SEARCH RESULTS

YOU WERE LOOKING FOR :Societal Impact of Technology

Essays 1651 - 1680

A Risk Management and Derivatives Case Study

This paper is a case study examining Link Technologies and how they utilize derivatives and risk management. This five page paper...

Technologies and Service Quality

In twenty pages this paper considers LAN and WAN technology systems in terms of service quality with network systems and risk asse...

The Pyramid Building of Ancient Egypt and the Beginnings of Engineering, Technology, and Cultural Dynamics

machines constructed of short pieces of wood; from the second tier the stones were raised by a similar machine to the third; and s...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Emerging Contemporary City and Technological Changes

In six pages this paper examines the changes in technology that influenced the emergence of the modern day city in a consideration...

Computer Failures and Disaster Recovery

and made a disaster recovery plan for if the computer suffered blackout time this would not have been a problem of the same magnit...

Overview of Life Insurance

In twelve pages this paper discusses the life insurance industry that considers among other topics the influence of AIDS and HIV a...

Strategies of Retail and Shopping

This paper consists of three pages in which retail and shopping strategies in times of globalization and computer technology are e...

World War I and its Causes

In eleven pages this paper presents a literature review on the underlying factors that led to World War I with military buildup, t...

Advantix® and Marketing by Eastman Kodak

In sixteen pages this consumer imaging technology by Kodak is evaluated in terms of performance, PEST and SWOT analyses, and marke...

Society and Global Effects of Information Technology

perceived needs (Nye, 1997). Consider how technology has advanced the fields of ecology, medicine and biotechnology (Lombardo, 199...

Overview of Knowledge Management

in such a way as to be accessible and available to those who need it. Knowledge management is, like the term suggests, a necessary...

Technological Connections and 'Cyberfeminism'

this Cyberfeminism, 2002). Cyberfeminism got its start in Australia during the early 1990s, when a group of artists and ac...

Internet Technology and Morality

compromising of principles much more likely. For example, it is noted that the Internet opens the doors of pornography and cyber a...

Technology and Application of Rapid Prototyping

any time in the past, a trend that is only expected to continue for the next several years. Competitive advantage is a quality th...

IT Outsourcing

emerging service companies to deliver accounting, human resources, data processing, internal mail distribution, security, plant m...

Hotel Industry and IT

a joint venture called The Hotel Industry Switch Co (THISCO). THISCO linked airline computer reservation systems and a majority of...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

John Galtung/Theory and Methods of Social Research

located outside the social scientist himself, and we shall follow this tradition" (Galtung 9). As this indicates, Galtung does not...

IBM Systems and Technology Marketing

had to recover from losses that the firm may be argued as becoming one that was more marketing oriented. The firm certainly undert...

How Economic Considerations and Doctrine Influence Military Innovation

tactical assumptions as unrealistic (Murray and Millett 1996, 29). Instead of composing a doctrine for the future, which would ha...

Learning Theories And Technology

conferencing, and interactive video and audio technologies. These are all student-centered technologies that can build upon prior ...

Sociological Theory, Contemporary Culture, and Technology

the need to separate religion from science, to synthesize the basic principles of the various branches of the sciences into one in...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

TECHNOLOGY AND ISOLATION: TRUTH OR NOT?

technology is putting people in touch with strangers on the other side of the world, its also taking away "face time" from family ...

Is an IT Strategy Focused On Maintaining Cutting-Edge Technology the Most Effective Way to Support Any Kind of Overall Business?

business strategies (Deloitte Consulting, 2004). The problem is that although there may be benefits of IT gaining alignment...

Appendicitis and CT Scans

of Computerized Tomography Scans (CT) in diagnosing abdominal conditions is highly debated. Baker emphasizes that the procedure p...

The Value of Podcasts and RSS Feed in the Research Act

older formats, such as printed formats, video or radio. Pod casts are already being used by some universities in the United States...

Orbitz

2008). The partnership was incorporated on the 24th of February 2000, as DUNC LCC, and DUNC Inc. was created on the fourth of May ...