Filter By:

Sort By:

Reset Filters

Sun Microsystem Essays (Examples)

Having trouble coming up with an Essay Title?

Use our essay title generator to get ideas and recommendations instantly

Performance Management System Within Sun
Words: 4451 Length: 12 Pages Document Type: Term Paper Paper #: 15909196
Read Full Paper  ❯

Measures should be developed at every level of the organisation as this will help in the measurement of performance at those levels. Again all services and teams will have action plans that they will have to meet which will make sure that the organisation reaches its goal. There has also got to be indicators for individuals as this will determine their performance for their teams and the organisation. (Measures of performance) the total service plan has to focus on the corporate and service objectives, highlight the important matters to the customers and staff, and the decision about the ultimate user of the information and their purpose for getting the information. (Key steps to effective performance measurement)

The measurement of the task done is against the information and there details that one has indicators for the objectives and also decides whether the task done will be meaningful and robust. The total…


Foundations of performance management. Retrieved at

Glick, Bryan. 2005. Trudy Norris-Grey, Sun Microsystems UK managing director. 13 April. Retrieved at 

Hats Off to Communicators a Great Success in Denver. 2001. Spring, Volume: 9; No: 3.

Retrieved at

Identification When One Company Looks at Taking
Words: 1010 Length: 3 Pages Document Type: Essay Paper #: 37625936
Read Full Paper  ❯


When one company looks at taking over another company that are many issues that must be looked at before a final bid can be put on the table. The first thing that the buying company must do is determine a vision for the combined companies. In the case of Oracles buy out of Sun Microsystems the visions that Oracles' Ellison was to transform the combination of the two companies into the Apple for the business customer by delivering high-quality, seamlessly integrated consumer products where software and hardware components were developed in conjunction, thus minimizing the customer setup process.

Ellison developed this vision by looking at what Sun Microsystems had that Oracle didn't and how would this acquisition help to better Oracles position in the market. If a company can buy another company at a practical price that has a unique niche in a particular industry it will more than…

Dell Inc
Words: 6698 Length: 15 Pages Document Type: Term Paper Paper #: 41200013
Read Full Paper  ❯

Dell Inc.

The head office of Dell is at Austin, Texas at the same place where the company was based. Dell Americas is also located in Texas, which is the regional business unit for the United States, Canada and Latin America. The regional headquarters offices of the company are in England, for Europe Middle East and Africa; in Singapore catering to Asia-Pacific; and in Kawasaki, Japan, to serve the market for Japan. The production unit for the manufacture of computers is located in Texas, Tennessee, Brazil, Ireland, Malaysia, and China. Dell Computer Corporation sells products and services meant for Information Technology and the Internet backbone. The proceeds of the company for the previous four quarters were $31.2 billion. (Stories of Entrepreneurs: Michael Dell)

Dell's product, pricing, distribution, and promotion strategies


The Dell product line-up of high performance computer systems comprises of PowerEdge servers, PowerApp server applications, PowerVault storage products,…


Bean, Michael. The Price Strategy Simulator: Anatomy of a Price War Hewlett-Packard / Compaq vs. Dell. Retrieved at . Accessed on 16 October, 2004

Best practice resources enabling lean manufacturing excellence. Retrieved at . Accessed on 16 October, 2004

Brief Description of the Product/Service. Retrieved at Accessed on 16 October, 2004

Build-To-Order Model for Success (Part-II) Retrieved at Accessed on 16 October, 2004

Microsoft Office Is the Most Popular Comprehensive
Words: 631 Length: 2 Pages Document Type: Term Paper Paper #: 86628619
Read Full Paper  ❯

icrosoft Office is the most popular comprehensive bundle of productivity applications in the world. It contains word publishing, spreadsheet, presentation, e-mail, and database software and is most often used with the icrosoft Windows operating system. It can also be used with the Apple acintosh. The icrosoft Office suite enjoys almost universal worldwide familiarity. The most recent version of S Office is Office XP, which is designed specifically to be compatible with the Windows XP environment.

Functionally, Sun StarOffice is very similar to icrosoft Office. The chief difference is that it is written using open source code and may be altered by programmers to match their specifications. It is the most popular system for Linux and Unix-based computers and utilizes an XTL-based interface. It is considered an 'alternative' to the Windows system because it is popular with developers, who often criticize icrosoft for the fact that the source code is unavailable…

Microsoft Powerpoint allows the user to design presentations that use graphics and visual effects. It is often used in with data that has been created in Excel. Microsoft Access is a database project that allows the user to enter and manage data and sort according to fields. Its chief limitation is that it is meant for one user to operate at a time. StarOffice Impress has essentially similar features, but uses the Macromedia Flash format to present its documents. Sun Microsystems pioneered Java Internet application technology and most computers have the capability of reading flash documents.

Datasheet: StarOffice 7 Data Sheet.

Microsoft Office XP: Office Home.

Computer Company Rivalry
Words: 690 Length: 2 Pages Document Type: Term Paper Paper #: 2737378
Read Full Paper  ❯

battles of the C# and Java wars between Sun and Microsoft. The winner will greatly affect the entire internet which in turn means they are in control of major part of our modern world. The net offers us a plethora of possibilities and opportunities. For example, I know that I can't live without my daily emails, chat and of course I am a big fan of music downloads and bargain shopping. The future of not only information technology is tied to the internet, but business in general as more companies move to the likes of the net for B2B and b2c marketing. The bottom line is that the internet is really comprised of nothing more that physical hardware that runs on intricate software with routers and Local Area Networks (LANs) sprinkled around the world. Basically, the company that grabs a monopoly hold over the rest of the industry can make…

Works Cited

Niccolai, James. "Sun's Gosling Testifies In Java Case." InfoWorld. September 9, 1998: Retrieved on 16 May 2005, from .

Sullivan, Tom and Ed Scannell. "Microsoft, Sun At War Again Over Java." InfoWorld. (2001): Retrieved on 16 May 2005, from <  >.

Computer Clustering Involves the Use of Multiple
Words: 2319 Length: 8 Pages Document Type: Term Paper Paper #: 54692503
Read Full Paper  ❯

Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single integrated system (Cluster computing). Clustering has been available since the 1980s when it was used in Digital Equipment Corp's VMS systems. Today, virtually all leading hardware and software companies including Microsoft, Sun Microsystems, Hewlett Packard and IM offer clustering technology. This paper describes why and how clustering is commonly used for parallel processing, batch processing, load balancing and high availability.

Despite some challenges such as achieving transparency, mitigating network latency and the split-brain problem, clustering has proven to be a huge success for bringing scale and availability to computing applications. Hungry for even more efficient resource use, IT departments are now turning their eye on the next evolution of clustering called grid computing.

Parallel processing is the processing of program…


Beowulf clusters compared to Base One's batch job servers Retrieved May 2, 2004 from Web site:

Burleson, D. Requirements for parallel clusters. Retrieved May 1, 2004 from Web site: 

Cluster computing. Retrieved May 1, 2004 from Web site:,sid10_gci762034,00.html 

D'Souza, Marco (2001, April 13). Meeting high-availability through clustering. ZDNet. Retrieved May 2, 2004 from Web site:

Crisis of Microsoft Lawsuit
Words: 797 Length: 3 Pages Document Type: Term Paper Paper #: 85536209
Read Full Paper  ❯

Crisis of Microsoft Lawsuit

The Microsoft Lawsuit: Microsoft vs. Sun

The emergence of computers has brought a name in the computing industry as the giant of all giants - the Microsoft. Microsoft is a company that was started and established by one of the richest man in the world today, ill Gates. Whenever we use a computer, we must remember that 98% of all computer users in the world uses Microsoft applications and tools as the major content that fills the hard disks space of our computers. Microsoft has indeed achieved the trust and confidence of most computer users worldwide.

Despite of the success that Microsoft has been reaping from its patrons, who are continuously growing in number, and where most of the Microsoft products became the standard tools for them, a large number of issues are being faced by the company. Most of which are lawsuits concerning contracts with…


Microsoft Agrees to Settlement that Protects Future Integrity of the Java Platform.

Lawsuit Related Information, Sun v. Microsoft.

Java Network Computing Technologies
Words: 2035 Length: 8 Pages Document Type: Term Paper Paper #: 52966845
Read Full Paper  ❯

Internet Inter-OR Protocol (IIOP)

Java Network Computing Technologies

Internet Inter-OR Protocol (IIOP) is a protocol that enables distributed programs located anywhere in the Internet to communicate with each other. It is an interoperability protocol that supports heterogeneous environments. IIOP offers possible communication between applications regardless of the platform and programming elements used in their development.

IIOP is an element of Object Management Group's (OMG) standard architecture called CORA (Common Object Request roker Architecture). It is a TCP/IP-based protocol and a GIOP mapping that provides standard communication methods between ORs. OR (Object Request roker) is a communication mediator used by CORA during requests and data interchange between clients and servers.

CORA/IIOP is a solution to the complexity that web applications are now becoming. efore, protocols are specifically developed on the basis of applications to allow compatibility in communication. ut with CORA/IIOP, communication is possible between diverse application platforms.

IIOP technology is…


Curtis, David. IIOP: OMG's Internet Inter-ORB Protocol.

OMG. 08 June 2003. 

Golding, Michael. Java Socket Programming.

UEL.AC.UK. 09 June 2003.

Network Security as an Issues for Business Data Communication
Words: 1631 Length: 5 Pages Document Type: Term Paper Paper #: 19332576
Read Full Paper  ❯

Network Security: An Issue for Business Data Communication

Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has made keeping data secure more difficult. The Internet did not change the key issues, just the number of users trying to access the information. Network administrators have been facing these issues for quite some time.

The key security issue facing IT professionals is to protect the system from invaders or intruders known as Hackers. Hackers can be grouped into several categories according to motive. They are Joyriders (who do it for fun), Vandals (who do it to cause harm),…

Works Cited

Atempo. Improving Network Security with Time navigator. 2001. . Accessed July, 2002.

CITES. Introduction to Windows Security. 2002. Accessed July, 2002.

Coffey, Tom, Dojen, Reiner and Flanagan, Tomas. Verification of Cryptographic Protocols used in Fixed and Mobile Networks..Information Security. ERCIM News No. 49, April 2002.  Accessed July 2002.

Joint Information Systems Committee (JISC) Senior Management Briefing Paper 1. 1997.  Accessed July 2002.

Architecture 2a Brief History of
Words: 2876 Length: 10 Pages Document Type: Research Paper Paper #: 15233263
Read Full Paper  ❯

These markets need the categorization of information assets and also the plan of interaction interfaces that conventionally were built up within the organizations. Nevertheless, as the diversities of the access to information and also functionality of these applications are increasing, the difficulties of the organization of information and also the user interfaces that are possible will also increase. Due to this, the architects of information are becoming increasingly concerned with the vertical application development to design and also to put into practice precise architectures to maintain users and also to develop and increase organically with functionality. In a number of instances, vertical IAs might principally be cautiously organized, task-based boundaries to customary end-user applications and databases accessed through a Web browser and customized to every purpose, activity and industry. A common example is the applications of e-commerce which are within commercial Web sites like shopping carts and exact term creation…


Beckett, D., & McBride, B., (2004).RDF=XML Syntax Specification (Revised): W3C

Recommendation 10 February 2004. World Wide Web Consortium, Cambridge, MA.,  / (accessed Mar 27-2011).

Dillon & Turnbull (2005). Dillon, a. & Turnbull, D. ( 2005). Information Architecture. (Pp. 1-9).

In: Encyclopedia of Library and Information Science. New York: Marcel Dekker. Pp. 1-14. Online:

Microsoft NASDAQ Msft Is a
Words: 1744 Length: 6 Pages Document Type: Research Proposal Paper #: 61030746
Read Full Paper  ❯

Further diversification is also recommended. Given the pace of change in the industry, the reliance on PC operating platforms and office software packages must be reduced. The risk of an entirely new technological paradigm emerging is high, so Microsoft must therefore diversify its revenue streams in order to defend against this threat. Overall, Microsoft's strategic thrust is strong and its operating results fantastic. The company must guard against major non-strategic threats such as technological change or acute damage from financial scandal. If Microsoft deals with these two issues effectively, the will remain in good position to continue to build their revenues in the coming years.

orks Cited

Financial and operating unit information from Reuters. Retrieved December 8, 2008 at

No author. (2004) Microsoft Corporation. Funding Universe Retrieved December 8, 2008 at

Microsoft 2008 Annual Report. (2008). Microsoft. Retrieved December 8, 2008 at

No author. (2006). Microsoft's Multiple…

Works Cited

Financial and operating unit information from Reuters. Retrieved December 8, 2008 at /stocks/companyProfile?symbol=MSFT.O

No author. (2004) Microsoft Corporation. Funding Universe Retrieved December 8, 2008 at 

Microsoft 2008 Annual Report. (2008). Microsoft. Retrieved December 8, 2008 at

No author. (2006). Microsoft's Multiple Challenges: Is Its Size a Benefit or a Burden? Wharton School of Business. Retrieved December 8, 2008 at

Systems Administration v Network Administration
Words: 1495 Length: 5 Pages Document Type: Essay Paper #: 72869548
Read Full Paper  ❯

The subject matter of systems administration includes computer systems and the ways people use them in an organization. This entails knowledge of operating systems and applications, as well as hardware and software troubleshooting, but also knowledge of the purposes for which people in the organization use the computers.

The most important skill for a system administrator is problem solving. The systems administrator is on call when a computer system goes down or malfunctions, and must be able to quickly and correctly diagnose what is wrong and how best to fix it. In some organizations, computer security administration is a separate role responsible for overall security and the upkeep of firewalls and intrusion detection systems, but all systems administrators are generally responsible for the security of the systems in their keep. (, 2011)

Network Administrator

What is a computer network? According to McGraw Hill Online Learning Center, "a network is two…


Armstrong, L. (1995), Let's Call the Whole Thing Off

Dignan, Ars Technica, Jan 28, 2001, post 305, - Information Technology- accessed 2011/1/14

Hegel, G.W.F., the Phenomenology of Mind, (1807), translated by J.B. Baillie, New York, Harper & Row, 1967

Comparing and Contrasting Java With C Net
Words: 737 Length: 2 Pages Document Type: Term Paper Paper #: 87178286
Read Full Paper  ❯

C# and Java have more similarities than differences, Java programmers my shun C# is situations where they require high-quality program design, cross-platform portability and runtime extensibility for remote applications. Developers that require a more expressive language than Java are likely to appreciate Microsoft's many expressive features such as metadata availability, event handling, and property access.

The most serious deficiency of C# is the lack of exception handling, meaning that the compiler will not notify the programmer if an exception occurs. Java, on the other hand, allows exception checking and the compiler will generate a compile-time error if the programmer hasn't specified how to handle the exception. The lack of checked exceptions in C# may lead to program designs which are flawed. C# developers must tale extra care to document all exceptions that callers should be aware of.

Java applications are portable across a number of operating systems and platforms. Sun…


Eaddy, Marc. "C# Versus Java." Dr. Dobb's Journal. Feb. 2001. Business Source Premier

Database (EBSCOhost) 3931159

Obasanjo, Dare. "A Comparison of Microsoft's C# Programming Language to Sun

Microsystems' Java Programming Language." Jonas Mockus 18 Feb. 2003.

Quantum Corporation Case Analysis Current
Words: 2826 Length: 10 Pages Document Type: Thesis Paper #: 60708526
Read Full Paper  ❯

Jerry Lopatin is the senior vice president, engineering at Quantum, having joined the company in March 2008. He served in a similar capacity at ONtor, and previously worked at companies such as Iomega, amsung Electronics, IBM.

III Opportunities/Threats

According to Quantum's Web site (2008), it is in a very favorable position in terms of opportunities. By nature, the it world is developing with increasing rapidity, with computers and software developing almost more rapidly than companies can upgrade. Quantum's position is then such that it can make use of this phenomenon by providing companies with solutions that are effective for their changing needs. Change is therefore the main driver of opportunity for the company.

A further driver of opportunity is development. First-world companies are increasingly developing sophisticated it software, as mentioned above. With this, the sophistication of storage needs is increasing. Quantum's team of innovation experts then have the opportunity to…


Quantum Corporation (2008). Data Storage Solutions. .

Quantum Corporation (2008, Aug 13). News Release: Quantum Achieves Major Milestone With 20,000th Shipment of Scalar i500 Tape Automation System.

Quantum Corporation (2008). Board of Directors.  

Wide Web Is Available Around
Words: 14250 Length: 52 Pages Document Type: Term Paper Paper #: 14951486
Read Full Paper  ❯

The reward for the effort of learning is access to a vocabulary that is shared by a very large population across all industries globally" (p. 214). Moreover, according to Bell, because UML is a language rather than a methodology, practitioners who are familiar with UML can join a project at any point from anywhere in the world and become productive right away. Therefore, Web applications that are built using UML provide a useful approach to helping professionals gain access to the information they need when they need it.

Overview of the Study

This paper used a five-chapter format to achieve the above-stated research purpose. Chapter one of the study was used to introduce the topic under consideration, provide a statement of the problem, the purpose of the study and its importance of the study. Chapter two of the study provides a review of the related peer-reviewed and scholarly literature concerning…


Domain Specifications

Specification Name:

Ontology Definition Metamodel (ODM)


New Ways of Workplace Development and Innovation by Using Work Technology
Words: 2466 Length: 9 Pages Document Type: Research Proposal Paper #: 21376127
Read Full Paper  ❯

New Ways of Workplace Development and Innovation by Using Work Technology

This work in writing proposes a research study on technology in terms of its impact on workplace development and workplace innovation.

The work of Meckl (2008) states that innovation system theory "indicates a transition from individual study to systematic research. The innovation system theory combines the dynamic and complexity of innovation. According to this theory, technological innovation interacts with institutional innovation, and the key factors in this system include knowledge, learning, and ability." (p.134) Meckl (2008) states that the entrepreneur is "a core factor in a firm's technological innovation and competitiveness; it is a necessity in technological innovation." Additionally reported in the work of Meckl is that in practice "not only a firm is embedded in the social structure as an organization, but also the entrepreneurs' innovation activities are socially embedded." (Meckl, 2008)

According to Meckl (2008) the technological…


Benko, C. And Weisberg, A.C. (2007) Mass Career Customization: Aligning the Workplace with Today's Nontraditional Workforce. Harvard Business Press. 2007.

Claver E. et al. (1998) Organizational Culture for Innovation and New Technological Behavior. Journal of High Technology Management Research 1998 (8) 55-68 in: Meckl, Reinhard (2008) Technology and Innovation Management: Theories, Methods and Practices from Germany and China. Oldenbourg Wissenschaftsverlag 2008.

Freimuth, J et al. (2002) Organizational Memory and Betriebliche Wissenstruktur, ZfG, 2002 (2), 96-104 in: Meckl, Reinhard (2008) Technology and Innovation Management: Theories, Methods and Practices from Germany and China. Oldenbourg Wissenschaftsverlag 2008.

Glynn (1996) cited in: Meckl, Reinhard (2008) Technology and Innovation Management: Theories, Methods and Practices from Germany and China. Oldenbourg Wissenschaftsverlag 2008.

Building a Secure Workflow Management
Words: 11534 Length: 35 Pages Document Type: Research Proposal Paper #: 30861705
Read Full Paper  ❯

Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message.


Lecture Survey.

The predicted solution of the problems related to e-government administration depends on answering the following questions as brainstorming ideas to solve the problem and the features provided by the system or application.

1. An important step for processing of e-Government.

2. To ensure the confidentiality of information such as contracts for military weapons and other by Providing a high level of security as it is based on singing the data by combining multiple key values like user id, date stamp and transaction id which produce an encrypted key utilized and used only internally by the system for authentication and validation of user privileges. This procedure would make it…


Averyt, William. (2005). E-Government Reconsidered: Renewal of Governance for the Knowledge Age. American Review of Canadian Studies 35(4): 769-770.

Chaffee, a. (2000-08-17). "What is a web application (or "webapp")?"

Cohen, JE. (2000). Examined Lives: Informational Privacy and the Subject as Object. Stanford Law Review 52(5): 1373.

Bourquard, J.A. (2003, March). What's Up with E-Government? Digital Government Isn't a Silver Bullet, but as Part of a Long-Term Plan it May Provide a Means to Reduce State

Front Line Change Experiences the
Words: 877 Length: 3 Pages Document Type: Thesis Paper #: 68969721
Read Full Paper  ❯

Instead the better approach would have been to ascertain which EP vendor would have been more suitable for the task of managing the distributed order management system implementation without forcing major reporting errors (Kanaracus, 2008) in addition to having professional staff on hand to manage the integration and professional services implementation plan. Second, the distractions Oracle faces during the BEA acquisition (Financial Times, 2008) were also reflected in their acquisition of Sun Microsystems recently (icadela, 2009) (Tait, 2010). The front-line experience of the CIO could have been avoided if an analysis of EP vendors had been completed that took into account the potential distractions and lack of focus from working with a vendor known for their merger and acquisitions (Financial Times, 2008).

In prioritizing this experience, the first is the initial success of installing the EP system followed by the lack of follow-through of the Oracle professional services teams.…


Financial Times, 2008, Oracle acquires BEA for Dollars 8.5bn: [ASIA EDITION]. 2008. Financial Times, January 17,

Kanaracus, C. 2008. Overstock's ERP Woes Force It to Restate Results. Computerworld, November 3, 7.

Aaron Ricadela. 2009. Oracle's Sun Deal: Oracle May Need to Loosen Its Grip. Business Week (Online), November 9, 14 -- 16.

Nikki Tait. 2010. Brussels approves $7.4bn Oracle-Sun deal., January 21.

Making a Recommendation to Implement a Particular Product Service or Program
Words: 2320 Length: 8 Pages Document Type: Research Paper Paper #: 94280543
Read Full Paper  ❯

Justification Report for American Beverage Corporation

"There is a growing sense of the world's interdependence and connectedness, and an understanding that progress is an illusion if it destroys the conditions for life to thrive on earth" (Buchholz, 1991). Twenty years ago, business ethicist and university professor Rogene Buccholz made the point that preserving natural resources should be a priority for the business community. Since that time, corporate social responsibility has become an even more important goal. Consequently, we prepared this report to provide the management team of American Beverage Corporation (ABC) with recommendations on launching a corporate environmental and sustainability program.

There are many reasons that ABC should commit to sustainable practices and principles, not least of which is protecting the earth's resources. But as this report discusses, there are compelling economic and business reasons to go green as well. By launching a green initiative ABC will realize the following…

Not only do green practices give ABC a competitive advantage in the market, but like many companies, we expect to be able to sell waste materials to a manufacturer that repurposes or recycles the waste for a profit. General Mills offers one such example, selling the oat hulls left over after making Cheerios cereal. General Mills is reported to have sold 86% of their solid waste in 2006, making more profit from selling it than they spent on disposal (Jenkins, 2010).

Tax Savings

Another savings opportunity associated with going green comes in the form of lower taxes. The government is currently providing businesses with more green tax credits and deductions than ever before. By installing a Geothermal heating system, ABC can qualify for a tax credit of 30%. So in addition to sizable savings on our energy bills, we save 30% off the total cost of the system.

Change Using Kotter's 8 Steps the Three
Words: 1571 Length: 4 Pages Document Type: Research Paper Paper #: 66692477
Read Full Paper  ❯


Using Kotter's 8 steps, the three most significant errors made out of all the change stories presented were: McDonald's failure to create urgency when it implemented its initial menu changes; Kodak's failure to communicate its vision for change; and Fiorina's failure to form a powerful coalition prior to the merger between HP and Compaq Computer Corp. However, it is important to keep in mind that Kotter's approach may not best describe organizational change; its popularity may be more attributable to its usable format than from any evidence that Kotter's approach to change management is superior to competing approaches (Appelbaum et al., 20120).

McDonald's made half-hearted efforts to respond to consumer demands for healthier menu options. However, at that time, it had not seen any reduction in profits because of the perceived lack of nutritional value of its offerings and was not committed to expanding beyond its traditional fast-food repertoire.…


Applebaum, S., Habashy, S., Malo, J., & Shafiq, H. (2012). Back to the future: Revisiting

Kotter's 1996 change model, Journal of Management Development, 31(8), 764-782.

Palmer, I., Dunford, R., & Akin, G. (2009). Managing organizational change: A multiple perspectives approach, 2nd Ed. McGraw-Hill.

Parker, D., Verlinden, A., Nussey, R., Ford, M., & Pathak, R.D. (2013). Critical evaluation of project-based performance management: Change intervention integration, International Journal of Productivity and Performance Management, 62(4), 407-419.

Extensible Markup Language XML Was Born in
Words: 1820 Length: 7 Pages Document Type: Term Paper Paper #: 54375554
Read Full Paper  ❯

Extensible Markup Language (XML) was born in the height of the browser wars in the mid-1990's. As Microsoft, Netscape, and W3C produced new and better versions of HTML. Jon Bosak, of Sun Microsystems, started the W3C SGML working group. Before long this name was changed to XML and the light cousin of SGML was born. Since that time XML has become a major server side resource for web site presentations.

The Standard Generalized Markup Language, SGML, is a very complex and rigid mark-up language used mostly for the publishing industry. Pre-dating HTML, SGML has been around for a little over a decade. SGML is a language for describing markup languages, particularly those used in electronic document exchange, document management, and document publishing. HTML is an example of a language defined in SGML. In order to bring sanity to the chaos the browser wars created, HTML has also become a rigid…

Reference List

Harold, Elliotte Rusty. 1998. XML Extensible Markup Language. IDG Books Worldwide.

Tidwell, Doug. 2001. Transforming XML into SVG [online]. IBM; available at;Internet ; accessed 2 December 2002.

Walsh, Kathy, and Sang Shin. Discover and Publish Web Services with JAXR [online]. Java World; available at;Internet ; accessed 2 December 2002.

XHTML 1.0. The Extensible HyperText Markup Language (second edition) [online]. W3; available at;Internet; accessed 2 December 2002.

Dot Com Boom Annotated Bibliography
Words: 1482 Length: 5 Pages Document Type: Research Paper Paper #: 87212387
Read Full Paper  ❯

The Internet began to rise in the early part of the decade, but the major landmark was the launch of the Netscape Navigator, the pioneering Internet browser. This, combined with significant infrastructure investments on the part of telecommunications companies, helped to drive the rapid growth of the Internet through the 1990s. Already in the mid1990s, companies in the Valley and beyond were beginning to exploit the commercial value of the Internet. By 1995, future giants such as eBay and Amazon had been established.

The early successes of these and other pioneering Internet firms hinted at the commercial viability of the Internet. Investors noted that the opportunity to buy a future global giant at IPO pricing, or near to it, was a rare opportunity. This fueled demand for stock in Internet companies. Although the business models for most Internet companies were unproven, investors were not willing to wait, fearing that it…

Virtual Collaboration Is a New
Words: 2973 Length: 10 Pages Document Type: Term Paper Paper #: 60803429
Read Full Paper  ❯

There are several characteristic that are evident with the software system use in virtual collaboration technology. The first characteristic is that most of these tools are web based and are downloadable; they also have the ability to offer a text chat feature in real time, thereby allowing for the synchronous communication among various users.

The platforms also has VoIP functionality, thereby giving them the ability to transmit sound over the laid down internet infrastructure. The virtual collaboration platform has the ability to allow screen sharing. This therefore allows the individual users to allow their partners to have a look at what they are working on their screens in an instant. The platform must have a presentation facility that allows for the presentation of Power point slides to the audience. The system also has Whiteboard-Live annotation tools which provides the users with a whiteboard type experience and look with the added…


Ackoff, R.L. (1971). Towards a system of system concepts.Management Science,

17(11):661 -- 671.

Bhaskar, R., Lee, H.S., Levas, a., P'etrakian, R., Tsai, F., and Tulskie, B. (1994). an-alyzing and re-engineering business processes using simulation. In Proceedings of the 1994 Conference on Winter Simulation, pages 1206 -- 1213

Biuk-Aghai, R.P. (2000a). Virtual workspaces for web-based emergent processes. In Fourth Paci-c Asia Conference on Information Systems: Electronic Commerce and Web-Based Information Systems, pages 864 -- 880, Hong Kong, China

Glimpse Into How Technology Companies Work Today
Words: 956 Length: 3 Pages Document Type: Term Paper Paper #: 74941878
Read Full Paper  ❯

glimpse into how technology companies work today, and what their strategies are for their continued growth. Hewlett-Packard (H-P) is one of the largest and most well-known high-tech companies in the world. In fact, the article states that it is the world's largest tech company by its revenues. H-P is acquiring 3 Com, a smaller company that has had problems in the current economic climate, to add another set of tools to its arsenal. A vice president with H-P says, "3Com has a better set of networking products for large corporate clients than H-P currently sells and a market share of more than 30% in the China networking market" (Scheck). Thus, H-P is positioning itself for a larger market share in China, and to better compete with Cisco Systems, another well-known high-tech competitor in the Silicon Valley.

Perhaps the most important aspect of this article is not that H-P is branching…


Scheck, Justin. "H-P to Acquire 3 Com for $2.7 Billion." Wall Street Journal. 2009. 14 Nov. 2009. .

Technology Ethnicity and Gender the
Words: 1596 Length: 6 Pages Document Type: Essay Paper #: 23704943
Read Full Paper  ❯

The article on Google is brief, but is worth a note on how the founders put forth the idea of active philanthropy as part of the activity of an it company. Many of the directions in which Google has developed have a certain philanthropy element attached to it.

The Hacker Ethic discusses the moral framework within which the hacker operates. Sometimes, it is difficult to understand how this is possible, given the fact that many associate the hacker with stealing personal information. Nevertheless, there is an ethical and moral code that may explain hacker actions as well and it comprises, among other things, access to information and the money ethic. The hacker issue is however much wider than the limited perception one usually has and involves the Open Source cooperation and, in terms of the economic and material implications, issues of Protestant ethics.

With the final article, it is interesting…

"The Hacker Ethic" discusses the moral framework within which the hacker operates. Sometimes, it is difficult to understand how this is possible, given the fact that many associate the hacker with stealing personal information. Nevertheless, there is an ethical and moral code that may explain hacker actions as well and it comprises, among other things, access to information and the money ethic. The hacker issue is however much wider than the limited perception one usually has and involves the Open Source cooperation and, in terms of the economic and material implications, issues of Protestant ethics.

With the final article, it is interesting to understand how the current development fits into the historical exponential view, which means that the development in the 21st century is no longer related to the actual temporal scale, but is exponential in the sense that the 100 years in the century will mean, in fact, 20,000 years of progress, especially at the current rate things are going. According to the studies revealed in unit 3, the rate of technical progress is doubling every decade. Some of the charts in this unit are more eloquent in showing how this rate has progressively increased in the last decades. The growth was much slower (a less abrupt curve) up to 1970 and much more obvious after 1985-1990.

Following the technological development, the argument of the writer is that the economic development of the 1990s was not a bubble, but rather strictly related to the technological developments that logically triggered the economic boost.

Microsoft Antitrust Battles the It& c
Words: 2684 Length: 9 Pages Document Type: Research Proposal Paper #: 51360303
Read Full Paper  ❯

Additionally, he argued that the best interest of the consumers, as promoted by Gate's organization, was in fact not the core element of new endeavors, as the company had argued, but that whenever a new product or service was being projected, this would be done in order to serve the financial interests of the organization rather than increase customer utility (Kegel, 2006).

In order to better understand why the above mentioned actions were ethical or unethical, it is best to assess them in light of three ethical perspectives. From the standpoint of the utilitarian perspective, the company is able to seek out those actions which maximize its gains, but in doing this, it must remain aware of the needs of others. More specifically, they can work towards their goals as long as these do not impede with the goals of others (Leiss, 1988). From this standpoint, the behavior of Microsoft…


Cooper, C., 1999, Microsoft Antitrust Judgment: Winners and Losers, ZD Net,,1000000121,2074984,00.htm  last accessed on August 14, 2009

Dale, N.B., Lewis, J., 2004, Computer Science Illuminated, 2nd Edition, Jones & Bartlett Publishers

Hunter, D., 2005, More Microsoft Employees to Get Antitrust Training, HunterStrat, / last accessed on August 14, 2009

Kegel, D., 2006, Corporate Ethics, Dan Kegel's Web Hostel,  last accessed on August 14, 2009

Managing Information Technology - Set
Words: 6095 Length: 13 Pages Document Type: Term Paper Paper #: 42345676
Read Full Paper  ❯

The vision Oracle has is one of unifying all of their enterprise applications into their Fusion architecture and creating a single unifying Service oriented Architecture (SOA) was first announced in 2006 (Krill, 13). Since that time Oracle has continually strived to create an SOA in Fusion that would appeal to its corporate customers. The proposed Fusion SOA platform has been designed to be robust and scalable enough to encompass enterprise-level applications including Enterprise esource Planning (EP) applications while also being flexible enough to provide for individualized application development. There are critics of SOA in general and Fusion specifically, with industry analysts considering it too difficult to create a process-centric model that allows for pervasive, in-depth applications necessary for mission-critical business while at the same time allowing for significant scalability (Handy, 2005). Despite these concerns however Fusion continues to gain market acceptance and provide Oracle with a path to the fulfillment…



Alex Handy. 2005. Oracle Fusion: The 'Frankenstein' of SOA? Software Development Times, October 15, 6

Paul Krill. 2006. Oracle Does SOA. InfoWorld, August 14, 11-13


RFID Technology as Is the
Words: 1341 Length: 4 Pages Document Type: Thesis Paper #: 11776892
Read Full Paper  ❯

In an earlier article, Michael Caton (2004), also mentions the standardization issue.

In order for RFID technology to be a viable replacement for the currently used bar code system, standardization is vital. EPCgloble Inc. provides the standards of universal product code information in both bar codes and RFID chips. According to Caton, this company will then also work towards establishing standards for the standardization of RFID use in terms of a variety of applications in the supply chain. This will simplify the interaction between shipping companies, as well as the way in which goods are stored and shipped within each company.

The company also addresses privacy concerns by dictating how RFID data can be erased. Erasing this data is however the retailer's responsibility. Mainly, concerns are that retailers may not take the responsibility of erasing individual item data after these are purchased by customers. This concern is legitimate and will…


Active Wave Inc. (2007). Technology: Advantages of RFID. 

Caton, Michael (2004, Apr. 19). RFID Reshapes Supply Chain Management. Eweek. 

Thryft, Ann R. (2007, Jan). Supply chain Management Challenges RFID Technology. RTC Magazine.

Payment of Dividends Companies Pay
Words: 956 Length: 3 Pages Document Type: Term Paper Paper #: 25243373
Read Full Paper  ❯

This method is popular amongst firms in cyclical industries, as it allows them to curtail dividends during down cycles and reward their investors handsomely during up cycles.

The market analyzes stocks based on their returns, of which dividends are just one components. Dividend policy is considered to be a measure of a company's financial health, and a function of its business situation. The dividend is not considered important for investors in growth stocks, who view the company's business opportunities as being lucrative enough that free cash should be reinvested rather than paid out. Conversely, high dividend stocks, known as "widows and orphans" are considered to be companies in mature industries with steady income streams. The market's view is that there is little to be gained for such companies to reinvest their earnings. ecause of this, the opportunity for capital gains is limited, and investors will require the certainty of a…


No author. (n.d.). How and Why do Companies Pay Dividends. Retrieved June 18, 2008 at 

Dividend payment information from Reuters.

Obligations Science Has Towards Society
Words: 2136 Length: 5 Pages Document Type: Term Paper Paper #: 6661935
Read Full Paper  ❯

(the ole of Science and Technology in Society and Governance, 1998) the most important thing to do is to redefine the role of science for the society and governance.

Looking at the relationship

Science does change society as much as society influences science. In the last century there were tremendous progress in scientific invention and discoveries. The vast expansion both in terms of facilities and information has affected the society to a great extent. The unfortunate part of the advancement is that science benefits the affluent, the corporate and the powers that be. While the changes in the society like medical advancements were brought about by science, they are still available to the affluent, but even insurance is not available to the poor. (Crow, 2001, p. B20)

The role of science and scientists, the thinkers of today is to figure out how they can stream line their progress so as…


Crow, Michael M. 2001. Harnessing Science to Benefit Society. The Chronicle Review


Ross, Andrew. 1996. Science Wars. Duke University Press. Durham, NC.

Gruss, Peter. 2005. History of Science Particular Ethical and Moral Obligation. [Online] Available at

Google Corporate Governance Comes in
Words: 5634 Length: 15 Pages Document Type: Term Paper Paper #: 16905587
Read Full Paper  ❯

The company showed a global reach early, adding numerous language versions around the world. In 2000, the company reached 18 million search queries per day and officially became the world's largest search engine ("Google, Inc." paras. 11-14).

The company now sought to address its need for income by introducing a keyword-targeted advertising program for another source of revenue. The company partnered with Yahoo! And with other partners, such as China's leading portal NetEast and NEC's BIGLOBE in Japan. Google introduced Adords, a self-service advertising program that could be activated with a credit card. By December of 2000, Google received more than 60 million searches per day and reached the 100-million search mark per day in 2001 ("Google, Inc." paras. 15-16).

Google as a Public Company

Google would offer an IPO of stock beginning in 2004. McShane and Von Glinow cite Google as a successful company, especially in terms of navigating…

Works Cited

Bylund, Anders. "All Aboard Google." The Motley Fool (6 June 2007). February 10, 2008. .

Everett, Chad. "The Google Way." Infoworld (23 February 2004). February 12, 2008. .

Google Inc." Hoover's Online (2007). -- /free-co-factsheet.xhtml.

Google, Inc." International Directory of Company Histories, Vol. 50. St. James Press, 2003. Reproduced in Business and Company Resource Center. Farmington Hills, Mich.:Gale Group. 2008.

Blackboard Inc Marketing Plan Blackboard
Words: 4520 Length: 18 Pages Document Type: Term Paper Paper #: 83754903
Read Full Paper  ❯


Blackboard collaborators are primarily divided into three categories: members, partners and channel partners or resellers. "Members are typically Independent Software Vendors (ISVs) who independently develop and market software solutions to extend the Blackboard applications. Partners strategically invest in and collaborate with us to deliver joint solutions to our clients. Channel Partners/Resellers are primarily focused on international sales and distribution of Blackboard software and services."

Blackboard continually collaborates with universities in order to get feedback and improve the products. Among the universities which collaborate with the manufacturer are the University of British Columbia or Princeton

Blackboard collaborates with Microsoft and they have even formed an alliance in order to improve the quality of the e-learning process. "Students and faculty using Blackboard's learning platform, built on Microsoft.NET technologies, will be able to more easily integrate a wider array of academic resources in a learning environment tailored to their individual needs and…

Works Cited

Mark, R., 2001, Microsoft, Blackboard Create e-Learning Alliance, Internet News,,last  accessed on November 12, 2007

Munoz, K.D., Van Duzer, J., 2005, Blackboard v. Moodle: A Comparison of Satisfaction with Online Teaching and Learning Tools, Humboldt State University, , last accessed on November 9, 2007

Zacker, Higher LMS market penetration: Moodle vs. Blackboard + WebCT vs. Sakai,, last accessed on November 12, 2007

2007, Blackboard Inc. Website, , last accessed on November 9, 2007

HP Pretexting Scandal the Hewlett-Packard
Words: 3344 Length: 10 Pages Document Type: Term Paper Paper #: 74518653
Read Full Paper  ❯

Perkins - who had retired at the age of 70 but was coming back on the board - had by this time muscled his way into a powerful position within the HP community; he and his powerful board ally, George Keyworth, held special "technology committee" meetings with key HP people the day before each board meeting. Stewart writes that Perkins' little group actually became a "board within a board," and Perkins' power grew. His disenchantment with Fiorina also grew. Fiorina was apparently losing the confidence of the board, and Perkins was the central figure in that movement away from Fiorina. Prior to the retreat, which was alluded to earlier in this paper, there was a board meeting scheduled, and before that meeting, Keyworth and Dunn approached Fiorina and urged her to "express concerns about Hewlett-Packard's performance, stock price, unfavorable press, and need to reorganize," Stewart continues.

Although Fiorina showed resistance…

Works Cited

Bloomberg. "HP chief opposes board vote plan." Retrieved 12 March 2007 from Australian it .

Broache, Anne. "HP execs: Spy scandal was ethical wake-up call." CNET Retrieved 13 March 2007 at .

Fried, Ina. "HP denies pretexting former employee." CNET (2007) Retrieved 13 March 2007 at

Transnational IT Operations Given the
Words: 870 Length: 3 Pages Document Type: Term Paper Paper #: 84033753
Read Full Paper  ❯

Meeting with department managers to plan out the network topologies, security levels of databases, and uses of the network departmentally. From this a planning matrix is created that guides the installers in getting the departmental Local Area Networks (LANs) connected to the servers. 12b bit encryption and firewalls are installed and tested prior to any servers going online internally.

Laptop docking stations and special-use systems are next installed by department.

Servers and PCs go through a series of network compatibility test to ensure they are running correctly.

The departments become operational again.

Transnational IT Continuity Milestones for Year One

Migration of data from hosting services to company servers.

Definition of a new contingency and risk assessment strategy for the new location including costing for replacement of systems.

Integration of purchasing, procurement and logistics systems with manufacturing.

Transnational IT Continuity Milestones for Year Three

Integration of buyer and supplier relationship management…

Strategic Scaffolding at Apple Strategic
Words: 1089 Length: 4 Pages Document Type: Term Paper Paper #: 34403563
Read Full Paper  ❯

raster graphics, wire-frame and 3D modeling performance, and refresh rates of their screens. What began to occur in the company's culture as a result of this focus on graphics performance and CPU acceleration was a bifurcation or splitting of product lines. At the high end Apple was gradually turning into a workstation company that could easily challenge Sun Microsystems or Silicon Graphics for supremacy of graphically-based calculations. At the low-end, the company was pursuing an aggressive strategy of dominating special-purpose laptops.

This strategy was entirely predicated on the core metrics of price/performance on hardware defining a culture that put pricing above all else, paradoxically nearly driving the company out of business during this period. The focus on metrics that were meant to purely define the Apple competitive advantage made the company descend into pricing wars with competitors whose business models were much more attuned to pricing competition. The metrics the…


Berling, Robert J. (1993). The emerging approach to business strategy: Building a relationship advantage. Business Horizons, 36(4), 16. Accessed from:

Keidel, Robert . THE GEOMETRY OF STRATEGY New York: Routledge, May 2010

Sakakibara, Kiyonori, Lindholm, Chris, & Ainamo, Antti. (1995). Product development strategies in emerging markets: The case of personal digital assistants. Business Strategy Review, 6(4), 23. Accessed from

Organizational Diagnosis and Recommendations
Words: 2744 Length: 8 Pages Document Type: Research Paper Paper #: 14551194
Read Full Paper  ❯

Organizational Diagnosis and ecommendations

Imagine studying an organization in more depth in order to determine what needs changed. This is not an easy task because it could take days or months to achieve success. Businesses also have to stay up with current technology, and this means staying present with various leadership theories in order to make the business better. Systems thinking is used as a means in which to fully understand what needs monitored. Through using transactional leadership theory, one is able to grasp what one can do as a means of making recommendation for improvement.

One needs to perform a preliminary review to ensure that he or she obtains information related to organizational leadership, culture, effectiveness and productivity. "Synergy Technical Solutions Corp. (Syntechs) is a leading national technical service solutions provider with over 1,500 highly skilled professionals" (Syntechs, 2011). Many of these individuals work on "desktop and notebook computers…


Aronson, D. (2011). Targetted innovation: Using systems thinking to increase the benefits of innovation efforts. Retrieved May 20, 2011, from Thinking:

Changing-Minds. (2011). Transactional leadership. Retrieved May 20, 2011, from Changing-Minds: .

Management Study Guide. (2011). Transactional leadership. Retrieved May 20, 2011, from Management Study Guide: .

Mattke, J. (2011, May 20). Syntechs Employee. (E. Mattke, Interviewer)

Dell Company Thank You for
Words: 2030 Length: 7 Pages Document Type: Term Paper Paper #: 61870489
Read Full Paper  ❯

This helps to provide a higher level of value to charitable organizations and encourages volunteerism on an ongoing basis. But One Dell: One Community is more than just volunteering.

Dell have been introduce some special edition laptop in Malaysia like studio 14 and 15 which comes with some artistic style designed by Mike Ming, Derek Welch, Andrea Rosenberger and (PRODUCT) RED. All this laptop offers 10+ original designs for customers to choose from. It is an extension of one's personality which include restrained, expressive, wild and sublime. Furthermore, when customers buy the (PRODUCT) RED laptop, part of the proceeds will go to the Global Fund to help eliminate AIDS in Africa.


The Dell Company faces major competition from other companies, this include Apple, Sun Microsystems, Gateway, Sony, Asus, Toshiba and Hewlett Packard which is also mentioned to as HP. All of these companies are its competitors but HP is…

2swot Analysis of Citigroup UAE Global Network
Words: 3387 Length: 12 Pages Document Type: Case Study Paper #: 4336909
Read Full Paper  ❯

2SWOT analysis of Citigroup UAE

Global network

The Strengths




The Porters 5 forces analysis

PESTEL Analysis

Business Strategy

The future trends in the internet banking arena

Benefits of e-banking

The legal and ethical issues surrounding e-banking

Alan, F (2002).Your e-banking future. Strategic Finance. Available online at Citibank is a bank that is a subsidiary of the larger Citigroup. Citigroup is a leading financial institution that has services an excess of 100 million clients, close to 6 million online relationships as well as worldwide presence that spans 100 nations. Citibank UAE began its operations in 1987 in an environment that was very competitive. It rolled its services that included a comprehensive array of top notch financial services that targeted the high class and the middle class households. The bank employed cutting edge innovation in order to leverage its global expertise. This positioned it in the UAE region as…


Al-Mudimigh, A.S.(2007) "E-Business Strategy in an Online Banking Services: A Case

Study," Journal of Internet Banking and Commerce, April 2007, Vol. 12, no. 1.

Alan, F (2002).Your e-banking future. Strategic Finance. Available online at 

Choi, S., Stahl, D.O., and Andrew B. Whinston.,A.B (1997).The Economics of Electronic

Legal Immigration Is Good for the United States
Words: 1929 Length: 6 Pages Document Type: Research Paper Paper #: 81889468
Read Full Paper  ❯

Legal Immigration Is Good for the United States

With the United States opening its boarders to thousands of legal immigrants each year, immigration has become one of the most hotly debated issues in the country. However, what has largely fueled this debate has to do with the impact of both illegal and legal immigrants on the United States' economy, crime rates as well as education and environment. While some continue to advocate for the reduction of immigration within the U.S., others are of the opinion that legal immigration impacts positively on the U.S. In terms of diversity and economic gains amongst other unique benefits. It is important to note that when legal immigration is viewed from a critical perspective, the United States does benefit greatly from the same. This text will clearly and concisely highlight some of these benefits.

Immigration in the United States: An Overview

Considered a complex demographic…


Arnold, K.R. (2011). Anti-Immigration in the United States: A Historical Encyclopedia. California: ABC-CLIO.

Estrom, P. (2007, June 7). Immigration: Google makes Its Case. Retrieved February 12th, 2012, from Business Week website: 

Geigenberger, J. (2008). The lasting Value of Legal Immigration for the United States of America. Norderstedt Germany: GRIN Verlag.

Griswold, D. (2009, July 21). As Immigrants Move in, Americans Move Up. Retrieved February 14th, 2012, from CATO Institute website:

Recruiting on the Internet Recruting
Words: 1590 Length: 5 Pages Document Type: Case Study Paper #: 48807250
Read Full Paper  ❯

It can also be used in educational institutions to receive applications Larreamendy-Joerns & Leinhardt, 2006.

Organizations, including educational institutions, which need to do any form of recruitment should thus be encouraged to use online recruitment which will give the company more advantages and enable the human resource management tactics to prosper Kirkby, Wilson, Calvert, & Draper, 2011()


Every company has its own set of needs and criteria for recruitment. However, since online recruitment provides advantages which cut across the needs of all different companies or organizations, online recruitment is the way to go for these companies. Among the advantages of online recruiting are the cost savings, time savings and the global reach of candidates. There is also one disadvantage of increasing the number of applications received which is essentially an advantage since the more the applications, the better the chances of getting a more suitable candidate for the job.…


Arthur, D. (1998). Recruiting, Interviewing, Selecting & Orienting New Employees. New York, NY: AMACOM.

Braddy, P.W., Meade, a.W., & Kroustalis, C.M. (2006). Organizational Recruitment Website Effects on Viewers' Perceptions of Organizational Culture. Journal of Business and Psychology, 20(4), 525-543.

Kirkby, H.M., Wilson, S., Calvert, M., & Draper, H. (2011). Using e-mail recruitment and an online questionnaire to establish effect size: A worked example. BMC Medical Research Methodology, 11, 89-89.

Larreamendy-Joerns, J., & Leinhardt, G. (2006). Going the Distance with Online Education. Review of Educational Research, 76(4), 567-605.

Listened to a Speech in the Community
Words: 1455 Length: 4 Pages Document Type: Research Paper Paper #: 7060482
Read Full Paper  ❯

listened to a speech in the community. The speech was about a community building moving locations and the speaker was soliciting funds to help the move. The speech was approximately 15 minutes in length.

Was the speech interesting and meaningful?

The speech may have been meaningful in that it was dealing with an event that was important to the audience and to the person delivering the speech. It was, however, disinteresting and failed, I think, to make its impact.

Did the speech appear to be well researched, prepared and rehearsed?

I think the speaker was nervous. He hit to the point mentioning the move, mentioning their need for money, and requesting it. The speech seemed to be impromptu. There was little research to be conducted since the speaker was familiar with the situation. He knew the amount of money needed as well as the new location of the organization. Being…

Sources Public Speaking Anxiety: Preparing to Give a Speech Top Tips For Nailing That Speech . Give a Great Speech: 3 Tips from Aristotle

Office Automation for the 21st
Words: 696 Length: 2 Pages Document Type: Term Paper Paper #: 63170647
Read Full Paper  ❯

Our office uses Orchestra - a web-based communication initiative and ultimate collaborative solution.

Web-based Collaboration Software Advantages

When using a web-based collaboration environment; several highly useful tools are made available to all involved. These can include whiteboard displays and file saves, instant messaging in synchrony and real-time, accessible at all times, proactive data 'pushes' to the recipients - replacing the passive 'search and grab' technology of the 1990's.

Flexibility, scalability, and accessibility are three of the most important factors when designing a communication portal for experts and participants in any business arena.

Web-based Collaboration Software Disadvantages

The inherent disadvantages to the tools we use in our environment are few. Site licenses are not available since it is managed over the Internet - thereby incurring monthly expenses. Most importantly, however, is the potential for the loss or theft of proprietary information; files left unprotected can end up in the hands of…

XML Physical Evaluation of XML
Words: 2450 Length: 6 Pages Document Type: Term Paper Paper #: 26696582
Read Full Paper  ❯

One such body is the American National Standards Institute or ANSI which is a non-profit private organization that surprisingly institutes standards the industry accepts voluntarily. Other influential standards organizations include the Institute of Electrical and Electronic Engineers or IEEE and the Organization for Standardization or ISO. The IEEE was the organization that defined LAN standards in the Project 802 or the 802 series. These projects could be the blueprints that could be used to make XML more effective by using PAT Algebra Operators for query needs.

XML PAT Algebra Operators

The internet is based on a foundation of distributed hypertext. There is also plenty of proof that the internet could be regarded as a large distributed database where there are million to billions of queries processed daily. "XML is too slow an exchange format for any large volume of data transfer. It is fine for exchange of small amounts of…


Avolio, Frederick M. (2000, March 20). Best Practices In Network Security -- As The Networking Landscape Changes, So Must The Policies That Govern Its Use. Don't Be Afraid Of Imperfection When It Comes To Developing Those For Your Group. Network Computing.

Dekker, Marcel. (n.d.). Security of the Internet. Retrieved on January 17, 2005, at  

Organization Microsoft Corporation Since the Bygone Thirty
Words: 1035 Length: 3 Pages Document Type: Term Paper Paper #: 84098343
Read Full Paper  ❯

Organization: Microsoft Corporation.

Since the bygone thirty years, technology has revolutionized the manner in which we work, play and communicate. From the setting up during the year 1975, the company- Microsoft has enjoyed leadership in this revolution. As a manifestation of that role and to aid in concentrating on the opportunities that lie at the forefront Microsoft's mission has been: to facilitate people and businesses across the world to realize their full potential. (Mission and Values)

The central values of the company are (i) Broad Customer Connection-linking with customers, realizing their requirement and the manner in which they use technology, and providing value through information and support to assist them attain their potential. (ii) A Global, Inclusive Approach -- Thinking and acting in a global scale (iii) Achieving excellence- in everything (iv) Trustworthy Computing- Intensifying customer faith by the quality of products and services, sensitivity and accountability, and predictability in…


"Microsoft SWOT Analysis" (January 17, 2005) Retrieved from Accessed on 15 January 2005

'Mission and Values" (25 June, 2003) Retrieved from / Accessed on 15 January 2005

"Facts about Microsoft Research" (2004) Retrieved from  Accessed on 15 January 2005

"Glimpse of the Future with Microsoft" (28 September 2004) Retrieved from  Accessed on 15 January 2005

Architecture Refers to the Design
Words: 309 Length: 1 Pages Document Type: Term Paper Paper #: 31811823
Read Full Paper  ❯

Open source is different than the similar free software movement because it is based on technical, rather than political motivations. The underlying philosophy of the free software movement is that it is morally wrong to restrict access to source code or prohibit making changes to software. The open source movement is based on the idea that making code public improves its quality because a much larger number of people have the ability to find defects and improve the software. Linux author Linus Torvalds compares traditional proprietary software to witchcraft, where a few individuals have secret information that gives them an advantage over everyone else. Torvalds compares open source software to science, in which researchers share their results to allow for independent review of the results.


McNurlin & Sprague R (2004). Information Systems Management in Practice (6th Ed.). Upper Saddle River, NJ: Prentice…


McNurlin B & Sprague R (2004). Information Systems Management in Practice (6th Ed.). Upper Saddle River, NJ: Prentice Hall

Computer Training Program to Enhance
Words: 6445 Length: 25 Pages Document Type: Term Paper Paper #: 50188973
Read Full Paper  ❯

Similar to the suggestions offered by Gahala (2001), rody (1995) identified several traits to be considered when developing a comprehensive professional development program. Among those traits include the reputation of the trainer, the rewards available to the participants, both tangible and intangible, and the support of the administration. Traditional staff development models have required everyone to participate at the same time and in the same location creating problems such as scheduling, travel, space, and funding. intrim (2002) notes that web-delivered staff development allows teachers to log on and participate at the time of day that is best for them and at the pace they are the most comfortable with.

urke (1994) concluded that the use of effective distance education programs for K-12 staff development should be increased to supplement face-to-face in-services due to the positive evaluations of K-12 educators who participated in the electronic distance education in-service programs. However, other…


Bintrim, L. (2002). Redesigning professional development. Educational Leadership, 59

Blumenfeld, P.C., Marx, R.W., Soloway, E. & Krajcik, J. (1996). Learning With Peers:

From Small Group Cooperation to Collaborative Communities. Educational Researcher, 25(8), 37- 40.

Books, J., Cayer, C., Dixon, J., Wood, J. (2001). Action Research Question: What Factors Affect Teachers' Integration of Technology in Elementary Classrooms?

Job Portal Security the Objective
Words: 3023 Length: 11 Pages Document Type: Term Paper Paper #: 16042206
Read Full Paper  ❯

XML is used not only to represent the data but also as a messaging protocol called SOAP; and (6) Portal Integration is another popular integration methodology in use today. It doesn't involve expensive and time consuming technologies and processes that EAI and data warehousing require. Also, it is the most customer-facing of all the methods described in this section. This means that it can be highly personalized and customized to the customer's requirements. In future, portals will present their functionality as web services so that multiple portals from different vendors can be integrated.

Architecture of Portals

The portal, when speaking technically, is "a framework that enables developers to plug various software components called portlets, and then deliver the aggregated content to multi-devices." (Mohan, 2003) Integration may be accomplished through using HRML, JSP, Java eans, Java servlets, XSL that transforms XML through XSL transformation or even CGI. Sun Microsystems' Java Community…


Mohan, Sajeev (2003) Mechanics of Oracle Portal and Identity Management. Online available at 

Reducing the Costs of it Security Management (2006) Sumner Blount eTrust Solutions Online available at 

Building a Portal? Vive La Difference (2001) Information Week. 5 November 2001 Online available at 

Oracle Solutions for Workforce Excellence - HR Transformation: Transform HR from an Administrative Function to a Strategic Partner.

Obsolete Software Tools the Pace of Technological
Words: 712 Length: 2 Pages Document Type: Essay Paper #: 14210859
Read Full Paper  ❯

Obsolete Software Tools

The pace of technological change continues to accelerate rending many software development applications, tools and programs obsolete quickly. The intent of this analysis is to evaluate ten of these obsolete applications, tools and programs, providing insights into how they can be improved to deliver greater value.

Analysis of Obsolete Tools

The first of the ten tools is Borland C++ Compiler Version 3.1. This specific version of the Borland C++ Complier had a series of commands within its structure that led to direct conflicts with the broader BSD C++ conventions supported by other software companies including Microsoft and their C++ Compiler. C++ has since been replaced with more Web-capable programming languages including Python.

The second obsolete programming tool is Borland Kylix. This programming tool is used for scripting and creating its own proprietary application libraries. Scripting languages including PEL and other tools for shell scripting have since overtaken…


Binstock, A. (2005). For Linux, the end-to-end is near. Software Development Times, (130), 30-31.

Lee, H.G., Clark, T., & Tam, K.Y. (1999). Research report. can EDI benefit adopters? Information Systems Research, 10(2), 186-195.

Miner, G. (2001). Choosing a LIMS in the internet age. American Water Works Association. Journal, 93(7), 120-120.

Strategic Impact on Globalization Is a Process
Words: 3835 Length: 12 Pages Document Type: Essay Paper #: 46616960
Read Full Paper  ❯

Strategic Impact on Globalization

Globalization is a process that brought in changes in all walks of human existence the world over. The liberalization has created a global community and brought in the IT revolution and new forms of services like outsourcing. The changes in the world outlook and technology changes have changed the way business and international trade is done and has thus revolutionized the strategies and corporate behavior. It has ushered in new laws and environment concerns. The global community now is a different being and individual countries have now merged -- for example the European Union and many countries have now been fragmented -- as the former USS. These have had a lot of impact in the process of globalization and some international events have been the results of globalization. Has any strategy impacted globalization? And what strategies have come to be created after the globalization and how…


Buttle, Francis. (2008) "Customer relationship management: concepts and technologies"


Drejer, Anders. (2002) "Strategic Management and Core Competencies: Theory and Application." Quorum Books: Westport, CT.

Frankel, Ernst G. (2006) "Challenging American leadership: impact of national quality on risk of losing leadership" Springer.

Technology in Instructional Delivery The Case of
Words: 879 Length: 3 Pages Document Type: Essay Paper #: 4518783
Read Full Paper  ❯

Technology in Instructional Delivery: The Case of Capella University

The use of technology, particularly Internet technology, in instructional delivery in educational institutions has revolutionized the way people access and utilize educational information. Online instructional delivery, either in mixed (combination of traditional and online modes of instruction) or purely online formats, have made learning more interactive, not only between the learner and the tool, but also between the teacher and learner and among learners themselves. This increasing demand for an online mode of instruction delivery in educational institutions is a reflection of the need to not only adopt the new technology, but also to 'manipulate' this technology to suit the users' learning needs (oschmann, 1996:8). The following description of the technology of instructional delivery at Capella University demonstrates this point.

In addition to its traditional format of instructional delivery, which is face-to-face classroom setting, Capella University has an online learning system…

Koschmann, T. (1996). In CSCL: Theory and Practice of an Emerging Paradigm. NJ: Lawrence Erlbaum Associates.

Merrill, G. And C. Galbraith. (2010). "Learning outcomes and instructional delivery method in professional and business related courses: An empirical study controlling for course and instructor differences." Journal of Business and Behavioral Sciences, Vol. 21, No. 2.

Reiser, R. And J. Dempsey. (Eds.). (2007). Trends and Issues in Instructional Design and Technology. NJ: Pearson.

Capital Budgeting Techniques Business Is
Words: 1097 Length: 4 Pages Document Type: Case Study Paper #: 46958675
Read Full Paper  ❯

Centralized application and client management allows efficient solution of application management, access, performance, and security. Below is figure one taken directly from Citix Systems (Server-Based Computing, 1999).

The new architecture will have various types of technology implemented throughout the system. The main component will be the internet which provides the foundation for the architecture. Other web related technologies such as HTML, and communications protocols are also used. The architecture first begins at the presentation level. In regards to payroll this would consist on online paycheck review, or benefits review. At the presentation level, there is the client system, which is used to view Web page information. The client contains both presentation and application logic components. At the content level, there is a Web server that provides interactive view of information from a relational database. Finally, at the data and service level, there is a relational database system, which provides data…


1. "Server-Based Computing," Citrix Systems, white paper,, 1999.

2. P. Dreyfus, "The Second Wave: Netscape on Usability in the Services-Based Internet,"

IEEE Internet Computing, Vol. 2, No. 2, March/April 1998, pp. 36-40.

3. "Software Development for the Web-Enabled Enterprise," Sun Microsystems, white paper, 1999.

Marketing-- Specified Marketing Is the
Words: 716 Length: 2 Pages Document Type: Essay Paper #: 56501155
Read Full Paper  ❯

With this in mind, the marketing division would notify the &D (research and advancement) division to produce a prototype of a service or product based upon the customers' brand-new needs.

The manufacturing division would then begin to produce the item, while the marketing division would concentrate on the advertising, circulation, rates, and so on of the item. Furthermore, a company's finance division would be gotten in touch with, with respect to securing ideal financing for the advancement, manufacturing and promo of the item. Inter-departmental disputes could happen, need to a company abide by the marketing alignment. Manufacturing might oppose the installment, support and maintenance of brand-new capital stock, which might be had to produce a brand-new item. Finance might oppose the necessary capital expense, because it could possibly weaken a healthy capital for the company.

A difference needs to be made in between marketing research and marketing research. Marketing research…


Hochbaum, D.S., Moreno-Centeno, E., Yelland, P. And Catena, R.A. (2011). Rating Customers According to Their Promptness to Adopt New Products, Operations Research 59(5): 1171-1183.

Kotler, P. And Keller, L.K. (2012). Marketing Management 14e. Pearson Education Limited.

The Definition of Marketing. American Marketing Association. Accessed from: This definition is part of the ongoing, Common Language: Marketing Activities and Metrics Project.

Debating Technology Society and the Environment
Words: 1357 Length: 4 Pages Document Type: Term Paper Paper #: 34066269
Read Full Paper  ❯

Technology, a very familiar phenomenon of modern world, is continuously enhancing its ways towards comforts and luxuries. New thoughts and ideas are coming with every passing second, and what started as only a blurred vision, now became a necessity for all mankind. These have become a need of today's society making the society very much involved in these technological reforms. Several debates have been made on the topic that although the level of our technology keeps on improving day by day, but do all of these hi-tech gadgets give us the proper advantages? Are we really aware of the two different sides of the same mirror, or are we just so much accustomed to all such things around us that we don't bother to look upon the other side? Amongst these debates, two of the very famous are classical McDermott vs. Mesthene debate of 1960s and contemporary debate of Joy…

Works Cited

Bill Joy: Genomics, Nanotechnology and Robotics. Retrieved on 15/6/2012 from: 

Brown, John S. And Duguid, Paul. Chapter 4. A Response to Bill Joy and the Doom-and- Gloom Technofuturists. Retrieved on 15/6/2012 from: 

Emannuel G. Mesthene vs. John McDermott. Retrieved on 15/6/2012 from:

James Burke Connections #1 - The Trigger Effect. Retrieved on 15/6/2012 from:

Different OM Perspective of an Organization
Words: 923 Length: 2 Pages Document Type: Term Paper Paper #: 16524573
Read Full Paper  ❯


Analyze the different OM perspectives of an organization

Dell Incorporation founded in November 4th, 1984 by Michael Dell in Austin, Texas is a multinational corporation. Its main line of business is developing computers and its peripherals (Dell Company profile). It is on number 41 in Fortune 500.

Dell has many competitors: Hewlett Packard, IBM and Sun Microsystems, Compaq and Apple. They are all in the PC industry. But what makes Dell unique is that when Michael Dell founded the company, he inculcated the 'direct selling model' in his organization. Dell was the first one in its field to do so. Not only was the industry in closer contact with customers by cutting the middle man, there were various other advantages. Costs were cut down because the middleman didn't have to be paid. Also before Dell, there was no customization in the PC market. Buying the product was majorly influenced…


Dell, M. (1965). Investment Analysis. Retrieved September 11, 2011 from cgi-bin/article.cgi?f=/c/a/2011/09/10/BUED1L22QD.DTL

Munroe, D. (2011). What Makes Dell Monitors So Different? Retrieved September 11, 2011 from 

Ricadela, A. (2011) Bloomberg BusinessWeek, As Pc market changes, Dell tries to adjust. Retrieved September 11, 2011 from http://

Broadband Internet Service What it Is and
Words: 2921 Length: 8 Pages Document Type: Term Paper Paper #: 63292701
Read Full Paper  ❯

roadband Internet Service: What it Is and Where It's Going

Explanation of roadband

Current State of roadband

The Future of roadband

The current frontier of high speed internet technology and digital communications is broadband. Although it has been available for several years now to both homes and businesses, broadband has not spread as rapidly as some proponents of the technology had hoped or expected, leading to the failure of some companies involved in this business. What is broadband, and what is its future? These are questions that are taking on increasing importance as broadband usage is finally increasing around the world. Of equal importance is which broadband technology will survive and how telecommunications regulations in this country will impact the digital world.

Explanation of roadband

Simply put, broadband is high-speed internet access. roadband allows for the high-speed transmission of large amounts of data. It is expected to revolutionize communications, entertainment,…


Abe, George. Residential Broadband. Second Edition. Indianapolis: Cisco Press,

Borland, John. "Microsoft Outlines Role in Broadband Future." CNET 24 July 2001. 1 March 2003. .

Broadband's Bright Future." The Industry Standard. 7 May 2001. 2 March 2003.,1902,23972,00.html?nl=dnt .

Electronic Business. "Broadband's Growth Defies Downturn." Newsedge. 11 January 2003.