SEARCH RESULTS

YOU WERE LOOKING FOR :Technology and Leadership

Essays 1891 - 1920

Internet Technology and Morality

compromising of principles much more likely. For example, it is noted that the Internet opens the doors of pornography and cyber a...

Technology and Application of Rapid Prototyping

any time in the past, a trend that is only expected to continue for the next several years. Competitive advantage is a quality th...

Workplace Technology and its Negative Aspects

In five pages this paper examines the negative impacts of workplace technology in a consideration of piracy and hacking problems a...

Comparative Analysis of Japan's Matsushita Group and the Netherlands Philips Electronics

the Netherlands and Matsushita Electronic in Japan, and to determine if their longevity and staying power can help get them back t...

Society and Global Effects of Information Technology

perceived needs (Nye, 1997). Consider how technology has advanced the fields of ecology, medicine and biotechnology (Lombardo, 199...

Radar's Role in World War II

the war" (Heywood, 1998; history.html). This lab was only one division of National Defense Research Committee (NDRC), for "in Jun...

Motivation and the Building of Teams

those skilled have become more specialised. In effect the ultimate team maybe compared to the single craftsman, and the modern tea...

Technology in Government, Its Responsibility and Role

In six pages this paper discusses the relation of Internet technology and the role the government should play regarding the protec...

Istanbul and Megacities

on the European shore. It is on both the land and sea routes of Asia and Europe. Istanbul has the advantage of being on the Blac...

Post Second World War and Global History

that the Russians "made very serious mistakes" (Booth 37). In an attempt to avert a secret attack, President Kennedy ordered Prem...

Can Computer Crime Be Effectively Fought?

attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent ba...

A Corporation's Adoption of Internet Technology

the level of competency -- that will exist at each individual location. It can be argued that computer design is only as technolo...

Cultural Traditions and Technology

had to change some things, in his heart he is, perhaps, doing exactly what he and those before him have always done: worship The M...

Technology Sector and Government Spending

with the advent of the North American Free Trade Agreement (NAFTA), Tennessee retained most of its textile companies for another d...

Postmodernism Defined

of another direction, only to be broken apart and redeveloped by way of postmodernistic composition. Technology, as such, represe...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

Appendicitis and CT Scans

of Computerized Tomography Scans (CT) in diagnosing abdominal conditions is highly debated. Baker emphasizes that the procedure p...

Hotel Industry and IT

a joint venture called The Hotel Industry Switch Co (THISCO). THISCO linked airline computer reservation systems and a majority of...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

The Changing Nature of Health Care in the U.S.

expected only to continue for several years to come. Then, growth will begin to decline in response to fewer numbers of people re...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Competitive Advantage and Southwest Airlines

the U.S. Department of Transportation gave a name to the phenomenon - the Southwest Effect (Southwest, 2003). It refers to the con...

5 'Golden Threads' and Their Implications

and Shared Minds Implications for business are clear. All of these threads weave together in the effective organization to...

Technology and Visionary Design Systems

planning in the manufacturing sector. Product Data Management (PDM) was created in the 1980s as a means of storing CAD document...

Film Industry and Technology

Though the request for this paper was to focus on technology in film during the past 50 years, no paper on this would be complete...

WLAN Weaknesses in Security

A wireless LAN uses radio technology in order to transfer the data between the different terminals (Cisco, 2003). Institutions suc...

K through 12 Instructional Technology

best for them. * Provides a "full picture" result that standard approaches may not be capable of illustrating meaningfully....

Internal Auditing and Use of Technology

they occur on a continuing and regular basis. This is the case for risk management; personnel database and skills inventory...

Contemporary World and 'Sacred' Technology

Work, Leisure, Community and Everyday Life" author Richard Florida (2002) contends that we have changed because we have sought ch...

Information Techology Outsourcing Trends

Outsourcing is becoming more and more prevalent. The purpose of outsourcing is to achieve optimum results for the functions that a...