SEARCH RESULTS

YOU WERE LOOKING FOR :National Security and Use of Technology

Essays 151 - 180

How Economic Considerations and Doctrine Influence Military Innovation

tactical assumptions as unrealistic (Murray and Millett 1996, 29). Instead of composing a doctrine for the future, which would ha...

Connection Between Government Policy and Technology

as other, apparently unrelated policies that have an indirect effect and can either support or undermine the technology policies. ...

Overview of 'Fannie Mae'

would otherwise be unable to qualify for a mortgage loan to do so (Hoovers, 2003). In short, Fannie Maes core mission is to make h...

National Air Space System Improvements

In five pages system improvements for National Air Space are discussed in a historical overview and consideration of WAAS and LAAS...

National Sovereignty and the Impact of Technology

power to be more equally distributed. At the same time technology allows the more equal distribution of political ideology and ul...

United Kingdom's Airline Industry and External Influences

flights may have local regulations to deal with, for example, at Stansted any flights that take off after eleven oclock at night w...

Porter's Diamond of National Advantage and Japan's Development

supporting industries and last the firm strategy and rivalry (Porter, 1999, Weller, 1999). Just as with any model the accuracy wil...

Creating Value With Supply Chain Integration

In 2002 the National Institute of Standards and Technology estimated that in the US alone more than $1 billion a year could be sa...

Banking Industry and IT

In five pages this paper considers commercial banking and the contributions of information technology with a discussion of such to...

Financial Management and Technology

In five pages this paper discusses how business finance applies technology in a consideration of virtual accounting and also analy...

Wearable Technology For Crime Scene Investigations

of 2005 to determine "the most critical technology needs for law enforcement" (International Association of Chiefs of Police, 2005...

Aviation Maintenance

mobile offices" (Pryma, 2002, p. NA). The portability of the laptops allows maintenance workers to bring them on the plane, if the...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

3 Articles on IT Reviewed

In six pages this paper reviews 3 articles researching various information technology aspects such as new system development for t...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Research and the Value of Educational Technology

In a paper of nine pages, the writer looks at educational technology. The importance of planning and evaluation in the use of tech...

VoIP in the Commercial Environment

The writer looks at the potential value that may be realized by a firm implementing VoIP technology to save costs on telecommunic...

Communication and Technology

In a paper of six pages, the writer looks at communication and technology. The diminishing of interpersonal communication as a res...

Security The Perimeter to the Innermost Recesses

whether it be private physical or commercial physical security is much more complex than it was just a few decades ago. Physical ...

Architecture - Technology and Art

form of structure, function, and aesthetics. This paper will explore how the evolution of technology has influenced the evolution ...

The Adoption of Technology by Senior Citizens

In a paper of seven pages, the writer looks at technology use by senior citizens. Adoption of technology is examined through the d...

Technologies for Learning Disabled Students

2010 study of more than twenty Turkish university students indicated that there was a direct correlation between students percepti...

Technology's Impact on Data Exchange

organizations to ensure the safety of information. Though the precise future evolution of the Internet is difficult to predict, t...

SECURITY AT ST. JOHN’S HOSPITAL

isnt being seen - and read - by unauthorized personnel (such as the cleaning crew or perhaps the cleaning crews friends). The like...

The Intersection of Language and Culture

it seems that with the increased number of brands and corporate identities that have arisen because of the internet, its happening...

Communication Mode Decisions for Education Deaf Students

an entirely different framework by which progress is judged. As it can be difficult to regulate such matters, South Australia has ...

The Health Care Industry and Information Technologies

field and industry out there it is important for organizations and businesses to keep up to date. It is surprising that the health...

Criminal Justice System and the Effects of Technology

details. Digital enhancement of such evidence has made the retrieval and identification of even the tiniest and most illegible ev...

Can Computer Crime Be Effectively Fought?

attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent ba...

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...