SEARCH RESULTS

YOU WERE LOOKING FOR :Technology and Minorities

Essays 1921 - 1950

Contemporary Organization's IT Uses

In fourteen pages this paper discusses organizational communications and the role of information technology in the U.S. Army in a ...

Documentation in the Digital Age

In twenty pages the creation and storage of information in the age of digital technology are discussed with the preservation of di...

Information Technology of CompuNet

In eleven pages this extensive case study focuses upon the technology reliance of CompuNet that includes a SWOT analysis, internal...

Future Trends and RISC Technology of IBM

In twenty pages this paper analyzes the RISC technology of IBM in order to determine whether its future development can be recomme...

Model Dissertation Proposal for RISC Technology of IBM

In eight pages this dissertation proposal evaluates research preparations regarding the RISC technology of IBM and whether this st...

PepsiCo and IT

In fifteen pages this report examines the information technology of PepsiCo in a consideration of policy, strategic, and objective...

Information Technology of 'Switches'

In three pages this research paper examines the ATM information technology of 'switches' in terms of their engineering and computa...

Case Study on Video Vision's IT

the scheduling issues for high quality titles. Second, the hotel has been able to provide the necessary information to distributo...

Computer Espionage and Emergencies of National Security

In five pages this paper examines the computer espionage threats to national security and technology being developed to eliminate ...

Supuercomputer Industry and Technology Export Control Effects

In fifteen pages the regulations regarding technology exports that were implemented more than five decades ago and their supercomp...

Successfully Communicating Across Cultural Lines

As the world continues to shrink, cross-cultural communication becomes even more important. This paper examines countries like Per...

Singapore and the Marketing of Video Games

In ten pages this paper discusses what must be considered when marketing home video games to the Singapore market in a considerati...

Australia Business Expansion Investigation

In fifteen pages this paper investigations possible plant expansion to Australia in a consideration of the country's economy, educ...

Computers in the Future and the Internet

In seven pages this paper considers Ralph M. Stair and George Walter Reynolds' text Principles of Information Systems - A Manageri...

Future Role of IT and Telecommunication Companies

In twenty pages this paper discusses the connection between information technology and telecommunications companies in a considera...

Science, Technology, and Public Relations

In five pages this paper considers how public relations influences technology and science with a story of Kuwait provided as an ex...

Consideration of the Brazil for Investment by a Biomedical Technology Firm from the United States

These types of development are reflected in the healthcare that is demanded and expected (Bilton et al, 2006). In terms of the so...

Privacy and Technology

impossible for anyone to lead a truly private and secluded life. The reader and writer of this essay could be under a surveillance...

TECHNOLOGY AND INSTRUCTIONAL DELIVERY

school turned to its Center for Distributed Learning (CDL) which was "quickly overwhelmed with requests for assistance" from facul...

Implementing Information Technology Compliance

comparison IT application controls are designed to ensure that specific applications are functioning correctly, which may include ...

Information Technology for a Shopping Center

duel purpose, to provide a system, of observations and as a deterrent. The tying of the system with an IT system, will allow for a...

Technology and Culture: The Electronic Media and Our Children

accounts of child abductions, rapes, and murders practically every day. We are kept up-to-date on the violence in Iraq and that u...

BADERMAN ISLAND RESORT AND TECHNOLOGY

in each room? Would the reservations be accessible through the hotels television sets? How would the remote systems work? This wou...

INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wa...

Negotiation and the Wellington Institute of Technology

means that there are two goals, a short term goals as well as a longer term goals that will help to mitigate the situation so that...

Constantly Evolving Information Technology

In eight pages this paper examines IT's past, present, and future potential. Six sources are cited in the bibliography....

Singapore International Airlines and In Flight Business Technology Enhancement

In eight pages the options Singapore International Airlines can pursue in order to attract greater numbers of business travelers a...

20,000 Leagues Under the Sea by Jules Verne and Futuristic Technology

as if it existed at the time. Carter Kaplan notes that "Verne exhibits strict adherence to known science or pseudo-science, a jour...

Technology and offender motivations in relation to fraud and theft

In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams...

TECHNOLOGY AND BUSINESS

one letter. Looking at that same workflow today, we likely have the boss distributing some notes to his or her administrative assi...