SEARCH RESULTS

YOU WERE LOOKING FOR :Security and Wireless Technologies

Essays 391 - 420

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Sports Fans and Advanced Sports Technology's Negative Effects

Americas favorite pastime seen better days. The lure of money is the single most important lure that has allowed advanced t...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

2D Ultrasound Technology versus 3D Ultrasound Technology

obvious; two dimensional imaging is a more limited view, and the distinctions that can be made because of the use of a more graphi...

SAS 99 Compliance and Lucent

financial information and balance sheet, its first a good idea to examine what, exactly, compliance means under Sarbanes-Oxley and...

Digital Technology's Pros and Cons

fact play a significant role in terms of the emerging 3G wireless appliances. It could in fact be that telephones could double as ...

Information Technology's Pyramid Levels

for creating value for the larger organization, providing a "map" of precisely where the organization needs to be going next. ...

Factors That Influence Strategic Implementation

that value is added to the customer and more custom gained. If a weakness is location then this may be the opportunity for change....

New Businesses, the European Union, and the IPPC

by the relevant regulatory bodies in each country. The approach is different in each country due to the principle of subsidiary. T...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

Choosing a Manufacturing Site

are better suited to more developed economies. Central and Eastern Europe Central and Eastern Europe hold a mix of nations ...

Information Systems Technology Projects Fail

all projects falls between 66 percent and 90 percent depending on which survey data one relies on. Engle (2007) reported that 90 ...

The Relationship Between Technology And Human Freedom

minds and bodies has become somewhat of a hobby with the presence of such technology as mood-altering drugs and cosmetic surgery (...

Technology And New Management Styles

partially resolved and the organization no better for the unfinished effort. Since the late 1980s, the concept of total quality m...

Forecasting for a Fast Food Outlet

and ice creams sold in the summer, this looks at the trends rather than just the past performance. Regression analysis takes th...

Nursing Profession and 'Telehealth' Implications

and was replaced by the broader term, telehealth (Maheu et al 7). The definition has also evolved to encompass all types of healt...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

National Security Threat Levels

needs to prepare. The standard protocol for a green national threat conditions includes taking this otherwise down time to re-eva...

The Patriot Act: A Political Issue

against Americans on their own soil. The extent to which the Act serves to intercept terrorist activity, protect national freedom...

Tenure Laws In Georgia And Tennessee: Opinion

these teachers not been locked into job security under the precept of permanent tenure and been expected - as with virtually every...

The Patriot Act

vital to national security (Pike 1). The 9/11 Commission even pinpointed several failure of communication that occurred within th...

E-commerce; Security and Legal Issues for UK Firms

the internet and then consider the issues of the Data Protection Act and the Distance Selling Regulations. There are many ...

A Lack of Emergency Preparedness in School Districts Today

hours when other activities occur on school grounds. In a nutshell, anyone can just walk in to virtually any school, getting past ...

Macro Economy of the United Arab Emirates

aspects that a government may seek to control or influence, including inflation, unemployment, the balance of trade, foreign inves...