SEARCH RESULTS

YOU WERE LOOKING FOR :Technology of Submarines

Essays 1321 - 1350

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...

A Case Study Featuring AcuScan, Inc.

to make the August launch date but without the required funds. This is both logical and emotional. The logic is based on Pats info...

Organizing a Breakfast Meeting

reaching potential customers, but all the formerly existing ones continue to be available as well. An electronic approach can aug...

Company Strategy Planning

is that of information gathering. There needs to be an understanding of the companys core competencies and the resources that are ...

eCommerce History

put a spacecraft into space, but they had not yet managed a manned flight and the US work feverishly to be the first to achieve th...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

IP Telephony's Status and Future Trends

of realising these advantages are less than investing in a new technology. In order to understand the influence and potential of I...

Overview of IT Project Process Stages

and also who it is that will be using the system and who it is that this use will impact on, for example, in a hospital this will ...

Contemporary Journalism and Cinema and its Perspective Shifts, Influences, and Innovations

the blink of an eye one could carry on a conversation with someone half way across the world. What came from this mingling of cult...

Article 'Teaching Design Taking the First Steps' by Scott Warner

be brought together. The process involved with technological design, then, is systematic, creative and iterative, and recognizes...

Overview of Multimedia and Social Culture

sense that more affluent nations will tend to display a high percentage of multimedia owners in relation to poorer ones: technolog...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...

Steinway's Supply Chain

chain, they are firm infrastructure, human resource management, technological development and procurement (Porter, 1985). At all l...

Analysis of the Internet's Past, Present, and Future

was no such thing as an Internet. In fact, the term "Internet" wasnt widely used until 1982 (PBS Online, 1997). The term itself, ...

Westward Settlement and Environmental Effects

Americans from the land). In addition, during the early part of the century and by Congressional Act, the U.S. forbid fore...

Business and IT

information is good. However information is only useful if it can be acted upon. Where there is information overload there may b...

Technological Advancement and Janet Abbate's 'Inventing the Internet

much stayed on one plot of land for much of their lives, passing the land to the children when they died. Then the children grew u...

Assessment of Value Creation

the values that may be gained. If they were not then these were tools which could have been used. The first tool...

E-Commerce Questions

seen in many banks, who not manage relationships when suggestively selling, offering products suitable to the customers lifecycle ...

Technological Change According to Goran Carstedt, Peter Senge, and Hans Jonas

capital and harvesting resources to create financial gains. Technology has simply been devised in order to promote further econom...

Economic Philosophies of John Kenneth Galbraith

did the so-called "technostructure" - the idea that technology can have an impact on the economy (Landry, 1998). Furthermo...

Industrial Cultures and Development

of technological change, views of communication, education and technological change all relate to the concept of determinism and t...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Suppressing Fires with the New Sapphire System

want to consider replacing Halon systems if possible due to the environmental concerns. The introduction of the Sapphire Fire Supp...

Baker and Young Information Systems Upgrade Recommendations

had to call on them and they did not have to place a phone call. Likewise the process of delivering the information to a central d...

Accounting Profession and the Effects of Information Systems

however, technological accounting functions were mainly stand-alones - they werent a whole lot different from the old by hand ledg...

Information Age and Social 'Technophobia'

who created the buggy whip? Many believe that technophobia is a modern syndrome, but in fact, it is not. During the Indust...

Global Mobile Phone Industry Overview

Jolly (2002) also reports that there were an estimated 150 million cellular telephone subscribers in China. There is some disagre...

Virtual World and Electronic Commerce

quite sophisticated and "a large number of potential users may interact with each other" (Shen, Radakrishnan and Georganas, 2002; ...