SEARCH RESULTS

YOU WERE LOOKING FOR :New Media Technologies and Their Cultural Implications

Essays 691 - 720

Client Server Technology's 2 Phase Commit

In ten pages this paper discusses client server technology's 2 phase commit in an overview of how it functions, how it can be appl...

Strategic Alignment and Communication Information Technology

In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...

Postmodern Music

In five pages Farmclub and Napster are featured in a consideration of technology's impact upon contemporary music. Four sources a...

Human Based Services Delivery

In eight pages the delivery of human care services are examined in terms of decision making, organizational structures, resource a...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Cathay Pacific Airways, Strategic Management and the Uses of Information Technology

In thirty pages this paper discusses Cathay Pacific Airways' uses of IT in strategic management with technology's direct and indir...

Business Practices and the Effects of Technological Changes

getting smaller, the culture had not yet moved to one that is essentially online, and technology was no where near where it is tod...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Technology Uses in Accounting

In this paper consisting of six pages using technology to automate accounting procedures is examined by determining a correlation ...

Diplomatic Organization and the Effects of Internet Technology

In eleven pages this paper examines diplomatic organizations in an assessment of Internet technology's pros and cons. Twelve sour...

Class Size Reduction and Technology

In eight pages this paper discusses whether instruments of technology technology are more important than class size with an argume...

Telemedicine Application of Network Architecture

In ten pages this paper discusses the telemedicine application possibilities of Lucent Technologies' WaveStar and LambaRouter and ...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

Organizational IT Growth and Management

In five pages this paper examines an information technology's growth and management and considers how success is dependent upon le...

DaimlerChrysler and IT

In seven pages DaimlerChrysler and Daimler Benz are examined in a consideration of information technology's benefits, challenges, ...

Integrated Technology and Smart Business

is used, technophobes may be scared of the impact it will have; such as disempowering employees and eliminating jobs. Others may s...

Law Enforcement Technology in the 21st Century

- protection from injustice - focuses on protecting the individuals rights and is usually called the Due Process Model (Perron). T...

Wearable Technology For Crime Scene Investigations

of 2005 to determine "the most critical technology needs for law enforcement" (International Association of Chiefs of Police, 2005...

Wal-Mart; The Impact of the External Environment - Technology

are made and supplied. The internet and the communications technology have increased the potential to find suppliers in many count...

Using Technology to Manage Ethics

point is valid. He asks his listeners to consider a situation in which the government "eliminates" someone; if a person were to ac...

Fremont Technology Plan and Enhancing Education through Technology Grant Program

the district; 3. to create a list of benchmarks and a specific set of obtainable dates for the implementation of new hardware, in...

MySpace: An Invisible World Flattener

other nations (the U.S. and Western Europe, as mentioned) are sitting back relaxed, not paying attention to the destruction of the...

Technology Helps Companies Become Global

call for tech support knows that they will likely be talking with someone in India. Outsourcing tech support to small companies in...

The Societal and Industrial Transformation to Digital Television

U.S. households and the average number of hours devoted to the medium by each household make it the ideal medium for a number of a...

HHH, Change Management, and Systems Thinking

Connected to the larger system, the hand is an integral part; separated from the system it quite literally is dead and fills none ...

Managing the Information Technology Resource by Jerry N. Luftman Chapter Summaries

adopted, while the right-hand end of the curve depicts the period in which laggards adopt ET (Luftman 186). The next section of th...

How the Diamond Age Contributes to the Philosophy of Technology

social class ended up in the hands of a poor girl. It was actually stolen by her brother who associated with a bad crowd. It is im...