SEARCH RESULTS

YOU WERE LOOKING FOR :Modern Economic Globalization and Changing Technology

Essays 751 - 780

Electronic Monitoring Devices/Parolees and Prisoners

in prison (Biniok, 2004). They contend that the costs of electronic supervision are unacceptable, even that such supervision viol...

The Influence of Cultural Developments on Visual Art, from the Mid-19th to the Mid-20th Century

early twentieth centuries established themselves. What this means in terms of how those great philosophers looked at the broader ...

Managing the Information Technology Resource by Jerry N. Luftman Chapter Summaries

adopted, while the right-hand end of the curve depicts the period in which laggards adopt ET (Luftman 186). The next section of th...

Change Management Decision Making

means of the company. The solution for HHH appears to lie in greater automation of routine tasks including regulatory repor...

The Benefits of New Technologies on E-Commerce

1995 world wide only 1 financial institution had web banking, by 2002 this increased to 6,000 had this. In 1995 only 50 financial ...

Web 2.0/Wave of Corp. Future

have been posted by a university, an institution or a business firm and consist of a series of inter-linked pages (Belcher 34). We...

How the Diamond Age Contributes to the Philosophy of Technology

social class ended up in the hands of a poor girl. It was actually stolen by her brother who associated with a bad crowd. It is im...

Distance Learning Program Initiation

to the Online courses. There are also intangible resources that must be considered, such as faculty time. One expert commented: "...

Society and the Impact of Technoloyg

potential ramifications of cloning: "He believes that while it is impossible to accurately forecast what the psychological and soc...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Digital Technology's Pros and Cons

fact play a significant role in terms of the emerging 3G wireless appliances. It could in fact be that telephones could double as ...

SAS 99 Compliance and Lucent

financial information and balance sheet, its first a good idea to examine what, exactly, compliance means under Sarbanes-Oxley and...

Factors That Influence Strategic Implementation

that value is added to the customer and more custom gained. If a weakness is location then this may be the opportunity for change....

New Businesses, the European Union, and the IPPC

by the relevant regulatory bodies in each country. The approach is different in each country due to the principle of subsidiary. T...

3 Articles on IT Reviewed

In six pages this paper reviews 3 articles researching various information technology aspects such as new system development for t...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

International Economy and the Impact of New Technologies

In ten pages communications technology is the focus of this paper that considers how the global economy has been affected by the u...

Civil Engineering Applications of Computer Technology

In fifteen pages computer technology is examined within the context of its impact upon civil engineering in terms of operations an...

eCommerce

In ten pages this paper examines technologies such as secure site and encryption in a consideration of digital economy technologie...

Case Study of AMP Incorporated and Technology Management

In six pages this paper examines the technology management of AMP Incorporated in a consideration of Managing Technology by Lowell...