SEARCH RESULTS

YOU WERE LOOKING FOR :Knowledge Management and Information Technology

Essays 361 - 390

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

Technology’s Impact in the Business World; Cause and Effect

with thee increased control that is given over the inventory. In many industries tools such as just in time inventory control are ...

Creativity and Innovation

of the sticky post it notes ma be seen as the creative use of an research project that initially had the aim of developing a new s...

Implications Of Implied Warranties In The Technology Sector

protect consumers from shoddy workmanship and defective products. The small print on the back of a package or bottom of a service...

Influences of IT on a Financial Services Company

This 4 page paper looks at information technology in financial institutions and considers influences such as the Sarbanes-Oxley, v...

Strategic Information Management; The Case of Tesco

groups and targeting the customers who would spend the most. The current loyalty scheme may be seen as the latest strategy to incr...

The Importance Of Metrics For Monitoring Organizational Performance

against previous performance, idea goals or best practice figures. Metric may be used in a variety of context, form use in single ...

Cognitive Science And Information Technology

ability to outreason and outlearn their human counterparts, leaving humanity open to an entirely unknown reality if that is ever t...

Lease or Buy?

This 3 page paper looks at two issues. The first assesses whether it is best to lease or buy equipment, the second considers issue...

Sainsbury; The Use of Information and Porters Five Forces Analysis

popular as it offered low prices for products of a good quality (Sainsbury, 2006). This initial success leads to more branches ope...

The Right Stuff & Technology

conquer it. The focus of the film changes when it shifts to dramatizing the successful launch of the Soviet Unions Sputnik and i...

Porter's 5 Forces Analysis & Value Chain - Retail Industry

companies. 3. Substitutes Products. Is it possible for a substitute product to capture the market? While it is always possible tha...

EDC and SLK Case Study

the management of the company, but by those who would be using system; in this case the accounts department, those who would be us...

Recruitment in the IT Sector

This 5 page paper looks at the challenges facing human resource managers when recruiting for information technology (IT) jobs. The...

Does Technology Improve Learning

classroom with state-of-the art technology, it must be worth the expense. Part 2. Examples of studies investigating this questio...

Advanced Practice Nurse And Informatics

Elderly, which requires a document signed by the doctor as well as certain health records to be faxed. Even though the same report...

Implementing New Technology; A Consideration Of Virtual Private Networks

be seen in a range of commercial and non commercial environment. One recent example has been the adoption of a VPN by the Honolulu...

Information System Case Studies

a greater advantage than ever before when it comes to project management and related processes. This is because these tools have t...

Requirement for a New IT System

involvement in the system, this will clarify the functionality requirements. Information will also be gathered from the users, suc...

Overview of Medication Errors

the University of California at San Diego, researchers analyzed over 62 million death certificates for the years 1979 through 2006...

KUDLER FINE FOODS: MARKETING, ADVERTISING, SALES - AND TECHNOLOGY

In other words, marketing involves everything from ensuring the right products are being offered to the right consumers, to ensuri...

SECURITY AT ST. JOHN’S HOSPITAL

isnt being seen - and read - by unauthorized personnel (such as the cleaning crew or perhaps the cleaning crews friends). The like...

RIORDAN MANUFACTURING: STRATEGIC IT FACTORS

Focuses on strategic information technology factors to be considered by Riordan Manufacturing when it makes its move from Hangzhou...

TERRORISM AND INFORMATION AND COMMUNICATION TECHNOLOGY: THE HOWS AND WHYS

Introduction On November 5, 2009, Nidal Malik Hasan, a major in the U.S. Army and a psychiatrist, entered his workplace, th...

Information Technology Infrastructure at Turk Heavy Transport

some unique need related to the implementation of a project; a task which often involves delivery of heavy or awkward equipment - ...

The Benefits of New Technology in the Classroom

are new and innovative ways in which information can be communicated between two or more parties. This not only applies to two fri...

SUNSWEET, TECHNOLOGY AND LOGISTICS

There is little doubt that todays supply chain is becoming very complex and multifaceted. This is a result of consistent outsourci...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

The Strengths and Future of Betfair

technological development and procurement (Porter, 1985). These support activities may relate to more than only one section of the...