SEARCH RESULTS

YOU WERE LOOKING FOR :Social Networking and the Learning Organization

Essays 871 - 900

Case Study: Decision Time at Lotus Corporation

1994). Not coincidentally, it also made Lotus the leader in the application software sector (Case study, 1994). Lotus believed th...

Currency Swaps and the Swap Network

company might not simply choose to issue a bond in the currency they would prefer to use to make the repayments. There are differe...

Racism in Contemporary America

investigations that "successfully demonstrate the unfairness that only Affirmative Action can begin to redress" (Bradley 450). Spe...

Nursing Leadership Scenario

defining the leadership characteristics that would be the focus of this educational effort (Pintar, Capuano and Rosser, 2007). As ...

Upgrading Riordan Manufacturing's Working Information

production and procurement of raw materials also should assist the company in planning for the future. Riordan currently has mark...

Traffic Network Analysis, Seattle

This research paper focuses on traffic network analysis in the City of Seattle and is associated with a sixteen slide power point ...

Leading a Public Organization

Public leadership is very different than leadership in the private sector. This is one of the topics discussed. Other topics inclu...

Occidental College Transfer Decision

are particularly important in my chosen occupation. Communication skills play a large role in business even from the time an appl...

Primus Securities' Website Development

been successful in achieving its goals in this regard. Network Protocol Now an "old" technology, Transmission Control Proto...

FIVE FORCES, PEST AND SWOT ANALYSES OF DISH NETWORK

Provides a Five Forces, PEST and SWOT analysis of DISH Network, to prove that a macro-analysis is necessary to the company's micro...

Virtual Private Network Between the U.S. and Malaysia and Security Concerns

to consider the complications that might be involved in establishing a virtual private network between Washington and Kuala Lumpur...

Testing and Integration of Computer Systems

network, after all, is to transport and control data, and to connect computers and peripheral drives with one another (Huber and B...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Wi Fi Network Selection and Integration

and professional journals, academic reference books and the internet. The development of wireless networks have been aided with...

P2P's Impact on Cinema Industry

This essay pertain to peer-to-peer (P2P) networking and the impact of film piracy on the cinema industry. Six pages in length, thr...

Discussion Questions on Network Security

In a paper of five pages, the writer looks at network security. A variety of topics are addressed via discussion questions. Paper ...

Information Technology and the Meeting of Organizational Structures and Operational Objectives

There are two types of organizational structures that tend to be used when it comes to IT management and objectives -- these are t...

Achieving Network Service Levels

that it also provides additional capacity when required. Reliability Redundancy is an option in preserving reliability as w...

Computer System Development

data needing a broad bandwidth, but also the need for security as patient files are confidential and security measures are not onl...

Fuzzy Logic Controllers (FLC) In Computer Systems

However even with this there is no any exactness as this does not mean that it is plus or minus 2 or 3 degrees (Rosenstein, 2004)....

Threading Development in a Network Environment

to take place. Hyper-threading is an extension of this technology taking threading to the next logical stage. Hyper-thread...

Public Sector and its Changes

others with resources that are often determined by still others and must do so within a general organizational framework establish...

The National Center for the Preservation of Democracy

the blog sites of Volpac, a conservative political action committee chaired by Senate majority leader Bill Frist. One of the curr...

Overview of VPNs

resources data. Issues of safety and security are not of concern, because the appropriate tools are available to effectively addr...

Software Quality and Can It Be Measured?

required manner at the required time in a way that is easy for the users to implement and understand. Other qualities that are req...

Wireless Sensor Networks and New Power Sources

other renewable forms of power. This is a form of power that has been explored for many types of power usage and as a renewable so...

Literature Review on Artificial Neural Networks Use

have been conducted since the late 1980s that reflect the effort to integrate artificial intelligence, especially artificial neura...

Information System Case Studies

a greater advantage than ever before when it comes to project management and related processes. This is because these tools have t...

Independent Taylor Greer's Journey to Maturity in The Bean Trees by Barbara Kingsolver

aware that her and her mothers poverty had placed them at the bottom rung of Kentuckys socioeconomic ladder, with the chances of u...

NETWORK TERMINOLOGY AND QUESTIONS

are typically connected to that main hub (which could be an actual hub, switch or router) with UTP Ethernet (Mitchell, 2010). The ...