SEARCH RESULTS

YOU WERE LOOKING FOR :Wal Marts Use of Information Technology

Essays 511 - 540

Questions on Information Technology Acquisitions

should not conflict, and may also help to achieve the goals. The way the project is planned and undertaken will need consider othe...

Implications of the Sarbanes-Oxley Act

of the marketplace by big business (Bittlingmayer, 2002). Catanzaro (2000) accuses President Richard Nixon of using antitrust law ...

THE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY AND ORGANIZATIONAL STRATEGIES

to have better outcomes - rather than spending a lot of money (not to mention wasted time and effort) on the latest IT fad, these ...

Impact on Society, Innovation in Communications Technology, Impact on Society

several decades have witnessed the emergence of revolutionary technological innovations in communications, which have greatly affe...

Using Technology in Education

In a paper of ten pages, the author reflects on the use of technology as a tool for instruction. The author considers the use of ...

INFORMATION TECHNOLOGY – TRENDS AND USAGE

Focuses on using smart phone technology for a supply chain in a Fortune 500 company. There are 3 sources listed in the bibliograph...

Competitiveness of Taiwan and IT

In fifty pages this literature review examines how information technology has contributed to the competitive position of Taiwan. ...

Student Information Technology Case Study

This paper consists of a student presented case study in five pages involving a telecommunications' company's IT strategic plannin...

Economic Growth and the Influence of IT

In fourteen pages Taiwan and Asia are examined in a consideration of how information technology influences regional as well as glo...

Mergers and Information Technology Opportunities

In ten pages this paper discusses a British brewery merger between two companies and the IT system and multinational structural is...

Economic Productivity Paradox Overview

In six pages this paper examines the economic productivity paradox in an overview of its background, information technology expend...

Mergers and IT Considerations

In eight pages this paper discusses mergers and what needs to be considered regarding information technology issues. Six sources ...

Mobil and Communication Through IT

In ten pages this report discusses how Mobil utilizes information technology for communication purposes. Nine sources are listed ...

Harley Davidson's Information Technology and HR

In eleven pages this paper examines Harley Davidson in SWOT analyses of its Information Technology and Human Resources systems. S...

Business, Technology Uses, and the Internet

In three pages this paper discusses the impact of the Internet on businesses in this overview of how new technology is being used....

Educational Computing Instructional Strategies

In fifteen pages this paper examines the integration of information technology into different kids of educational units. Ten sour...

Considerations for IT Implementation Projects

The writer looks at a number of issues that should be considered by those planning and implementing information technology project...

Overview of Medication Errors

the University of California at San Diego, researchers analyzed over 62 million death certificates for the years 1979 through 2006...

Assessing the Value of an Information Technology Risk Assessment

value would then be assessed as a result of the savings that were created less the costs of putting those savings in place. Increa...

Requirement for a New IT System

involvement in the system, this will clarify the functionality requirements. Information will also be gathered from the users, suc...

Organizational Efficiency and the Integration of Information Technology Solutions

it that has highlighted existing inadequacies all throughout the company structure. By examining each of these deficient areas in ...

SUNSWEET, TECHNOLOGY AND LOGISTICS

There is little doubt that todays supply chain is becoming very complex and multifaceted. This is a result of consistent outsourci...

SECURITY AT ST. JOHN’S HOSPITAL

isnt being seen - and read - by unauthorized personnel (such as the cleaning crew or perhaps the cleaning crews friends). The like...

RIORDAN MANUFACTURING: STRATEGIC IT FACTORS

Focuses on strategic information technology factors to be considered by Riordan Manufacturing when it makes its move from Hangzhou...

Choosing an Information Technology System

to evaluate the best course of action and to make the decision. This process may take seconds, or may take months, depending on th...

KUDLER FINE FOODS: MARKETING, ADVERTISING, SALES - AND TECHNOLOGY

In other words, marketing involves everything from ensuring the right products are being offered to the right consumers, to ensuri...

Assessment of Value Creation

the values that may be gained. If they were not then these were tools which could have been used. The first tool...

Information Technology and VMS Operating Systems

"is a 32-bit, multitasking, multiprocessing virtual memory operating system" (Article 73391, 2001). OpenVMS Alpha is the 64-bit v...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...