Filter Results By:

Reset Filters

We have over 74 essays for "Sun Microsystem"

View Full Essay

Performance Management System Within Sun

Words: 4451 Length: 12 Pages Document Type: Term Paper Paper #: 15909196

Measures should be developed at every level of the organisation as this will help in the measurement of performance at those levels. Again all services and teams will have action plans that they will have to meet which will make sure that the organisation reaches its goal. There has also got to be indicators for individuals as this will determine their performance for their teams and the organisation. (Measures of performance) the total service plan has to focus on the corporate and service objectives, highlight the important matters to the customers and staff, and the decision about the ultimate user of the information and their purpose for getting the information. (Key steps to effective performance measurement)

The measurement of the task done is against the information and there details that one has indicators for the objectives and also decides whether the task done will be meaningful and robust. The total…… [Read More]

References

Foundations of performance management. Retrieved at http://www.idea-knowledge.gov.uk/idk/core/page.do?pageId=76249

Glick, Bryan. 2005. Trudy Norris-Grey, Sun Microsystems UK managing director. 13 April. Retrieved at  http://www.computing.co.uk/analysis/1162459 

Hats Off to Communicators a Great Success in Denver. 2001. Spring, Volume: 9; No: 3.

Retrieved at http://www.nagc.com/newnewsletter.pdf
View Full Essay

Identification When One Company Looks at Taking

Words: 1010 Length: 3 Pages Document Type: Essay Paper #: 37625936

Identification

When one company looks at taking over another company that are many issues that must be looked at before a final bid can be put on the table. The first thing that the buying company must do is determine a vision for the combined companies. In the case of Oracles buy out of Sun Microsystems the visions that Oracles' Ellison was to transform the combination of the two companies into the Apple for the business customer by delivering high-quality, seamlessly integrated consumer products where software and hardware components were developed in conjunction, thus minimizing the customer setup process.

Ellison developed this vision by looking at what Sun Microsystems had that Oracle didn't and how would this acquisition help to better Oracles position in the market. If a company can buy another company at a practical price that has a unique niche in a particular industry it will more than…… [Read More]

View Full Essay

Dell Inc

Words: 6698 Length: 15 Pages Document Type: Term Paper Paper #: 41200013

Dell Inc.

The head office of Dell is at Austin, Texas at the same place where the company was based. Dell Americas is also located in Texas, which is the regional business unit for the United States, Canada and Latin America. The regional headquarters offices of the company are in England, for Europe Middle East and Africa; in Singapore catering to Asia-Pacific; and in Kawasaki, Japan, to serve the market for Japan. The production unit for the manufacture of computers is located in Texas, Tennessee, Brazil, Ireland, Malaysia, and China. Dell Computer Corporation sells products and services meant for Information Technology and the Internet backbone. The proceeds of the company for the previous four quarters were $31.2 billion. (Stories of Entrepreneurs: Michael Dell)

Dell's product, pricing, distribution, and promotion strategies

Product

The Dell product line-up of high performance computer systems comprises of PowerEdge servers, PowerApp server applications, PowerVault storage products,…… [Read More]

References

Bean, Michael. The Price Strategy Simulator: Anatomy of a Price War Hewlett-Packard / Compaq vs. Dell. Retrieved at  http://www.forio.com/pricing20010912.htm . Accessed on 16 October, 2004

Best practice resources enabling lean manufacturing excellence. Retrieved at  http://www.superfactory.com/Resources/concepts/demandflow.htm . Accessed on 16 October, 2004

Brief Description of the Product/Service. Retrieved at http://homepages.wmich.edu/~j0karnat/Dell%20Project.htm. Accessed on 16 October, 2004

Build-To-Order Model for Success (Part-II) Retrieved at http://www.themanagementor.com/kuniverse/kmailers_universe/manu_kmailers/scm_build2order2.htm. Accessed on 16 October, 2004
View Full Essay

Microsoft Office Is the Most Popular Comprehensive

Words: 631 Length: 2 Pages Document Type: Term Paper Paper #: 86628619

icrosoft Office is the most popular comprehensive bundle of productivity applications in the world. It contains word publishing, spreadsheet, presentation, e-mail, and database software and is most often used with the icrosoft Windows operating system. It can also be used with the Apple acintosh. The icrosoft Office suite enjoys almost universal worldwide familiarity. The most recent version of S Office is Office XP, which is designed specifically to be compatible with the Windows XP environment.

Functionally, Sun StarOffice is very similar to icrosoft Office. The chief difference is that it is written using open source code and may be altered by programmers to match their specifications. It is the most popular system for Linux and Unix-based computers and utilizes an XTL-based interface. It is considered an 'alternative' to the Windows system because it is popular with developers, who often criticize icrosoft for the fact that the source code is unavailable…… [Read More]

Microsoft Powerpoint allows the user to design presentations that use graphics and visual effects. It is often used in with data that has been created in Excel. Microsoft Access is a database project that allows the user to enter and manage data and sort according to fields. Its chief limitation is that it is meant for one user to operate at a time. StarOffice Impress has essentially similar features, but uses the Macromedia Flash format to present its documents. Sun Microsystems pioneered Java Internet application technology and most computers have the capability of reading flash documents.

Datasheet: StarOffice 7 Data Sheet. http://wwws.sun.com/software/star/staroffice/ds/STAROFS7RETAIL_90903.pdf

Microsoft Office XP: Office Home.  http://www.microsoft.com/office
View Full Essay

Computer Company Rivalry

Words: 690 Length: 2 Pages Document Type: Term Paper Paper #: 2737378

battles of the C# and Java wars between Sun and Microsoft. The winner will greatly affect the entire internet which in turn means they are in control of major part of our modern world. The net offers us a plethora of possibilities and opportunities. For example, I know that I can't live without my daily emails, chat and of course I am a big fan of music downloads and bargain shopping. The future of not only information technology is tied to the internet, but business in general as more companies move to the likes of the net for B2B and b2c marketing. The bottom line is that the internet is really comprised of nothing more that physical hardware that runs on intricate software with routers and Local Area Networks (LANs) sprinkled around the world. Basically, the company that grabs a monopoly hold over the rest of the industry can make…… [Read More]

Works Cited

Niccolai, James. "Sun's Gosling Testifies In Java Case." InfoWorld. September 9, 1998: Retrieved on 16 May 2005, from .

Sullivan, Tom and Ed Scannell. "Microsoft, Sun At War Again Over Java." InfoWorld. (2001): Retrieved on 16 May 2005, from <  http://www.infoworld.com/articles/hn/xml/01/01/29/010129hnmsjava.html  >.
View Full Essay

Computer Clustering Involves the Use of Multiple

Words: 2319 Length: 8 Pages Document Type: Term Paper Paper #: 54692503

Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single integrated system (Cluster computing). Clustering has been available since the 1980s when it was used in Digital Equipment Corp's VMS systems. Today, virtually all leading hardware and software companies including Microsoft, Sun Microsystems, Hewlett Packard and IM offer clustering technology. This paper describes why and how clustering is commonly used for parallel processing, batch processing, load balancing and high availability.

Despite some challenges such as achieving transparency, mitigating network latency and the split-brain problem, clustering has proven to be a huge success for bringing scale and availability to computing applications. Hungry for even more efficient resource use, IT departments are now turning their eye on the next evolution of clustering called grid computing.

Parallel processing is the processing of program…… [Read More]

Bibliography

Beowulf clusters compared to Base One's batch job servers Retrieved May 2, 2004 from Web site: http://www.boic.com/beowulf.htm

Burleson, D. Requirements for parallel clusters. Retrieved May 1, 2004 from Web site:  http://www.fast-track.cc/teas_ft_rac07.htm 

Cluster computing. Retrieved May 1, 2004 from Web site:  http://search390.techtarget.com/sDefinition/0,sid10_gci762034,00.html 

D'Souza, Marco (2001, April 13). Meeting high-availability through clustering. ZDNet. Retrieved May 2, 2004 from Web site:  http://www.zdnetindia.com/biztech/services/whitepapers/stories/19538.html
View Full Essay

Crisis of Microsoft Lawsuit

Words: 797 Length: 3 Pages Document Type: Term Paper Paper #: 85536209

Crisis of Microsoft Lawsuit

The Microsoft Lawsuit: Microsoft vs. Sun

The emergence of computers has brought a name in the computing industry as the giant of all giants - the Microsoft. Microsoft is a company that was started and established by one of the richest man in the world today, ill Gates. Whenever we use a computer, we must remember that 98% of all computer users in the world uses Microsoft applications and tools as the major content that fills the hard disks space of our computers. Microsoft has indeed achieved the trust and confidence of most computer users worldwide.

Despite of the success that Microsoft has been reaping from its patrons, who are continuously growing in number, and where most of the Microsoft products became the standard tools for them, a large number of issues are being faced by the company. Most of which are lawsuits concerning contracts with…… [Read More]

Bibliography

Microsoft Agrees to Settlement that Protects Future Integrity of the Java Platform.

Lawsuit Related Information, Sun v. Microsoft.  http://java.sun.com/lawsuit
View Full Essay

Java Network Computing Technologies

Words: 2035 Length: 8 Pages Document Type: Term Paper Paper #: 52966845

Internet Inter-OR Protocol (IIOP)

Java Network Computing Technologies

Internet Inter-OR Protocol (IIOP) is a protocol that enables distributed programs located anywhere in the Internet to communicate with each other. It is an interoperability protocol that supports heterogeneous environments. IIOP offers possible communication between applications regardless of the platform and programming elements used in their development.

IIOP is an element of Object Management Group's (OMG) standard architecture called CORA (Common Object Request roker Architecture). It is a TCP/IP-based protocol and a GIOP mapping that provides standard communication methods between ORs. OR (Object Request roker) is a communication mediator used by CORA during requests and data interchange between clients and servers.

CORA/IIOP is a solution to the complexity that web applications are now becoming. efore, protocols are specifically developed on the basis of applications to allow compatibility in communication. ut with CORA/IIOP, communication is possible between diverse application platforms.

IIOP technology is…… [Read More]

Bibliography

Curtis, David. IIOP: OMG's Internet Inter-ORB Protocol.

OMG. 08 June 2003.  http://www.omg.org/library/iiop4.html 

Golding, Michael. Java Socket Programming.

UEL.AC.UK. 09 June 2003. http://homepages.uel.ac.uk/2795l/pages/javaapps.htm
View Full Essay

Network Security as an Issues for Business Data Communication

Words: 1631 Length: 5 Pages Document Type: Term Paper Paper #: 19332576

Network Security: An Issue for Business Data Communication

Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has made keeping data secure more difficult. The Internet did not change the key issues, just the number of users trying to access the information. Network administrators have been facing these issues for quite some time.

The key security issue facing IT professionals is to protect the system from invaders or intruders known as Hackers. Hackers can be grouped into several categories according to motive. They are Joyriders (who do it for fun), Vandals (who do it to cause harm),…… [Read More]

Works Cited

Atempo. Improving Network Security with Time navigator. 2001.  http://www.atempo.com/library/pdf/wp_security.pdf . Accessed July, 2002.

CITES. Introduction to Windows Security. 2002. http://www.cites.uiuc.edu/security/winintro.html Accessed July, 2002.

Coffey, Tom, Dojen, Reiner and Flanagan, Tomas. Verification of Cryptographic Protocols used in Fixed and Mobile Networks..Information Security. ERCIM News No. 49, April 2002.  http://www.ercim.org/publication/Ercim_News/enw49/coffey.html  Accessed July 2002.

Joint Information Systems Committee (JISC) Senior Management Briefing Paper 1. 1997.  http://www.jisc.ac.uk/pub97/sm01_sec.html  Accessed July 2002.
View Full Essay

Architecture 2a Brief History of

Words: 2876 Length: 10 Pages Document Type: Research Paper Paper #: 15233263

These markets need the categorization of information assets and also the plan of interaction interfaces that conventionally were built up within the organizations. Nevertheless, as the diversities of the access to information and also functionality of these applications are increasing, the difficulties of the organization of information and also the user interfaces that are possible will also increase. Due to this, the architects of information are becoming increasingly concerned with the vertical application development to design and also to put into practice precise architectures to maintain users and also to develop and increase organically with functionality. In a number of instances, vertical IAs might principally be cautiously organized, task-based boundaries to customary end-user applications and databases accessed through a Web browser and customized to every purpose, activity and industry. A common example is the applications of e-commerce which are within commercial Web sites like shopping carts and exact term creation…… [Read More]

References

Beckett, D., & McBride, B., (2004).RDF=XML Syntax Specification (Revised): W3C

Recommendation 10 February 2004. World Wide Web Consortium, Cambridge, MA.,  http://www.w3.org/TR/rdf-syntax-grammar  / (accessed Mar 27-2011).

Dillon & Turnbull (2005). Dillon, a. & Turnbull, D. ( 2005). Information Architecture. (Pp. 1-9).

In: Encyclopedia of Library and Information Science. New York: Marcel Dekker. Pp. 1-14. Online: http://www.dekker.com/sdek/abstract~db=~content=a713609832?words=&hash=
View Full Essay

Microsoft NASDAQ Msft Is a

Words: 1744 Length: 6 Pages Document Type: Research Proposal Paper #: 61030746

Further diversification is also recommended. Given the pace of change in the industry, the reliance on PC operating platforms and office software packages must be reduced. The risk of an entirely new technological paradigm emerging is high, so Microsoft must therefore diversify its revenue streams in order to defend against this threat. Overall, Microsoft's strategic thrust is strong and its operating results fantastic. The company must guard against major non-strategic threats such as technological change or acute damage from financial scandal. If Microsoft deals with these two issues effectively, the will remain in good position to continue to build their revenues in the coming years.

orks Cited

Financial and operating unit information from Reuters. Retrieved December 8, 2008 at http://www.reuters.com/finance/stocks/companyProfile?symbol=MSFT.O

No author. (2004) Microsoft Corporation. Funding Universe Retrieved December 8, 2008 at http://www.fundinguniverse.com/company-histories/Microsoft-Corporation-Company-History.html

Microsoft 2008 Annual Report. (2008). Microsoft. Retrieved December 8, 2008 at http://www.microsoft.com/msft/reports/ar08/index.html

No author. (2006). Microsoft's Multiple…… [Read More]

Works Cited

Financial and operating unit information from Reuters. Retrieved December 8, 2008 at  http://www.reuters.com/finance /stocks/companyProfile?symbol=MSFT.O

No author. (2004) Microsoft Corporation. Funding Universe Retrieved December 8, 2008 at  http://www.fundinguniverse.com/company-histories/Microsoft-Corporation-Company-History.html 

Microsoft 2008 Annual Report. (2008). Microsoft. Retrieved December 8, 2008 at http://www.microsoft.com/msft/reports/ar08/index.html

No author. (2006). Microsoft's Multiple Challenges: Is Its Size a Benefit or a Burden? Wharton School of Business. Retrieved December 8, 2008 at  http://knowledge.wharton.upenn.edu/article.cfm?articleid=1478
View Full Essay

Systems Administration v Network Administration

Words: 1495 Length: 5 Pages Document Type: Essay Paper #: 72869548

The subject matter of systems administration includes computer systems and the ways people use them in an organization. This entails knowledge of operating systems and applications, as well as hardware and software troubleshooting, but also knowledge of the purposes for which people in the organization use the computers.

The most important skill for a system administrator is problem solving. The systems administrator is on call when a computer system goes down or malfunctions, and must be able to quickly and correctly diagnose what is wrong and how best to fix it. In some organizations, computer security administration is a separate role responsible for overall security and the upkeep of firewalls and intrusion detection systems, but all systems administrators are generally responsible for the security of the systems in their keep. (Encyclopedia.com, 2011)

Network Administrator

What is a computer network? According to McGraw Hill Online Learning Center, "a network is two…… [Read More]

References

Armstrong, L. (1995), Let's Call the Whole Thing Off

Dignan, Ars Technica, Jan 28, 2001, post 305, http://arstechnica.com/civis/viewtopic

Encyclopedia.com - Information Technology- accessed 2011/1/14

Hegel, G.W.F., the Phenomenology of Mind, (1807), translated by J.B. Baillie, New York, Harper & Row, 1967
View Full Essay

Comparing and Contrasting Java With C Net

Words: 737 Length: 2 Pages Document Type: Term Paper Paper #: 87178286

C# and Java have more similarities than differences, Java programmers my shun C# is situations where they require high-quality program design, cross-platform portability and runtime extensibility for remote applications. Developers that require a more expressive language than Java are likely to appreciate Microsoft's many expressive features such as metadata availability, event handling, and property access.

The most serious deficiency of C# is the lack of exception handling, meaning that the compiler will not notify the programmer if an exception occurs. Java, on the other hand, allows exception checking and the compiler will generate a compile-time error if the programmer hasn't specified how to handle the exception. The lack of checked exceptions in C# may lead to program designs which are flawed. C# developers must tale extra care to document all exceptions that callers should be aware of.

Java applications are portable across a number of operating systems and platforms. Sun…… [Read More]

Bibliography

Eaddy, Marc. "C# Versus Java." Dr. Dobb's Journal. Feb. 2001. Business Source Premier

Database (EBSCOhost) 3931159

Obasanjo, Dare. "A Comparison of Microsoft's C# Programming Language to Sun

Microsystems' Java Programming Language." Jonas Mockus 18 Feb. 2003. http://www.soften.ktu.lt/~mockus/gmcsharp/csharp/c-sharp-vs.-java.html#different
View Full Essay

Portfolio Management Project

Words: 4930 Length: 17 Pages Document Type: Term Paper Paper #: 69381068

Stock

Portfolio Management Project

Selected 10 companies

Company

Symbol

purchase date purchase price

Apple, Inc.

APPL

Industry/Sector: Technology/Personal Computer -- Investment Style: Large Growth

Brocade

BCD

Communications Systems Inc.

Industry/Sector: Technology/Data Storage -- Investment Style: Small Growth

Joy Global Inc.

JOYG

Industry/Sector: Farm/Const/Mach -- Investment Style: Large Growth

Ctrip.com

CTP

Industry/Sector: Consumer Services -- Investment Style: International

Gerdau SA

GGB

Industry/Sector: Steal & Iron -- Investment Style: International

Gol Linhas

GOL

Aereas Inteligentes SA

Industry/Sector: egional Airline -- Investment Style: International

Green Mountain

GMC

10/21/2009

Coffee oasters Inc.

Industry/Sector: Processed Pkgd gds -- Investment Style: Small Growth

io Tinto PLC

TP

10/21 / 2009

Industry/Sector: Steal & Iron -- Investment Style: International

Vale SA

VALE

10/21/09

26.90

Industry/Sector: Steal & Iron -- Investment Style: International

Wendys/Arbys

WEN

10/21/09

4.08

Group Inc.

Industry/Sector: estaurants -- Investment Style: Small Growth

Introduction

Investing today is about taking advantage of growth from a broader…… [Read More]

Reference Model (OSI) Layer 2-3 switches and routers, which enable the use of bandwidth-intensive network business applications and digital entertainment on local area networks and wide area networks. Its Application Delivery Controller segment offers OSI Layer 4-7 switches that allow enterprises and service providers to build network infrastructures to direct the flow of traffic, as well as provides file area network products and associated management solutions. The company's Global Services segment includes break/fix maintenance, extended warranty, installation, consulting, network management, related software maintenance, and telecommunications services that assist customers in designing, implementing, deploying, and managing networking solutions, as well as post-contract customer support and customer support services. It offers its products and services to end-user customers directly and through various distribution partners, including original equipment manufacturers, distributors, systems integrators, and value-added resellers in the United States, western Europe, Japan, and the greater Asia Pacific region. The company was founded in 1995 and is headquartered in San Jose, California. (Yahoo Finance)

Industry: Data Storage Devices

BRCD SECTOR / INDUSTRY MEMBERSHIP

Sector:

Technology
View Full Essay

Quantum Corporation Case Analysis Current

Words: 2826 Length: 10 Pages Document Type: Thesis Paper #: 60708526



Jerry Lopatin is the senior vice president, engineering at Quantum, having joined the company in March 2008. He served in a similar capacity at ONtor, and previously worked at companies such as Iomega, amsung Electronics, IBM.

III Opportunities/Threats

According to Quantum's Web site (2008), it is in a very favorable position in terms of opportunities. By nature, the it world is developing with increasing rapidity, with computers and software developing almost more rapidly than companies can upgrade. Quantum's position is then such that it can make use of this phenomenon by providing companies with solutions that are effective for their changing needs. Change is therefore the main driver of opportunity for the company.

A further driver of opportunity is development. First-world companies are increasingly developing sophisticated it software, as mentioned above. With this, the sophistication of storage needs is increasing. Quantum's team of innovation experts then have the opportunity to…… [Read More]

Sources

Quantum Corporation (2008). Data Storage Solutions.  http://www.Quantum.com .

Quantum Corporation (2008, Aug 13). News Release: Quantum Achieves Major Milestone With 20,000th Shipment of Scalar i500 Tape Automation System. http://phx.corporate-ir.net/staging/phoenix.zhtml?c=69905&p=irol-newsArticle&ID=1186977&highlight=

Quantum Corporation (2008). Board of Directors.  http://www.quantum.com/AboutUs/CorporateProfile /BoardofDirectors/Index.aspx" target="_blank" REL="NOFOLLOW">
View Full Essay

Wide Web Is Available Around

Words: 14250 Length: 52 Pages Document Type: Term Paper Paper #: 14951486

The reward for the effort of learning is access to a vocabulary that is shared by a very large population across all industries globally" (p. 214). Moreover, according to Bell, because UML is a language rather than a methodology, practitioners who are familiar with UML can join a project at any point from anywhere in the world and become productive right away. Therefore, Web applications that are built using UML provide a useful approach to helping professionals gain access to the information they need when they need it.

Overview of the Study

This paper used a five-chapter format to achieve the above-stated research purpose. Chapter one of the study was used to introduce the topic under consideration, provide a statement of the problem, the purpose of the study and its importance of the study. Chapter two of the study provides a review of the related peer-reviewed and scholarly literature concerning…… [Read More]

Reference:

Domain Specifications

Specification Name:

Ontology Definition Metamodel (ODM)

Description:
View Full Essay

New Ways of Workplace Development and Innovation by Using Work Technology

Words: 2466 Length: 9 Pages Document Type: Research Proposal Paper #: 21376127

New Ways of Workplace Development and Innovation by Using Work Technology

This work in writing proposes a research study on technology in terms of its impact on workplace development and workplace innovation.

The work of Meckl (2008) states that innovation system theory "indicates a transition from individual study to systematic research. The innovation system theory combines the dynamic and complexity of innovation. According to this theory, technological innovation interacts with institutional innovation, and the key factors in this system include knowledge, learning, and ability." (p.134) Meckl (2008) states that the entrepreneur is "a core factor in a firm's technological innovation and competitiveness; it is a necessity in technological innovation." Additionally reported in the work of Meckl is that in practice "not only a firm is embedded in the social structure as an organization, but also the entrepreneurs' innovation activities are socially embedded." (Meckl, 2008)

According to Meckl (2008) the technological…… [Read More]

Bibliography

Benko, C. And Weisberg, A.C. (2007) Mass Career Customization: Aligning the Workplace with Today's Nontraditional Workforce. Harvard Business Press. 2007.

Claver E. et al. (1998) Organizational Culture for Innovation and New Technological Behavior. Journal of High Technology Management Research 1998 (8) 55-68 in: Meckl, Reinhard (2008) Technology and Innovation Management: Theories, Methods and Practices from Germany and China. Oldenbourg Wissenschaftsverlag 2008.

Freimuth, J et al. (2002) Organizational Memory and Betriebliche Wissenstruktur, ZfG, 2002 (2), 96-104 in: Meckl, Reinhard (2008) Technology and Innovation Management: Theories, Methods and Practices from Germany and China. Oldenbourg Wissenschaftsverlag 2008.

Glynn (1996) cited in: Meckl, Reinhard (2008) Technology and Innovation Management: Theories, Methods and Practices from Germany and China. Oldenbourg Wissenschaftsverlag 2008.
View Full Essay

Building a Secure Workflow Management

Words: 11534 Length: 35 Pages Document Type: Research Proposal Paper #: 30861705

Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message.

1.4.

Lecture Survey.

The predicted solution of the problems related to e-government administration depends on answering the following questions as brainstorming ideas to solve the problem and the features provided by the system or application.

1. An important step for processing of e-Government.

2. To ensure the confidentiality of information such as contracts for military weapons and other by Providing a high level of security as it is based on singing the data by combining multiple key values like user id, date stamp and transaction id which produce an encrypted key utilized and used only internally by the system for authentication and validation of user privileges. This procedure would make it…… [Read More]

References

Averyt, William. (2005). E-Government Reconsidered: Renewal of Governance for the Knowledge Age. American Review of Canadian Studies 35(4): 769-770.

Chaffee, a. (2000-08-17). "What is a web application (or "webapp")?"

Cohen, JE. (2000). Examined Lives: Informational Privacy and the Subject as Object. Stanford Law Review 52(5): 1373.

Bourquard, J.A. (2003, March). What's Up with E-Government? Digital Government Isn't a Silver Bullet, but as Part of a Long-Term Plan it May Provide a Means to Reduce State
View Full Essay

Front Line Change Experiences the

Words: 877 Length: 3 Pages Document Type: Thesis Paper #: 68969721

Instead the better approach would have been to ascertain which EP vendor would have been more suitable for the task of managing the Overstock.com distributed order management system implementation without forcing major reporting errors (Kanaracus, 2008) in addition to having professional staff on hand to manage the integration and professional services implementation plan. Second, the distractions Oracle faces during the BEA acquisition (Financial Times, 2008) were also reflected in their acquisition of Sun Microsystems recently (icadela, 2009) (Tait, 2010). The front-line experience of the CIO could have been avoided if an analysis of EP vendors had been completed that took into account the potential distractions and lack of focus from working with a vendor known for their merger and acquisitions (Financial Times, 2008).

In prioritizing this experience, the first is the initial success of installing the EP system followed by the lack of follow-through of the Oracle professional services teams.…… [Read More]

References

Financial Times, 2008, Oracle acquires BEA for Dollars 8.5bn: [ASIA EDITION]. 2008. Financial Times, January 17,

Kanaracus, C. 2008. Overstock's ERP Woes Force It to Restate Results. Computerworld, November 3, 7.

Aaron Ricadela. 2009. Oracle's Sun Deal: Oracle May Need to Loosen Its Grip. Business Week (Online), November 9, 14 -- 16.

Nikki Tait. 2010. Brussels approves $7.4bn Oracle-Sun deal. FT.com, January 21.
View Full Essay

Oracle Enterprise Edition Assessing Oracle's

Words: 2175 Length: 6 Pages Document Type: Thesis Paper #: 11683612



For all of these strengths however it is well-known that Oracle databases are high maintenance and often require one full time system administrator to keep them optimized. This is necessary for keeping the audit tools up-to-date and functioning, and also supporting patching of the database when updates arrive. Second, Oracle's pricing and maintenance policies are often considered exceptionally high for the market and are often questioned by customers (Evans, 10).

ecommendations for Implementation

In terms of implementing the system significant changes to processes for data capturing including extraction, transfer and load (ETL) and the integration of BI components are necessary. From manufacturers including Quantum who relies on Oracle Enterprise Edition to manage the production of high density tape drives to .L. Polk and its use for automotive data, Enterprise Edition has been shown to scale globally. Further, the transaction engine component is being used for synchronizing supply chains and production…… [Read More]

References

Ghazi Alkhatib, and Ronny S. Labban. "Transaction management in distributed database systems: The case of Oracle's two-phase commit. " Journal of Information Systems Education 13.2 (2002): 95-103.

Babcock, C.. "Oracle Adds Grid Features To 11g. ," InformationWeek 7 Sep. 2009, 124, 125.

Babcock, C. "Oracle Touts Virtualization, Apps -- And 11g, Of Course." InformationWeek 19 Nov. 2007: 83, 84.

Mike Cochrane. "The Big Picture: Industry convergence mandates a holistic BI and performance management approach." Information Management 19.4 (2009): 38.
View Full Essay

Making a Recommendation to Implement a Particular Product Service or Program

Words: 2320 Length: 8 Pages Document Type: Research Paper Paper #: 94280543

Justification Report for American Beverage Corporation

"There is a growing sense of the world's interdependence and connectedness, and an understanding that progress is an illusion if it destroys the conditions for life to thrive on earth" (Buchholz, 1991). Twenty years ago, business ethicist and university professor Rogene Buccholz made the point that preserving natural resources should be a priority for the business community. Since that time, corporate social responsibility has become an even more important goal. Consequently, we prepared this report to provide the management team of American Beverage Corporation (ABC) with recommendations on launching a corporate environmental and sustainability program.

There are many reasons that ABC should commit to sustainable practices and principles, not least of which is protecting the earth's resources. But as this report discusses, there are compelling economic and business reasons to go green as well. By launching a green initiative ABC will realize the following…… [Read More]

Not only do green practices give ABC a competitive advantage in the market, but like many companies, we expect to be able to sell waste materials to a manufacturer that repurposes or recycles the waste for a profit. General Mills offers one such example, selling the oat hulls left over after making Cheerios cereal. General Mills is reported to have sold 86% of their solid waste in 2006, making more profit from selling it than they spent on disposal (Jenkins, 2010).

Tax Savings

Another savings opportunity associated with going green comes in the form of lower taxes. The government is currently providing businesses with more green tax credits and deductions than ever before. By installing a Geothermal heating system, ABC can qualify for a tax credit of 30%. So in addition to sizable savings on our energy bills, we save 30% off the total cost of the system.
View Full Essay

Change Using Kotter's 8 Steps the Three

Words: 1571 Length: 4 Pages Document Type: Research Paper Paper #: 66692477

Change

Using Kotter's 8 steps, the three most significant errors made out of all the change stories presented were: McDonald's failure to create urgency when it implemented its initial menu changes; Kodak's failure to communicate its vision for change; and Fiorina's failure to form a powerful coalition prior to the merger between HP and Compaq Computer Corp. However, it is important to keep in mind that Kotter's approach may not best describe organizational change; its popularity may be more attributable to its usable format than from any evidence that Kotter's approach to change management is superior to competing approaches (Appelbaum et al., 20120).

McDonald's made half-hearted efforts to respond to consumer demands for healthier menu options. However, at that time, it had not seen any reduction in profits because of the perceived lack of nutritional value of its offerings and was not committed to expanding beyond its traditional fast-food repertoire.…… [Read More]

References

Applebaum, S., Habashy, S., Malo, J., & Shafiq, H. (2012). Back to the future: Revisiting

Kotter's 1996 change model, Journal of Management Development, 31(8), 764-782.

Palmer, I., Dunford, R., & Akin, G. (2009). Managing organizational change: A multiple perspectives approach, 2nd Ed. McGraw-Hill.

Parker, D., Verlinden, A., Nussey, R., Ford, M., & Pathak, R.D. (2013). Critical evaluation of project-based performance management: Change intervention integration, International Journal of Productivity and Performance Management, 62(4), 407-419.
View Full Essay

Extensible Markup Language XML Was Born in

Words: 1820 Length: 7 Pages Document Type: Term Paper Paper #: 54375554

Extensible Markup Language (XML) was born in the height of the browser wars in the mid-1990's. As Microsoft, Netscape, and W3C produced new and better versions of HTML. Jon Bosak, of Sun Microsystems, started the W3C SGML working group. Before long this name was changed to XML and the light cousin of SGML was born. Since that time XML has become a major server side resource for web site presentations.

The Standard Generalized Markup Language, SGML, is a very complex and rigid mark-up language used mostly for the publishing industry. Pre-dating HTML, SGML has been around for a little over a decade. SGML is a language for describing markup languages, particularly those used in electronic document exchange, document management, and document publishing. HTML is an example of a language defined in SGML. In order to bring sanity to the chaos the browser wars created, HTML has also become a rigid…… [Read More]

Reference List

Harold, Elliotte Rusty. 1998. XML Extensible Markup Language. IDG Books Worldwide.

Tidwell, Doug. 2001. Transforming XML into SVG [online]. IBM; available at  http://www-106.ibm.com/developerworks/education/transforming-xml/xmltosvg;Internet ; accessed 2 December 2002.

Walsh, Kathy, and Sang Shin. Discover and Publish Web Services with JAXR [online]. Java World; available at  http://www.javaworld.com/javaworld/j2-06-2002/jw-0614-jaxr_p.html;Internet ; accessed 2 December 2002.

XHTML 1.0. The Extensible HyperText Markup Language (second edition) [online]. W3; available at http://www.w3.org/TR/2002/WD-soap12-part0-20020626/;Internet; accessed 2 December 2002.
View Full Essay

Merger One of the Greatest Mergers in

Words: 2315 Length: 6 Pages Document Type: Term Paper Paper #: 63033401

Merger

One of the greatest mergers in the history of computers was recently organized between Hewlett Packard and Compaq Computers. This was a great victory organized by the chief executive of Hewlett Packard, Carleton S. Fiorina. The direct proof has come within one year of the purchase of Compaq computers at a cost of $19 billion. There was a savings of $3.5 billion and this was achieved in one year, when the promise was to save a billion dollars less and that too, by the end of two years. The company has had the classical result of mergers with a decrease of 17,000 jobs but there was a gain of market share, over 3,000 new patents and launching of 367 new products. It was also very successful in gaining new contracts and got $3 billion contract from Proctor and Gamble that is spread out over ten years. The success has…… [Read More]

Bibliography

Hardy, Quentin. We Did It, 11 August, 2003. Retrieved at  http://www.forbes.com/forbes/2003/0811/076_print.html . Accessed on 29 June, 2004

Rupley, Sebastian. HP and Compaq Get Down to Brass Tacks, May 10, 2002 Retrieved at  http://www.pcmag.com/article2/0,1759,50028,00.asp . Accessed on 29 June, 2004

Popovich, Ken. HP Releases First Earnings Reflecting Merger; August 27, 2002 Retrieved at  http://www.eweek.com/article2/0,3959,489290,00.asp . Accessed on 29 June, 2004

Popovich, Ken. Fiorina: Compaq Acquisition Paying Dividends; October 23, 2002 Retrieved at  http://www.eweek.com/article2/0,3959,645785,00.asp . Accessed on 29 June, 2004
View Full Essay

Dot Com Boom Annotated Bibliography

Words: 1482 Length: 5 Pages Document Type: Research Paper Paper #: 87212387

The Internet began to rise in the early part of the decade, but the major landmark was the launch of the Netscape Navigator, the pioneering Internet browser. This, combined with significant infrastructure investments on the part of telecommunications companies, helped to drive the rapid growth of the Internet through the 1990s. Already in the mid1990s, companies in the Valley and beyond were beginning to exploit the commercial value of the Internet. By 1995, future giants such as eBay and Amazon had been established.

The early successes of these and other pioneering Internet firms hinted at the commercial viability of the Internet. Investors noted that the opportunity to buy a future global giant at IPO pricing, or near to it, was a rare opportunity. This fueled demand for stock in Internet companies. Although the business models for most Internet companies were unproven, investors were not willing to wait, fearing that it…… [Read More]

View Full Essay

Virtual Collaboration Is a New

Words: 2973 Length: 10 Pages Document Type: Term Paper Paper #: 60803429

There are several characteristic that are evident with the software system use in virtual collaboration technology. The first characteristic is that most of these tools are web based and are downloadable; they also have the ability to offer a text chat feature in real time, thereby allowing for the synchronous communication among various users.

The platforms also has VoIP functionality, thereby giving them the ability to transmit sound over the laid down internet infrastructure. The virtual collaboration platform has the ability to allow screen sharing. This therefore allows the individual users to allow their partners to have a look at what they are working on their screens in an instant. The platform must have a presentation facility that allows for the presentation of Power point slides to the audience. The system also has Whiteboard-Live annotation tools which provides the users with a whiteboard type experience and look with the added…… [Read More]

Bibliography

Ackoff, R.L. (1971). Towards a system of system concepts.Management Science,

17(11):661 -- 671.

Bhaskar, R., Lee, H.S., Levas, a., P'etrakian, R., Tsai, F., and Tulskie, B. (1994). an-alyzing and re-engineering business processes using simulation. In Proceedings of the 1994 Conference on Winter Simulation, pages 1206 -- 1213

Biuk-Aghai, R.P. (2000a). Virtual workspaces for web-based emergent processes. In Fourth Paci-c Asia Conference on Information Systems: Electronic Commerce and Web-Based Information Systems, pages 864 -- 880, Hong Kong, China
View Full Essay

Open Source Software Open-Source Software

Words: 1930 Length: 7 Pages Document Type: Essay Paper #: 5296845

It is therefore a reiterative process for the benefit of the public. This is then also the basis of the claim that software evolution is faster via OSS because of its multiple participants in the processes of writing, testing, or debugging. According to Raymond [42], the participation of more people will result in the identification and elimination of more bugs, which in turn will likely result in faster software improvement. Along with this, a further claim is that the resulting rapid evolution of software via the OSS model also results in better software. The cited reason for this is that the traditional closed model is seen by "only a very few programmers" [38], while most users are obliged to use the software "blindly." When taking the above into account, OSS development can be said to be a process of perpetual maintenance. It is a series of maintenance efforts by multiple…… [Read More]

View Full Essay

Glimpse Into How Technology Companies Work Today

Words: 956 Length: 3 Pages Document Type: Term Paper Paper #: 74941878

glimpse into how technology companies work today, and what their strategies are for their continued growth. Hewlett-Packard (H-P) is one of the largest and most well-known high-tech companies in the world. In fact, the article states that it is the world's largest tech company by its revenues. H-P is acquiring 3 Com, a smaller company that has had problems in the current economic climate, to add another set of tools to its arsenal. A vice president with H-P says, "3Com has a better set of networking products for large corporate clients than H-P currently sells and a market share of more than 30% in the China networking market" (Scheck). Thus, H-P is positioning itself for a larger market share in China, and to better compete with Cisco Systems, another well-known high-tech competitor in the Silicon Valley.

Perhaps the most important aspect of this article is not that H-P is branching…… [Read More]

References

Scheck, Justin. "H-P to Acquire 3 Com for $2.7 Billion." Wall Street Journal. 2009. 14 Nov. 2009.

 http://online.wsj.com/article/SB10001424052748704576204574530001155685762.html .
View Full Essay

Technology Ethnicity and Gender the

Words: 1596 Length: 6 Pages Document Type: Essay Paper #: 23704943



The article on Google is brief, but is worth a note on how the founders put forth the idea of active philanthropy as part of the activity of an it company. Many of the directions in which Google has developed have a certain philanthropy element attached to it.

The Hacker Ethic discusses the moral framework within which the hacker operates. Sometimes, it is difficult to understand how this is possible, given the fact that many associate the hacker with stealing personal information. Nevertheless, there is an ethical and moral code that may explain hacker actions as well and it comprises, among other things, access to information and the money ethic. The hacker issue is however much wider than the limited perception one usually has and involves the Open Source cooperation and, in terms of the economic and material implications, issues of Protestant ethics.

With the final article, it is interesting…… [Read More]

"The Hacker Ethic" discusses the moral framework within which the hacker operates. Sometimes, it is difficult to understand how this is possible, given the fact that many associate the hacker with stealing personal information. Nevertheless, there is an ethical and moral code that may explain hacker actions as well and it comprises, among other things, access to information and the money ethic. The hacker issue is however much wider than the limited perception one usually has and involves the Open Source cooperation and, in terms of the economic and material implications, issues of Protestant ethics.

With the final article, it is interesting to understand how the current development fits into the historical exponential view, which means that the development in the 21st century is no longer related to the actual temporal scale, but is exponential in the sense that the 100 years in the century will mean, in fact, 20,000 years of progress, especially at the current rate things are going. According to the studies revealed in unit 3, the rate of technical progress is doubling every decade. Some of the charts in this unit are more eloquent in showing how this rate has progressively increased in the last decades. The growth was much slower (a less abrupt curve) up to 1970 and much more obvious after 1985-1990.

Following the technological development, the argument of the writer is that the economic development of the 1990s was not a bubble, but rather strictly related to the technological developments that logically triggered the economic boost.
View Full Essay

Microsoft Antitrust Battles the It& c

Words: 2684 Length: 9 Pages Document Type: Research Proposal Paper #: 51360303



Additionally, he argued that the best interest of the consumers, as promoted by Gate's organization, was in fact not the core element of new endeavors, as the company had argued, but that whenever a new product or service was being projected, this would be done in order to serve the financial interests of the organization rather than increase customer utility (Kegel, 2006).

In order to better understand why the above mentioned actions were ethical or unethical, it is best to assess them in light of three ethical perspectives. From the standpoint of the utilitarian perspective, the company is able to seek out those actions which maximize its gains, but in doing this, it must remain aware of the needs of others. More specifically, they can work towards their goals as long as these do not impede with the goals of others (Leiss, 1988). From this standpoint, the behavior of Microsoft…… [Read More]

References:

Cooper, C., 1999, Microsoft Antitrust Judgment: Winners and Losers, ZD Net,  http://news.zdnet.co.uk/software/0,1000000121,2074984,00.htm  last accessed on August 14, 2009

Dale, N.B., Lewis, J., 2004, Computer Science Illuminated, 2nd Edition, Jones & Bartlett Publishers

Hunter, D., 2005, More Microsoft Employees to Get Antitrust Training, HunterStrat, http://www.hunterstrat.com/news/more-microsoft-employees-to-get-antitrust-training / last accessed on August 14, 2009

Kegel, D., 2006, Corporate Ethics, Dan Kegel's Web Hostel,  http://www.kegel.com/corporate_ethics.html  last accessed on August 14, 2009
View Full Essay

Managing Information Technology - Set

Words: 6095 Length: 13 Pages Document Type: Term Paper Paper #: 42345676



The vision Oracle has is one of unifying all of their enterprise applications into their Fusion architecture and creating a single unifying Service oriented Architecture (SOA) was first announced in 2006 (Krill, 13). Since that time Oracle has continually strived to create an SOA in Fusion that would appeal to its corporate customers. The proposed Fusion SOA platform has been designed to be robust and scalable enough to encompass enterprise-level applications including Enterprise esource Planning (EP) applications while also being flexible enough to provide for individualized application development. There are critics of SOA in general and Fusion specifically, with industry analysts considering it too difficult to create a process-centric model that allows for pervasive, in-depth applications necessary for mission-critical business while at the same time allowing for significant scalability (Handy, 2005). Despite these concerns however Fusion continues to gain market acceptance and provide Oracle with a path to the fulfillment…… [Read More]

References

Oracle

Alex Handy. 2005. Oracle Fusion: The 'Frankenstein' of SOA? Software Development Times, October 15, 6

Paul Krill. 2006. Oracle Does SOA. InfoWorld, August 14, 11-13

Security
View Full Essay

RFID Technology as Is the

Words: 1341 Length: 4 Pages Document Type: Thesis Paper #: 11776892



In an earlier article, Michael Caton (2004), also mentions the standardization issue.

In order for RFID technology to be a viable replacement for the currently used bar code system, standardization is vital. EPCgloble Inc. provides the standards of universal product code information in both bar codes and RFID chips. According to Caton, this company will then also work towards establishing standards for the standardization of RFID use in terms of a variety of applications in the supply chain. This will simplify the interaction between shipping companies, as well as the way in which goods are stored and shipped within each company.

The company also addresses privacy concerns by dictating how RFID data can be erased. Erasing this data is however the retailer's responsibility. Mainly, concerns are that retailers may not take the responsibility of erasing individual item data after these are purchased by customers. This concern is legitimate and will…… [Read More]

Sources

Active Wave Inc. (2007). Technology: Advantages of RFID.  http://www.activewaveinc.com/technology_rfid_advantage.php 

Caton, Michael (2004, Apr. 19). RFID Reshapes Supply Chain Management. Eweek.  http://www.eweek.com/c/a/Mobile-and-Wireless/RFID-Reshapes-Supply-Chain-Management/ 

Thryft, Ann R. (2007, Jan). Supply chain Management Challenges RFID Technology. RTC Magazine. http://www.rtcmagazine.com/home/article.php?id=100786
View Full Essay

Payment of Dividends Companies Pay

Words: 956 Length: 3 Pages Document Type: Term Paper Paper #: 25243373

This method is popular amongst firms in cyclical industries, as it allows them to curtail dividends during down cycles and reward their investors handsomely during up cycles.

The market analyzes stocks based on their returns, of which dividends are just one components. Dividend policy is considered to be a measure of a company's financial health, and a function of its business situation. The dividend is not considered important for investors in growth stocks, who view the company's business opportunities as being lucrative enough that free cash should be reinvested rather than paid out. Conversely, high dividend stocks, known as "widows and orphans" are considered to be companies in mature industries with steady income streams. The market's view is that there is little to be gained for such companies to reinvest their earnings. ecause of this, the opportunity for capital gains is limited, and investors will require the certainty of a…… [Read More]

Bibliography

No author. (n.d.). How and Why do Companies Pay Dividends. Investopedia.com. Retrieved June 18, 2008 at  http://www.investopedia.com/articles/03/011703.asp 

Dividend payment information from Reuters.  http://www.reuters.com/finance
View Full Essay

Obligations Science Has Towards Society

Words: 2136 Length: 5 Pages Document Type: Term Paper Paper #: 6661935

(the ole of Science and Technology in Society and Governance, 1998) the most important thing to do is to redefine the role of science for the society and governance.

Looking at the relationship

Science does change society as much as society influences science. In the last century there were tremendous progress in scientific invention and discoveries. The vast expansion both in terms of facilities and information has affected the society to a great extent. The unfortunate part of the advancement is that science benefits the affluent, the corporate and the powers that be. While the changes in the society like medical advancements were brought about by science, they are still available to the affluent, but even insurance is not available to the poor. (Crow, 2001, p. B20)

The role of science and scientists, the thinkers of today is to figure out how they can stream line their progress so as…… [Read More]

References

Crow, Michael M. 2001. Harnessing Science to Benefit Society. The Chronicle Review

B20.

Ross, Andrew. 1996. Science Wars. Duke University Press. Durham, NC.

Gruss, Peter. 2005. History of Science Particular Ethical and Moral Obligation. [Online] Available at  http://www.mpg.de/english/illustrationsDocumentation/multimedia/mpResearch/2005/heft03/3_05MPR_66_67_pdf.pdf
View Full Essay

Google Corporate Governance Comes in

Words: 5634 Length: 15 Pages Document Type: Term Paper Paper #: 16905587

The company showed a global reach early, adding numerous language versions around the world. In 2000, the company reached 18 million search queries per day and officially became the world's largest search engine ("Google, Inc." paras. 11-14).

The company now sought to address its need for income by introducing a keyword-targeted advertising program for another source of revenue. The company partnered with Yahoo! And with other partners, such as China's leading portal NetEast and NEC's BIGLOBE in Japan. Google introduced Adords, a self-service advertising program that could be activated with a credit card. By December of 2000, Google received more than 60 million searches per day and reached the 100-million search mark per day in 2001 ("Google, Inc." paras. 15-16).

Google as a Public Company

Google would offer an IPO of stock beginning in 2004. McShane and Von Glinow cite Google as a successful company, especially in terms of navigating…… [Read More]

Works Cited

Bylund, Anders. "All Aboard Google." The Motley Fool (6 June 2007). February 10, 2008.  http://www.fool.com/investing/value/2007/06/06/all-aboard-google.aspx .

Everett, Chad. "The Google Way." Infoworld (23 February 2004). February 12, 2008.  http://web.ebscohost.com/ehost/pdf?vid=4&hid=4&sid=e2bbe58a-ff50-4544-be56-d20f347f3c1f%40SRCSM2 .

Google Inc." Hoover's Online (2007). http://www.hoovers.com/google/--ID__59101 -- /free-co-factsheet.xhtml.

Google, Inc." International Directory of Company Histories, Vol. 50. St. James Press, 2003. Reproduced in Business and Company Resource Center. Farmington Hills, Mich.:Gale Group. 2008.  http://galenet.galegroup.com/servlet/BCRC
View Full Essay

Blackboard Inc Marketing Plan Blackboard

Words: 4520 Length: 18 Pages Document Type: Term Paper Paper #: 83754903



Collaborators

Blackboard collaborators are primarily divided into three categories: members, partners and channel partners or resellers. "Members are typically Independent Software Vendors (ISVs) who independently develop and market software solutions to extend the Blackboard applications. Partners strategically invest in and collaborate with us to deliver joint solutions to our clients. Channel Partners/Resellers are primarily focused on international sales and distribution of Blackboard software and services."

Blackboard continually collaborates with universities in order to get feedback and improve the products. Among the universities which collaborate with the manufacturer are the University of British Columbia or Princeton

Blackboard collaborates with Microsoft and they have even formed an alliance in order to improve the quality of the e-learning process. "Students and faculty using Blackboard's learning platform, built on Microsoft.NET technologies, will be able to more easily integrate a wider array of academic resources in a learning environment tailored to their individual needs and…… [Read More]

Works Cited

Mark, R., 2001, Microsoft, Blackboard Create e-Learning Alliance, Internet News,  http://www.internetnews.com/bus-news/article.php/751121,last  accessed on November 12, 2007

Munoz, K.D., Van Duzer, J., 2005, Blackboard v. Moodle: A Comparison of Satisfaction with Online Teaching and Learning Tools, Humboldt State University,  http://www.humboldt.edu/~jdv1/moodle/all.htm , last accessed on November 9, 2007

Zacker, Higher LMS market penetration: Moodle vs. Blackboard + WebCT vs. Sakai, http://zacker.org/higher-ed-lms-market-penetration-moodle-vs.-blackboard-vs.-sakai, last accessed on November 12, 2007

2007, Blackboard Inc. Website,  http://www.blackboard.com , last accessed on November 9, 2007
View Full Essay

HP Pretexting Scandal the Hewlett-Packard

Words: 3344 Length: 10 Pages Document Type: Term Paper Paper #: 74518653



Perkins - who had retired at the age of 70 but was coming back on the board - had by this time muscled his way into a powerful position within the HP community; he and his powerful board ally, George Keyworth, held special "technology committee" meetings with key HP people the day before each board meeting. Stewart writes that Perkins' little group actually became a "board within a board," and Perkins' power grew. His disenchantment with Fiorina also grew. Fiorina was apparently losing the confidence of the board, and Perkins was the central figure in that movement away from Fiorina. Prior to the retreat, which was alluded to earlier in this paper, there was a board meeting scheduled, and before that meeting, Keyworth and Dunn approached Fiorina and urged her to "express concerns about Hewlett-Packard's performance, stock price, unfavorable press, and need to reorganize," Stewart continues.

Although Fiorina showed resistance…… [Read More]

Works Cited

Bloomberg. "HP chief opposes board vote plan." Retrieved 12 March 2007 from Australian it

 http://australianit.news.com .

Broache, Anne. "HP execs: Spy scandal was ethical wake-up call." CNET News.com. Retrieved 13 March 2007 at  http://www.news.com .

Fried, Ina. "HP denies pretexting former employee." CNET News.com (2007) Retrieved 13 March 2007 at
View Full Essay

Transnational IT Operations Given the

Words: 870 Length: 3 Pages Document Type: Term Paper Paper #: 84033753



Meeting with department managers to plan out the network topologies, security levels of databases, and uses of the network departmentally. From this a planning matrix is created that guides the installers in getting the departmental Local Area Networks (LANs) connected to the servers. 12b bit encryption and firewalls are installed and tested prior to any servers going online internally.

Laptop docking stations and special-use systems are next installed by department.

Servers and PCs go through a series of network compatibility test to ensure they are running correctly.

The departments become operational again.

Transnational IT Continuity Milestones for Year One

Migration of data from hosting services to company servers.

Definition of a new contingency and risk assessment strategy for the new location including costing for replacement of systems.

Integration of purchasing, procurement and logistics systems with manufacturing.

Transnational IT Continuity Milestones for Year Three

Integration of buyer and supplier relationship management…… [Read More]

View Full Essay

Strategic Scaffolding at Apple Strategic

Words: 1089 Length: 4 Pages Document Type: Term Paper Paper #: 34403563

raster graphics, wire-frame and 3D modeling performance, and refresh rates of their screens. What began to occur in the company's culture as a result of this focus on graphics performance and CPU acceleration was a bifurcation or splitting of product lines. At the high end Apple was gradually turning into a workstation company that could easily challenge Sun Microsystems or Silicon Graphics for supremacy of graphically-based calculations. At the low-end, the company was pursuing an aggressive strategy of dominating special-purpose laptops.

This strategy was entirely predicated on the core metrics of price/performance on hardware defining a culture that put pricing above all else, paradoxically nearly driving the company out of business during this period. The focus on metrics that were meant to purely define the Apple competitive advantage made the company descend into pricing wars with competitors whose business models were much more attuned to pricing competition. The metrics the…… [Read More]

Reference

Berling, Robert J. (1993). The emerging approach to business strategy: Building a relationship advantage. Business Horizons, 36(4), 16. Accessed from: http://www.berlingassociates.com/features/horizon.pdf

Keidel, Robert . THE GEOMETRY OF STRATEGY New York: Routledge, May 2010

Sakakibara, Kiyonori, Lindholm, Chris, & Ainamo, Antti. (1995). Product development strategies in emerging markets: The case of personal digital assistants. Business Strategy Review, 6(4), 23. Accessed from  http://www.soc.utu.fi/laitokset/iasm/SakakibaraEtAlPDAs1995.pdf
View Full Essay

Organizational Diagnosis and Recommendations

Words: 2744 Length: 8 Pages Document Type: Research Paper Paper #: 14551194

Organizational Diagnosis and ecommendations

Imagine studying an organization in more depth in order to determine what needs changed. This is not an easy task because it could take days or months to achieve success. Businesses also have to stay up with current technology, and this means staying present with various leadership theories in order to make the business better. Systems thinking is used as a means in which to fully understand what needs monitored. Through using transactional leadership theory, one is able to grasp what one can do as a means of making recommendation for improvement.

One needs to perform a preliminary review to ensure that he or she obtains information related to organizational leadership, culture, effectiveness and productivity. "Synergy Technical Solutions Corp. (Syntechs) is a leading national technical service solutions provider with over 1,500 highly skilled professionals" (Syntechs, 2011). Many of these individuals work on "desktop and notebook computers…… [Read More]

References

Aronson, D. (2011). Targetted innovation: Using systems thinking to increase the benefits of innovation efforts. Retrieved May 20, 2011, from Thinking: http://www.thinking.net/Systems_Thinking/st_innovation_990401.pdf.

Changing-Minds. (2011). Transactional leadership. Retrieved May 20, 2011, from Changing-Minds:  http://changingminds.org/disciplines/leadership/styles/transactional_leadership.htm .

Management Study Guide. (2011). Transactional leadership. Retrieved May 20, 2011, from Management Study Guide:  http://www.managementstudyguide.com/transactional-leadership.htm .

Mattke, J. (2011, May 20). Syntechs Employee. (E. Mattke, Interviewer)
View Full Essay

Dell Company Thank You for

Words: 2030 Length: 7 Pages Document Type: Term Paper Paper #: 61870489

This helps to provide a higher level of value to charitable organizations and encourages volunteerism on an ongoing basis. But One Dell: One Community is more than just volunteering.

Dell have been introduce some special edition laptop in Malaysia like studio 14 and 15 which comes with some artistic style designed by Mike Ming, Derek Welch, Andrea Rosenberger and (PRODUCT) RED. All this laptop offers 10+ original designs for customers to choose from. It is an extension of one's personality which include restrained, expressive, wild and sublime. Furthermore, when customers buy the (PRODUCT) RED laptop, part of the proceeds will go to the Global Fund to help eliminate AIDS in Africa.

Competitors

The Dell Company faces major competition from other companies, this include Apple, Sun Microsystems, Gateway, Sony, Asus, Toshiba and Hewlett Packard which is also mentioned to as HP. All of these companies are its competitors but HP is…… [Read More]

View Full Essay

2swot Analysis of Citigroup UAE Global Network

Words: 3387 Length: 12 Pages Document Type: Case Study Paper #: 4336909

2SWOT analysis of Citigroup UAE

Global network

The Strengths

Weaknesses

Opportunities

Threats

The Porters 5 forces analysis

PESTEL Analysis

Business Strategy

The future trends in the internet banking arena

Benefits of e-banking

The legal and ethical issues surrounding e-banking

Alan, F (2002).Your e-banking future. Strategic Finance. Available online at Citibank is a bank that is a subsidiary of the larger Citigroup. Citigroup is a leading financial institution that has services an excess of 100 million clients, close to 6 million online relationships as well as worldwide presence that spans 100 nations. Citibank UAE began its operations in 1987 in an environment that was very competitive. It rolled its services that included a comprehensive array of top notch financial services that targeted the high class and the middle class households. The bank employed cutting edge innovation in order to leverage its global expertise. This positioned it in the UAE region as…… [Read More]

References

Al-Mudimigh, A.S.(2007) "E-Business Strategy in an Online Banking Services: A Case

Study," Journal of Internet Banking and Commerce, April 2007, Vol. 12, no. 1.

Alan, F (2002).Your e-banking future. Strategic Finance. Available online at  http://www.allbusiness.com/technology/computer-software-customer-relation/171142-1.html 

Choi, S., Stahl, D.O., and Andrew B. Whinston.,A.B (1997).The Economics of Electronic
View Full Essay

Open-Source Software and the Field of Database

Words: 652 Length: 2 Pages Document Type: Essay Paper #: 53809208

Open-Source Software and the Field of Database Management Tools:

In the past several years, the open-source database market has continued its upswing with no signs of slowing down. Actually, the value of the open-source database market has increased from $850 million in 2008 to over $1.2 billion because of the increased use by enterprises to support Web 2.0 applications among other workloads. However, the increase is despite of the fact that many organizations are not in a hurry to rip out the proprietary database management tools. This is partly attributed to the fact that enterprises are rather slow in using open-source database management tools for mission-critical applications. According to the findings of a research, enterprises were utilizing open-source databases to avoid paying for extra database licenses from proprietary vendors for new projects in particular application areas. These areas include development and evaluation environments in addition to factors like migration costs…… [Read More]

References:

Assay, M. (2007, October 2). Why Choose Proprietary Software Over Open Source? Survey

Says! Retrieved May 30, 2011, from  http://news.cnet.com/8301-13505_3-9789275-16.html 

Prince, B. (2008, July 21). Open-Source Databases MySQL, PostgreSQL, Adoption Rising.

Retrieved May 30, 2011, from  http://www.eweek.com/c/a/Database/Open-Source-Database-Adoption-Upswing-Continues/
View Full Essay

Legal Immigration Is Good for the United States

Words: 1929 Length: 6 Pages Document Type: Research Paper Paper #: 81889468

Legal Immigration Is Good for the United States

With the United States opening its boarders to thousands of legal immigrants each year, immigration has become one of the most hotly debated issues in the country. However, what has largely fueled this debate has to do with the impact of both illegal and legal immigrants on the United States' economy, crime rates as well as education and environment. While some continue to advocate for the reduction of immigration within the U.S., others are of the opinion that legal immigration impacts positively on the U.S. In terms of diversity and economic gains amongst other unique benefits. It is important to note that when legal immigration is viewed from a critical perspective, the United States does benefit greatly from the same. This text will clearly and concisely highlight some of these benefits.

Immigration in the United States: An Overview

Considered a complex demographic…… [Read More]

References

Arnold, K.R. (2011). Anti-Immigration in the United States: A Historical Encyclopedia. California: ABC-CLIO.

Estrom, P. (2007, June 7). Immigration: Google makes Its Case. Retrieved February 12th, 2012, from Business Week website:  http://www.businessweek.com/bwdaily/dnflash/content/jun2007/db20070606_792054.htm 

Geigenberger, J. (2008). The lasting Value of Legal Immigration for the United States of America. Norderstedt Germany: GRIN Verlag.

Griswold, D. (2009, July 21). As Immigrants Move in, Americans Move Up. Retrieved February 14th, 2012, from CATO Institute website:  http://www.cato.org/pub_display.php?pub_id=10650
View Full Essay

Recruiting on the Internet Recruting

Words: 1590 Length: 5 Pages Document Type: Case Study Paper #: 48807250

It can also be used in educational institutions to receive applications Larreamendy-Joerns & Leinhardt, 2006.

Organizations, including educational institutions, which need to do any form of recruitment should thus be encouraged to use online recruitment which will give the company more advantages and enable the human resource management tactics to prosper Kirkby, Wilson, Calvert, & Draper, 2011()

Conclusion

Every company has its own set of needs and criteria for recruitment. However, since online recruitment provides advantages which cut across the needs of all different companies or organizations, online recruitment is the way to go for these companies. Among the advantages of online recruiting are the cost savings, time savings and the global reach of candidates. There is also one disadvantage of increasing the number of applications received which is essentially an advantage since the more the applications, the better the chances of getting a more suitable candidate for the job.…… [Read More]

References

Arthur, D. (1998). Recruiting, Interviewing, Selecting & Orienting New Employees. New York, NY: AMACOM.

Braddy, P.W., Meade, a.W., & Kroustalis, C.M. (2006). Organizational Recruitment Website Effects on Viewers' Perceptions of Organizational Culture. Journal of Business and Psychology, 20(4), 525-543.

Kirkby, H.M., Wilson, S., Calvert, M., & Draper, H. (2011). Using e-mail recruitment and an online questionnaire to establish effect size: A worked example. BMC Medical Research Methodology, 11, 89-89.

Larreamendy-Joerns, J., & Leinhardt, G. (2006). Going the Distance with Online Education. Review of Educational Research, 76(4), 567-605.
View Full Essay

Listened to a Speech in the Community

Words: 1455 Length: 4 Pages Document Type: Research Paper Paper #: 7060482

listened to a speech in the community. The speech was about a community building moving locations and the speaker was soliciting funds to help the move. The speech was approximately 15 minutes in length.

Was the speech interesting and meaningful?

The speech may have been meaningful in that it was dealing with an event that was important to the audience and to the person delivering the speech. It was, however, disinteresting and failed, I think, to make its impact.

Did the speech appear to be well researched, prepared and rehearsed?

I think the speaker was nervous. He hit to the point mentioning the move, mentioning their need for money, and requesting it. The speech seemed to be impromptu. There was little research to be conducted since the speaker was familiar with the situation. He knew the amount of money needed as well as the new location of the organization. Being…… [Read More]

Sources

About.com Public Speaking Anxiety: Preparing to Give a Speech  http://socialanxietydisorder.about.com/od/copingwithsad/qt/speechprepare.htm 

Forbes.com Top Tips For Nailing That Speech

 http://www.forbes.com/2007/08/01/sun-microsystems-nokia-ent-sales-cx_ll_0801byb07_publicspeaking.html .

Inc.com Give a Great Speech: 3 Tips from Aristotle
View Full Essay

Office Automation for the 21st

Words: 696 Length: 2 Pages Document Type: Term Paper Paper #: 63170647

Our office uses Orchestra - a web-based communication initiative and ultimate collaborative solution.

Web-based Collaboration Software Advantages

When using a web-based collaboration environment; several highly useful tools are made available to all involved. These can include whiteboard displays and file saves, instant messaging in synchrony and real-time, accessible at all times, proactive data 'pushes' to the recipients - replacing the passive 'search and grab' technology of the 1990's.

Flexibility, scalability, and accessibility are three of the most important factors when designing a communication portal for experts and participants in any business arena.

Web-based Collaboration Software Disadvantages

The inherent disadvantages to the tools we use in our environment are few. Site licenses are not available since it is managed over the Internet - thereby incurring monthly expenses. Most importantly, however, is the potential for the loss or theft of proprietary information; files left unprotected can end up in the hands of…… [Read More]

View Full Essay

XML Physical Evaluation of XML

Words: 2450 Length: 6 Pages Document Type: Term Paper Paper #: 26696582



One such body is the American National Standards Institute or ANSI which is a non-profit private organization that surprisingly institutes standards the industry accepts voluntarily. Other influential standards organizations include the Institute of Electrical and Electronic Engineers or IEEE and the Organization for Standardization or ISO. The IEEE was the organization that defined LAN standards in the Project 802 or the 802 series. These projects could be the blueprints that could be used to make XML more effective by using PAT Algebra Operators for query needs.

XML PAT Algebra Operators

The internet is based on a foundation of distributed hypertext. There is also plenty of proof that the internet could be regarded as a large distributed database where there are million to billions of queries processed daily. "XML is too slow an exchange format for any large volume of data transfer. It is fine for exchange of small amounts of…… [Read More]

References

Avolio, Frederick M. (2000, March 20). Best Practices In Network Security -- As The Networking Landscape Changes, So Must The Policies That Govern Its Use. Don't Be Afraid Of Imperfection When It Comes To Developing Those For Your Group. Network Computing.

Dekker, Marcel. (n.d.). Security of the Internet. Retrieved on January 17, 2005, at  http://www.cert.org/ encyc_article/tocencyc.html#Overview" target="_blank" REL="NOFOLLOW">
View Full Essay

Organization Microsoft Corporation Since the Bygone Thirty

Words: 1035 Length: 3 Pages Document Type: Term Paper Paper #: 84098343

Organization: Microsoft Corporation.

Since the bygone thirty years, technology has revolutionized the manner in which we work, play and communicate. From the setting up during the year 1975, the company- Microsoft has enjoyed leadership in this revolution. As a manifestation of that role and to aid in concentrating on the opportunities that lie at the forefront Microsoft's mission has been: to facilitate people and businesses across the world to realize their full potential. (Mission and Values)

The central values of the company are (i) Broad Customer Connection-linking with customers, realizing their requirement and the manner in which they use technology, and providing value through information and support to assist them attain their potential. (ii) A Global, Inclusive Approach -- Thinking and acting in a global scale (iii) Achieving excellence- in everything (iv) Trustworthy Computing- Intensifying customer faith by the quality of products and services, sensitivity and accountability, and predictability in…… [Read More]

References

"Microsoft SWOT Analysis" (January 17, 2005) Retrieved from http://www.SWOT-analysis.net/microsoft.php Accessed on 15 January 2005

'Mission and Values" (25 June, 2003) Retrieved from http://www.microsoft.com/mscorp/mission / Accessed on 15 January 2005

"Facts about Microsoft Research" (2004) Retrieved from  http://research.microsoft.com/aboutmsr/presskit/MSResearchFS04.aspx  Accessed on 15 January 2005

"Glimpse of the Future with Microsoft" (28 September 2004) Retrieved from  http://www.channelminds.com/article.php3?id_article=2348  Accessed on 15 January 2005
View Full Essay

Architecture Refers to the Design

Words: 309 Length: 1 Pages Document Type: Term Paper Paper #: 31811823

Open source is different than the similar free software movement because it is based on technical, rather than political motivations. The underlying philosophy of the free software movement is that it is morally wrong to restrict access to source code or prohibit making changes to software. The open source movement is based on the idea that making code public improves its quality because a much larger number of people have the ability to find defects and improve the software. Linux author Linus Torvalds compares traditional proprietary software to witchcraft, where a few individuals have secret information that gives them an advantage over everyone else. Torvalds compares open source software to science, in which researchers share their results to allow for independent review of the results.

ibliography

McNurlin & Sprague R (2004). Information Systems Management in Practice (6th Ed.). Upper Saddle River, NJ: Prentice…… [Read More]

Bibliography

McNurlin B & Sprague R (2004). Information Systems Management in Practice (6th Ed.). Upper Saddle River, NJ: Prentice Hall
View Full Essay

Computer Training Program to Enhance

Words: 6445 Length: 25 Pages Document Type: Term Paper Paper #: 50188973

Similar to the suggestions offered by Gahala (2001), rody (1995) identified several traits to be considered when developing a comprehensive professional development program. Among those traits include the reputation of the trainer, the rewards available to the participants, both tangible and intangible, and the support of the administration. Traditional staff development models have required everyone to participate at the same time and in the same location creating problems such as scheduling, travel, space, and funding. intrim (2002) notes that web-delivered staff development allows teachers to log on and participate at the time of day that is best for them and at the pace they are the most comfortable with.

urke (1994) concluded that the use of effective distance education programs for K-12 staff development should be increased to supplement face-to-face in-services due to the positive evaluations of K-12 educators who participated in the electronic distance education in-service programs. However, other…… [Read More]

Bibliography

Bintrim, L. (2002). Redesigning professional development. Educational Leadership, 59

Blumenfeld, P.C., Marx, R.W., Soloway, E. & Krajcik, J. (1996). Learning With Peers:

From Small Group Cooperation to Collaborative Communities. Educational Researcher, 25(8), 37- 40.

Books, J., Cayer, C., Dixon, J., Wood, J. (2001). Action Research Question: What Factors Affect Teachers' Integration of Technology in Elementary Classrooms?
View Full Essay

Job Portal Security the Objective

Words: 3023 Length: 11 Pages Document Type: Term Paper Paper #: 16042206

XML is used not only to represent the data but also as a messaging protocol called SOAP; and (6) Portal Integration is another popular integration methodology in use today. It doesn't involve expensive and time consuming technologies and processes that EAI and data warehousing require. Also, it is the most customer-facing of all the methods described in this section. This means that it can be highly personalized and customized to the customer's requirements. In future, portals will present their functionality as web services so that multiple portals from different vendors can be integrated.

Architecture of Portals

The portal, when speaking technically, is "a framework that enables developers to plug various software components called portlets, and then deliver the aggregated content to multi-devices." (Mohan, 2003) Integration may be accomplished through using HRML, JSP, Java eans, Java servlets, XSL that transforms XML through XSL transformation or even CGI. Sun Microsystems' Java Community…… [Read More]

Bibliography

Mohan, Sajeev (2003) Mechanics of Oracle Portal and Identity Management. Online available at  http://download.oracle.com/owsf_2003/36786_Mohan.doc 

Reducing the Costs of it Security Management (2006) Sumner Blount eTrust Solutions Online available at  http://i.cmpnet.com/ittransformationcenter.techweb.com/pdfs/reducing_costs_security_mgt.pdf 

Building a Portal? Vive La Difference (2001) Information Week. 5 November 2001 Online available at  http://www.informationweek.com/news/showArticle.jhtml?articleID=6508083 

Oracle Solutions for Workforce Excellence - HR Transformation: Transform HR from an Administrative Function to a Strategic Partner.  http://www.oracle.com/global/uk/hcm/9575%20Transformation-2-9-4.pdf
View Full Essay

Obsolete Software Tools the Pace of Technological

Words: 712 Length: 2 Pages Document Type: Essay Paper #: 14210859

Obsolete Software Tools

The pace of technological change continues to accelerate rending many software development applications, tools and programs obsolete quickly. The intent of this analysis is to evaluate ten of these obsolete applications, tools and programs, providing insights into how they can be improved to deliver greater value.

Analysis of Obsolete Tools

The first of the ten tools is Borland C++ Compiler Version 3.1. This specific version of the Borland C++ Complier had a series of commands within its structure that led to direct conflicts with the broader BSD C++ conventions supported by other software companies including Microsoft and their C++ Compiler. C++ has since been replaced with more Web-capable programming languages including Python.

The second obsolete programming tool is Borland Kylix. This programming tool is used for scripting and creating its own proprietary application libraries. Scripting languages including PEL and other tools for shell scripting have since overtaken…… [Read More]

References

Binstock, A. (2005). For Linux, the end-to-end is near. Software Development Times, (130), 30-31.

Lee, H.G., Clark, T., & Tam, K.Y. (1999). Research report. can EDI benefit adopters? Information Systems Research, 10(2), 186-195.

Miner, G. (2001). Choosing a LIMS in the internet age. American Water Works Association. Journal, 93(7), 120-120.
View Full Essay

Strategic Impact on Globalization Is a Process

Words: 3835 Length: 12 Pages Document Type: Essay Paper #: 46616960

Strategic Impact on Globalization

Globalization is a process that brought in changes in all walks of human existence the world over. The liberalization has created a global community and brought in the IT revolution and new forms of services like outsourcing. The changes in the world outlook and technology changes have changed the way business and international trade is done and has thus revolutionized the strategies and corporate behavior. It has ushered in new laws and environment concerns. The global community now is a different being and individual countries have now merged -- for example the European Union and many countries have now been fragmented -- as the former USS. These have had a lot of impact in the process of globalization and some international events have been the results of globalization. Has any strategy impacted globalization? And what strategies have come to be created after the globalization and how…… [Read More]

References

Buttle, Francis. (2008) "Customer relationship management: concepts and technologies"

Butterworth-Heinemann.

Drejer, Anders. (2002) "Strategic Management and Core Competencies: Theory and Application." Quorum Books: Westport, CT.

Frankel, Ernst G. (2006) "Challenging American leadership: impact of national quality on risk of losing leadership" Springer.
View Full Essay

Technology in Instructional Delivery The Case of

Words: 879 Length: 3 Pages Document Type: Essay Paper #: 4518783

Technology in Instructional Delivery: The Case of Capella University

The use of technology, particularly Internet technology, in instructional delivery in educational institutions has revolutionized the way people access and utilize educational information. Online instructional delivery, either in mixed (combination of traditional and online modes of instruction) or purely online formats, have made learning more interactive, not only between the learner and the tool, but also between the teacher and learner and among learners themselves. This increasing demand for an online mode of instruction delivery in educational institutions is a reflection of the need to not only adopt the new technology, but also to 'manipulate' this technology to suit the users' learning needs (oschmann, 1996:8). The following description of the technology of instructional delivery at Capella University demonstrates this point.

In addition to its traditional format of instructional delivery, which is face-to-face classroom setting, Capella University has an online learning system…… [Read More]

Koschmann, T. (1996). In CSCL: Theory and Practice of an Emerging Paradigm. NJ: Lawrence Erlbaum Associates.

Merrill, G. And C. Galbraith. (2010). "Learning outcomes and instructional delivery method in professional and business related courses: An empirical study controlling for course and instructor differences." Journal of Business and Behavioral Sciences, Vol. 21, No. 2.

Reiser, R. And J. Dempsey. (Eds.). (2007). Trends and Issues in Instructional Design and Technology. NJ: Pearson.