SEARCH RESULTS

YOU WERE LOOKING FOR :Military and Technology Uses

Essays 241 - 270

Criminal Sexual-type Conduct Data

There have been a number of laws passed and numerous court cases regarding sexual harassment in the workplace. These span more tha...

Technological Change and Diversity Q and A

with various religions and to some extent, one might say that it has affected normative behavior, values and attitudes within the ...

How Employees View Technology/A Research Proposal

jobs in the country continue to be filled by citizens of other nations. Though technological advances have made many of Saudi Ara...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Making Management Decisions and IS Technology

a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...

Case Study on Dubai Ports Authority

the Bill of Lading, the delivery order, and the bill of entry. Another major player in the situation was the Dubai Customers Depa...

Technology and Price Waterhouse Coopers

this set-up is that the SAP system stays Online while employees make the copy of what they need, which is a major time-saver (Stor...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

Security in Schools and Technology

in schools can solve all problems, but that it can be used to benefit schools if used properly: "National School Safety and Securi...

Culture and Technology of Price Waterhouse Coopers

company places emphasis on human capital and considers employees the companys assets. The many items included in the Code go abov...

Web Based Application Tool and Cross Platform Programming Language Known as Java

to view pages which contain applets and the applets code is transferred to their systems and executed by the browsers Java virtual...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

NCLB and AR Program

determining comparative success in educational. The NCLB has not only redirected educators to a "teach to the test" method for in...

IT Project Assessments

of scoring with the scores weighted to reflect the needs of the business. We will assess each individual and then compare the scor...

Case Studies In Technology and Management

may do this with more backing and market power, SMaL had to compete with Casio. It is then with this in mind a company has to deve...

Vulnerabilities of Windows and Possible Solutions to These Problems

a GUI or Graphical User Interface. While Windows had become increasingly popular for mainstream purposes, it was something that wo...

Changes in Advertising and Technology

Technology and Advertising Many large corporate advertisers are looking for ways to reach larger markets and to demonstrate...

Society and the Impact of Technoloyg

potential ramifications of cloning: "He believes that while it is impossible to accurately forecast what the psychological and soc...

IT and Systems Management

in mind when it comes to designing and implementing a system, as opposed to not doing so. While this might be a simplistic stateme...

Business and the Use of Technology

learn lessons from the construction trade where building can either develop or may be designed especially with the users in mind. ...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

History, Present, and Future of SQL

In five pages this paper discusses SQL in a consideration of its history, uses in the present, and the future promise it holds in ...

Diplomatic Organization and the Effects of Internet Technology

In eleven pages this paper examines diplomatic organizations in an assessment of Internet technology's pros and cons. Twelve sour...

Information Technology and Competitive Advantage

A literature review of information technology and how it can be used to acquire competitive advantage consists of five pages. Sev...