SEARCH RESULTS

YOU WERE LOOKING FOR :Nobles Opposition to Technology

Essays 271 - 300

Civil Engineering Applications of Computer Technology

In fifteen pages computer technology is examined within the context of its impact upon civil engineering in terms of operations an...

International Economy and the Impact of New Technologies

In ten pages communications technology is the focus of this paper that considers how the global economy has been affected by the u...

Management Accounting and the Use of Technology

11 pages and 5 sources. This paper provides an overview of the major changes in management accounting that have extended from sig...

eCommerce

In ten pages this paper examines technologies such as secure site and encryption in a consideration of digital economy technologie...

Case Study of AMP Incorporated and Technology Management

In six pages this paper examines the technology management of AMP Incorporated in a consideration of Managing Technology by Lowell...

Uses of Technology in the Classroom

in order for the children of today to be "effective leaders and productive citizens" of tomorrow, they will require confidence in...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

The Technological Evolution of Computers

term was used broadly to reference any machine which handled data (even manual calculators and the like) (New York Public Library,...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Position of Lucent Technologies

This has resulted in a negative return on assets figure of -42.09%. This is an anomalous year as the figures for 2000 were more fa...

4 Areas of Operations Management

without excessive costs involved. Therefore, the first issue may be raw materials, but this will depend on the business and the ea...

Human Based Services Delivery

In eight pages the delivery of human care services are examined in terms of decision making, organizational structures, resource a...

Cathay Pacific Airways, Strategic Management and the Uses of Information Technology

In thirty pages this paper discusses Cathay Pacific Airways' uses of IT in strategic management with technology's direct and indir...

Business Practices and the Effects of Technological Changes

getting smaller, the culture had not yet moved to one that is essentially online, and technology was no where near where it is tod...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Mobile Phone Technologies and UMTS and GSM Comparison

places where such accessibility is not available. The separation between GMS technology and past applications is its distinctive ...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

Factors That Influence Strategic Implementation

that value is added to the customer and more custom gained. If a weakness is location then this may be the opportunity for change....

SAS 99 Compliance and Lucent

financial information and balance sheet, its first a good idea to examine what, exactly, compliance means under Sarbanes-Oxley and...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

New Businesses, the European Union, and the IPPC

by the relevant regulatory bodies in each country. The approach is different in each country due to the principle of subsidiary. T...

Small Businesses and the Value of IT

receptive to the idea. However, upon meeting with Margaret at JavaBooks, the nature of the business need for information technol...