SEARCH RESULTS

YOU WERE LOOKING FOR :Society and Technology

Essays 1591 - 1620

War Generation, Depression, and Infochild

with little respect for or understanding of any other generation that did not share in the same advancements. Harv just thinks Ma...

Motivation and the Building of Teams

those skilled have become more specialised. In effect the ultimate team maybe compared to the single craftsman, and the modern tea...

Internet Technology and Morality

compromising of principles much more likely. For example, it is noted that the Internet opens the doors of pornography and cyber a...

IT Outsourcing

emerging service companies to deliver accounting, human resources, data processing, internal mail distribution, security, plant m...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

Appendicitis and CT Scans

of Computerized Tomography Scans (CT) in diagnosing abdominal conditions is highly debated. Baker emphasizes that the procedure p...

Hotel Industry and IT

a joint venture called The Hotel Industry Switch Co (THISCO). THISCO linked airline computer reservation systems and a majority of...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

Technology Sector and Government Spending

with the advent of the North American Free Trade Agreement (NAFTA), Tennessee retained most of its textile companies for another d...

The Changing Nature of Health Care in the U.S.

expected only to continue for several years to come. Then, growth will begin to decline in response to fewer numbers of people re...

Global Companies and Lotus System and Application Implementation

In fifty pages this paper discusses how a global company would introduce an information technology communications system in this c...

National Health Service Information System Implementation Methodology

this thesis makes use of the Actor Network Theory it is appropriate to use a research paradigm that may be seen as able to cope wi...

Relational Databases and JDBC Driver Types

within the database stores one sort of data that is relevant to the application (Spruit, 2002). As an example, an address book mig...

Industrial Effects of IT

is still perceived as strong, and the use of computers has moved from being seen as a source of competitive advantage., to a neces...

Istanbul and Megacities

on the European shore. It is on both the land and sea routes of Asia and Europe. Istanbul has the advantage of being on the Blac...

Technology in Government, Its Responsibility and Role

In six pages this paper discusses the relation of Internet technology and the role the government should play regarding the protec...

Business and International Logistics

In fact, many corporations, McDonalds included, are experiencing "strong sales and creating new jobs"2 for most of their internati...

Traditional Film Methods and Digital Film of the Future

In twelve pages this paper examines traditional film methods and the increased reliance upon digital technology in a contrast and ...

Global Trade, Investments, and Technology

and easier to understand than walking in to a brokerage firm with a list full of questions. When you first go in to one of these s...

Analysis of Alan Lightman's “The Diagnosis”

has a serious neurological breakdown of his own. Bill has a sudden and disturbing memory loss - he is unable to remember the name...

Information Management and Hotels

their study was that: "... a best practices study is important at this time is the industrys consolidation. The industrys intense ...

Electronics and Consumerism

most significant inclusion. In looking at consumer electronic products of the twenty-first century and beyond, it does appear tha...

Post Second World War and Global History

that the Russians "made very serious mistakes" (Booth 37). In an attempt to avert a secret attack, President Kennedy ordered Prem...

Can Computer Crime Be Effectively Fought?

attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent ba...

A Corporate Productivity Audit Analysis

eight sections of the audit were addressed in the productivity audit with the following findings: Policy: The depiction of the co...

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...

Contemporary Medicine and the Impact of 'Telemedicine'

as we see advances in the world of telemedicine. INTRODUCTION The literature review of telemedicine articles is based on inform...

Dell - A Case Study

U.K. and Canada, and the company is aggressively pushing into Asia and Europe (Gibbs 35). The role of formal knowledge in develop...

Organizations and Environmental Compliance

Solutions are typically technocentric, cost-driven and reliant on end-of-pipe technology (1997). These solutions were typical duri...

Classroom Technology and the Education of Teachers

teachers in technology, and how to implement it in the classroom, children who graduate from schools will be better prepared for t...