SEARCH RESULTS

YOU WERE LOOKING FOR :Position of Lucent Technologies

Essays 211 - 240

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Snow Crash by Neal Stephensonn and Technology's Effects

counterparts "brain-drained" (2). Because America was responsible for the technological fusion, it paid the greatest price with p...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Sports Fans and Advanced Sports Technology's Negative Effects

Americas favorite pastime seen better days. The lure of money is the single most important lure that has allowed advanced t...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

2D Ultrasound Technology versus 3D Ultrasound Technology

obvious; two dimensional imaging is a more limited view, and the distinctions that can be made because of the use of a more graphi...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

Digital Technology's Pros and Cons

fact play a significant role in terms of the emerging 3G wireless appliances. It could in fact be that telephones could double as ...

Factors That Influence Strategic Implementation

that value is added to the customer and more custom gained. If a weakness is location then this may be the opportunity for change....

Information Technology's Pyramid Levels

for creating value for the larger organization, providing a "map" of precisely where the organization needs to be going next. ...

New Businesses, the European Union, and the IPPC

by the relevant regulatory bodies in each country. The approach is different in each country due to the principle of subsidiary. T...

Electronic Monitoring Devices/Parolees and Prisoners

in prison (Biniok, 2004). They contend that the costs of electronic supervision are unacceptable, even that such supervision viol...

The Influence of Cultural Developments on Visual Art, from the Mid-19th to the Mid-20th Century

early twentieth centuries established themselves. What this means in terms of how those great philosophers looked at the broader ...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

Planning Strategy and Information Technology's Value

are dependent on the efficient use of the higher levels of corporate information available now. Astute organizations are cognizan...

Society and Technology

of political life" (1969, 55). Mesthene sees technology as detrimental and provides examples. For instance, cities have mass trans...

MySpace: An Invisible World Flattener

other nations (the U.S. and Western Europe, as mentioned) are sitting back relaxed, not paying attention to the destruction of the...

Wearable Technology For Crime Scene Investigations

of 2005 to determine "the most critical technology needs for law enforcement" (International Association of Chiefs of Police, 2005...

Law Enforcement Technology in the 21st Century

- protection from injustice - focuses on protecting the individuals rights and is usually called the Due Process Model (Perron). T...

Fremont Technology Plan and Enhancing Education through Technology Grant Program

the district; 3. to create a list of benchmarks and a specific set of obtainable dates for the implementation of new hardware, in...

Architecture - Technology and Art

form of structure, function, and aesthetics. This paper will explore how the evolution of technology has influenced the evolution ...

Photovoltaic Technology and Market

Most system will see the installation of flat cells in existing roofs, but they are being increasing installed in new builds with ...

Technology's Impact on Data Exchange

organizations to ensure the safety of information. Though the precise future evolution of the Internet is difficult to predict, t...

Technologies for Learning Disabled Students

2010 study of more than twenty Turkish university students indicated that there was a direct correlation between students percepti...