SEARCH RESULTS

YOU WERE LOOKING FOR :Strategies for Creating Technology Equity

Essays 1891 - 1920

Marine Vessel Diesel Engines and Selective Catalytic Reduction

have the edge on other more expensive technologies. The Problem: Emissions Most large engines, such as exist in marine vessels...

Implications of the Sarbanes-Oxley Act

of the marketplace by big business (Bittlingmayer, 2002). Catanzaro (2000) accuses President Richard Nixon of using antitrust law ...

U.S. Homeland Security and Technology That is Becoming Obsolete

of the World Trade Center and the subsequent attack on the Pentagon itself, numerous government officials have come to more fully ...

Philosophy Paper Sample on Junger, Zola, Dostoyevsky, and Nietzsche

been warriors but are now too docile for their own survival. Those who are poor are not poor because of the system, but are poor b...

Critical Response to Cell Phone Technology

voice is composed of sine waves, each of which has amplitude, frequency, and phase (Stern and Mazella, 1996). Amplitude is the wa...

Past and Present Artificial Intelligence

right now. AI is still in its infancy. However, as an application toward various processes, for example, the gaming industry, it i...

Insurgent Threats, Technology Uses, and Spatial Analysis

pattern analysis mapping software, military officials can predict sites and the likely times of insurgent attack (Grau, 2004). Ano...

2025 Organizations

is likely to be smaller, from the standpoint of square footages. With employees being able to connect with companies via intranets...

National Football League and the Effects of Instant Replay Technology

bit (as he states) and managed to slow down the frame time. Stop Action was born. Soon the Airforce contacted Jim to ask if he mig...

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

The Development of the Fyborg

situations in terms of past experiences. Capra (1997) refers to this pattern as the "Computer Model of Cognition" (p. 65), ...

Asymmetrical Threat Assessment Through Geospatial Applications

"decision support tool " for those who work in the field of homeland security. It tells an observer where someone is, who he is as...

Information on Corporate Structure

in a corporate charity or non-profit organization) or to obtain a profit based on a product or service that the market definitely ...

Analyzing Oliver Parker's Film Version of Othello

military prestige and marriage to a well-to-do Caucasian, was little more than a savage who was ultimately enslaved by primal pass...

Laser Technology Overview

factor, in particular. That factor is light. To understand the importance of light in laser technology we can look to yet ...

Online Trading and the Infrastructure of Technology

been successful in achieving its goals in this regard. Network Protocol Now an "old" technology, Transmission Control Proto...

The Organizational Culture of an Architecture Company

than many firms. Another part of this companys reputation is innovative designs. One reason for the companys speed is the effectiv...

Competitive Advantage and Technology

and Millar (1985) noted some 20 years ago that information technology ends up creating a competitive advantage by offering the bus...

Investment Target Selection

company, but it is likely that IBM will be able to attain growth at lease equal to that of last year Figure 1 provides a view of ...

Computer Technology and Effective Educator Communications

use in todays business environment, all of which are appropriate to specific sets of circumstances. The business environment is t...

Cambridge Antibody Technology and AstraZeneca

his own (Irving and Verdin, 2004). The FDA Administration tried to immediately distance itself from the regulators comments but th...

British Gas Services Organization and Economic Environment

of a business like this, where some calls may require a rapid response, whilst others are less urgent and can be booked a long way...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Educators, Computer Technology, and Effective Communication

to be able to agree on a definition" (Leadership Theories: Definition and framework, 2004). Though definitions can vary, one basi...

Processes of Risk Management and Risk Assessment

One of the factors separating physical and IT projects is that in producing a building (or bridge, or airplane) everyone knows at ...

Comparison of 'Declaration of a Heretic' by Rifkin and 'The Existential Pleasures of Engineering' by Florman

order for work to be appropriately "subdivided into highly specialised, routine tasks."3 As enthusiastic as Florman (1996) is a...

Uninsured Issues for Metropolitan Hospital Center of New York II

continues to battle against the ongoing nursing shortage. Today, the problem of the nursing shortage has grown to the point that ...

Development of Automatic Speech Recognition Systems

who needs to be able to "talk" to his computer (Gallant, 1989). Gallant was writing in 1989, and there are more systems available...

Protocols in 802.11 Technology

of uniform standards to ensure different systems can be integrated and the wireless devices are not incompatible. IEEE developed t...

Ireland, China, and ICT

reforming the state owned IT enterprises as well as encouraging a range of research and development in the areas of software and i...