SEARCH RESULTS

YOU WERE LOOKING FOR :Using Computer Networks and Security Issues

Essays 1921 - 1950

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Health Care, Data Security, and Legislation

of a celebritys medical information and so on, there has been prompt attention to security by the law. There are many situations ...

Foreign Policy and the Influence of Intelligence Agencies

Secretary of Defense and Chairman of the Joint Chiefs of Staff and serves as an advisor on military intelligence issues" (DIA, 200...

Banking Industry and Computer Technology

banking, and so on. Workplaces are good places to examine how the dreams and dilemmas of computerization really work out for larg...

Analysis of Shoplifting in America

product movement analysis reports, the number of actual shoplifter apprehensions, and the revelation of demonstrable signs of thef...

Computer Operating Language Python

used; this decreases the costs of the learning process as well as the programme maintenance processes. The language supports modul...

SWOT Analysis of Gateway

In five pages Gateway Computers is subjected to a SWOT analysis of the company's strategy, positioning, finances, and conditions o...

Strategic Procurement and Supply Chain Management

In ten pages this paper examines Dell Computer Corp. in a consideration of supply chain management and strategic procurement with ...

Technology and Leadership

their life or the life of those around them? A leader has the "capacity to create or catch vision." In other words a leader has ...

Computer Hardware Change Management and its Implications

In six pages this paper examines how computer hardware changes have significant risk and reward implications for corporate managem...

James Jeffords' Political Party Change and the Conflict Between Liberal and Conservative Views

In six pages this paper discusses the ideological conflict between conservative and liberal political part, the role of social sec...

Apple Computer - Case Study

The writer gives a short history of Apple Computer, a statement of the problem and a possible recommended course of action. The wr...

Future Demands on National Security

It also presents a valuable model for the most effective aspects of integration at all levels of a combined operation. Background...

Small Business and the Marketing of Computer Services

In seven pages this paper examines small business in an assessment of end to end computer systems services marketing with marketin...

Europe and its Common Security Policy Failure

In sixteen pages this paper examines the European Union in an analysis of why the implementation of a policy regarding common secu...

IT's Impact on HRM's Changing Role

In seventeen pages this paper examines how human resource management has been affected by computers and the use of information tec...

Security Risks of Data Warehousing

In eight pages a possible security risk posed by a company's external data warehouse is examined in terms of the business's altern...

Nortel Networks and Training of Employees

In five pages a Nortel HR manager is interviewed in a discussion of employee training and development with planning and program st...

Computer Game Technology in Japan and the US

In nine pages the computer game industry and its technology in the United States and Japan are the focuses of this comparative ana...

Globalization and Technology

In five pages this paper discusses how businesses have been affected by the computer technology that gave rise to globalization. ...

Local Area Network Topologies

In five pages this paper discusses the advantages and disadvantages of various transmission alternatives in this consideration of ...

Post 1945 Russian and Eastern European Security Affairs

In five pages this paper discusses the measures these regions took with regards to security following the Second World War until t...

Computers and Social Problems

In five pages this report examines the social problems associated with computers and increased technology in the twenty first ce...

Possible Futures For The Microsoft Corporation

antagonize the government. Gates attitude appears to be one of the principal factors behind why the ruling went against Microsoft....

Societal Impact of Technology

the combination of industrial productivity and high mass-consumption principles. The crisis of Fordism was essentially a crisis of...

U.S. Naval Operation Earnest Will and Hostile Intent

flag patterned in stars and stripes and printed in the colors red, white and blue. These new flags proclaimed that each tanker ha...

Company Profile of Dell

In nine pages Dell is examined in a company profile that includes discussion of the computer industry and its micro and macro leve...

Problem Definition and Solutions

In five pages this paper defines a Y2K computer bug and then considers some possible strategic development solutions. Three sourc...

Datacom and Telecom Network Electronic Media Convergence

performing various office tasks through the use of individual computer workstations, each of which is connected to one another thr...