intellectual property in a consideration of ...

U.S. Politics and the Impact of Technology

In five pages this paper discusses the problems associated with the U.S. presidential election of 2000 in this consideration of th...

Technical Processes and DSL Technology

In twelve pages DSL technology is defined and examined in terms of various types, process, positive and negative DSL factors along...

Jordan's Changing Technology

In six pages this paper examines changing technology and how Jordan's culture has been affected. Five sources are cited in the bi...

Case Study on Mobil and Order Processing Technology

In eight pages the Total Quality Management approach to order processing systems' technology by Mobil is the focus of this student...

Appendicitis and CT Scans

of Computerized Tomography Scans (CT) in diagnosing abdominal conditions is highly debated. Baker emphasizes that the procedure p...

Technology and Application of Rapid Prototyping

any time in the past, a trend that is only expected to continue for the next several years. Competitive advantage is a quality th...

Workplace Technology and its Negative Aspects

In five pages this paper examines the negative impacts of workplace technology in a consideration of piracy and hacking problems a...

The Changing Nature of Health Care in the U.S.

expected only to continue for several years to come. Then, growth will begin to decline in response to fewer numbers of people re...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

Ethics and Technology

software to weed out spam, and rules to assure that company employees are not engaging in unsavory practices, but many firms are u...

TECHNOLOGY CHANGE AND UNDERLYING FACTORS

be involved as end-users, this will need to be taken into account in terms of training, as well as the amount of resources dedicat...

DHL and RFID Technology

money. Customs officials could then link directly to the information databases of the manufacturers of the products that have been...

Wal-Mart SWOT Analysis

as mentioned earlier is one of those strengths. Wal-Marts brand is based on value for ones money, convenience and the number and v...

Folding@Home

this folding issue do not get shared. This scientist created a software program that can link computers together, basically crea...

Language And Syllogisms

and the Internet could well be viewed as a foreign language. For example, consider the word mouse which is a creature, and undesir...

Influences on Management Functions in McDonalds

corporate level, but also a store level, when planning the staffing rotas. Internal influences may come from individual employees ...

Working from Home and Internet Technologies

Although some Internet service providers (ISP) offer telecommuting packages, Blodgett and Girard point out that "they really cant ...

Oil Industry's Changing Technology

In twelve pages this paper examines how the oil industry changed in the 20th century due to such technology as satellites, compute...

The Changes in the Aviation Industry Since the Seventies

In a paper consisting of six pages the major changes affecting the aviation industry since the 1970s most notably deregulation are...

A Risk Management and Derivatives Case Study

This paper is a case study examining Link Technologies and how they utilize derivatives and risk management. This five page paper...

Frankenstein, Technology, and Society

In 8 pages this paper discusses scientific and social responsibility in a consideration of technology. There is 1 source cited in...

Jeremy Bentham's 'Panopticon,' Michel Foucault, and Power

intention, Michel Foucault in "Discipline and Punish" (DP) has pointed out that in actual application, the Panopticon became more ...

The Pyramid Building of Ancient Egypt and the Beginnings of Engineering, Technology, and Cultural Dynamics

machines constructed of short pieces of wood; from the second tier the stones were raised by a similar machine to the third; and s...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Technologies and Service Quality

In twenty pages this paper considers LAN and WAN technology systems in terms of service quality with network systems and risk asse...

TECHNOLOGY AND ISOLATION: TRUTH OR NOT?

technology is putting people in touch with strangers on the other side of the world, its also taking away "face time" from family ...

The Value of Podcasts and RSS Feed in the Research Act

older formats, such as printed formats, video or radio. Pod casts are already being used by some universities in the United States...

Technology and the Criminal Justice System

and foremost, its reliability for identification purposes (Technology and Human Values, 1997). In addition, it is widely used and...