SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories And Technology

Knowledge Management and the Roles of ICT and Social Processes

which interaction takes place and arte key to the formation of culture within an organization. Social process take place regardles...

U.S. Toothpaste Market and Colgate Palmolive

application of technology that first brought Colgate into the toothpaste market when they were the first to mass production toothp...

Article Review on Miami's Project CHILD Program and Technology

non-participation. The independent variables for this study were the outcomes of student performance relative to standardized tes...

Process Digitalization Through Computers as Employed by Kirwin Brewery Company

practical, but when firms use inventory, it is quite practical. The toy industry comes to mind because there is such a great deal ...

Comparing Marathon Oil and Valero Energy

5,000 retail outlets that the company does not own. The company has a total level of 22,068 employees and with an income...

U.S. and the Effects of Identity Theft

first arrests of its kind when the FBI successfully captured a large group of Milwaukee hackers known as 414s, whose infiltration ...

Literature Review of Mathematics Distance Learning

schools and colleges have worked collaboratively to support the introduction of online instructional models. In California school...

Description of Susan Getting Her Realtor License

Durham, North Carolina educational services firm as data processing manager. She had only four programmers - the entire IT depart...

Indian Company MphasiS BFL Limited

acquiring MphasiS, such as system integration expertise, blue chip customers, like Citibank, Charles Schwab, Morgan Stanley Dean W...

Criminal Justice, Law Enforcement, and the Impact of Technology

has developed over the past decade. Even more prevalent than in-field computer systems is the vast computer resources whi...

Accounting Profession and the Effects of Information Systems

however, technological accounting functions were mainly stand-alones - they werent a whole lot different from the old by hand ledg...

Classroom Technology and Research into Brain Function

prunes connections based on experience." The cycle is "most pronounced between the ages of 2 and 11, as different development are...

Students with ADHD and Educational Strategies

can be cared to asking the student what steps they need to take to complete the assignment (Salend, Elhoweris and Garderen, 2003)....

Technology and Visionary Design Systems

planning in the manufacturing sector. Product Data Management (PDM) was created in the 1980s as a means of storing CAD document...

Film Industry and Technology

Though the request for this paper was to focus on technology in film during the past 50 years, no paper on this would be complete...

WLAN Weaknesses in Security

A wireless LAN uses radio technology in order to transfer the data between the different terminals (Cisco, 2003). Institutions suc...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Competitive Advantage and Southwest Airlines

the U.S. Department of Transportation gave a name to the phenomenon - the Southwest Effect (Southwest, 2003). It refers to the con...

5 'Golden Threads' and Their Implications

and Shared Minds Implications for business are clear. All of these threads weave together in the effective organization to...

K through 12 Instructional Technology

best for them. * Provides a "full picture" result that standard approaches may not be capable of illustrating meaningfully....

Management Information Systems and the Credit Card Industry

style of credit cards, all the way to redeeming award points summary online, a service offered by Citibank both in Malaysia and in...

National Security and the Important Role of Technology

example of why the United States needs a national security strategy for technology. There are hundreds more. Since the Sep...

Brief Company Analysis of Vermont Teddy Bear Co.

sees the companys competitors not as other toy or plush doll/animal companies but as companies who sell greeting cards, chocolates...

Business Process Reengineering and Information Technology

has come to embrace a more enlightened perspective with regard to addressing the ever-changing needs of commercial interchange, wi...

Bear Gram and the Vermont Teddy Bear Co.

to protect against the fall in sales due to economic factors. The company started in 1981, and have grown by using differentiati...

Information Age and Social 'Technophobia'

who created the buggy whip? Many believe that technophobia is a modern syndrome, but in fact, it is not. During the Indust...

Virtual World and Electronic Commerce

quite sophisticated and "a large number of potential users may interact with each other" (Shen, Radakrishnan and Georganas, 2002; ...

Global Mobile Phone Industry Overview

Jolly (2002) also reports that there were an estimated 150 million cellular telephone subscribers in China. There is some disagre...

Classrooms and the Obstacles to Technology Education

programs which are passive in nature, which equate to simple mouse clicks and button pushing did little to enhance the learning pr...

Disruptive Wireless Internet Technology

business model that only offers low profit margins (Van Horn, 2002). When it first comes out, nobody wants it (2002). It is not li...