SEARCH RESULTS

YOU WERE LOOKING FOR :Peer to Peer Technology

Essays 1801 - 1830

Case Studies on the Integration of Technology

to Point B overnight. Where FedEx has led the way is in the area of value add, in other words, using technology to help provide mo...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

Women's Rights and the Impact of Technology

little time for themselves, or to think about doing anything rather than staying ahead of what needed to be done. Because ...

Modern Economic Globalization and Changing Technology

part of the globalisation process over the last fifty years this is supported by the way the actual output increase has remained c...

Signage Industry and Applied Technology

the meaning and context of the written word (Calnon, 2004). When this purpose is accomplished successfully, it attracts attention ...

Technology and Trends in E-Marketing

has introduced customer relationship management as a way to build and maintain markets. In this paper, well examine some fa...

Technology and Organizational Change

The authors have pointed out that the conventional research of the time had worked toward obtaining evaluations of other proposals...

ICT School Strategies Development

tackled by many studies. The concept of the digital divide with the technically able and the technical unable creating a social an...

Social Issues and Robots

(Isom). Skipping ahead passing other inventions, we find that in 1898, Nikola Tesla built and demonstrated a robot boat that was r...

Business, Technology, Science, and The Bible

and those regarding the sciences, technology, and business. The difference is that although we "sense" our religious beliefs we d...

IT and the Implications of Outsourcing

results, the National Health Service in the UK has outsourced many services to a high level of criticism as has the London Ambulan...

International Healthcare and the Impact of Technology

correct medications, and the list goes on and on (Bartholomew and Curtis, 2004). McEachern (2004) reports that technologically adv...

Child Support/Complications due to New Technology

same sex couples raising children, relationships and obligations when couples break up have become extremely complicated, giving r...

Assessing the Value of an Information Technology Risk Assessment

value would then be assessed as a result of the savings that were created less the costs of putting those savings in place. Increa...

Organizational Efficiency and the Integration of Information Technology Solutions

it that has highlighted existing inadequacies all throughout the company structure. By examining each of these deficient areas in ...

Choosing an Information Technology System

to evaluate the best course of action and to make the decision. This process may take seconds, or may take months, depending on th...

Information Technology in an Organizational Expansion

the company has undertaken a project to transport its China operations from Hangzhou to Shanghai. In order for such a move to be c...

Technology and offender motivations in relation to fraud and theft

In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams...

TECHNOLOGY AND BUSINESS

one letter. Looking at that same workflow today, we likely have the boss distributing some notes to his or her administrative assi...

Singapore International Airlines and In Flight Business Technology Enhancement

In eight pages the options Singapore International Airlines can pursue in order to attract greater numbers of business travelers a...

20,000 Leagues Under the Sea by Jules Verne and Futuristic Technology

as if it existed at the time. Carter Kaplan notes that "Verne exhibits strict adherence to known science or pseudo-science, a jour...

Constantly Evolving Information Technology

In eight pages this paper examines IT's past, present, and future potential. Six sources are cited in the bibliography....

Firms Tend to Under-Invest in the are of Information Technology

Banker & Ravindran, 2006). On some level, this is true. Firms that have for example excellent web sites that are easily navigable ...

MANAGEMENT, SECURITY AND INFORMATION TECHNOLOGY

man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/pat...

Negotiation and the Wellington Institute of Technology

means that there are two goals, a short term goals as well as a longer term goals that will help to mitigate the situation so that...

INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wa...

BADERMAN ISLAND RESORT AND TECHNOLOGY

in each room? Would the reservations be accessible through the hotels television sets? How would the remote systems work? This wou...

Technology and Culture: The Electronic Media and Our Children

accounts of child abductions, rapes, and murders practically every day. We are kept up-to-date on the violence in Iraq and that u...

Observations in History, Nationalism, and Military Strategy and Technology

measuring stick against which all the answers to all the questions could be compared to see if they measured up. Not only was sci...

TECHNOLOGY AND THE INFLUENCE ON MASS MEDIA

that mass media, by its very nature, is media that involves the masses. Mass communication theory, at its very core, involves the ...