SEARCH RESULTS

YOU WERE LOOKING FOR :National Security and Use of Technology

Essays 181 - 210

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...

Home Lifestyle Changes Due to Computers

make life so much easier. Anymore, there is no reason to slave over a hot stove when one can come home from work with a hot, nour...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Online Security

confidential information, hackers have found other ways to make trouble. In February of 2000, a Michigan-based medical products f...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Analysis of the Internet's Past, Present, and Future

was no such thing as an Internet. In fact, the term "Internet" wasnt widely used until 1982 (PBS Online, 1997). The term itself, ...

21st Century Database Management

in large companies this is a monumental task. In older times, when companies were reliant on a paper trail, the work was not as da...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

Discussion of Biometric Security Measures

In a paper consisting of seven pages scanning technologies of iris, finger, retina, and hand along with their applications are con...

Client Server Technology's 2 Phase Commit

In ten pages this paper discusses client server technology's 2 phase commit in an overview of how it functions, how it can be appl...

Airline Passengers and Biometric Security Measures

since the days of Perry Mason of "The Untouchables." Biometrics are at the foundation of personal identification. They are the mea...

Cathay Pacific Airways, Strategic Management and the Uses of Information Technology

In thirty pages this paper discusses Cathay Pacific Airways' uses of IT in strategic management with technology's direct and indir...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Overview of Security Fraud and Protection

beating the clock and waiting in long lines are becoming a thing of the past. There is no question that the concept of Electronic...

Banking Industry and Electronic Security

type of cryptography (2000). The Mississippi Secretary of States office for instance describes a digital signature as "a computer-...

3 Articles on IT Reviewed

In six pages this paper reviews 3 articles researching various information technology aspects such as new system development for t...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Influences of IT on a Financial Services Company

This 4 page paper looks at information technology in financial institutions and considers influences such as the Sarbanes-Oxley, v...

Power Plants in Texas

alternative new technology plants cost 20% more to build that these models. With any form of energy production there are differi...

Wearable Technology For Crime Scene Investigations

of 2005 to determine "the most critical technology needs for law enforcement" (International Association of Chiefs of Police, 2005...

Aviation Maintenance

mobile offices" (Pryma, 2002, p. NA). The portability of the laptops allows maintenance workers to bring them on the plane, if the...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

VoIP in the Commercial Environment

The writer looks at the potential value that may be realized by a firm implementing VoIP technology to save costs on telecommunic...

Communication and Technology

In a paper of six pages, the writer looks at communication and technology. The diminishing of interpersonal communication as a res...

Research and the Value of Educational Technology

In a paper of nine pages, the writer looks at educational technology. The importance of planning and evaluation in the use of tech...

The Adoption of Technology by Senior Citizens

In a paper of seven pages, the writer looks at technology use by senior citizens. Adoption of technology is examined through the d...

Architecture - Technology and Art

form of structure, function, and aesthetics. This paper will explore how the evolution of technology has influenced the evolution ...

Security The Perimeter to the Innermost Recesses

whether it be private physical or commercial physical security is much more complex than it was just a few decades ago. Physical ...

National Security Council's History and Origin

In twelve pages the NSC is examined in terms of its origin, the role played by President Harry S. Truman, and its controversy. Se...