SEARCH RESULTS

YOU WERE LOOKING FOR :iMac Computer Marketing

Essays 1141 - 1170

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Overview of Hypertext

, 2000). Hypertext, when it is combined with the telecommunications revolution, surely becomes the largest change in the way in...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

How Computers Weaken Language Skills

a poem as well as a human being, the real problem is not skill, but in ideology. That is, many people tend to rely on computers an...

3 Education Research Proposals

policies, implementation and use may occur, impacting different stakeholders. 2. Methodology To assess the way popular media a...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Computer Hacking's Impact

in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Comparative Analysis of Computers and Humans

feel. They can not alter their communication style, or any other style, to better communicate and establish a connection with the ...

Using Computer Networks and Security Issues

In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

Globalization and Technology

In five pages this paper discusses how businesses have been affected by the computer technology that gave rise to globalization. ...

Strategic Procurement and Supply Chain Management

In ten pages this paper examines Dell Computer Corp. in a consideration of supply chain management and strategic procurement with ...

IT's Impact on HRM's Changing Role

In seventeen pages this paper examines how human resource management has been affected by computers and the use of information tec...

High School Curriculum and Computer Integration

In five pages this report discusses the significance of computers in the high school educational curriculum. Four sources are cit...

Japan, the U.S. and the Computer Games Industry

In nine pages this paper discusses microenvironmental and macroenviromental issues as they pertain to the computer games industry ...

CRT Monitors, Effects, and Diseases

In seven pages this report considers the effects of excessive computer use with such health issues as electromagnetic radiation, b...

Overview of Internet Crime

In fifteen pages this paper examines Internet crime in a consideration of system security concerns and the threats posed by comput...

Apple Computer - Case Study

The writer gives a short history of Apple Computer, a statement of the problem and a possible recommended course of action. The wr...

Network Selection

In five pages a company in need of a computer network is discussed in a hypothetical scenario that considers choices, configuratio...

Banking Industry and Computer Technology

banking, and so on. Workplaces are good places to examine how the dreams and dilemmas of computerization really work out for larg...

Computer Operating Language Python

used; this decreases the costs of the learning process as well as the programme maintenance processes. The language supports modul...

Computerized Charting, Ethical and Legal Considerations

In six pages this paper examines the increased hospital use of computers to record charts of patients from ethical and legal persp...