SEARCH RESULTS

YOU WERE LOOKING FOR :Military and Technology Uses

Essays 331 - 360

Postmodern Music

In five pages Farmclub and Napster are featured in a consideration of technology's impact upon contemporary music. Four sources a...

An Overview of Radar

This research paper offers an overview of radar, its history and its function. The writre also discusses uipdates in this form of ...

Strategic Alignment and Communication Information Technology

In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...

Amazon.com, the Internet, and IT

In eight pages this paper examines the information technology uses of Amazon as a way of creating competitive advantage and also c...

Eli Goldratt's Necessary But Not Sufficient

his " Theory of Constraints Business" novels. The book itself focuses on a fictitious ERP software seller. The company used is a s...

Business and Information Technology

In five pages this paper explores the many business uses of information technology in a consideration of competitive advantage and...

19th Century British Industrialization and its Impacts on India, Ireland, and Technology in World War I

In 5 pages this paper discusses how British industrialization led to Ireland's terrible potato famine, India's railway constructio...

How the Diamond Age Contributes to the Philosophy of Technology

social class ended up in the hands of a poor girl. It was actually stolen by her brother who associated with a bad crowd. It is im...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

How Employees View Technology/A Research Proposal

jobs in the country continue to be filled by citizens of other nations. Though technological advances have made many of Saudi Ara...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Making Management Decisions and IS Technology

a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...

Technological Change and Diversity Q and A

with various religions and to some extent, one might say that it has affected normative behavior, values and attitudes within the ...

British Airways and IT

database, which was supported by both of the scenarios and arose due to this ling term planning. The culture of adopting and the...

Civil War and the Evolution of Warfare in Terms of Naval Power

in weaponry which were unveiled during this time. The evolution of projectiles, for example, had just moved weaponry from relying...

Outsourcing and the Pharmaceutical Industry

to expand their capacity for research and basically, to increase their overall productivity (Borchardt, 2000). The analysis fram...

The Technological Evolution of Computers

term was used broadly to reference any machine which handled data (even manual calculators and the like) (New York Public Library,...

Warfare of Early America and Technology

suited to fast action and hand-to-hand combat. The jineta saddle has short stirrups that cause the rider to bend his knees, allow...

Development of Digital Rights Management

not give content providers absolute control over how users use their material, but it can place some prohibitions on specific uses...

Relationship Marketing

publication, however, these all look at the relationship from the beginning ands the first interaction, either as a purchase or a ...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Technology and Price Waterhouse Coopers

this set-up is that the SAP system stays Online while employees make the copy of what they need, which is a major time-saver (Stor...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

Security in Schools and Technology

in schools can solve all problems, but that it can be used to benefit schools if used properly: "National School Safety and Securi...