SEARCH RESULTS

YOU WERE LOOKING FOR :Privacy and Technology

Essays 1141 - 1170

Relational Databases and JDBC Driver Types

within the database stores one sort of data that is relevant to the application (Spruit, 2002). As an example, an address book mig...

Industrial Effects of IT

is still perceived as strong, and the use of computers has moved from being seen as a source of competitive advantage., to a neces...

A Corporate Productivity Audit Analysis

eight sections of the audit were addressed in the productivity audit with the following findings: Policy: The depiction of the co...

Discussion of Cellular Phones and Their Impact

the busy executive who is able to keep abreast of last minute details with the one that always accompanies him on business trips, ...

Analysis of Alan Lightman's “The Diagnosis”

has a serious neurological breakdown of his own. Bill has a sudden and disturbing memory loss - he is unable to remember the name...

Information Management and Hotels

their study was that: "... a best practices study is important at this time is the industrys consolidation. The industrys intense ...

Electronics and Consumerism

most significant inclusion. In looking at consumer electronic products of the twenty-first century and beyond, it does appear tha...

Comparative Analysis of Japan's Matsushita Group and the Netherlands Philips Electronics

the Netherlands and Matsushita Electronic in Japan, and to determine if their longevity and staying power can help get them back t...

Society and Global Effects of Information Technology

perceived needs (Nye, 1997). Consider how technology has advanced the fields of ecology, medicine and biotechnology (Lombardo, 199...

Technology and Application of Rapid Prototyping

any time in the past, a trend that is only expected to continue for the next several years. Competitive advantage is a quality th...

Workplace Technology and its Negative Aspects

In five pages this paper examines the negative impacts of workplace technology in a consideration of piracy and hacking problems a...

IT Outsourcing

emerging service companies to deliver accounting, human resources, data processing, internal mail distribution, security, plant m...

Overview of Knowledge Management

in such a way as to be accessible and available to those who need it. Knowledge management is, like the term suggests, a necessary...

Technological Connections and 'Cyberfeminism'

this Cyberfeminism, 2002). Cyberfeminism got its start in Australia during the early 1990s, when a group of artists and ac...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

Appendicitis and CT Scans

of Computerized Tomography Scans (CT) in diagnosing abdominal conditions is highly debated. Baker emphasizes that the procedure p...

The Changing Nature of Health Care in the U.S.

expected only to continue for several years to come. Then, growth will begin to decline in response to fewer numbers of people re...

National Health Service Information System Implementation Methodology

this thesis makes use of the Actor Network Theory it is appropriate to use a research paradigm that may be seen as able to cope wi...

Istanbul and Megacities

on the European shore. It is on both the land and sea routes of Asia and Europe. Istanbul has the advantage of being on the Blac...

Technology in Government, Its Responsibility and Role

In six pages this paper discusses the relation of Internet technology and the role the government should play regarding the protec...

Technology Sector and Government Spending

with the advent of the North American Free Trade Agreement (NAFTA), Tennessee retained most of its textile companies for another d...

Postmodernism Defined

of another direction, only to be broken apart and redeveloped by way of postmodernistic composition. Technology, as such, represe...

Hotel Industry and IT

a joint venture called The Hotel Industry Switch Co (THISCO). THISCO linked airline computer reservation systems and a majority of...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

A Corporation's Adoption of Internet Technology

the level of competency -- that will exist at each individual location. It can be argued that computer design is only as technolo...

Cultural Traditions and Technology

had to change some things, in his heart he is, perhaps, doing exactly what he and those before him have always done: worship The M...

3 Technology Questions

has strong a weak forms (Cross et al, 1974). Question 2 The open source software movement may be seen in relation to the way th...

An Analysis of Avid Technologies

mover advantages and increased functionality are still goals that are achieved. The company wanted to grow, and as a core competen...

Greece's 3G Telecommunications

this fro the perspective of Greece, where the third generation technology has only gone live in January of 2004, we can see a patt...

Technology and Theater of the Victorian Age

In eight pages this paper discusses how Victorian theater was impacted by new technology in terms of staging and social culture. ...