SEARCH RESULTS

YOU WERE LOOKING FOR :Apple Computers Leadership Problems

Essays 211 - 240

LEADERSHIP AND MANAGEMENT: THE NECESSITY

to believe. Successful organizations, however, have people that are both. They have leaders who know how to manage and managers wh...

COST LEADERSHIP: AN EXPLANATION

Strategy, 2009). Wal-Mart, which touts its low prices, has used technology and a very lean supply chain to wring every last saving...

S&F AND LEADERSHIP CHANGE

been established. The COO has found this in the early days, and realizes that there are some huge problems underway because of it...

Aspects of Leadership

This 8 page paper describes various types of leaders and leadership styles. Bibliography lists 8 sources. ...

Kingship and Leadership in Shakespeare’s Richard II

years because he seems to care a bit for the father of Henry, John of Gaunt. In these respects one can see that Richard II may wel...

Leadership Qualities of Mahatma Gandhi

This paper discusses India's fight for independence along with Mohandas K. Gandhi's leadership attributes and what influenced him ...

Case Study on Leadership Styles

In ten pages this paper presents a case study on introducing change to a company in a consideration of various styles of leadershi...

Costs and Benefits of Computer Mediated Communication

There have been some expected benefits that have also proven to be false expectations. It was expected that computer based communi...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...

Systems' Downtime and Business Solutions

In a paper consisting of eight pages solutions to downtime in business are considered in terms of intangible and tangible costs as...

Federal Government Sharing of Strategic Information

In seven pages this paper discusses the problems associated with capital planning and budget computer information storage in a con...

An Overdoes of Intravenous Medication and a Change Theory Application

while in the hospital plus the incidence of symptoms and/or disease that would have initially required use of the medication. In ...

Commercial Environment and Computer System Implementation

In eight pages a case study is used to discuss the problems involved in the development and implementation of a business computer ...

Y2K, the Year 2000, and Thereafter

Twenty first century management is examined in this paper that discusses the managerial challenges presented by the Y2K computer p...

Role of Management in Avoiding Y2K Catastrophe

In fifty pages this comprehensive research paper examines how management in the corporate sector can successfully tackle the probl...

Year 2000 Problem and its Economic Implications

The problem of panic is directly linked to the perceptions and actions of a number of Y2K alarmists, who have argued that the gove...

Obvious Impacts of the Millennium Bug

This paper examines the various computer problems associated with the date change to January 1, 2000 in eight pages. Eight source...

Computers and the Y2K New Millennium Bug

This paper examines the many computer problems that can result from the Y2K bug upon the year 2000 in five pages. Three sources a...

Civil Engineering Applications of Computer Technology

In fifteen pages computer technology is examined within the context of its impact upon civil engineering in terms of operations an...

Bilingual Education and Computer Technology

In eight pages this paper discusses bilingual education programs and the problems and challenges of computer technology implementa...

Computer Phobia and Gender Differences

they need from its depths. It has been estimated that only about 10 percent of approximately twenty million internet users around...

HIV Youth and Computers

In five pages this report discusses computer technology as it pertains to youth afflicted with HIV in terms of applications and po...

Election Process Impact of Computers

willing to give. "The chief problem with paper is that it takes too long to count thousands or millions of ballots. We are just ...

Modern Life Run by Technology and Computers

about half of all Americans, according to one source, have Internet access (Roberts, 2005). But still, the number of people buying...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Small and Medium Business Accounting Information Systems

In this five page paper the impact of accounting systems on small and medium sized businesses are assessed with such issues as the...

Current Trends Regarding Network Security Issues

home office or to transfer sensitive documents to the boss. It was found that others would enter the home offices portals - hacker...

Operations Problems at Riordan Manufacturing

immediate vicinity of the goods Riordan is receiving. There are several problems with this arrangement, not the least of wh...