SEARCH RESULTS

YOU WERE LOOKING FOR :Blu ray Technology

Essays 241 - 270

SAS 99 Compliance and Lucent

financial information and balance sheet, its first a good idea to examine what, exactly, compliance means under Sarbanes-Oxley and...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

Society and Technology

of political life" (1969, 55). Mesthene sees technology as detrimental and provides examples. For instance, cities have mass trans...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Choosing a Manufacturing Site

are better suited to more developed economies. Central and Eastern Europe Central and Eastern Europe hold a mix of nations ...

Technology And New Management Styles

partially resolved and the organization no better for the unfinished effort. Since the late 1980s, the concept of total quality m...

The Relationship Between Technology And Human Freedom

minds and bodies has become somewhat of a hobby with the presence of such technology as mood-altering drugs and cosmetic surgery (...

Information Systems Technology Projects Fail

all projects falls between 66 percent and 90 percent depending on which survey data one relies on. Engle (2007) reported that 90 ...

Quincy Jones for the Rock and Roll Hall of Fame

into rock and roll but focused more on jazz, pop and soul. His production capabilities are legendary, in no small part because of...

Gone with the Wind's Cinematography

that "Tara is the whole story" as the plot revolves around Tara" (Schreibman, 2004, p. 41). The cinematography particularly unde...

Leadership at the Battle of Ia Drang

from Georgia (Kingseed, 2002). From this painstaking experience, Moore says he learned that a person must first learn to lead them...

Was Young King Tut Killed

When King Tut's mummified corpse was x-rayed, there was a strange black section on the base of his skull that the doctor said coul...

Technology’s Impact in the Business World; Cause and Effect

with thee increased control that is given over the inventory. In many industries tools such as just in time inventory control are ...

Cognitive Science And Information Technology

ability to outreason and outlearn their human counterparts, leaving humanity open to an entirely unknown reality if that is ever t...

Importance Information Technology And CIO

sites must have up-to-day information available for all their sites quickly (Hall and Suh, 2004). In fact, they need to have the c...

Past and Present Motion Picture Special Effects Technology

actual event with which the audience is familiar with an example being the Pearl Harbor catastrophe of December 1941 that was repr...

Man and Technology: Three Views of Our Future

of sex and love. Harraway explores technology from a feminist perspective, from the perspective of how man and machine can blend ...

Emotional Intelligence in the High Technology Workplace

Indeed, even prior to Golmans book the importance of the ability to interrelate with others as a factor in determining business su...

Does Information Technology Still Provide Competitive Advantage?

on the manufacturing sector. There, the author says, the "competitive advantage is provided by integrated information systems" (T...

The Use of Technology, and Privacy Issues, at Cayuga Medical Center

of the staff and patients. All things considered, it seems that information security policies are well implemented. 2. Describe ...

Resource Dependency Theory, Contingency Theory and Core Technology

over a great deal with social exchange theory and the study of politics in the workplace (Huczyniski and Buchanan, 2003). The use ...

Elementary Schools, Mathematics Achievement, and Technology

thing that was certain was the fact that simply having computers in a classroom did not mean they would have any effect on student...

“The Tools of Empire: Technology and European Imperialism in the Nineteenth Century”

use of both primary and secondary sources are used throughout the book and the message if the interdependent link between imperial...

Bluetooth Technology

with seven more, then very quickly were up to hundreds of individual devices that can communicate with one another via Bluetooth. ...

Letter Writing: Untouched By Technology

to bridge great distances, and economy...The downside is more subtle--it includes the positive turned inside out:...informality an...

Technology: Terms and Companies

WiFi- This term means a wireless network, that being a network of computers that does not rely on wires or cables but is...

Useful Wearable Technology

Over the past several years, there have been a plethora of technological innovations focusing on health information and behavior, ...