SEARCH RESULTS

YOU WERE LOOKING FOR :Is Technology Good or Harmful to Life

Essays 331 - 360

Special Interest and Courses Description

include the subject of your research?] This course teaches the student not only how to conduct research but how to read it. ETEC 0...

Sgt. Alvin C. York's Life

As he grew older he was also well known it seems for being something of a delinquent at times. While being very good with a firear...

Planning Strategy and Information Technology's Value

are dependent on the efficient use of the higher levels of corporate information available now. Astute organizations are cognizan...

Society and Technology

of political life" (1969, 55). Mesthene sees technology as detrimental and provides examples. For instance, cities have mass trans...

Digital Technology's Pros and Cons

fact play a significant role in terms of the emerging 3G wireless appliances. It could in fact be that telephones could double as ...

Factors That Influence Strategic Implementation

that value is added to the customer and more custom gained. If a weakness is location then this may be the opportunity for change....

Information Technology's Pyramid Levels

for creating value for the larger organization, providing a "map" of precisely where the organization needs to be going next. ...

Biography of D.H. Lawrence

"was a former schoolteacher, greatly superior in education to her husband. Lawrences childhood was dominated by poverty and fricti...

New Businesses, the European Union, and the IPPC

by the relevant regulatory bodies in each country. The approach is different in each country due to the principle of subsidiary. T...

Philosophy Defined by Philosphers

explain why this is so. Descartes also questioned the ability of a dreamer to know whether or not he is dreaming. Many people do a...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

SAS 99 Compliance and Lucent

financial information and balance sheet, its first a good idea to examine what, exactly, compliance means under Sarbanes-Oxley and...

Sports Fans and Advanced Sports Technology's Negative Effects

Americas favorite pastime seen better days. The lure of money is the single most important lure that has allowed advanced t...

2D Ultrasound Technology versus 3D Ultrasound Technology

obvious; two dimensional imaging is a more limited view, and the distinctions that can be made because of the use of a more graphi...

British Fashion Photographer David Bailey

prospect of becoming a photographer became less remote, perhaps even attainable" (Kodak, 2003). Bailey then finished with his n...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

The Jewish 'Father' Abraham

Michalowski explains, "Each person also had an additional, personal god" (Szulc, 2001, p. 90). A close interaction with this pers...

Islamic Women's Lives

Women had been treated as possessions of their husbands; Islamic law made the education of girls a sacred duty and gave women the ...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

The Technological Evolution of Computers

term was used broadly to reference any machine which handled data (even manual calculators and the like) (New York Public Library,...