SEARCH RESULTS

YOU WERE LOOKING FOR :Ayers In the Presence of Mine Enemies

Essays 91 - 120

Community Concerns and Social Workers

operation on the top of a mountain. Standing nearly ten stories high, this machine is capable of leveling even the tallest of moun...

Business Intelligence Competitive Tool of Data Mining

"junk" from the system before uploading the data and implementing a data mining tool. PNC Bank Corp. is used as an example of a ...

Data Mining and Business Intelligence

in the United States, decided to purchase Model 1. V. Conclusion Those businesses which apply data mining tools will have the adva...

A Diamond Industry Study

considered the jewels of the extremely wealthy - diamonds and mink go together, it seems, much like coffee and milk. In short, whe...

Machine Learning, Data Mining, and KM

new information becomes available. This requires a dynamic form of programmes that will facilitate machine learning. In this paper...

Issues Involving Computer Viruses

In a paper consisting of twenty one pages compromised computer security and Internet privacy are just two of the issues considered...

Land Mine Marketing and Ethics

area where the mines were laid" (14). Only the most determined and profit-oriented marketer or the one with no sense of moral scru...

Analyzing An Enemy of the People by Henrik Ibsen

In all honesty, Dr. Stockmann fails to think outside his scientific reasoning. He is, in a sense, blind to those who do not believ...

Laura Sonnets by Petrarch

most tragic play" (line 8). Furthermore, he attests that this love is his "constant gate and fountain" of grief" (line 12). This ...

Physical Punishment, Child Labor, and England in the 1800's

and these changes, perhaps more so than any other factor, manifested themselves in part in the manner in which children were expec...

Susan Mattern's Rome and the Enemy Imperial Strategy in The Principate

In five pages this book is examined in an overview that wonders if the contemporary world could have such a foreign policy. Three...

Business and Data Mining

that have already occurred (Nash, 1998). The purpose can be to determine which websites generate the most traffic and where that ...

A Summary of Enemies: A Love Story

to marry considering she is dead. Yadwiga and Herman live in Coney Island where he continues to take care of Yadwiga out of obli...

Direct and Indirect Effects and Native American Water Rights

importance than some treaty provisions given the location of most Native American reservations in the arid West (Lewis, 2001). Wa...

South America and the Population Impact of Sixteenth to Eighteenth Century Silver Mining

also set a precedent with regard to the extent of South Americas extended reach into new and previously uncharted territory. O?at...

A Review of David Christian's Article, 'Silk Roads or Steppe Roads? The Silk Roads in World History'

This paper discusses in 5 pages the notion that silk roads represent broad terms in world history not just in terms of civilizati...

1954 Blacklisted Film Salt of the Earth

In fact, information included in the DVD release of the film explains that Biberman was arrested while filming the movie and had t...

Cripple Creek Days by Lee

In two pages this paper compares Buffalo Bill's portrayal of the development of the West with the Cripple Creak, Colorado's mining...

Tanako Shozo and the Ashio Copper Mine

In eight pages this paper discusses the Ashio Copper Mine of Japan, environmental law, and the contributions of the first Japanese...

Comparison of Ethel Wilson's 'The Window' and Joyce Marshall's 'The Enemy'

In five pages the similarities and differences that exist in these two short stories are contrasted and compared. Two sources are...

Organizational Data Collection and Knowledge Management

In ten pages this paper discusses the organizational management of knowledge in an examination that includes various information t...

Regional Economies and Geography

In seven pages this paper discusses how regional economies are impacted by geography in a consideration of the coal mines of north...

Case Analysis of Information Systems Management

In five pages this case analysis presents a problem definition regarding privacy invasion through data mining, problem justificati...

Internet Marketing Information Management

is the electronic process of searching for patterns in events that have already occurred (Nash, 1998). The purpose can be to dete...

Internet Marketing Information Management II

In ten pages data mining is discussed with the focus being on opt in mailing list approaches. Thirteen sources are cited in the b...

The Relationship between Kantian Theory and Environmental Destruction

The writer discusses Kantian Theory, which says that people who do not live up to their ethical responsibilities have no respect f...

Holding the Line

The writer examines the Barbara Kingsolver book Holding the Line, which discusses the 1983 mining strike in Arizona. The book reve...

Operational Commander Implications for the Banning of Antipersonnel Land Mines

In fifteen pages these issues are presented in an overview that considers the implications for an operational commander that may r...

Henrik Ibsen's An Enemy of the People, Nathaniel Hawthorne's The Scarlet Letter and Humiliation

In five pages this paper examines how humiliation is used as a theme in Ibsen's play and Hawthorne's novel. Two sources are cited...

Overview of the Molly Maguires Group

In six pages this paper examines the violent post Civil War labor history of the Pennsylvania coal mines in this overview of the M...