SEARCH RESULTS

YOU WERE LOOKING FOR :Overview of Emerging Technologies

Essays 1621 - 1650

The Promoting of Safety in the Work Place

switch the robot off before doing so (Trust me, 2006). While robots exhibit what is know as A.I., that is "artificial intelligence...

Information Technology and Management at EasyJet

in with the strategy and the people who use it. It is only by appreciating the technological environment within EasyJet as a whole...

External Environment And Dell

of software programs (Ransford et al, 2003). This is a very real threat to the company and something that needs to be considered. ...

The Humanities

is all very fine, but why bother to study him when we could be learning computers? Because studying the humanities gives us insigh...

A Short History of Progress - Or Lack Thereof

past, we can use it to predict what our likely future is, and that should give anyone pause, for our past is not particularly whol...

Truman Proclamation/Continental Shelf

over activities off its shores," which pertain to the utilization of these resources (Truman). Having laid out the rationale for...

CUSTOMER RETENTION IN THE MIDST OF TECHNOLOGY CHANGE

is available to its customer base 24/7. And theres a cost savings to such technology as well (Del Franco, 2007). The problem occur...

Management Functions Based on Personal Experience

been planned may not be accessible. In this instance, nothing is really lost. Plans that have been made can be recalled by memory,...

Transitions at Yahoo

a surprise. When it comes to technology, almost all businesses are affected in this day and age. Even old-fashioned accounting and...

Cyberspace Crimes and the Law

offences and the law has not been able to keep pace with new technology. With law enforcement lagging behind, cyber criminals some...

Thermal Imaging, Satellite Surveillance, and Privacy Issues

areas in the picture appearing lighter and colder areas appearing as dark areas (Colbridge, 2001). The question of whether or no...

Technological Innovations Between 1930 and 1944

time was use of carbon paper to make several copies of the same document. If Carlson was to get additional copies of patented expe...

Wal-Mart Porter Analysis & Value Chain

two-thirds of which are in the U.S. (Biesada 2006). Besides its own stores, Wal-Mart holds a majority position in Seiyu, Co., Ltd,...

Future Trends in Technology

whether that change is in "information technology (IT), biotechnology, or such emerging fields as nanotechnology" (Karoly and Pani...

Eastern Europe's Musical Cultures and the Effects of Modern Technology

Europe prior to the end of communism. In what was once Yugoslavia, for example, Belgrade was a center for rock and roll and popul...

Fahrenheit 451 by Ray Bradbury

In six pages this paper examines the author's purpose for his contrasts of human expression and technology in the futuristic novel...

An Analysis of The Creature in Mary Shelley's Frankenstein

draws from his experience. His first introduction to fire, for example, results in his knowledge that the same element that can p...

Dark Future in the Science Fiction Novel Neuromancer by William Gibson

In nine pages this paper examines how technology can lead society into a dark dystopia in an analysis of William Gibson's Neuroman...

Technology and Public Interest Law

In five pages this paper discusses technology uses as they apply to public interest law with background and history also included....

Internet and Electric Utilities

In five pages this research paper examines the marketplace and influence of recent legislation with Internet technology allowing u...

England's Industrial Revolution and Child Labor

This paper addresses various aspects of England's Industrial Revolution. The author examines new technologies, factory conditions...

US War Technology from 1770 to 1870

the Revolutionary war, but not used until the War of 1812 (Wright, 1991, p. 519). A lack of interest in building war technology...

Information on Heart Disease

In seven pages this paper contains relevant information on heart disease and includes endocardial disease, myocardium and pericard...

Prospective Payment System and Diagnosis Related Groups

In five pages the increasing costs of U.S. medical care is the focus of this paper that discusses diagnosis related groups and a p...

National Security and the Important Role of Technology

example of why the United States needs a national security strategy for technology. There are hundreds more. Since the Sep...

Business Process Reengineering and Information Technology

has come to embrace a more enlightened perspective with regard to addressing the ever-changing needs of commercial interchange, wi...

Bear Gram and the Vermont Teddy Bear Co.

to protect against the fall in sales due to economic factors. The company started in 1981, and have grown by using differentiati...

Project Management and New Technologies

As the show demonstrated back then, wireless technology would become the most important technology in the field of communications....

Food Production and Gene Technology

that can produce food which is argued to offer many benefits to people, and the planet. "This includes foods with better nutrition...

Online Security

confidential information, hackers have found other ways to make trouble. In February of 2000, a Michigan-based medical products f...