SEARCH RESULTS

YOU WERE LOOKING FOR :Career Paths for Information Technology Workers

Essays 301 - 330

Informaion Technology and the Construction Contractor

not been as visible. The starting point of construction has benefited from CAD layer programmes for many decades. However, it may ...

University Healthcare Call Center Construction and Implementation

nurse desk or to another location for prescription refill. Messages are recorded on paper message pads, after which the message i...

Information Technology Knowledge Needed by a Risk or Security Manager

nuts and bolts of I.T., or is a cursory knowledge sufficient? In part, the answer lies in management ideology. Do managers need to...

Information Technology in Brazil

to develop a thriving ICT industry, and Brazil has done just that. The criteria for making this judgment were: first, the enviro...

IT Project Assessments

of scoring with the scores weighted to reflect the needs of the business. We will assess each individual and then compare the scor...

Enterprise Resource Planning and Supply Chain Management

made (Harrington, 2002). In managing the supply chain there are many aspects that may be amended or adjusted to create val...

6 Cases and Technology

that companies that imitate the original and enter the market later (de Haviland had a passenger jet before Boeing, but who today ...

6 Articles on Technology

second problem that arises is when one design begins to dominate the market. For instance, what aircraft designer today wants to ...

Information Technology and the Meeting of Organizational Structures and Operational Objectives

There are two types of organizational structures that tend to be used when it comes to IT management and objectives -- these are t...

School ICT and Student Research

disagreements. The data was collected with the use of self completing questionnaires. This option was chosen as it was felt this...

IT and Changes to Society

is never as robust as the high that preceded it, and it "ends with a sudden shock ... and the economy rolls over into the next con...

Fitness Center IT System Design

deal with scheduling and resource planning and will also need to keep tack of results, such as leagues or matches where there are ...

Work, Group Members, and Technology

state level, such as MEDS and SFIS, a Statewide Fingerprint Imaging System. MEDS is a database application holding client informa...

IT Acquisition by Developing Nations and Strategies of Identification

at the structure of global trade it is already recognised that developing countries face many major disadvantages. They have less ...

Large Information Technology Projects Management

in large complex projects (McElhearn, 2004, Kerzner, 2004). If we look at the different aspects of the projects such as lifecycle ...

Information Technology Design and Gender Bias

including illiterates, but the emphasis shift to what it terms the I-methodology. The I-methodology was able to take the i...

MIS Case Study of Cathay Pacific Airways

2005). The company was initially headquartered in Shanghai but was subsequently moved to Hong Kong (Cathay Pacific Airways, About,...

UK's Dabbs.com and Information Services

and did not fit in with the business model. The company was started in 1990 by David Atherton as Dabbs Direct and was a mail ord...

Managerial Impact of Developments in Information Technology

that outsourced some of their IT needs, Kodak and British Petroleum Exploration (BPX), because the management structures were very...

Statement of the Problem of Managing Military Information Systems Technology

reliable and trustworthy information systems" (Wolthusen, 2004, p. 102). In fact, the development of military-based software and ...

HRM and Kraft Foods Inc.

(Brand Strategy, 2006). The restructuring plan runs through 2008, thus, one might think that will be the end of Krafts labor reduc...

Money Laundering Detection Through Information Technology

with suggestions for making the presentation of the research proposal a success. Introduction Money laundering is the practice o...

Cafeteria Services Information Technology System Analysis

theft, especially when there is a large amount of exposure to non employees in the form of students. The risks of theft may be s...

Chapter Summaries of Managing the Information Technology Resource by Jerry Luftman

then goes back and discusses each level of the five level conceptual framework and how the six criteria apply to each one. For exa...

IT Project Task List and Risk Management Plan

old systems to new needs, but Acme Hospital appears not to be hindered by this affliction. It fully expects to acquire all new ha...

Questions on Information Technology Examined

objects will interact (JavaBeans, 2003). Unlike the ActiveX control that can be written in any language, the Java applet can be w...

An International Cruise Line Alternative Information Technology Initiative

certain amount of control when another company runs its IT functions. A second alternative is to set up their own IT systems that...

Home Health and Hospice Company Business Requirement Analysis

critical matters, employee requests for information often go unanswered for too long. Results can and have been employee frustrat...

Chapters Nine and Ten of Managing the Information Technology Resource by Jerry N. Luftman

computer support specialist, system analyst, database administrator and desktop publishing specialist. In order to qualify as an...

Knowledge Management and the Roles of ICT and Social Processes

which interaction takes place and arte key to the formation of culture within an organization. Social process take place regardles...