SEARCH RESULTS

YOU WERE LOOKING FOR :Technology in an Organization

Technology of Cellular Systems

Kims research suggests that protein mechanisms may explain how viruses, such as the flu and HIV manage to work their way into our ...

GENEX FUELS AND TECHNOLOGY

Presents a case study about IT management at the fictitious Genex Fuels. There is 1 source listed in the bibliography of this 6-pa...

Technology and Internet Banking

as the use of passwords have not been sufficient to discourage the hackers. The development of SSL protocols helped increase secur...

Stress of the Workplace and the Impact of Technology

proficiency. Because technology-related job stress -- and the management of it -- has become a focal point in the workforce, empl...

Student Questions on the Information Technology Slump Answered

may be little consolation for those who fear losing their jobs, but it can be seen as a gesture so that others will not suffer. A ...

Sales and Technology

amount of information that is required for them to function effectively (Colombo, 1994). Computer applications can be used to crea...

DEC Compaq Merger and Information Technology Integration

had occurred during the meetings. The two companies were very different in their approach to business. They sought to comp...

Strategies for Creating Technology Equity

The key to this strategy, then, is to determine that a critical mass of computers is available for each classroom, in order to exp...

Porter's Applicability to Retail's Information Technology

of operation of the organization. Thus it "is in these activities that a firm has the opportunity to generate superior valu...

One of the Negatives of Advanced Technology: Identity Theft

his or her social security number written on various documents, someone that throws all mail into the trash without securing vital...

AT&T and VoIP Technology; Strategic Issues

U.S. Department of Justice and AT&T. It was at this time that the environment was changing, competition was seen as good for the i...

Cell Phone Technology

to represent the "geographical area covered by cellular radio antennas" (Farley and van der Hoek, 2006). Such an area is called a ...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Aspen Technology Inc Case Study

fees over the period of the license which complies with the matching concept in accounting. It may be argued that there was an imp...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

Case Studies and SWOT Analyses of Wind Technology, Harley Davidson, and KFC

2002). The Yum! Brands company is the worlds number 2 company after McDonalds (Hoovers Business, 2002). Strengths. Becaus...

Future Directions for Information Technology

IBM coined a phrase referring to "technology with self-regulating and self-healing technologies" (Knorr, 2002; p. 106), naming the...

Building an Effective Technology Support Team

says, for the leader to provide the team with a written statement of his/her management philosophy, expectations of the team, the ...

Evolution of Cell Phone Technology and Usage

2001, the "Handspring Treo 180" became the first phone to include a QWERTY (standard) keyboard; the Blackberry made its appearance...

The Leverage of Technology by Boeing

in the manufacture of the new Boeing 787 (Dreamliner) leveraging technology in a way that was not possible for Airbus (Farish, 200...

Technology And Conception

solely for gender selection and family balancing options. For couples using in vitro fertilization (IVF), the option for genetic ...

Technology Transfer in the Middle East

then needs to be facilitated, with employees and local companies able to benefit from the importing of the technology. The aim of ...

Windows: A Key Technology in the Development of Multimedia Computing

Such was not to immediately be the case, however. DEC canceled the project in its preliminary stages and the world would have to ...

Man and Technology: Three Views of Our Future

of sex and love. Harraway explores technology from a feminist perspective, from the perspective of how man and machine can blend ...

Cognitive Science And Information Technology

ability to outreason and outlearn their human counterparts, leaving humanity open to an entirely unknown reality if that is ever t...

Emotional Intelligence in the High Technology Workplace

Indeed, even prior to Golmans book the importance of the ability to interrelate with others as a factor in determining business su...

Does Information Technology Still Provide Competitive Advantage?

on the manufacturing sector. There, the author says, the "competitive advantage is provided by integrated information systems" (T...

The Use of Technology, and Privacy Issues, at Cayuga Medical Center

of the staff and patients. All things considered, it seems that information security policies are well implemented. 2. Describe ...

Organizational Efficiency and the Integration of Information Technology Solutions

it that has highlighted existing inadequacies all throughout the company structure. By examining each of these deficient areas in ...

Choosing an Information Technology System

to evaluate the best course of action and to make the decision. This process may take seconds, or may take months, depending on th...