Use our essay title generator to get ideas and recommendations instantly
Education is being revolutionized by the use of tablet PCs and smart devices as well. The iPad is now considered by many college and university students as the preferred approach to getting their textbooks delivered as well (Weisberg, 188). Thankfully the day is soon coming when all textbooks will be delivered electronically to the device of a student's choice, whether it is an Amazon e-reader like the Kindle or Fire, or to an Apple iPad, iPad2 or subsequent generation of tablet PCs they are planning today. Instead of having to have a backpack stuffed with 50 lbs. Of books all that will be needed is a folder and a slim line iPad or Kindle to carry all textbooks from class to class. Universities continue to experiment with teaching courses entirely on iPads with Georgia State University's obinson College of Business and Hult International Business School distributing entire course material including…
Tim Bradshaw. "iPad takes over as the lecture hall aid of choice. " Financial Times 14 Mar. 2011,
Castelluccio, M.. "The Tablet at Work. " Strategic Finance 92.5 (2010): 59-60.
Geyer, M., and F. Felske. "Consumer Toy or Corporate Tool: The iPad Enters the Workplace. " Interactions 18.4 (2011): 45.
Weisberg, M.. "Student Attitudes and Behaviors Towards Digital Textbooks. " Publishing Research Quarterly 27.2 (2011): 188.
From the first generations of this technology to its current iteration, latent semantic indexing is proving valuable for tying together seemingly unrelated events through the use of linguistic modeling and probability theory. Determining the scope, relative urgency or lack thereof, and the potential threat internationally all can be ascertained through the parsing of unstructured content obtained from surveillance. Using this technology it is going to be possible to outsmart terrorists before they strike, replicating their knowledge network to an extent they themselves are not even aware of. In this respect, knowledge becomes a major deterrent by being able to understand how terrorists make decisions and thwart their actions before they can ever begin. Speed and closure of security strategies based on this level of knowledge is nearly impossible for an adversary to respond to, hence its potency for battling terrorism globally. Determining context and its role in defining linguistic modeling…
Michael Cooney "Prototype software sniffs out insider threats." Network World, February 25, 2008, 46. http://www.proquest.com (Accessed April 28, 2008).
Chris H.Q. Ding "A probabilistic model for Latent Semantic Indexing." Journal of the American Society for Information Science and Technology 56, no. 6 (April 1, 2005): 597-608.
technological advances of today's society seem to grow as rapidly as the human population itself. Human interaction with this technology defines its culture and allows a certain way of life to flourish or diminish. In today's world, usiness Intelligence (I) represents a tool for those within economic markets. This technique combines the raw power of computers and the ability to acquire and sort events amounts of data with the human management element that uses data to improve the efficiency or effectiveness of the organization. It seems however that the technological advances have far out reached the human understanding of what they can actually do. I is an underused technology in my opinion and the purpose of this essay is to explore this idea by suggesting ways that businesses can use I to their best advantage. I have created a three-step plan that simplifies this process and can practically improve any…
The Business Intelligence Guide. "Common Mistakes of BI Programs." Retrieved from http://www.thebusinessintelligenceguide.com/bi_program/Mistakes/index.php
Garner, B. (2011).Poor communication to blame for business intelligence failure, says gartner. Computer Weekly 10 January 2011. Retrieved from http://www.computerweekly.com/Articles/2011/01/25/244807/Poor-communication-to - blame-for-business-intelligence-failure-says.htm
McGeever, C. (2000). Business intelligence. Computer World 24 June 2000. Retrieved from http://www.computerworld.com/s/article/47371/Business_Intelligence?taxonomyId=120 &pageNumber=3
It has transformed work and has pervaded our leisure lives as well. And it has changed the way we educate. Not since the Industrial evolution has society seen such an omnipresent technological advancement. We are teaching amidst a technological renaissance, with ideas flowing digitally at rapid speeds, traversing the globe, and changing our lives in the process. (oss & Schulz, 1999, p. 123)
The value of communicating with stored information as well as individuals on the other side of the planet has become a pervasive aspect of the social fiber of the world, though their s still a divide that separates some from the system, it is safe to say that without the WWW.noone would even know the who, what and where needs of individuals missing this common link. (Aberg & Shahmehri, 2003, p. 287) the change has been so extreme that the WWW.nowspawns countless new ideas a day, as…
Aberg, J., & Shahmehri, N. (2003). 15 Live Help Systems. In Human Factors and Web Development, Ratner, J. (Ed.) (pp. 287-329). Mahwah, NJ: Lawrence Erlbaum Associates.
Computer History Museum. (2006) Exhibits Internet History, Retrieved January 20, 2008 from: http://www.computerhistory.org/internet_history/index.shtml
Forsythe, C., Grose, E., & Ratner, J. (Eds.). (1998). Human Factors and Web Development. Mahwah, NJ: Lawrence Erlbaum Associates.
Hawisher, G.E. & Selfe, C.L. (Eds.). (2000). Global Literacies and the World-Wide Web. London: Routledge.
The Cost of Technological Advances
The development of technological advances has been significant in the last 50 years but more so in the last 30. According to Moore an early pioneer in silicone technology, the capacity for engineering technology innovation is clearly rapid. Moore set a benchmark for silicone technology claiming that capacity would double the number of transistors on a chip, which determines the capacity for memory every 24 months. This law served as a standard for Intel and other chip manufacture companies, creating a demonstrative goal that was followed almost to the letter from its inception to now (Intel, 2011). This rapid advancement of technology has made many functions and aspects of technology capabilities possible as computers and servers can process more and more tasks and information more rapidly than ever. The result of these advances has been both an extreme learning curve cost as well…
Ford, G.C. (2012, January 15). Demand for allied health professionals creating shortages.
Gazette, The (Cedar Rapids, IA).
Staff Writer (March 17, 2012) Stockton bankruptcy: City would be largest in American history to declare bankruptcy. Huff Post, San Francisco, CA. http://www.huffingtonpost.com/2012/02/23/stockton-bankruptcy-biggest-in-american-history_n_1298055.html
Intel. (2011). Moore's Law inspires Intel innovation. Retrieved from http://www.intel.com/about/companyinfo/museum/exhibits/moore.htm
It is yet to be seen whether alternative energy will eventually replace petroleum products or whether they will simply enhance the efficiency, cost effectiveness, and availability of energy in the future. BP's move into alternative energy will help it to position itself as a leader regardless of which direction the market decides to go. BP's move makes sense from many perspectives. It makes sense for a marketing perspective because it will help to improve BP's image to one that is more environmentally friendly and in line with current public consciousness. It will help it to make better use of natural resources from production to end use of all of its product lines.
One advantage that BP has over many of the other companies entering into the alternative energy field is that it has experience in providing the needs of mass consumers. It understands the technical difficulties of supplying energy to…
BP Solar International Inc. BP Solar has over 30 years experience in the solar industry: a legacy of quality, service, performance and innovation all around the world. 2006. http://www.bp.com/genericarticle.do?categoryId=3050457&contentId=3050613 .
Accessed October 29, 2006.
Technological advances have impacted every area of human existence on almost every area of the planet, with few exceptions. Nearly every aspect of daily mundane life is affected by technology, including communication and transportation. However, one area of daily life is even more impacted and transformed than others. That area is food and eating. Food production has changed dramatically since the Industrial Age. Indeed, since the invention of the cotton gin, all agricultural practices have depended on technologies that have gone far beyond ox carts and donkeys. Mechanical food production increased food outputs, and greater yields have subsequently improved health and livelihoods for large groups of people. However, the fusion of technology and food production has not been completely positive. There are many negative repercussions of using technology at every stage of food production, and the integration of technology and food proves political and highly controversial. Problems such as…
Ball, M. (2014). Want to know if your food is genetically modified? The Atlantic. 14 May, 2014. Retrieved online: http://www.theatlantic.com/features/archive/2014/05/want-to-know-if-your-food-is-genetically-modified/370812/
Flandrin, J. & Montanari, M. (2013). Today and tomorrow: Conclusion to Food: A Cultural History. Columbia University Press.
Pedrocco, G. (2013). The food industry and new preservation techniques. Chapter 36 in Food: A Cultural History. Columbia University Press.
Pollan, M. (2007). The Omnivore's Dilemma. New York: Penguin.
The dedication shown by the principal, M. Jett, and the two instructors was truly tremendous, and it is obvious that the high-risk students attending ACE Academy are well served. The cramped environment, however, provides a challenge whose effects cannot really be mitigated while the school remains in the same space.
Though ACE Academy is only in its first year of operation, one way in which it could improve its educational process would be to establish an ongoing collaborative system of course adjustment and development, especially with the other schools in the county from which ACE's students come. This enables faster, more effective, and more directly needs-based instruction and courses to be developed (Lake 2003). The expansion of the school's physical size could also allow for the hiring of more instructors (in addition to the two currently employed by ACE Academy), which would further reduce the current student-teacher ratio and allow…
Jett, G. (2010). Personal interview, February 11.
Lake, E. (2003). "Course Development Cycle Time: A Framework for Continuous Process Improvement." Innovative higher education 28(10< pp. 21-33.
These efforts include: expansion of international efforts to prevent terrorist acquisition of biological agents, initiated Bioatch program to detect initial releases of biological weapons within the environment, launched food programs to carefully inspect foods for potential bioagents (with greater focus on foreign foods), expanded bioterrorism research (including Project Bioshield, a program to develop medical ripostes to biological agents), and increased medical stockpiles and training for dealing with bioterrorism attacks (Cordesman; Lindler, Lebeda, & Korch; Petsko; Fidler & Gostin). These efforts will help to both prevent the initial release of any biological agents within the general populace or environment, as well as effectively treat afflicted individuals and slow spread through appropriate treatments.
Once biological agents are released into the general population, the extent of disease spread and number of individuals afflicted will be significantly affected by the role and effectiveness of the government through quarantine and treatment (Cordesman; Lindler, Lebeda, &…
Cole, Leonard A. The Eleventh Plague. Macmillan, 2002. Print.
Cordesman, Anthony H. The challenge of biological terrorism. CSIS, 2005. Print.
Fidler, David P., and Lawrence O. Gostin. Biosecurity in the global age. Stanford University Press, 2008. Print.
Kortepeter, MG, and GW Parker. "Potential biological weapons threats." Emerging Infectious Diseases 5.4 (1999): 523-527. Print.
Technological Fix and natomical Body
19th and 20th Century Surgical Fixes
During the 1800s, surgery had become a common medical procedure due to the discovery of anesthesia which was used in reducing pain during surgery.[footnoteRef:1] In addition, technological fixes were in place for correcting medical conditions such as the removal of tumors. During this period, medical practitioners were able to describe the locations of structures in relation to other structures in the body which ensured they knew the organ's positions and could conduct surgery of various body parts easily. [1: Porter, R. (1999). The Greatest Benefit to Mankind: Medical History of Humanity from ntiquity to the Present. Fontana Press.]
Following the in-depth understanding of human anatomy and use of antiseptics as well as anesthesia, towards the end of the 19th century, surgeons started performing new types of surgery including dissection of the abdomen, brain, and spinal cord.[footnoteRef:2] In line with…
Additionally, the patient's illness was an exaggeration by the doctor according to critics. The statements by the doctors were inaccurate since the patient was constantly agitated, cried a lot, and never cooperated in anything her sister did for her. Besides, the patient had had three-week admission in a private sanitarium and medication from other medics which never helped her. Besides, she protested medical exams always refusing to undergo intelligence tests.
"Examination disclosed a well-nourished woman, about 60 years old, with the classical mien of agitated depression. The tissues were flabby, and there were enormous circles below the eyes. 'There was no significant alteration in the neurologic examination; the retinal arteries showed a mild degree of sclerosis; the blood pressure was 222/128 and the heart was somewhat enlarged. Quite frequently she snorted and cleared her throat with a loud noise (a phenomenon observed in at least three other patients of this series). The hands were warm and dry, and the agitation seemed to be rather superficial"[footnoteRef:6]. [6: Ogren, K, and M. Sandlund. "Psychosurgery in Sweden 1944-1964." Journal of the History of the Neurosciences, 14 (4), 2005: 353-367.]
Dr. Freeman's invasive surgery method made the procedure risky, bringing about several side effects. This surgical intervention was ultimately banned since it never treated the condition and with the discovery of better medications led to its decline[footnoteRef:7] while new methods of treating mental illness are present at present, frontal lobotomy should not be disregarded since during this time, it was the only treatment methods available. [7: ibid]
Health economics questions
What are the two basic tools of economics? Give an example of each with respect to health, medical services, and hospitals.
The two basic tools of economics are marginal analysis and optimization techniques and supply and demand analysis. Marginal analysis and optimization techniques underline the fact that economics is the science of studying scarce resources. Only though setting specific criteria when deciding how to use scarce resources can costs be minimized and outputs be maximized. In the field of healthcare such analysis is particularly critical, given that hospitals must often make decisions about what types of technology to spend money on and which types of specialists to hire, based upon the needs of the population. Health insurance agencies are famously criticized for refusing to cover specific procedures because they deem less costly measures to be equally effective, even if the patient or his or her…
Arnst, Catherine. (2008). Behind rising healthcare costs. Bloomberg Businessweek. Retrieved:
Technological Culture. Discussed: how it effects our life; B.F. Skinner; Aldous Huxley, and Zbigniew Brzezinski.
The world has become a technological mecca, filled with gadgets and wonders that only a generation ago would have been impossible for the average citizen to envision, except perhaps in science fiction novels. However, today, the majority of households have at least one computer, if not more. The Internet allows one to access endless sources of information and to communicate with people around the world with a click of the mouse. Cell phones, once a handy luxury for professionals, are now carried by children and parents as a way to keep in touch. Technological advances in genetics has enabled scientists to clone species, and make remarkable leaps in medical research. The last one hundred years has brought mankind from the horse and buggy days to space age technology as a part of daily…
Anthropology, Psychology, and Sociology B.F. Skinner." The Dictionary of Cultural
Literacy. January 01, 1988.
August 7, 2002: Death ray weapons 'ready in a decade.'" http://gpgwebdesign.com.au/haarp.htm .(accessed 12-12-2002).
B.F. Skinner." Francis Marion University. http://www.fmarion.edu/psych/bio/skinner.htm .(accessed 12-12-2002).
Levine also notes that the result of the government patchwork of funding is that private firms jump into the technological progress market, with even worse economic results. "Private firms focus their research efforts according to short-term, market-driven priorities, motives which often contradict long-term sustainable development and economic growth" (Levine 1998 675). Result=inequality/scarcity.
Further, Levine (1998 675) notes that large academic institutions that are more likely to consider long-term concerns are put in the position of directing national innovation systems; please see above for the problems inherent in that (turf wars).
Despite all that, Levine does still believe technological progress is the answer to scarcity, at least in environmental arenas. Levine notes that "As far back as 1911, Joseph A. Schumpeter integrated innovation into economic development theory by showing a positive correlation between involvement in a commercial transaction and the generation of new products, devices or systems" (1998 675). But in…
Bakker, Karen J. "Privatizing Water, Producing Scarcity: The Yorkshire Drought of 1995" Economic Geography 76.1 (2000): 4. Questia. 3 Dec. 2004 .
Caselli, Francesco. 'Technological Revolutions." American Economic Review 89.1 (1999): 78-102.
Clark, Charles M.A. 'Wealth and Poverty: On the Social Creation of Scarcity." Journal of Economic Issues 36.2 (2002): 415+. Questia. 3 Dec. 2004 .
Dosi, Cesare, and K. William Easter. "Market Failure and Role of Markets and Privatization in Alleviating Water Scarcity." International Journal of Public Administration 26.3 (2003): 265+. Questia. 3 Dec. 2004 .
Advances in Digital Medical Imaging
In the past few decades advances in healthcare have emerged, as new forms of technological integration are implemented as part of the overall healthcare management system. Healthcare providers, doctors and patients require more technological integration into the system providing real time data analysis and the possibility of enhancing medical knowledge. Sharing that knowledge can lead to what many describe as "digital medicine" where stored clinical data can generate medical knowledge which can be widely distributed, incorporated into decision support systems, and lead to more effective medical practices (ouler & Morgenstern, 2005). Digital medical image processing within the healthcare area has its origins in the 1970's when computed tomography was introduced as the first digital modality. In the decades that followed, advances in digital medical imaging technology have dramatically affected the planning and design of diagnostic interventional radiology facilities. Soon after the advent of computerized…
Bang, C. (2005). Digital Imaging Drives Health Care Design. Building Operation
Becker, S. (1994). Costs and Benefits of Picture Archiving and Communication Systems.
Journal of the American Medical Informatics Association, vol. 1, no. 5: 361-371.
High school and college students use digital media extensively.
Their typical digital media habits and practices are dangerous.
They often publish personal information that can be used for exploitation.
In many cases, information they publish can harm them in the future.
Willenz, P. (2003). "Internet use involves both pros and cons for children and adolescents: Some youth benefit from Internet use while for others it can exacerbate self-destructive behaviors." American Psychological Association.
etrieved July 10, 2010 from:
Hypothesis # 4
The availability of digital social media has increased the incidence of extramarital affairs by providing a convenient medium for initiating anonymous social overtures.
Digital media have been used extensively to conduct illicit sexual affairs.
The privacy of the medium permits secrecy from spouses and significant others.
The anonymity of digital communications facilitates deception in social overtures.
Hertlein, K.M. And Piercy, F.P. "Internet Infidelity: A Critical eview of…
Hertlein, K.M. And Piercy, F.P. "Internet Infidelity: A Critical Review of the Literature." The Family Journal Vol. 14 (2006): 366-371.
This were then replaced with larger big band orchestras as technology allowed such large groups to be clearly recorded, "As the swing era began, shorts were made of many of the top orchestras," (Yanow 2). Big band orchestras began showing up in all the major Hollywood productions. They featured pre-recorded songs where the musicians lip singed. It is interesting to have such a crucial period on film. The Swing Era "was fortunately captured for feature films and short subjects at the time it was all happening," (Behlmer 1). Big bands became incredibly popular in feature films during the 1930s and 40s. Benny Goodman, "The King of Swing," had a movie- Hollywood Hotel in 1937 "the full orchestra plays an abbreviated version of that quintessential Swing Era arrangement of 'Sing, Sing, Sing' in the film," (Behlmer 1). From big Hollywood productions came popularity on the small screen. As televisions became the…
Behlmer, Rudy. "Big Bands in the Movies." Turner Classic Movies. 2009. Retrieved 16 Nov 2009 at http://www.tcm.com/thismonth/article/?cid=199314
Gridley, Mark C. Jazz Styles: History and Analysis. 9th ed. Prentice Hall. 2006.
History Link, "The Jazz Singer, the First Successful Feature Film with Sound, Debuts in Seattle at the Blue Mouse on December 30, 1927." The Free Online Encyclopedia. Retrieved 15 Nov 2009 at http://www.historylink.org/index.cfm?DisplayPage=output.cfm&file_id=2485
Schoenherr, Steven E. "Recording Technology History." San Diego University. 2005. Retrieved 16 Nov 2009 at http://history.sandiego.edu/GEN/recording/notes.html#origins
Technological Globalization esults
Expanded Efficiency in Service of a Diversified Customer Base
IT plays a huge role in adapting corporate strategy in order to increase the efficiency and service towards a new, and more diversified consumer base. Essentially, "greater efficiency can be achieved by dividing the overall problem-solving effort into tasks, showing maximal interaction" with the new market environment (Arora et al., 2004). IT must take over and assign esearch and Development tasks accordingly to better understand the market. Through comprehensive investigation of new markets, IT can then provide the most successful strategies to go after the primary characteristics of the chosen market demographic. IT strategies that are proven successful can then serve as a model for other firms. Here, "the idea is that &D investments by a firm spill over into other firms, thereby increasing the productivity of &D in other firms, or directly improving efficiency and productivity in…
Arora, Ashish, Fosfuri, Andrea, & Gambradella, Alfonso. (2004). Markets for Technology: The Economics of Innovation and Corporate Strategy. MIT Press.
Bijker, W.E., Hughes, T.P., Pinch, T., & Douglas, D.G. (2012). The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology. MIT press.
Yunker, J. (2002). Beyond borders: Web globalization strategies. New Riders.
They include the use of stealthy tactics, tools and techniques in order to avoid detection by antimalware software. The second goal is to create a backdoor that allows the attackers to gain greater access to the compromised software especially if other access points are discovered or patched. The third goal is to initiate the primary mission of the attackers which may be to steal sensitive information, monitor communications or simply to disrupt operations. The last goal is to leave the compromised computer without being detected McAfee, 2010()
Effect of APT on the National Security
Advanced persistent threats are designed to steal sensitive information by stealthily innovatively and tactically evading the detection by common malware software. Advanced persistent attacks are usually targeted to be large-scale attacks. The main goal or objective of the attack is to steal intellectual property from the compromised computers. There have been cases reported where organizations have…
Andress, J. (2011). Attacker Sophistication Continues to Grow? ISSA Journal, June (2011), 18-25.
Knapp, E.D. (2011). Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Amsterdam: Elsevier Science.
McAfee. (2010). Advanced Persistent Threats. Santa Clara, CA: McAfee.
Surhone, L.M., Tennoe, M.T., & Henssonow, S.F. (2010). Advanced Persistent Threat. Saarbrucken: VDM Verlag Dr. Mueller AG & Co. Kg.
technical advances that occurred since 1950 that radically changed any 4 of the following 6 areas.
Transportation - Modern automobiles with all sorts of conveniences such as anti-lock brakes, sophisticated sensors, and computer-controlled mechanisms for injecting fuel and air. Also rockets that conveyed man to the moon.
Communications - Digital computer and software technology that dramatically changed communication in a wide sphere of services including factories, offices, hospitals, and, indeed, throughout society. In fact, each of these four areas are influenced by these two technical advances.
Manufacturing - inventions here include oil refineries and electric power plants.
e. Entertainment - The DVD and ability to download virtual music over the Internet and, via online technology, to compose and disseminate one's own musical compositions.
Chapter 1, Figure 1 (also slides 14-15 of Need for Systems Engineering) illustrates the law of diminishing returns in seeking the optimum system (or component) performance and,…
The question to be addressed in this paper is: should society hold back technology in order to protect those workers that are unskilled? It is true that many unskilled laborers have no opportunity to learn digital and other kinds of technology, and indeed many workers who lack skills in modern technology struggle to learn when they are given the opportunity. Hence, in order to protect unskilled workers and their potential, should technology be somewhat scaled back so those unskilled workers are not left out of the economy, and basically denied the opportunity to make a livable wage?
First of all, there can be no holding back of technology no matter how just and fair the reasons might be for doing that. Technology has done so much in a positive light to enhance communication and information worldwide, it would make no sense to attempt to hold it back. Secondly, the…
Business Dictionary. (2014). Technology. Retrieved September 27, 2014, from http://www.businessdictionary.com .
Oxford Dictionaries. (2014). Technology. Retrieved September 27, 2014, from http://www.oxforddictionaries.com .
Sanders, M. (2005). Technology and the Decline in Demand for Unskilled Labour: A
Theoretical Analysis of the U.S. And European Labour Markets. Northampton, MA:
The reduction in liabilities represents a move to reduce financial leverage in a period of tightening credit and risk profiles. The cash build-up too is an assertive move to combat liquidity concerns and build structural soundness to the balance sheet. AMD management implicitly understood that their internal financial condition was threatening to unravel the company with stagnant revenues and bloated expenses. As such the repositioning of AMD to take advantage of new revenue opportunities in their fusion process technology was an important step. Add to this a streamline of operations to improve the income statement, a strengthening of the balance sheet through targeted asset increases and strategic debt reductions; and the result are 2010 financial statements which show AMD "achieved many financial milestones: increasing revenue 20% year-over-year, restructuring the balance sheet, reducing overall debt, improving gross margin and delivering positive adjusted non-GAAP free cash flow" (AMD Annual eport. 2010)
Advanced Micro Devices. AMD. (2009). 2009 Annual Report. Advanced Micro Devices.
Retrieved September 19, 2011 from http://phx.corporate-ir.net/External.File?item=UGFyZW50SUQ9MzI2ODh8Q2hpbGRJRD0tMXxUeXBlPTM=&t=1
Advanced Micro Devices. AMD. (2010). 2010 Annual Report. Advanced Micro Devices.
Retrieved September 19, 2011 from http://phx.corporate-ir.net/External.File?item=UGFyZW50SUQ9ODUyNDV8Q2hpbGRJRD0tMXxUeXBlPTM=&t=1
Globalization and Technological Influences
On International Mergers: DaimlerChrysler as a Case Study
One of the most interesting international manufacturing mergers of the 20th century was the 1998 negotiation between the Daimler auto company headquartered in Germany and the struggling Chrysler corporation, headquartered in the U.S. Daimler's buyout of Chrysler resulted in a merger that ultimately failed to benefit either party, and may have seriously damaged both organizations' capacity for future growth. Below, I will discuss how the merger proceeded -- as it was covered in U.S. And international business media -- and how the negotiations for the merger and the 2007 spinoff of Chrysler were facilitated by technological developments and global business practices. I will also discuss motivations for international mergers in general and how they applied specifically in the case of the DaimlerChrysler merger.
As a horizontal merger, DaimlerChrysler followed a popular movement towards consolidation in the international auto…
Qiu, L., & Zhou, W. (2003). International Mergers: Incentive and Welfare. Journal of International Economics, 68(1): 38-58.
Landler, M., & Maynard, M. (2007). "DaimlerChrysler stock gets a lift from talk of Chrysler spinoff." International Herald Tribune, Tuesday February 20, 2007.
Finkelstein, S. (2001). The DaimlerChrysler Merger. Tuck School of Business White Paper # 1-0071.
Vlasic, B., & Stertz, B. (2001). Taken for a Ride: How Daimler-Benz Drove Off with Chrysler. New York: Harper Perennial.
Apocalypse of Art in the Tech Era
Modern Apocalypse Art and Technological Aspects
The purpose of this paper is to examine modern art, in particular that which is referred to as "apocalypse art" and further to examine the interactions between art and technology. Specifically this paper will look at the new dimensions that technology has contributed to the rendering of art as well as what contribution or impact that art has rendered to technology.
The methodology for this study is through examination of several of the artists as well as scholars who are in some way interconnected in this process of producing apocalypse art.
The question that seems to weigh on the minds of those who view the modern "apocalypse" art exhibits asks:
Has this artist attempted to achieve the effect of shock or is the artist attempting to convey some deeper truth?"
London's Art Gallery featured an exhibit entitled…
Bibliography 3 of 3
28. UNSW (nd) "Anna Munster" [Online] available at http://www.icinema.unsw.edu.au/bios/zbio_munter.html
29. Vesna, Victoria (1999) "Fear of Deletion and the Eternal Trace" [Online] available at http://www.the-artists.org/Artists/Vesna.html
30. Wilson, Cintra (2000) "Joel-Peter Witkin" Salon [Online] available at http://dir.salon.com/people/bc/2000/05/09/witkins/index.html
Reuters News (3 May 2000) "London Gallery's Apocalypse Could Rival Controversial Sensation" [Online] available at http://www.cnn.com/2000/style/arts/05/03/britian.apocalypse.reut/
Computer Technology, The Concorde Jet Liner, And Ethics
The issues of ethic in business practices in the age of increasing computer technology and the importance of managing information has come to the forefront of organizational management issues. In a society which now creates much of its wealth, not from hardwoods products, or services, but from the use of information, the integrity of that information is imperative to the ongoing well-being of the organization. In order for company A to continue to occupy the competitive position in the marketplace, the information and knowledge which company A possesses is considered as one of its proprietary assets. Stealing, 'borrowing' or otherwise duplication information in today's information business world is no different than breaking into a bank vault, and making off with the companies payroll money, or electronically hacking into the company bank records, and transferring moneys to a personal account.
In order to…
Association of Computer Machinery. "ACM Code of Ethics and Professional." ACM: Code of Ethics. 10 October 1992. www.acm.org/constitution/code.html.19 January 2001.
British Computer Society. "Codes of Ethics Online. Codes of Ethics Online. 6 March 1998. http://csep.iit.edu/codes/coe/bcs-b.htm.19 January 2001.
Computer Society of India. "Codes of Ethics Online." Codes of Ethics Online. 24 October 1997. http://csep.iit.edu/codes/coe/India_Code.htm.19 January 2001.
Langford, Duncan. "Essay: Computer Ethics and Clothing." Computer Ethics and Clothing. 1995. www.depaul.edu/ethics/computer.html.19 January 2001.
Security in Healthcare
The recent advances in technology -- databases that store personal medical records and information -- are bringing tools to patients, doctors and other healthcare professionals that were simply not available just a few years ago. There is hope that eventually, a doctor in Hawaii that is treating a medical emergency for a tourist from Florida, will be able to access the digitally kept medical and healthcare records for that injured tourist. In other words, there will likely be in the foreseeable future a national database -- that perhaps links state databases with each other the way the FBI and local law enforcement agencies are linked -- that will be of enormous benefit to citizens and their healthcare providers.
But before that nationally linked database can become a reality, there are a number of potential problems that need to be ironed out. For example, legislation needs to be…
Dogac, Asuman, and Laleci, Gokce B. (2005). A Survey and Analysis of Electronic
Healthcare Record Standards. ACM Computing Surveys, 37(4), 277-315.
Glaser, John, and Aske, Jennings. (2010). Healthcare IT trends raise bar for information security.
Healthcare Financial Management, 64(7), 40-44.
Technological and social challenges of information technology in health care
Information technology has transformed all aspects of society and healthcare is no exception. One 2010 survey of physicians conducted by the Medical Group Management association found that seven of the top ten challenges identified by physicians had to do with health information technology: implementing electronic records-keeping, keeping track of Medicare reimbursement and compensation, and bi;; collections via new information management systems (Sarasohn-Kahn 2010). However, significant challenges exist in implementing health information technology effectively, so it can realize its promise to create a more efficient healthcare system. "Clinical information systems do not communicate with each other automatically because integration of existing data standards is lacking. Data standards for medical specialties need further development. Database architectures are often designed to support single clinical applications and are not easily modified to meet the enterprise-wide needs desired by all end-users" (Kardry et al. 2010).…
Gibbons, Michael Christopher. (2011). Use of health information technology among racial and ethnic underserved communities. Online research journal: Perspectives in Health Information Management. Retrieved October 17, 2011 at http://perspectives.ahima.org/index.php?option=com_content&view=article&id=206:use-of-health-information-technology-among-racial-and-ethnic-underserved-communities&catid=63:telehealth
Kadry B., I.C. Sanderson, & A. Macario. (2010). Challenges that limit meaningful use of health information technology. Current Opinion Anesthesiology, 23(2):184-92.
Retrieved October 17, 2011 at http://www.ncbi.nlm.nih.gov/pubmed/20084001
Sarasohn-Kahn, Jane. (2010). Economics and health information technology are top challenges for physicians in 2010. Health Populi. Retrieved October 17, 2011 at http://healthpopuli.com/2010/07/01/economics-and-health-information-technology-are-top-challenges-for-physicians-in-2010/
Science teachers can utilize this article by updating their curriculum related to the universe. While textbooks currently being used convey the traditional notions of the past, newer developments need to be incorporated immediately. Most current aspects of science seem to change rapidly. Astronomers such as Fabio Governato from the University of Washington have demonstrated how supercomputers can be used to replicate the activities in space, which are invisible to our telescopes. Using the components of the article to make a presentation on the latest developments in the field of space and technology can be a good approach. While most students would consider this just like any other class, it might stand out to some intelligent ones who could build a career in this area. Science teachers can observe this article from a broader point-of-view, search for similar articles and satisfy their personal research interests.
Scientists often focus on a particular…
advances in technology. The Internet has brought the idea of instantaneous global communication to a reality; smaller and smarter chips are now included in inexpensive Smart Phones, and our ability to understand and manipulate data has vastly increased. New technologies can certainly offer law enforcement a number of new tools that aid in their job. Essentially, these can be divided into different segments, all of which are useful during different situations:
Aviation Technology -- Helicopters and light planes have both improved and become more cost effective, although they are still more appropriate for larger urban areas. They are able to help with traffic issues, and with the addition of cameras and nigh vision, help track suspects or increase surveillance on large events or potential gang related activities. They are also able to be equipment with special weapons (SWAT), firefighting, and emergency medical equipment (Langton, 2009).
Biometrics -- Biometrics is a…
Communications Technology. (2007, November 13). Retrieved from National Institue of Justice: http://www.nij.gov/topics/technology/communication/welcome.htm
Types of Less Lethal Devices. (2008, July 11). Retrieved from National Institute of Justice: http://www.nij.gov/nij/topics/technology/less-lethal/types.htm
Body Armor. (2012, September 13). Retrieved from National Institute of Justice: http://www.nij.gov/nij/topics/technology/body-armor/welcome.htm
Harries, K. (1999, December). Mapping Crime: Principles and Practices. Retrieved from NCJRS.GOV: https://www.ncjrs.gov/html/nij/mapping/ch1_18.html
Global Business 8081
Technological and Economic Changes in Educational Sector of North America
Impact of Technological Change in Education Sector of North America
Impact of Economic Change in Education Sector of North America
Impact of Technological and Economic Changes in Educational Sector of China
The paper is providing the impact of changes in the aspects of economic and technology in the educational sector of North America. The discussion is further followed with the identification of the impacts of technology and economy changes in the China similar to that of North America.
Impact of Technological Change in Education Sector of North America
It is observed that the popularity of Massive Open Online Courses or MOOCs along with the other types of distributed learning is the form of major drivers of technological change in education sector of North America. The potential of MOOC provided the potential to open higher education to several…
Altbach, P.G., Gumport, P.J. & Berdahl, R.O., 2011. American Higher Education in the Twenty-First Century: Social, Political, and Economic Challenges. s.l.:JHU Press.
Apple, M.W., 2012. Can Education Change Society?. s.l.:Routledge.
Bangay, C. & Blum, N., 2010. Education responses to climate change and quality: Two parts of the same agenda?. International Journal of Educational Development, 30(4), pp. 359-368.
Betz, F., 2011. Managing Technological Innovation: Competitive Advantage from Change. s.l.:John Wiley & Sons.
Technological Challenges of Today
The objective of this study is to answer as to what challenges law enforcement officials have faced in the light of technological advances throughout the global environment and to discuss a minimum of three problems that such changes have created. This study will answer as to what the recommendations are for future action that could assist law enforcement officials in becoming more effective in the investigation and prevention of such challenges.
Organized Crime and Technology
The work of Bjelopera and Finklea (2012) reports that technological advances have created new challenges for law enforcement particularly in the area or organized crime. This is because "modern organized criminals often prefer cellular or networked structural models for their flexibility and avoid the hierarchies that previously governed more traditional organized crime groups." (p.1) These type of "fluid network structures" make it more difficult for law enforcement to "infiltrate, disrupt, and…
Bjelopera, JP and Finklea, KM (2012) Organized Crime: An Evolving Challenge for U.S. Law Enforcement. 6 Jan 2012. CRS Report for Congress. Retrieved from: http://fas.org/sgp/crs/misc/R41547.pdf
Globalization and new technologies: challenges to drug law enforcement in the twenty-first century. (nd) INCB.org. Retrieved from: http://www.incb.org/documents/Publications/AnnualReports/AR2001/AR_01_Chapter_I.pdf
How the Web Presents New Challenges for Law Enforcement Agencies (2014) Community Policing Dispatch. Vol. 7, Issue 1. Retrieved from: http://cops.usdoj.gov/html/dispatch/01-2014/how_the_web_presents_new_challenges_for_law_enforcement_agencies.asp
Consequence of apid Advances in Science and Technology
Identify A Potential Unintended Consequence Of The apid Advances Made In Science And Technology
Potential unintended consequences of rapid advances in science and technology
The purpose of this paper is to identify the unintended consequence of radiotherapy treatment on the cancer patient. adiotherapy is the technology that is regularly used to directly kill the cancerous cells through the use of the short-wave rays. The process is intended to help the patient with a treatment option other than leaving the patient suffers from the impacts of cancer. Unintended consequences are those impacts that arise from a technology that was initially meant to have a solution to a specific problem. The unintended consequences may be positive or negative but mostly they are negative consequences that are observed. For example, the purpose of the Avandia or rosiglitazone that was intended to help the diabetes II…
Abrams, D.I., & Weil, A.T. (2008). Integrative oncology. New York: Oxford University Press.
Bonavida, B. (2008). Sensitization of cancer cells for chemo/immuno/radio-therapy. Totowa, NJ: Humana Press.
Handbook of philosophy of technological sciences. (2008). Amsterdam: Elsevier.
KES International Symposium on Intelligent Decision Technologies, N., K. (2009). New advances in intelligent decision technologies: Results of the first KES International Symposium IDT 2009. Berlin: Springer.
Additional studies show these effects last." (Ibid) the following statistics are stated in the study of Walsh, Gentile, Walsh and ennett (2005) relating to the parent's belief and the actuality as reported by their child.
Differences between parents and children reports related to video games
How often does a parent/do you:
Play computer or video games with you/your child?
Talk to you about the video games you play?
Help decide what video games you may buy/rent?
Have to ask permission before playing video games?
Does your family have rules about how much you may play?
Does your family have rules about when you may play video games?
Source: Walsh, Gentile, Walsh, & ennett (2005)
IV. The Future of Video Gaming
Positive applications for learning have emerged from video gaming capabilities. A Computer Research Association report entitled: "Cyberinfrastructure for…
Fischer, P.; Guter, S.; Frey, D.; Kubitz; J. (2007) Virtual Driving and Risk Taking: Do Racing Games Increase Risk-Taking Cognitions, Affect and Behaviors" Journal of Experimental Psychology Applied 2007 Vol. 19 No. 1 12031. American Psychological Association 2007.
Walsh, D.; Gentile, D.; Walsh, E.; Bennett, N. (2006) 11th Annual MediaWise Video Game Report Card. National Institute on Media and the Family, 28 Nov 2006. Online available at http://www.mediafamily.org/research/report_vgrc_2006.shtml .
Ainsworth, S.; Honey, M; Johnson, WL; Koedinger, K.; Maramatsu, Pea, R.; Recker, M. And Weimar, S. (2005) Cyberinfrastructure for Education and Learning for the Future: A Vision and Research Agenda. Computing Research Association. Online available at http://www.cra.org/reports/cyberinfrastructure.pdf
Gaming Advances as Learning Tool: For Some Educators, Computer Games are Serious Business" eSchool News Online. Available at http://www.eschoolnews.com/news/showStory.cfm?ArticleID=6799 .
It is also evident through the reading to realize the responsibility that comes with new technology and sharing those resources with others. The reading discusses how resources that are seen as trivial to one person can be used along with personal knowledge of another to be quite destructive. (Stanley & Waugh, 2001, p.694)
Throughout the entire reading, it is understood that technology is advancing at such a pace that it is often difficult to fathom what will happen within a short period. However, it is important to note current trends, pay attention to the economy, respect technology, and know it for its strengths and weaknesses in order to truly learn from it, and lastly never assume always question and seek further understanding and know your own ability in the whole scheme of things. The reading shows that people play an important role in the creation of new technologies as well…
Stanley, E., & Waugh, W. (2001). Emergency Managers for the New Millennium. In a. Farazmand (Ed.), Handbook for Crisis and Emergency Management (1st ed., pp.). New York: Marcel Dekker, Inc..
cultural advances made Islamic world tenth fifteenth centuries? eference Book: A History World Societies, Eighth Edition, Vol1 by: McKay, Hill, Buckler, Ebrey, Beck, Crowston, & Wiesner-Hanks
The apogee of the Islamic world when considering cultural and scientific innovations took place between the tenth and fifteenth centuries A.D. Islamic art flourished during this period, as Muslims started to experience significant progress in creating artwork using ceramics, glass, and metals. Similarly, the intellectual segment experienced great developments as individuals started to write more and more manuscripts and as calligraphy progressed. In spite of the fact that philosophy was a field that Muslims were generally reluctant to address because it was believed to be accountable for inducing unorthodox thinking in individuals, many Muslims did not hesitate to express philosophical thought and were actually very successful in doing so.
A great deal of Muslims focused on philosophical thought expressed during Antiquity and adapted it…
Marcinkowski, C., 2009, The Islamic World and the West: Managing Religious and Cultural Identities in the Age of Globalisation, LIT Verlag Munster
McKay, J.P., 2009, A history of world societies, 8th edition, Bedford / St. Martin's
Response is expected to be multi-faceted and brutal.
Technological change represents another key threat. As new technologies emerge and the end needs of users shift, the existing industry paradigm can shift quickly and decisively. For example, if the personal computer were to become outmoded in the next ten years, AMD's capture of the market leading manufacturers would be worthless. This is entirely possible, given the pace of change. AMD must always be on top of change in the industry, or risk being left behind.
Lastly, there is the risk of talent defection. AMD relies on top talent to develop its technology, to market the products, and to fight the legal battles. If their supply of talent were to be compromised, either by Intel or by startups, AMD would find it increasingly difficult to compete. They must ensure that their human resources systems are sufficient to attract and retain the top…
MSN Moneycentral: AMD. (2009). Retrieved October 30, 2009 from http://moneycentral.msn.com/investor/invsub/results/statemnt.aspx?Symbol=AMD&lstStatement=Balance&stmtView=Ann
Porter, M., adapted. (1985). The value chain. NetMBA. Retrieved October 30, 2009 from http://www.netmba.com/strategy/value-chain/
No author. (2007). SWOT analysis. QuickMBA. Retrieved October 30, 2009 from http://www.quickmba.com/strategy/SWOT/
Gupalo, D. (2007). AMD launches "puma" mobile platform. X-Drivers.com. Retrieved October 30, 2009 from http://www.x-drivers.com/news/hardware/164.html
The foolishness of this reversal of priorities would be clearly demonstrated in the contrast between the results of intelligence efforts on 9/11 and those just two years prior.
After the resignation of Tenet, who submitted as his official reason for departure the desire to spend more time with his family, his spokesman noted that "no one in the U.S. government was more aggressive in calling attention to and dealing with the threat of terrorism prior to 9/11 than was George Tenet.' The CIA's counterterrorism budget increased 50% between fiscal 1997 and fiscal 2001, while staffing went up 60%."
This ultimately resulted in an increased level of effectiveness during those years of assessing and averting terrorist plots, highlighted by the 1999 foiling of al Qaeda's millennium hijacking plan. Here, a carefully synchronized set of airliner takeovers was to strike at prominent and highly populated points within the U.S. Or utilize the…
Bowden, C. 2002. Closed Circuit Television for Inside Your Head: Blanket traffic data retention and the emergency anti-terrorism legislation. Duke Law & Technology Review.
Enderle, R. 2004) Fighting Terrorism Through Technology. TechNewsWorld. Online at http://www.technewsworld.com/story/33460.html?wlc=1243220640
Force Protection Equipment Demonstration (FPED). 2009. Demonstration Features Commercial Technology for Combating Terrorism. PR Newswire. Online at http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=/www/story/05-08-2009/0005022313&EDATE=
Ham, S. & Atkinson, R.D. 2002. Using Technology to Detect and Prevent Terrorism. Progressive Policy Institute. Online at http://www.ppionline.org/ppi_ci.cfm?knlgAreaID=124&subsecID=307&contentID=250070
new detection technologies advanced in the prevention of concealment of explosives.
Current security methods in place for detection of explosives
The hunt to develop new and improved instruments to eradicate terrorism is on the increase as terrorists progressively produce increasingly more sophisticated instruments. Some of the high explosives that terrorists use such as DX, TNT, and C4 propel huge blasts that are not always manageable by modern instruments. Added to that are comparatively new arsenal such as sarin gas that can have a concrete effect on nerve and is not always visible. All of this demands new and increasingly sophisticated counter-measures that can provide prompt and accurate detection and identification of these, and other, lethal chemicals.
Traditional methods used have most famously been dogs that have sniffed out explosives, and trained to react in a positive way when detecting a lethal chemical, but dogs soon become tired or bored. In…
BBC. (2007-09-05) Hot picks: UK tech start-ups. BBC.co.uk.. http://newsvote.bbc.co.uk/mpapps/pagetools/print/news.bbc.co.uk/1/hi/technology/6972526.stm.
Coffey, M. Chemical and explosives detection. APS Physics.
Knight, W. (10 August 2006). Analysis: Explosive detection technologies. NewScientist.com news service. http://technology.newscientist.com/channel/tech/weapons/dn9715.
Feasibility Study of E-Groceries
ecent technological developments have seen different plans of action being actualized as it relates to e-Groceries retailing. However, challenges have limited the full realization of this aspect with the greatest hindrance has been logistics; more wasteful operation has often prompted resources being utilized on working expenditures. In this case, enhancements geared towards logistical effectiveness are seen as standouts amongst the most essential steps towards the implementation of this project. This study focuses at the feasibility of a distinctive e-grocery logistics framework and usage plan. The primary target is to study how best to actualize an e-Grocery business from the logistical perspective in order to guarantee some business success. The second target is to recognize, model, and assess diverse logistical results that could be utilized as a part of e-basic need retailing. esults for realizing more remarkable delivery proficiency are displayed and modeled.
For the realization…
Aka-li, E. (2005). Applications of Supply Chain Management and E-Commerce Research. New York: Springer Science+Business Media, Inc.
Davis, W.S., & Benamati, J. (2013). E-commerce basics: Technology foundations and e-business applications. Boston: Addison-Wesley.
Dennis, C., Fenech, T., & Merrilees, B. (2008). E-retailing. London [u.a: Routledge.
Dholakia, R.R., Dholakia, N., Fritz, W., & Mundorf, N. (2012). Global e-commerce and online marketing: Watching the evolution. Westport, Conn [u.a.: Quorum Books.
Modernization on the technological front by the business sector during the nineties has transformed the manner in which Indian businesses are required to be performed. I.T. has launched novel business models and is more and more contributing a major part in enhancing the e-banking services in India. (E-Banking: An Emerging Perspective of the egulatory and Taxation Issues) The description of e-banking differs among the research fraternity since electronic banking pertains to various categories of services. Burr for instance, explains it as an electronic linkage between the bank and its customer so as to organize, deal with and regulate monetary transactions. Electronic banking can even be described as a diversity of the proposals: (a) Internet Banking or online banking (b) Phone Banking (c) T.V-linked banking (d) Mobile Banking and (e) PC Banking or offline banking. (E-Banking: An Emerging Perspective of the egulatory and Taxation Issues) The concepts 'Anywhere Banking', 'Tele-Banking',…
Berniker, Mark. 2003. Study: E-Banking Blooming, but Needs New Apps. Ecommerce News.
February 20. Retrieved from http://news.earthweb.com/ec-news/article.php/1588061 Accessed on 22 April, 2005
Dalal, Praveen. 2005. Internet Banking and its challenges in India. 26 March. http://mumbai.indymedia.org/en/2005/03/210298.shtml Accessed on 22 April, 2005
Dalal, Praveen. The Compulsive Mandates of Electronic era.
Technology Is Good agree that technological process is always good. Learning is an important facet of life and without it, we cannot grow. Growth is an important aspect of life. It is human nature to be curious and it is the human spirit to explore. Intelligence increases with each new discovery and with all of the exciting possibilities that technology has to offer, we should look forward with enthusiasm.
This is not to say that, as a society, we will not encounter problems that might arise from the advancement of technology. Just recently, we have seen some of the repercussions of technology with the first so-called cloned human baby. Many people are opposed to technology because of problems just like this. In fact, many people refer to Dr. Frankenstein and his monster whenever technology seems to interfere with moral issues. If we can learn to approach each situation responsibly and…
Technological transformations have brought widespread use of machines and tools to the work setting. Owing to this, such concepts as human-machine/equipment interfaces have become increasingly prominent. In its simplest form, human-machine interface (HMI) refers to the point or extent of interaction between a machine and its operator; taken literally, it is the area of the machine and that of the human that interact during the execution of a task. As the use of machines at the workplace increases, the HMI concept becomes more relevant. This is particularly because machines and equipment keep getting rather complicated and advanced, and as users make more and more use of them, the risk of error increases. In this regard, manufactures are under pressure to continually develop tools and machines that align with human anatomy, limitations, and skills to make the user-machine interface safer for users (Flasporer, et al., 2002).
Human-Equipment Interfaces in…
FDA. (2015). White Paper: Infusion Pump Improvement Initiative. The U.S. Food and Drug Administration (FDA). Retrieved 17 February 2015 from http://www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/GeneralHospitalDevicesandSupplies/InfusionPumps/ucm205424.htm
Flaspoler, E., Hauke, A., Pappachan, P., Reinert, D., Bleyer, T., Henke, N.,…Beeck R. (2002). The Human-Machine Interface as an Emerging Risk. The European Agency for Safety and Health at Work. Retrieved 17 February 2015 from https://osha.europa.eu/en/publications/literature_reviews/HMI_emerging_risk
Sawyer, D. (2014). Do it by Design: An Introduction to Human Factors in Medical Devices. The U.S. Food and Drug Administration (FDA). Retrieved 18 February 2015 from http://www.fda.gov/RegulatoryInformation/Guidances/ucm094957.htm
Other measures could be to freeze the doctor's assets which would effectively stop all research due to lack of funding.
Other actions could include working with those foreign countries to establish, create and enforce laws that would make it illegal to conduct research in those countries, especially if the researcher was a citizen of the United States.
"Much has been written on the increasingly international generation, transmission and diffusion of technologies, with the phenomenon having been given its own term -- techno-globalism -- and interpreted by some as displacing national systems of innovation and making redundant and futile any attempt by national governments to foster technological development domestically." (Archibugi 1993-page 121)
Fostering development domestically is not the only thing difficult in this increasingly global world, also difficult is the controlling of that development especially in regards to the type of research being conducted. It is probably worth the time and…
Archibugi, Daniele, Michie, Jonathan (1993) The Globalisation of Technology: A New Taxonomy, Cambridge Journal of Economics, Vol. 19, Number 1, pp 121-140
Scotchmer, Suzanne (1991) Standing on the Shoulders of Giants: Cumulative Research and the Patent Law, Journal of Economic Perspectives, Vol. 5 Number 1, pp 29-41
Information technology has advanced a long way since its invention and in today's hi-tech world; IT is continuously enhancing its ways towards comforts and luxuries. New thoughts and ideas are coming with every passing second, and what started as only a blurred vision, now became a necessity for all mankind. In this essay, a glimpse of the journey of IT is provided from the start till present and its effects over individual and social aspects. The journey begins with the digitization in 1950s. It was the time when overall, every machine was operated on the analogue system and there were no signs of digital information and communication technology. The history begins with the invention of transistor in the year 1947, which converts analogue signals into digital signals of binary format and can be used in many ways in electronic circuits. This invention really embarked its name in the field of…
Network and usiness Intelligence: Discussion Locus and Political Hotbed
The objective of this study is to examine why the implementation of I in an organization in the context of total social-technical system is more efficient and effective than the traditional way of implementing I in the context of social subsystem alone.
usiness Intelligence is reported to as a professional discipline to "prescribe organizational and technological interventions aimed at providing timely, accurate information to the right people, at the right times, to enable and improve business decision making." (Clark, nd, p. 1) This is reported to be situated "firmly within the domain of decision support systems (DSS) and scarcely an academic paper or vendor sales-pitch fails to mention I's power to impact decision-making." (Clark, nd, p. 1) However, there is still little comprehension of how the tools and strategies of I impact decision making.
Components of usiness Intelligence
It is reported…
Clark, JW (nd) Business Intelligence and Decision Making: Understanding B.I. As a Theory-Performing discipline of Decision Improvement. Sprouts Working Papers on Information Systems. Retrieved from: http://sprouts.aisnet.org/935/2/BI_as_theory-performing_nov2010.pdf
Is Your Business Intelligent? The 4 Modes of Intelligence (2011) RightPoint. Retrieved from: http://community.rightpoint.com/blogs/viewpoint/archive/2011/04/18/is-your-business-intelligent-the-4-modes-of-intelligence.aspx
Obsolete Software Tools
The pace of technological change continues to accelerate rending many software development applications, tools and programs obsolete quickly. The intent of this analysis is to evaluate ten of these obsolete applications, tools and programs, providing insights into how they can be improved to deliver greater value.
Analysis of Obsolete Tools
The first of the ten tools is Borland C++ Compiler Version 3.1. This specific version of the Borland C++ Complier had a series of commands within its structure that led to direct conflicts with the broader BSD C++ conventions supported by other software companies including Microsoft and their C++ Compiler. C++ has since been replaced with more Web-capable programming languages including Python.
The second obsolete programming tool is Borland Kylix. This programming tool is used for scripting and creating its own proprietary application libraries. Scripting languages including PEL and other tools for shell scripting have since overtaken…
Binstock, A. (2005). For Linux, the end-to-end is near. Software Development Times, (130), 30-31.
Lee, H.G., Clark, T., & Tam, K.Y. (1999). Research report. can EDI benefit adopters? Information Systems Research, 10(2), 186-195.
Miner, G. (2001). Choosing a LIMS in the internet age. American Water Works Association. Journal, 93(7), 120-120.
Psychology: Environmental Problems
Facing its worst drought in 40 years, the State of California took a number of measures to conserve water. It first used positive consequences to compel a 20% reduction in water usage by homes and businesses. The disappointing results led to the addition of negative consequences to compel conservation. In addition, California is now taking emergency measures against the oil and gas industry, which was previously exempt from some of the State's environmental laws. California has shown that an environmental policy must use positive and negative consequences, along with carefully given exemptions, in order to be most effective.
ater Control During Drought
Evaluate 2 Strategies for Promoting Positive Environmental Behavior
The State of California is currently enduring a 3-year drought that is its worst in 40 years and is expected to continue for the foreseeable future (Associated Press, 2014). Californians continued to use water with too little…
Associated Press. (2014, July 16). California seeks to send message to water-wasters. Retrieved July 19, 2014 from sacramento.cbslocal.com Web site: http://sacramento.cbslocal.com/2014/07/16/california-seeks-to-send-message-to-water-wasters/
Lustgarten, A. (2014, July 18). California halts injection of fracking waste, warning it may be contaminating aquifers. Retrieved July 19, 2014 from www.propublica.org Web site: http://www.propublica.org/article/ca-halts-injection-fracking-waste-warning-may-be-contaminating-aquifers
McCarty, J.A., & Shrum, L.J. (Spring 2001). The influence of individualism, collectivism, and locus of control on environmental beliefs and behaviors. Journal of Public Policy & Marketing, 20(1), 93-104.
State of California. (2014). California drought. Retrieved July 19, 2014 from ca.gov Web site: http://ca.gov/drought/
An understanding of other technological tools and approaches that have increased efficiency and cost effectiveness through automation, such as Electronic Product Codes (EPC), RFID tags, and real-time inventory control systems, can provide a more holistic background view of supply chain automation and the potential for low-cost and easily adaptable technologies.
he various levels of automation and their impact on supply chain efficiency and cost also raises another issue that will be explicitly examined in the research, namely the need to develop a system for quantifying the efficacy of robotics/automation adoption at various points in the supply chain. Large degrees of difference between impacts make it difficult to compare different technologies and different uses in a meaningful way, and as of yet no clear system for making such a comparison has emerged in practical or theoretical research. Addressing this gap will not only have intrinsic research value, but it will also…
The use of robotics at various points in the supply chain for many products and industries has been demonstrated in research and practice to be highly cost effective and efficiency increasing (Zhang et al. 2011). Further research is still necessary to determine what specific cost reduction drivers are affecting these technological advances, however, and to identify additional supply chin components that can benefit from automation. This research would help to address issues in the American manufacturing sector, and has the potential to increase employment and add to GDP by providing significant cost savings to businesses that can be used to fuel growth and increase productivity (White House 2009, CCC 2009). According to a 2010 report on warehouse productivity and safety published by the Aberdeen Group a transition to robotics can reduce ownership costs and accelerate ROI timescales, assuming appropriate technologies have been identified and adopted. It is in the area of such identification and adoption procedures that more research is strongly needed, and that this research will address.
Fully or primarily automated manufacturing technologies such as those that have been in place in the United States' automotive industry for over half a century are often cost prohibitive, with a recoupment of investment on the transition to such robotics too far in the future for most firms to seriously contemplate. Emerging robotics systems and other means of automation, which are necessarily iterative and become increasingly effective and diverse as foundational technologies themselves grow and become more functional and efficient, can provide benefits to other areas of the supply chain at lower costs yet with a similar impact on savings. An understanding of other technological tools and approaches that have increased efficiency and cost effectiveness through automation, such as Electronic Product Codes (EPC), RFID tags, and real-time inventory control systems, can provide a more holistic background view of supply chain automation and the potential for low-cost and easily adaptable technologies.
The various levels of automation and their impact on supply chain efficiency and cost also raises another issue that will be explicitly examined in the research, namely the need to develop a system for quantifying the efficacy of robotics/automation adoption at various points in the supply chain. Large degrees of difference between impacts make it difficult to compare different technologies and different uses in a meaningful way, and as of yet no clear system for making such a comparison has emerged in practical or theoretical research. Addressing this gap will not only have intrinsic research value, but it will also make the empirical research undertaken here more meaningful and valid. Quantification will enable the process of reviewing past and upcoming automation technologies and procedures much simpler, and will enable for more coherent and explicit surveying of companies in various stages of robotics and/or automation adoption, also allowing value chain analysis to include more quantitative and concrete components than are currently available.
In setting this plan for implementation and maintenance the ultimate goal for the district within the next five years is the creation of a student-to-computer ratio of 1-1 in grades 3-12 and 3-1 for grades K-2 in accordance with developmental studies for the utilization of technology in lesson and course plans for each respective grade. Computers will be updated on an annual basis, with replacement being taken into consideration every four years. In order to maintain cost-effectiveness, leasing programs and low-cost computer programs will allow students and teachers the capacity to access more applications and content which is relevant to consumers but nearly unaffordable in many educational systems. Low-cost computer programs such as the One Laptop per Child Foundation have been developed in order to aggressively place computers in the hands of hundreds of millions of children around the world, the United States included, in order to aid students in…
Aliasgari, M. Mojdehavar, N. And Riahinia, F. (2010). Computer-assisted instruction and student attitudes toward learning mathematics. Education, Business, and Society, 3.1: pp. 6. Web. Retrieved from: ProQuest Database.
Ames, M. And Warschauer, M. (2010). Can one laptop per child save the world's poor?
Journal of International Affairs, 64.1: pp. 33-55. Web. Retrieved from: ProQuest Database.
Carman, E., Lewis, C., Murphy, K. And Richards, J. (2005). Strengthening educational technology in schools and in pre-service teacher education: a practitioner-faculty collaborative process. Journal of Technology and Teacher Education, 13.1: pp. 125-140. Web. Retrieved from: ProQuest Database.
, 2012). When considering housing for this group it is important to make sure that you do not isolate someone sharing their spiritual or religious beliefs. A social worker who does not keep up with the understanding of the individuals with whom they work could be inadvertently setting up a disaster for such an elderly individual. It is always important to discover, praise, and attend to new developments and changes regarding all aspects of the clients with which the social worker involved.
Christensen, H. (2001). What cognitive changes can be expected with normal ageing?
Australian and New Zealand Journal of Psychiatry, 35, 768 -- 775.
Escobar-Bravo, M.A., Puga-Gonzalez, D., & Martin-Baranera, M. (2012). Protective effects of social networks on disability among older adults in Spain. Archives of Gerontology and Geriatrics, 54(1), 109-116.
Hodge, D.., Horvath, V.E., Larkin, H., & Curl, a.L. (2012). Older adults' spiritual needs in health care…
Christensen, H. (2001). What cognitive changes can be expected with normal ageing?
Australian and New Zealand Journal of Psychiatry, 35, 768 -- 775.
Escobar-Bravo, M.A., Puga-Gonzalez, D., & Martin-Baranera, M. (2012). Protective effects of social networks on disability among older adults in Spain. Archives of Gerontology and Geriatrics, 54(1), 109-116.
Hodge, D.R., Horvath, V.E., Larkin, H., & Curl, a.L. (2012). Older adults' spiritual needs in health care settings: A qualitative meta-synthesis. Research on Aging, 34(2), 131-155.
Today the outbound telephone marketing industry has given political campaigns the ability to reach out to a large group of targeted voters in a quick and quiet way, just below the radar. This notion went way beyond the small volunteer call centers that have existed for over forty years. It was essential for the technology to be in place and widely utilized. Political campaigns could not have put into production a complete industry of dissimilar companies, large and small, with many thousands of telephones in call centers. This was a revolution as one could target using any criteria from gender, age, vote propensity, income, level of education, to presence of children. One could shape the message even within a single calling agenda, so that they may be calling all women, but the script may be different for younger women in comparison to older women. And maybe most importantly, one can…
Bimber, B., and Davis, R. 2003. Campaigning Online: TheInternet in U.S. Elections, New
York: Oxford University Press.
Cornfield, M. 2005. Commentary on the Impact of the Internet onthe 2004 Election,
Washington, DC: Pew Internet and American Life Project, March 3.
The 1980s (the period when onald eagan was the U.S. President) witnessed a series of government measures targeting environmental regulations. This resulted in public outrage against the anti-environmental policies of the government leading to a renewed interest in nature clubs and groups and the formation of radical groups who led strong movements to protect the environment. (vii) the post- eagan resurgence (1990s onwards) - President Bush and President Clinton did not take the radical stance of their predecessor. However, President George W. Bush has taken many measures which have weakened the environmental movement instead of strengthening it. This includes opposing curbs on greenhouse emissions via the Kyoto Protocol, supporting oil drilling in the ANW or Arctic National Wildlife ange, weakening clean air standards and lifting the ban on logging in forests.
3) How does economics determine the public's opinion regarding environmental issues? Discuss the values of the dominant social paradigm…
Bocking, Stephen. Nature's Experts: Science, Politics, and the Environment. Rutgers University Press. 2004.
Palmer, Mike. Pathways of Nutrients in the Ecosystem - Pathways of elements in ecosystem. http://www.okstate.edu/artsci/botany/bisc3034/lnotes/nutrient.htm
Redclift, M. R; Woodgate, Graham. The International Handbook of Environmental Sociology. Edward Elgar Publishing, 2000.
Schmidtz, David; Willott, Elizabeth. Environmental Ethics: What Really Matters, what Really Works. Oxford University Press U.S., 2002.
Factors that affect an organization's capacity and willingness to change need to be examined and exploited. Organizational culture, which is a set of shared values and assumptions that are followed by the members of an organization, plays an important role in affecting the attitude of an organization to change. If an organizational history has been unwelcome to change in the past, it is highly unlikely that an organization will be willing to accept change in the future. Sometimes, core competency can assist in the process of change (Porter, 1980).
Lastly, at the individual level, the process of change is completed when it is implemented within a company. The task of the general manager then becomes of envisioning the future of the change and of facilitating cooperation among the workforce. He is also responsible for implementing change at various levels of production, development and distribution. In particular, what needs to be…
Saunders, M., Lewis, P. And Thornhill, A (2003). Research methods for business students. 3rd Ed. London: Prentice Hall.
Seaman, C.H.C. (1987). Research Methods: Principles, Practice, and Theory for Nursing. (pp. 174) Appleton & Lange.
Sudman, S. And Bradburn, N.M. (1982). Asking Questions: a Practical Guide to Questionnaire Design. San Francisco, CA: Jossey-Bass Inc.
Taylor, Aex III (October 12, 2009) Fortune: "Can GM Survive?" 60 (7), 60. Retrieved October 31, 2009, Proquest, ISSN: 00158259
Specifically, perimeter security requires protocols for continuous monitoring of the entire perimeter, especially in conjunction with responding to potential breaches in any given sector (McGee 2006). Grounds and perimeter security also requires scenario-based training in conjunction with non-security-related emergency procedures. Specifically, periodic emergency drills involving building tenants and personnel may present a vulnerability where grounds and perimeter security procedures are not equipped to accommodate larger than normal volumes of foot traffic, such as typically associated with fire drills.
Optimal grounds and perimeter security protocols must include procedures for accommodating the increased traffic necessitated by non-security-related emergency drills without compromising general grounds and perimeter security considerations. For the same reason, information detailing emergency drill schedules must be protected from unauthorized access or unnecessary dissemination in advance (Larson 2007).
The primary technological advances in physical facility, building, grounds, and perimeter security relate to computerization of relevant security information and its…
Larsen, R.J. (2007) Our Own Worst Enemy: Asking the Right Questions About Security to Protect You, Your Family, and America. New York: Grand Central Publishing
McGee, J. (2006) International Special Events; FBI Law Enforcement Bulletin, Vol. 75, No. 1. (pp.10-18).
Reed. B. (2008) Future Technology in Law Enforcement; FBI Law Enforcement Bulletin, Vol. 77, No. 5. (pp.15-21).
Criminal Identification Procedures
The dawn of the twenty-first century has become the era of George Orwell's "1984." Technology that was found only in science fiction a few decades ago, is part of today's standards and procedures.
The world today is filled with cameras that can film an individual wherever he goes, his cell phone signal can pinpoint his location, and even one glance can reveal his true identity (Shenk 2003). Iris-recognition technology, soon to be common in places such as airports, offices, and banks, will simply scan an individual's eyes to reveal his idenity (Shenk 2003). Many feel that in this post-9/11 landscape, there is a serious need for these high-tech tools to help detect money laundering, encrypted e-mails, bio-weapons, and suitcase nukes (Shenk 2003).
Poseidon, a new electronic surveillance system, is a network of cameras that feeds a computer programmed to use a set of complex mathematical algorithms to…
Shenk, David. "Watching you the world of high-tech surveillance."
National Geographic. 11/1/2003.
Udall, Morris K. "Criminal Justice New Technologies and the Constitution:
Chapter 2 Investigation, Identification, Apprehension." U.S. History. 9/1/1990.
Technology and Healthcare
Demographics of the global community are rapidly changing so that each year there are more and more seniors within the population base. This has a profound implication on the healthcare system of many regions since a large number of elderly citizens will be spending their lives in the confines of their home, and some may have chronic illness that require continuous monitoring. Clinical telemedicine is one way to offer greater services to rural or homebound populations. Indeed, a variety of technological advances have made it possible to change the paradigm of healthcare. Clinical information systems, for instance, have expanded in scope and depth. Increased processor speeds and data storage devices have made it possible to collect more data than ever on the detailed encounters that make up the provider-patient care delivery process, and present it more effectively to a wider range of users. Healthcare monitoring is part…
Luppicini, R. And R. Adell, eds., (2008). Handbook of Research on Technoethics. New York: Information Science Publishing Company.
Teo, T., et.al. (2008). "Wireless Healthcare Monitoring Systems. World Academy Of Science, Engineering, and Technology. 42 (1: Retrieved from:
The rise of globalization has been a contentious issue both economically and politically. Aspects such as tax incentives for overseas operations, repatriation of dollars earned in foreign markets, and potential currency wars used to devalue exchange rates, are all problems plaguing a globalized society. Add the possible threat of cyber terrorism, and global companies have a cacophony of threats that are as difficult to enumerate as they are to understand. However, through these threats, society has generally benefited for the technological advances and financial globalization of enterprise. For one, capitalism continues to spread all around the world. This provides incentive for society to innovate, and improve the overall quality of life for everyone involved. Financial globalization provides the needed capital to overseas ventures that are deemed worthy of investment. Through transparency initiatives, emerging markets are now better able to secure vital funding needed to innovate. Language adoption has facilitated…
The first piece of literature that has endured over the years, the Epic of Gilgamesh, also testifies about the existence and consumption of beer, even attributing it the power to signify the civilization as opposed to the world of the beast that did not have any use of such drink. One of the heroes in the legend, Enkidu, is brought into the civilized world though the contact with a woman, consumption of beer and hygiene: "Enkidu's primitive nature is demonstrated by his lack of familiarity with bread and beer; but once he has consumed them, and then washed himself, he too becomes a human and is then ready to go to Uruk, the city ruled by Gilgamesh" (the History of the World in ix Glasses, p.27). The first recorded literary piece is linked with the largest city in Mesopotamia and the first alcoholic beverage to be used by humans at…
Standage, Tom. A History of the World in Six Glasses. 2005. Walker Publishing Company. New York
Beer Institute. Retrieved: Oct 17, 2009. Available at: http://www.beerinstitute.org/tier.asp?bid=142
A History of Beer. Retrieved: Oct 18, 2009. Available at: http://www.alabev.com/history.htm
iegele indicates that "employers often wish to know whether they are entitled to contact an applicant's references and what obligations they may have in this regard. ith respect to obtaining consent to contact such references, it is accepted that an applicant who lists references on a job application or resume is implicitly consenting to a prospective employer contacting and obtaining information from those references. Similarly, it is generally accepted that an applicant who lists former employers is deemed to be giving consent to have those employers contacted for references." (iegele, p. 3)
This speaks to the fundamental condition in the relationship between employer and prospective employee. The latter must make available willingly certain information that would otherwise be considered private and protected. This is part and parcel to the process of attempting to gain employment and provides the prospective employer with avenues to determine the suitability of the individual…
Draper, H. (2012). Facebook Privacy Issues Arising in Hiring Process. Biz Journals.
Fleischer, M. (2010). A Legal Landmine: Privacy Issues in the 21st Century. Med Team Support Staffing.
Forster, E. & Garakani, G. (2007). Critical Issues in the Hiring Process. Blaney McMurtry Barristers & Solicitors, LLP.
Waggott, G. (2011). Law Note -- Pre-Hiring Background Checks. McMillan.ca.
Planning menus may on the surface seem rudimentary, but upon further inspection, one should realize a thorough and prudent approach is required. Menus are an essential component to any business irrespective of the industry. They are the foundation by which the customer can interpret the value proposition offered by the business. In planning the menu, the owner should focus on two primary concepts: culture and technology. With culture, the franchise can better determine its target market and demographic. This enables the company to formulate a menu to cater specifically to this target market. Technology as it stands today, will impact the menu and subsequent product offerings. Due to its ubiquitous nature, the internet provides the consumer with a litany of options. Thus, when designing the menu, technological advances should be utilized.
The first aspect of the menu design should be that of culture, target markets and demographics. Knowing this…
1. McGrory, Brian (September 19, 2004). "$28.95 for that?." The Boston Globe (Boston.com). http://www.boston.com/news/globe/magazine/articles/2004/09/19/2895_for_that/ .
2. Goodale, Gloria (October 19, 2007). "At fast-food joints, try the secret menu." Boston: Christian Science Monitor. ISSN 0882-7729. http://www.csmonitor.com/2007/1019/p13s01-lifo.html .
3. Clines, Frances X. (1994-01-16). "Building the Szechuan Empire." The New York Times. http://www.nytimes.com/1994/01/16/nyregion/new-yorkers-co-building-the-szechuan-empire.html?pagewanted=all&src=pm . July 31, 2012.
4. Erikson, Chris (2010-06-28). "The Chinese Menu Wars." The West Side Spirit. http://westsidespirit.com/2010/06/28/the-chinese-menu-wars/ . Retrieved August 1, 2012.
Nursing and the E
The Emergency oom is often one of the most visible parts of healthcare for political debate. It is also one of the most difficult environments for a modern nurse. It is interesting that one of the founders of modern nursing had emergency experience prior to developing her overall theories. Nightingale also looked at negatives and positives that are the conditions, which could help make people recover and reach their actual potential, as also noted by Maslow hierarchy of needs. She did not look or speak directly of the disease per se, but rather, looked at air, clean water, environment, and sanitation. She published her book in1860 with the title a "Notes on Nursing: What it Is and What it Is Not," connecting human beings and quality of human life, and comparing the stagnant sewage she saw in Scutari, as well as in London. She…
Americans at Risk. (March 2009). Families USA. Retrieved from:
Patient Perceptions in the Emergency Department: Physicians, Physician Assistants,
Nurse Practitioners. (30 August 2010). Retrieved from: http://idiopathicmedicine.wordpress.com/2010/08/30/patient-perceptions-in-the-emergency-department-physicians-physician-assistants-nurse-practitioners/