SEARCH RESULTS

YOU WERE LOOKING FOR :Technology at Shell

Essays 571 - 600

Technology and Changes in American Culture

were large multi-branched entities and several generations typically lived under one roof. This was, in fact, a necessity in thes...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Aspen Technology Inc Case Study

fees over the period of the license which complies with the matching concept in accounting. It may be argued that there was an imp...

Organizing Function Of Management: Knowledge And Technology

decisions; rather, it extends deep into the very core of the company so as to assemble an operation where every single entity work...

Child Tracking Technology: Protecting Those With Cognitive Disorders

with some type of cognitive deficit disorder such as dementia or Alzheimers. In order to anticipate the percentage of those who w...

Revolutions in Science and Technology

While it is true that Fleming noted the effect of this substance on bacterial growth, the discovery entirely by chance, as Fleming...

TECHNOLOGY CHANGE AND UNDERLYING FACTORS

be involved as end-users, this will need to be taken into account in terms of training, as well as the amount of resources dedicat...

Using Technology To Support Learning

The research would involve students in science, math, visual arts and language arts. Small groups would also be working together t...

Technology and the Criminal Justice System

and foremost, its reliability for identification purposes (Technology and Human Values, 1997). In addition, it is widely used and...

Sociological Theory, Contemporary Culture, and Technology

the need to separate religion from science, to synthesize the basic principles of the various branches of the sciences into one in...

AMAZON, ORGANIZATIONAL CHANGE, AND TECHNOLOGY

change, because change takes effort. It forces them from their comfort zones, forces them to re-adapt and to take on new things....

TECHNOLOGY, CUSTOMERS AND THE EXAMPLE OF VOLVO

to paying customers. If paying customers are put off by an employees attitude (due to his/her frustration), its a sure bet the cus...

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...

LOCALLY FUNDED TECHNOLOGY - REX, GEORGIA

developed. The problem is, most districts must rely on grants, bond issues and philanthropy when it comes to supporting technology...

Personnel and The Use of New Technology

changes in regard to personnel and how they react and communicate (Painter, 2008). To see how personnel were actually affected, su...

IBM Systems and Technology Marketing

had to recover from losses that the firm may be argued as becoming one that was more marketing oriented. The firm certainly undert...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Learning Theories And Technology

conferencing, and interactive video and audio technologies. These are all student-centered technologies that can build upon prior ...

Technology and Decision-Making in Nursing

showing substantial improvement over these early versions. Recognizing that the task of designing a CDSS is formidable, the Deci...

Information Technology; Business Solutions

which may include the organizational goals and the need to be able to demonstrate accountability. One area where information tec...

Cell Phone Technology

to represent the "geographical area covered by cellular radio antennas" (Farley and van der Hoek, 2006). Such an area is called a ...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

The Leverage of Technology by Boeing

in the manufacture of the new Boeing 787 (Dreamliner) leveraging technology in a way that was not possible for Airbus (Farish, 200...

Information Technology and Management at EasyJet

in with the strategy and the people who use it. It is only by appreciating the technological environment within EasyJet as a whole...

Technology and Ethical Standards and Guidelines

nature of the business culture and the views of all the stakeholders. From a managerial standpoint, the most obvious area ...

Evolution of Cell Phone Technology and Usage

2001, the "Handspring Treo 180" became the first phone to include a QWERTY (standard) keyboard; the Blackberry made its appearance...

CUSTOMER RETENTION IN THE MIDST OF TECHNOLOGY CHANGE

is available to its customer base 24/7. And theres a cost savings to such technology as well (Del Franco, 2007). The problem occur...

Building an Effective Technology Support Team

says, for the leader to provide the team with a written statement of his/her management philosophy, expectations of the team, the ...

The Fremont Technology Plan and the EETT Grant Process

have been implemented in accordance with the Curriculum Component goals, benchmarks and timeline. The Fremont plan identifies t...

Law Enforcement Technology and Due Process

a DNA test reveals that Mr. Smith, who is later proven innocent of the crime hes being investigated for, is the father of Mrs. Bro...