SEARCH RESULTS

YOU WERE LOOKING FOR :Tradition vs Technology

Essays 1501 - 1530

INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wa...

Constantly Evolving Information Technology

In eight pages this paper examines IT's past, present, and future potential. Six sources are cited in the bibliography....

Singapore International Airlines and In Flight Business Technology Enhancement

In eight pages the options Singapore International Airlines can pursue in order to attract greater numbers of business travelers a...

20,000 Leagues Under the Sea by Jules Verne and Futuristic Technology

as if it existed at the time. Carter Kaplan notes that "Verne exhibits strict adherence to known science or pseudo-science, a jour...

Technology and the Works of H.G. Wells and Stanley Kubrick

In seven pages this paper discusses the impact of technology upon humankind as considered in H.G. Wells' novels The War of the Wor...

Disaster Recovery Planning and Information Technology

II. Five Elements of Disaster Recovery Planning IIa. Preparedness and Training In general, a great deal of planning is directe...

TECHNOLOGY AND THE INFLUENCE ON MASS MEDIA

that mass media, by its very nature, is media that involves the masses. Mass communication theory, at its very core, involves the ...

Ethics and medical technologies

are a number of research initiatives which deal with genetic mapping, therapy, and modification. Gene mapping, which is fundamenta...

Negotiation and the Wellington Institute of Technology

means that there are two goals, a short term goals as well as a longer term goals that will help to mitigate the situation so that...

LAW ENFORCEMENT AND TECHNOLOGY

on the predators, with information transferred, through GPS, to appropriate pagers, mobile phones and e-mail (High-Tech Help in Tr...

The Impact of Technology in Preschool

(Schmid, Miodrag and Di Francesco, 2008; Chatel, 2005; Macpherson, 2005; Weikle and Hadadian, 2003). Does this media help or hinde...

Technology and offender motivations in relation to fraud and theft

In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams...

TECHNOLOGY AND BUSINESS

one letter. Looking at that same workflow today, we likely have the boss distributing some notes to his or her administrative assi...

Cell Phone Technology

to represent the "geographical area covered by cellular radio antennas" (Farley and van der Hoek, 2006). Such an area is called a ...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Chapters One and Two of Managing the Information Technology Resource by Jerry N. Luftman

distributed and applications were developed to support individual needs" (Luftman 4). The contemporary era has been described as o...

Article Review on Miami's Project CHILD Program and Technology

non-participation. The independent variables for this study were the outcomes of student performance relative to standardized tes...

Chapters Nine and Ten of Managing the Information Technology Resource by Jerry N. Luftman

computer support specialist, system analyst, database administrator and desktop publishing specialist. In order to qualify as an...

Technology Effects on Education

curricula and, he asserts that computers are frequently a "waste money; theyre sitting in the back of the classroom" (Learner, 200...

World Wars and Changes in Technology

tanks as well, but the paper is too short. There are of course many other possibilities such as small arms, nuclear weapons, and...

Ideology and Technology of the Second World War

to that war the battleship, for example, had come to be regarded as the ultimate offensive weapon. While Hitlers emphasis was on ...

System Development Life Cycle and Information Technology

lead to the finished product; maintenance equates to the use of the finished product and ensuring it remains workable and useful t...

An International Cruise Line Alternative Information Technology Initiative

certain amount of control when another company runs its IT functions. A second alternative is to set up their own IT systems that...

Questions on Information Technology Examined

objects will interact (JavaBeans, 2003). Unlike the ActiveX control that can be written in any language, the Java applet can be w...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Aspen Technology Inc Case Study

fees over the period of the license which complies with the matching concept in accounting. It may be argued that there was an imp...

Adoption of Technology in Classrooms

so frequently that it is simply accepted as a maxim. However, data from the third annual "Teachers Talk Tech" survey, which was ta...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

Technology and Changes in American Culture

were large multi-branched entities and several generations typically lived under one roof. This was, in fact, a necessity in thes...

COMMUNICATION PROCESS, ORGANIZATIONAL STRUCTURE AND TECHNOLOGIES

allow electronic storage, all of that paper can now go into a particular box on the hard drive, which saves space and time (as its...