SEARCH RESULTS

YOU WERE LOOKING FOR :Military and Technology Uses

Essays 301 - 330

Case Study on Dubai Ports Authority

the Bill of Lading, the delivery order, and the bill of entry. Another major player in the situation was the Dubai Customers Depa...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

How Employees View Technology/A Research Proposal

jobs in the country continue to be filled by citizens of other nations. Though technological advances have made many of Saudi Ara...

British Airways and IT

database, which was supported by both of the scenarios and arose due to this ling term planning. The culture of adopting and the...

Civil War and the Evolution of Warfare in Terms of Naval Power

in weaponry which were unveiled during this time. The evolution of projectiles, for example, had just moved weaponry from relying...

Relationship Marketing

publication, however, these all look at the relationship from the beginning ands the first interaction, either as a purchase or a ...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Development of Digital Rights Management

not give content providers absolute control over how users use their material, but it can place some prohibitions on specific uses...

Information Technology and Competitive Advantage

A literature review of information technology and how it can be used to acquire competitive advantage consists of five pages. Sev...

Flintknapping Stone Toolmaking

In eighteen pages this paper presents an overview of flintknapping stone toolmaking technology in a consideration of definitions, ...

Eli Goldratt's Necessary But Not Sufficient

his " Theory of Constraints Business" novels. The book itself focuses on a fictitious ERP software seller. The company used is a s...

Business and Information Technology

In five pages this paper explores the many business uses of information technology in a consideration of competitive advantage and...

Computer Advantages and Disadvantages

In five pages this paper discusses computer technology, its pros and cons, uses, and human genome project programs. Five sources ...

Postmodern Music

In five pages Farmclub and Napster are featured in a consideration of technology's impact upon contemporary music. Four sources a...

An Overview of Radar

This research paper offers an overview of radar, its history and its function. The writre also discusses uipdates in this form of ...

Outsourcing and the Pharmaceutical Industry

to expand their capacity for research and basically, to increase their overall productivity (Borchardt, 2000). The analysis fram...

The Technological Evolution of Computers

term was used broadly to reference any machine which handled data (even manual calculators and the like) (New York Public Library,...

Warfare of Early America and Technology

suited to fast action and hand-to-hand combat. The jineta saddle has short stirrups that cause the rider to bend his knees, allow...

Strategic Alignment and Communication Information Technology

In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...

Amazon.com, the Internet, and IT

In eight pages this paper examines the information technology uses of Amazon as a way of creating competitive advantage and also c...

19th Century British Industrialization and its Impacts on India, Ireland, and Technology in World War I

In 5 pages this paper discusses how British industrialization led to Ireland's terrible potato famine, India's railway constructio...

Web 2.0/Wave of Corp. Future

have been posted by a university, an institution or a business firm and consist of a series of inter-linked pages (Belcher 34). We...

Proposal for a New Security Model Using Integrated Circuit Card Embedded with User’s Biometrics

to the appearance of the person standing in from of them. Over time the change in what is and is not accepted as identifying and t...

Students and Using Credit Card Uses

a more accepting attitude of debt also indicates that this is resulting in the use of credit cards and higher than ever before cre...

The Societal and Industrial Transformation to Digital Television

U.S. households and the average number of hours devoted to the medium by each household make it the ideal medium for a number of a...

The Benefits of New Technologies on E-Commerce

1995 world wide only 1 financial institution had web banking, by 2002 this increased to 6,000 had this. In 1995 only 50 financial ...

HHH, Change Management, and Systems Thinking

Connected to the larger system, the hand is an integral part; separated from the system it quite literally is dead and fills none ...

AN ANALYSIS OF EMERGING TECHNOLOGIES

introduced, werent necessarily thought to have much of an impact at the time. For example, looking back on the printing press, we ...

EMERGING TECHNOLOGIES AND INFLUENCES

of technology. But technology is more than computers. The basic definition of technology is "the application of science, especiall...