SEARCH RESULTS

YOU WERE LOOKING FOR :Position of Lucent Technologies

Essays 3031 - 3060

Societal Dependence and Cell Phone Technology

Its safe to say that cell phones are an ubiquitous part of society. While just a decade ago, that opera-goer probably would have b...

School Budget Internet Technology Spending

same barriers. It is more accepted, but the vision of the no digital divide had not been realised. The use of a budget needs to be...

The Dowding Universal Business Model and Its Influences on Information Technology

as customers, suppliers and managers. With the ten aspects there are a total of fifty five elements (Dowding, 2001). The third...

Elementary Education and Technology Integration

typed their writing assignments, they were able to make more effective editing choices (Fletcher, 2001). Other findings included: ...

Evolution of Cell Phone Technology and Usage

2001, the "Handspring Treo 180" became the first phone to include a QWERTY (standard) keyboard; the Blackberry made its appearance...

Information Technology; Business Solutions

which may include the organizational goals and the need to be able to demonstrate accountability. One area where information tec...

TECHNOLOGY AND THE INFLUENCE ON MASS MEDIA

that mass media, by its very nature, is media that involves the masses. Mass communication theory, at its very core, involves the ...

Technology and Culture: The Electronic Media and Our Children

accounts of child abductions, rapes, and murders practically every day. We are kept up-to-date on the violence in Iraq and that u...

Observations in History, Nationalism, and Military Strategy and Technology

measuring stick against which all the answers to all the questions could be compared to see if they measured up. Not only was sci...

Ray Bradbury's "The Veldt" - Technology

is how science fiction portrays this futuristic idea. Indeed, the extent to which films and books have expounded upon the potenti...

Information Technology Projects

change. One dynamic that is often overlooked in IT change projects is the loss of productivity during and immediately after the ...

Technology and Decision-Making in Nursing

showing substantial improvement over these early versions. Recognizing that the task of designing a CDSS is formidable, the Deci...

Nursing and Technology

In two pages a journal article is reviewed in which a Computerlink research study is summarized in terms of its surgical services'...

Organizations, Technology, and 'Cyberliability'

In eight pages legislation and cases involving 'cyberliability' issues are discussed and include Internt transmittal of obscene or...

Analyzing 'Technology and Politics in the Blade Runner Dystopia' by Judith Kerman

In five pages this paper considers Kerman's thoughtful commentary and assessment of the 'Blade Runner' film and its contribution t...

Technology, Electronics Manufacturing, and the Restaurant Industry's Product Life Cycle

different equipment or different raw materials than those currently being used for the existing product line. This initial stage ...

Historical and Contemporary Religious Responses to Science and Technology

empires that would endure for centuries. These initial ties would culminate in a genuinely global integration of human cultures. ...

Singapore International Airlines and In Flight Business Technology Enhancement

In eight pages the options Singapore International Airlines can pursue in order to attract greater numbers of business travelers a...

20,000 Leagues Under the Sea by Jules Verne and Futuristic Technology

as if it existed at the time. Carter Kaplan notes that "Verne exhibits strict adherence to known science or pseudo-science, a jour...

Constantly Evolving Information Technology

In eight pages this paper examines IT's past, present, and future potential. Six sources are cited in the bibliography....

INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wa...

BADERMAN ISLAND RESORT AND TECHNOLOGY

in each room? Would the reservations be accessible through the hotels television sets? How would the remote systems work? This wou...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

Aspen Technology Inc Case Study

fees over the period of the license which complies with the matching concept in accounting. It may be argued that there was an imp...

The Leverage of Technology by Boeing

in the manufacture of the new Boeing 787 (Dreamliner) leveraging technology in a way that was not possible for Airbus (Farish, 200...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Cell Phone Technology

to represent the "geographical area covered by cellular radio antennas" (Farley and van der Hoek, 2006). Such an area is called a ...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Personnel and The Use of New Technology

changes in regard to personnel and how they react and communicate (Painter, 2008). To see how personnel were actually affected, su...

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...