SEARCH RESULTS

YOU WERE LOOKING FOR :Using Technology in Business

Essays 2581 - 2610

Past and Present Artificial Intelligence

right now. AI is still in its infancy. However, as an application toward various processes, for example, the gaming industry, it i...

Asymmetrical Threat Assessment Through Geospatial Applications

"decision support tool " for those who work in the field of homeland security. It tells an observer where someone is, who he is as...

Using Drugs and Social Deviance

who may then need assistance from the government. They put a burden on society if they steal and harm others in an attempt to get ...

Laser Technology Overview

factor, in particular. That factor is light. To understand the importance of light in laser technology we can look to yet ...

Uses and Value of Military Protocol

uses is analogous to military customs and courtesy required of all members of the armed forces. Far from being little more than e...

Competitive Advantage and Technology

and Millar (1985) noted some 20 years ago that information technology ends up creating a competitive advantage by offering the bus...

The Development of the Fyborg

situations in terms of past experiences. Capra (1997) refers to this pattern as the "Computer Model of Cognition" (p. 65), ...

Platform Game PACT Analysis

a mixture of male and females, but with a skew to males as these are the dominant user group. However, where the platform has the ...

Globalism, Technology, Capitalism, and Sport

transnational, those that promote the American way of life and "transmit American popular culture" across the globe (Keys, 2000). ...

Revolution Known as the Internet

their own by virtue of in-class Internet instruction. One of the most prevalent ways in which the Internet has changed the way to...

Using the Cognitive Dissonance Theory to Evaluate the Decision of ER Doctor Elizabeth Corday

decide whether it was right to go against the law to do good. Many situations come up for individuals where they must decide what ...

Strategy and Position of Cisco Systems

In this paper, well provide proof that Cisco knows what its doing by comparing its activities to that of one of its closest compet...

Application of C# Programming Uses of VB.NET

applications (Win2000.com, 2005). C# basically helps simplify programming, and combined with VN.NET, helps develop Web application...

Critical Response to Cell Phone Technology

voice is composed of sine waves, each of which has amplitude, frequency, and phase (Stern and Mazella, 1996). Amplitude is the wa...

Critical Response to the Film The Gods Must Be Crazy

anthropological data on this tribe, it is impossible to say precisely where this assessment errs, but err it must, simply because ...

National Football League and the Effects of Instant Replay Technology

bit (as he states) and managed to slow down the frame time. Stop Action was born. Soon the Airforce contacted Jim to ask if he mig...

Speech on Using Seat Belts

age between 3 and 33 (2002 Top Causes of Death by Age Groups, 2003). At 35 and through the age of 64, cancer moves into the lead ...

2025 Organizations

is likely to be smaller, from the standpoint of square footages. With employees being able to connect with companies via intranets...

Overview of Computed Axial Tomography Scanning Technology

on this project may want to note that Ledleys original machine is now housed at the Smithsonian Institution. As with virtually a...

Reproductive Technology and Identity

to be inferior (Chesterton, 1922). The idea behind this premise was to protect the American "identity" which in many ways was stil...

Workplace Impacts of Technology

customer inquiries and concerns (Olsten Forum Reports, 2002). And, in terms of organizational culture, the Internet allows compani...

Labor Relations' Environmental Changes and the United Auto Workers Union

be surprised by their recognition of the changes that have taken place, and what the future may hold (2001). II. About the UAW ...

Design and Cyber Culture

definite plus (Grunin,2002). Looks count too, as consumers are barraged with a plethora of choices in the marketplace (Grunin,200...

Protein Synthesis, RNA, and DNA

amino acid sequences of Proteins" (2003). In figuring out the Genetic Code one can see how a sequence of bases as contained in RNA...

Asia's WLAN and 3G Communications Markets

as Japan being an early adopter for new technology, and many other countries still lagging behind. Third generations teleph...

Changing Technology and Resulting Moral and Social Threats

availing the public with bits and pieces of peoples lives to which they would not otherwise be privy. Inasmuch as Internet commun...

Human Resource Management and New Technologies

check, act; recognition of the need for continuous improvement; and the use of measurement to evaluate systems and practices and t...

Using a Particular Biblical Genre to Preach the Gospels of Jesus Christ

it is not always easy to let go of what is of this earth; worldly possessions are so hard to come by, some people make them the fo...

Operations Management and IT, TQM, and JIT Effects

* Manufacturing flexibility is essential (Green and Inman, 2000). * Customers define quality (Green and Inman, 2000). * Team effor...

Javacom Case Study on Risk Assessment and Behavior

involves analyzing influence factors that could have an impact on the base cost estimate (Igbal and Rye, 2002). Ranging is the pro...