SEARCH RESULTS

YOU WERE LOOKING FOR :Technology of Submarines

Essays 1021 - 1050

Technological Change According to Goran Carstedt, Peter Senge, and Hans Jonas

capital and harvesting resources to create financial gains. Technology has simply been devised in order to promote further econom...

Analysis of the Internet's Past, Present, and Future

was no such thing as an Internet. In fact, the term "Internet" wasnt widely used until 1982 (PBS Online, 1997). The term itself, ...

Industrial Cultures and Development

of technological change, views of communication, education and technological change all relate to the concept of determinism and t...

Company Strategy Planning

is that of information gathering. There needs to be an understanding of the companys core competencies and the resources that are ...

eCommerce History

put a spacecraft into space, but they had not yet managed a manned flight and the US work feverishly to be the first to achieve th...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...

A Case Study Featuring AcuScan, Inc.

to make the August launch date but without the required funds. This is both logical and emotional. The logic is based on Pats info...

Organizing a Breakfast Meeting

reaching potential customers, but all the formerly existing ones continue to be available as well. An electronic approach can aug...

Economic Philosophies of John Kenneth Galbraith

did the so-called "technostructure" - the idea that technology can have an impact on the economy (Landry, 1998). Furthermo...

IP Telephony's Status and Future Trends

of realising these advantages are less than investing in a new technology. In order to understand the influence and potential of I...

8 Points of a Productivity Audit

take form. During necessary organizational strategy revisions, the mission statement is one of the first documents addressed; by ...

Greece's 3G Telecommunications

this fro the perspective of Greece, where the third generation technology has only gone live in January of 2004, we can see a patt...

Continuation of 'Historical Development of Shannondale Nursing Home'

nursing shortage has meant for SNFs that they have fewer RNs available to them and that recruiting and retention has become more c...

Electrical Equipment Manufacturing Changes in America

three to five years in the future. The Traditional Supply Chain With the three leading competitors in the industry located ...

Eastman Kodak's Problems

a competitive advantage. Porter defined two types of competitive advantage. These are cost advantage and differentiation. These ar...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Competitive Advantage and Southwest Airlines

the U.S. Department of Transportation gave a name to the phenomenon - the Southwest Effect (Southwest, 2003). It refers to the con...

5 'Golden Threads' and Their Implications

and Shared Minds Implications for business are clear. All of these threads weave together in the effective organization to...

Information Techology Outsourcing Trends

Outsourcing is becoming more and more prevalent. The purpose of outsourcing is to achieve optimum results for the functions that a...

IT Project Tender Invitation Case Study

to support the window operating system and alternate operating systems on the computers in the network. The system will also need ...

Management Information Systems and the Credit Card Industry

style of credit cards, all the way to redeeming award points summary online, a service offered by Citibank both in Malaysia and in...

2 Industries and Ethical Standards

is Gatifloxacin." Before the doctor can order the medication, yet another screen pops up and tells the doctor that he needs to tak...

WLAN Weaknesses in Security

A wireless LAN uses radio technology in order to transfer the data between the different terminals (Cisco, 2003). Institutions suc...

Accounting Profession and the Effects of Information Systems

however, technological accounting functions were mainly stand-alones - they werent a whole lot different from the old by hand ledg...

Online Security

confidential information, hackers have found other ways to make trouble. In February of 2000, a Michigan-based medical products f...

Bear Gram and the Vermont Teddy Bear Co.

to protect against the fall in sales due to economic factors. The company started in 1981, and have grown by using differentiati...

Brief Company Analysis of Vermont Teddy Bear Co.

sees the companys competitors not as other toy or plush doll/animal companies but as companies who sell greeting cards, chocolates...

Information Age and Social 'Technophobia'

who created the buggy whip? Many believe that technophobia is a modern syndrome, but in fact, it is not. During the Indust...

Supply Chain Management and Warehousing

employee in a company has the responsibility to improve production. Under kaizen, a company takes ideas from its employees, along ...