SEARCH RESULTS

YOU WERE LOOKING FOR :Technology of Submarines

Essays 1201 - 1230

IT and Its Social Aspects

In six pages this paper discusses the social elements associated with information technology and its constantly changing organizat...

Overview of Past and Future of CD ROM

CD ROM technology is considered in this overview consisting of twelve pages that discusses past history, manufacturing of the medi...

Computer Music and its Social Effects

This paper discusses how digital or computerized music and its technology have significantly affected society in five pages. Four...

Cyberculture and Its Sociological Ramifications

In ten pages this paper examines the mutual changes resulting from the relationship between society and Internet technology in a c...

Contemporary Robotics

In fifteen pages this research paper discusses U.S. industrial uses for robotics and considers artificial research technologies an...

Twenty First Century US Army

In eight pages this essay examines the application of computer technology to the twenty first century American Army. Five sources...

The Uses of TCP/IP Protocol Today

their old SNA (systems network architecture) for crucial applications (Passmore, 1997) as real or potential hybridization of netwo...

Communications and Fiber Optics

In six pages communications and fiber optics technology in terms of development and applications are presented in this overview. ...

The Road Ahead by Bill Gates

This paper consisting of six pages emphasizes Gates' future vision regarding technology in order to take issue with his points. T...

The Road Ahead by Bill Gates 2

suggested that his book was one long commercial for the company. At the same time, computer professionals should give the book a ...

The Road Ahead by Bill Gates 3

In five pages this text in terms of its technology and scientific influence is examined with points contained within the book expa...

Security Introduction

In forty pages this paper discusses U.S. security in an introduction to a paper including such topics as technology, security mana...

Contemporary Educational Profession Issues

In twenty five pages this research paper discusses various teaching issues such as liability for educators, technology, computers,...

Information Techology Outsourcing Trends

Outsourcing is becoming more and more prevalent. The purpose of outsourcing is to achieve optimum results for the functions that a...

IT Project Tender Invitation Case Study

to support the window operating system and alternate operating systems on the computers in the network. The system will also need ...

8 Points of a Productivity Audit

take form. During necessary organizational strategy revisions, the mission statement is one of the first documents addressed; by ...

Greece's 3G Telecommunications

this fro the perspective of Greece, where the third generation technology has only gone live in January of 2004, we can see a patt...

Continuation of 'Historical Development of Shannondale Nursing Home'

nursing shortage has meant for SNFs that they have fewer RNs available to them and that recruiting and retention has become more c...

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...

A Case Study Featuring AcuScan, Inc.

to make the August launch date but without the required funds. This is both logical and emotional. The logic is based on Pats info...

Organizing a Breakfast Meeting

reaching potential customers, but all the formerly existing ones continue to be available as well. An electronic approach can aug...

Company Strategy Planning

is that of information gathering. There needs to be an understanding of the companys core competencies and the resources that are ...

eCommerce History

put a spacecraft into space, but they had not yet managed a manned flight and the US work feverishly to be the first to achieve th...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

Electrical Equipment Manufacturing Changes in America

three to five years in the future. The Traditional Supply Chain With the three leading competitors in the industry located ...

Eastman Kodak's Problems

a competitive advantage. Porter defined two types of competitive advantage. These are cost advantage and differentiation. These ar...

Brief Company Analysis of Vermont Teddy Bear Co.

sees the companys competitors not as other toy or plush doll/animal companies but as companies who sell greeting cards, chocolates...

Information Age and Social 'Technophobia'

who created the buggy whip? Many believe that technophobia is a modern syndrome, but in fact, it is not. During the Indust...

Global Mobile Phone Industry Overview

Jolly (2002) also reports that there were an estimated 150 million cellular telephone subscribers in China. There is some disagre...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...