SEARCH RESULTS

YOU WERE LOOKING FOR :Technology Transfer

Essays 481 - 510

Truman Proclamation/Continental Shelf

over activities off its shores," which pertain to the utilization of these resources (Truman). Having laid out the rationale for...

The Leverage of Technology by Boeing

in the manufacture of the new Boeing 787 (Dreamliner) leveraging technology in a way that was not possible for Airbus (Farish, 200...

Information Technology and Management at EasyJet

in with the strategy and the people who use it. It is only by appreciating the technological environment within EasyJet as a whole...

External Environment And Dell

of software programs (Ransford et al, 2003). This is a very real threat to the company and something that needs to be considered. ...

Cell Phone Technology

to represent the "geographical area covered by cellular radio antennas" (Farley and van der Hoek, 2006). Such an area is called a ...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Daily Mail and General Trust

2. Introduction The Daily Mail is a well known UK newspaper, with a long history. The group which publish the Daily Mail; the Da...

Technology and Changes in American Culture

were large multi-branched entities and several generations typically lived under one roof. This was, in fact, a necessity in thes...

The Importance of Fiber Optics

("Basic Principles of Fiber Optics," 2008). While there are many well known companies making use of fiber optics in telecommuni...

Video Surveillance and Stun Guns Should Not Be Used by Police

injury and even death. In some way, the police have a false sense of security in using these devices. Stun guns are thought to b...

Management at Amazon

the need to move to purchase more expensive real estate. Therefore, planning can be seen as part of the history of Amazon,...

Allocating Health Services

saving technology. This may seem cruel but the doctors and hospitals surely do not work for free and as such monetary issues are c...

Adoption of Technology in Classrooms

so frequently that it is simply accepted as a maxim. However, data from the third annual "Teachers Talk Tech" survey, which was ta...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Aspen Technology Inc Case Study

fees over the period of the license which complies with the matching concept in accounting. It may be argued that there was an imp...

HEALTH CARE AND FUTURE TRENDS

that telemedicine is already having an impact on how healthcare is being delivered (Kohler, 2008). Kohler points out that technolo...

Wireless-Enabled E-commerce Components; An Introduction

Howe (2001) notes that e-commerce is wider than simply buying and selling through the internet it also involves inter-company and ...

Will Existing and Developing Technologies in Chemistry Protect Air Quality?

something known as the greenhouse effect, is something that can be controlled, at least to an extent. Many of the problems as it ...

Wal-Mart Management Effectiveness

the managers of each outlet may not be available, we do know that Wal-Mart has more employee-initiated class-action lawsuits again...

Technology And Cultural Change: Three Sociological Perspectives

once-omnipotent mode of communication known as TV. Television has been an untouchable resource of information and entertainment f...

NetFlix Case Study

less to produce, the company will have an advantage afforded by superior profits. To compete in the long term Porter has argued th...

Creativity and Innovation

of the sticky post it notes ma be seen as the creative use of an research project that initially had the aim of developing a new s...

Informaion Technology and the Construction Contractor

not been as visible. The starting point of construction has benefited from CAD layer programmes for many decades. However, it may ...

One of the Negatives of Advanced Technology: Identity Theft

his or her social security number written on various documents, someone that throws all mail into the trash without securing vital...

Influences of IT on a Financial Services Company

This 4 page paper looks at information technology in financial institutions and considers influences such as the Sarbanes-Oxley, v...

The Likely Effects Of E-Commerce On The Future Of Book Publishing

issues may still have the potential for a very large impact. The idea of the e-book is that a book may be bought in electronic f...

AT&T and VoIP Technology; Strategic Issues

U.S. Department of Justice and AT&T. It was at this time that the environment was changing, competition was seen as good for the i...

Moore’s Law and Data Storage

the number of transistors (Jurvetson, 2004). However, the use of nanotechnology has extended the law from the boundaries that were...

Computer Technology in the Classroom: Advantages and Disadvantages

Instructional technology has been in a state of evolution throughout history. In the latter part of the twentieth century, howeve...