SEARCH RESULTS

YOU WERE LOOKING FOR :Technology Transfer

Essays 361 - 390

HR Function and Detrimental Use of Technology Use

permanent changes in process. Principles remain unchanged in todays business environment, but processes certainly have not. ...

Management Change

sigma has the ability to monitor changes over time. It contains within it the "define, measure, analyze, improve, and control (DM...

Description of Susan Getting Her Realtor License

Durham, North Carolina educational services firm as data processing manager. She had only four programmers - the entire IT depart...

Indian Company MphasiS BFL Limited

acquiring MphasiS, such as system integration expertise, blue chip customers, like Citibank, Charles Schwab, Morgan Stanley Dean W...

Chapters One and Two of Managing the Information Technology Resource by Jerry N. Luftman

distributed and applications were developed to support individual needs" (Luftman 4). The contemporary era has been described as o...

Essays on Health Care

before, with the result that there is a "pill" for virtually any physical condition. Individuals taking any kind of ethical drug ...

The Machine Stops

first examines Forsters story and then examines particular thematic elements from the story that seem quite relevant today. These ...

Wireless Technology of the Future

use. Much is known as to how cells are affected by radiation, such as contained in the Radiation Injury report published in 1999 (...

IT Project Task List and Risk Management Plan

old systems to new needs, but Acme Hospital appears not to be hindered by this affliction. It fully expects to acquire all new ha...

Integrated Technology and Teacher Staff Development Program

Impact Aid; and Encouraging Freedom and Accountability (Bush, 2001). The call for accountability on a state and national ...

eBusiness and Technology Linkage Factors

to e-business include trading partners, competitors, customers, legal and regulatory (Ramachandran and Tan, 2001). The internal fa...

Journalism and Audience Effects of New Technologies

domains. This gives consumers more choice, but it also means they are more informed and with and increased knowledge base the perc...

Evaluating Harrah's Entertainment

children who are wandering around on their own. They also warn their customers that they will prosecute any minor using false iden...

Chinese Cinematic Art

Even today, if we look at the extent to which Chinese cultural ideology has made its way to the West via art and...

Technology, Mother Nature, and Ethics

term, or hire a human incubator, or go through various forms of testing and treatments to try to conceive a baby naturally, but so...

Military Operations and IT

easily by insiders (Shaw, Ruby and Post, 1998). In the second case described above, the enlisted man was a convicted hacker to who...

HRM and Kraft Foods Inc.

(Brand Strategy, 2006). The restructuring plan runs through 2008, thus, one might think that will be the end of Krafts labor reduc...

Money Laundering Detection Through Information Technology

with suggestions for making the presentation of the research proposal a success. Introduction Money laundering is the practice o...

Cafeteria Services Information Technology System Analysis

theft, especially when there is a large amount of exposure to non employees in the form of students. The risks of theft may be s...

Chapter Summaries of Managing the Information Technology Resource by Jerry Luftman

then goes back and discusses each level of the five level conceptual framework and how the six criteria apply to each one. For exa...

China, Singapore, and New Media and Internet Technology Uses

control the people by controlling the Internet. Yet, it likely realizes, it can only do so much to control something that is rathe...

Recruitment Techniques in the U.S. Military Since the Civil War

to the ideological complexities of that war. Tearing the nation apart in the middle 1800s, this war is most often remembered as r...

Technology Questions

In five pages a Q and A format is used to answer 2 questions posed by a student regarding health care professionals and the import...

Technological Impact of Computers on Society

a change with regard to the overall application in order for computers to become significantly more user-friendly. Granted there ...

Media Moguls

profitable fashion, it has created problems as well. One of the most obvious and by far the worse of these problems is that it is...

Journey in Sembene Ousmane's 'God's Bits of Wood' and Cheikh Hamidou Kane's 'Ambiguous Adventure'

obstacles, the people maintain their stalwart conviction to ultimately seek out a better existence. Kanes Ambiguous Adventu...

Wireless Application Protocol, Geographic Information Systems, and UMTS

This paper examines UMTS 3rd generation technology in six pages and also discusses how GIS system flexibility is achieved through ...

Health Education and Technology

problem with the approaches of the past, which were to hand out pamphlets at health care centers, was that the pamphlets did not a...

Battleship Technology and its Combat Relevance

quite awhile. Philosophers of every time period have looked at war and tried to find a theory to explain it (Honderich, 1995). Her...

Films and Technology

- is what was considered quite unique for the figuratively dark production. Adding literal darkness to MacBeth was the directors ...