SEARCH RESULTS

YOU WERE LOOKING FOR :Management of Technology

Essays 1681 - 1710

The Development of the Fyborg

situations in terms of past experiences. Capra (1997) refers to this pattern as the "Computer Model of Cognition" (p. 65), ...

Asymmetrical Threat Assessment Through Geospatial Applications

"decision support tool " for those who work in the field of homeland security. It tells an observer where someone is, who he is as...

Past and Present Artificial Intelligence

right now. AI is still in its infancy. However, as an application toward various processes, for example, the gaming industry, it i...

2025 Organizations

is likely to be smaller, from the standpoint of square footages. With employees being able to connect with companies via intranets...

Critical Response to the Film The Gods Must Be Crazy

anthropological data on this tribe, it is impossible to say precisely where this assessment errs, but err it must, simply because ...

British Gas Services Organization and Economic Environment

of a business like this, where some calls may require a rapid response, whilst others are less urgent and can be booked a long way...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Information on Corporate Structure

in a corporate charity or non-profit organization) or to obtain a profit based on a product or service that the market definitely ...

Analyzing Oliver Parker's Film Version of Othello

military prestige and marriage to a well-to-do Caucasian, was little more than a savage who was ultimately enslaved by primal pass...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

Investment Target Selection

company, but it is likely that IBM will be able to attain growth at lease equal to that of last year Figure 1 provides a view of ...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

An Analysis on an Article About Caring and Science

lawyers, uncaring nurses and pedophile clergy is to cut back on scientific research--a tenuous conclusion at best. Where the art...

Computer Age and Information Ethics

technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of computerized ...

Ford Motor Company and IT

than the company could go without IT. It is a claim that is quite logical as even ordinary individuals with a computer realize tha...

Marine Vessel Diesel Engines and Selective Catalytic Reduction

have the edge on other more expensive technologies. The Problem: Emissions Most large engines, such as exist in marine vessels...

Implications of the Sarbanes-Oxley Act

of the marketplace by big business (Bittlingmayer, 2002). Catanzaro (2000) accuses President Richard Nixon of using antitrust law ...

Philosophy Paper Sample on Junger, Zola, Dostoyevsky, and Nietzsche

been warriors but are now too docile for their own survival. Those who are poor are not poor because of the system, but are poor b...

Wi Fi Network Selection and Integration

and professional journals, academic reference books and the internet. The development of wireless networks have been aided with...

Overview of 'Designer Babies'

In eight pages this paper considers the issue of 'designer babies' or babies who have been genetically manipulated in order to emb...

Platform Game PACT Analysis

a mixture of male and females, but with a skew to males as these are the dominant user group. However, where the platform has the ...

Revolution Known as the Internet

their own by virtue of in-class Internet instruction. One of the most prevalent ways in which the Internet has changed the way to...

A Review of How Computers Work

and experts alike will find this book useful. It is mostly geared, however, to the user not to the computer repair technician but...

Strategy and Position of Cisco Systems

In this paper, well provide proof that Cisco knows what its doing by comparing its activities to that of one of its closest compet...

Forensic Science and DNA Testing

RFLP is no smaller than a quarter, while with PCR Analysis the sample can be no bigger than a few skin cells. This seemingly insi...

Supply Chain and Radio Frequency Identification Contributions

area of study sees an application in several contexts, goods in the supply chain may be working capital for a company, and as such...

Manuel Castells' IT Theory Evaluation

internet is the centre of communications and social function for society from social communications to the conducting of commerce....

Case Study of Eastern Power Company

allowing bill payment online as well as facilitating complaints or communication with customer services by e-mail. However, these ...

Philosophy of Learning According to Seymour Papert

that Piagets theory of child development is "so simple that only a genius could have thought of it." Piaget, very simply, proposed...

Comparison of 'Declaration of a Heretic' by Rifkin and 'The Existential Pleasures of Engineering' by Florman

order for work to be appropriately "subdivided into highly specialised, routine tasks."3 As enthusiastic as Florman (1996) is a...