SEARCH RESULTS

YOU WERE LOOKING FOR :Managerial Control Removed by Workplace Technology

Essays 331 - 360

Formal Decision Making Processes

friend and I in particular had what we viewed as a stellar business idea. It had been suggested to us that we might prefer to stri...

THE IMPORTANCE OF MANAGEMENT ACCOUNTING IN THE DECISION-MAKING PROCESS

turn, helps implement decisions (Topor et al, 2011). This can especially be important if a company relies on certain types...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

Society and Technology

of political life" (1969, 55). Mesthene sees technology as detrimental and provides examples. For instance, cities have mass trans...

Factors That Influence Strategic Implementation

that value is added to the customer and more custom gained. If a weakness is location then this may be the opportunity for change....

SAS 99 Compliance and Lucent

financial information and balance sheet, its first a good idea to examine what, exactly, compliance means under Sarbanes-Oxley and...

Digital Technology's Pros and Cons

fact play a significant role in terms of the emerging 3G wireless appliances. It could in fact be that telephones could double as ...

Choices of Data Storage

In five pages data storage and its many choices are examined in terms of the data transfer, durability of storage capacity, and co...

Wireless Future, 3G, and Europe

In thirty five pages this paper considers Europe and wireless technology's future in review of relevant literature, pro and con an...

Strategic Alignment and Communication Information Technology

In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...

Client Server Technology's 2 Phase Commit

In ten pages this paper discusses client server technology's 2 phase commit in an overview of how it functions, how it can be appl...

Electronic Monitoring Devices/Parolees and Prisoners

in prison (Biniok, 2004). They contend that the costs of electronic supervision are unacceptable, even that such supervision viol...

The Influence of Cultural Developments on Visual Art, from the Mid-19th to the Mid-20th Century

early twentieth centuries established themselves. What this means in terms of how those great philosophers looked at the broader ...

The Technological Evolution of Computers

term was used broadly to reference any machine which handled data (even manual calculators and the like) (New York Public Library,...

Special Interest and Courses Description

include the subject of your research?] This course teaches the student not only how to conduct research but how to read it. ETEC 0...

Uses of Technology in the Classroom

in order for the children of today to be "effective leaders and productive citizens" of tomorrow, they will require confidence in...

Position of Lucent Technologies

This has resulted in a negative return on assets figure of -42.09%. This is an anomalous year as the figures for 2000 were more fa...

Mobile Phone Technologies and UMTS and GSM Comparison

places where such accessibility is not available. The separation between GMS technology and past applications is its distinctive ...