Software Essays


Quantitative Research

series commence and end? What numerical optimization technique was adopted? Which software was utilized? Was missing information simply deleted or filled in; how was this done? REFLECTION - Reflect on your newly developed understanding of QUALITATIVE research. What has this experience meant to you? How will this make a difference in your practice of nursing? This is a personal reflection and should have some depth (at least two full paragraphs). Please respond in reference to understanding qualitative methodology and not the specific focus of the research study. What has the experience of reading and critiquing a qualitative study meant… Continue Reading...

Special Education in Miami Dade

assists by offering options to special needs students. For example, word processing software allows text to be enlarged, colored, and emphasized in ways that grabs a student's attention. Slide shows allow for use of visual aids. The internet allows teachers access to the most recent educational resources (Wilmore, 2013). However, technology integration is not the only aspect of special education that needs improvement. Research shows teachers may not willingly integrate technology into their daily instruction because of certain attitudes and perceptions (Vincenti, Buciero, & Vaz de Carvalho, 2014). These attitudes and perceptions often come from lack of training (Keengwe,… Continue Reading...

Engaging Employees in Change Process

responsive. These kinds of transition are probably minor, such as installation of new software or major, such as coming up with new strategies for marketing, disputing hostile takeovers or changing the organization due to stubborn foreign competition (Anderson and King, 2002). A critique of several tactics that can be used to engage employees in the change process. You should consider the following in your effort to achieve a successful transition: Come up with an organizational vision. Make sure you have a vision that is common among every team member to determine the way the team will combine effort with… Continue Reading...

Congress Vs the Public Library

public schools are subject to the authority of U.S. Congress concerning installation of web filtering software as a result of receiving E-Rate discounts. These discounts are part of federal funding. Any public school or library receiving such funds must install this type of software. The ruling demonstrated installation of such filtering software is not unconstitutional as it does not violate the First Amendment. This ruling provided the groundwork for the Children's Internet Protection Act to take full effect. In 2000, Congress passed the CIPA or the Children's Internet Protect Act. This law served as the main issue for the… Continue Reading...

Project Data

an annual report, by partnering with The Urban Institute, the Association of Fundraising Professionals (AFP), and participant donor software companies. FEP resources back growth-focused fundraising initiatives. The Gig (Growth in Giving) program endeavors to increase philanthropy's GDP (gross domestic product) share. This initiative has assumed the shape of a large umbrella agency, in tandem with the development of the novel Gig Database (with its considerable research capacity). At present, over 6,000 nonprofits are now participating in the effort. Data/Variables An Excel-based, downloadable Fundraising Fitness Assessment has been developed by the FEP, enabling nonprofit entities' fundraising program measurement and evaluation… Continue Reading...

Gis Systems Article Review

prices to be had and they range from cash prizes or suites of Ersi software that range in value from two thousand dollars all the way up to five times that. Beyond that, the winners will be featured at ERsi's Federal GIS and Education GIS conferences as well as the ERsi Young Professional Network events (GSS, 2016). Dawn Wright, the Chief Scientist for Ersi, has been the mouthpiece of the contest. She notes that "Ersi views science as helping us to understand not only how the earth works but also how the earth should look" (GSS, 2016). She went… Continue Reading...

Project Management Fundamentals

environment. Nonetheless, the role of the project manager in a software development project would be quite different. First, it may not be necessary for a construction manager to be an architect or an engineer (Dykstra, 2011). In a software development project, however, it is usually more useful when the project manager is considerably knowledgeable in software development and/or information technology in general (Mcmanus, 2005). This implies that the role of the project manager in a software development project may be much more active and complex compared to a construction project. This role would, for instance, involve understanding software requirements, creating… Continue Reading...

Open Source Software

The term "open source software" has been used to refer to computer software whose source code is available for public use, either exactly the way it is, or after certain alterations are made to it. Such software normally requires no license fee. OSS applications are available for various purposes like web design, communications, office automation, content management, and operating systems (Necas & Klapetek, 2012). One major difference between proprietary software and OSS is license. Just like copyright material, one will nearly always find that software is licensed. software licenses… Continue Reading...

Strategic Resource Management Hewlett Packard Enterprise

everyone from individual customers to businesses. Via HP's product offerings, consumers can accomplish tasks, making life easier. The software multinational offers infrastructure technology, technology maintenance and support, business process outsourcing, networking resources and products, application creation and support, personal computing, access devices, integration and consulting services enterprise IT software and infrastructure, and printing and imaging linked services and products. In the year 2007, it launched its all-in-one Touchsmart PC, featuring touch-screen display, in addition to its touch-screen tablet PC for consumers (Williamson, Cooke and Jenkins, 2003; Jeannet and Hennessy, 2001). In April of the next year, it launched its… Continue Reading...

Generational Differences in Social Media Usage

N. R. (2004). Simplifying qualitative data analysis using general purpose software tools. Preventive and Behavioral Medicine Publications and Presentations: Paper 84. MacKay, A. W. (2015, January). Law as an ally or enemy in the war on cyberbullying: Exploring the contested terrain of privacy and other legal concepts in the age of technology and social media. University of New Brunswick Law Journal, 66, 3-10. Miller, K. H. (2009, February). The law catches up with distance education Journal, 31(7), 31-37. Miller, W. J. (2013, January). Show me, tell me: social media and the political awareness of American youth. Afro-Americans in New… Continue Reading...

Ending Terrorism in Africa

2015; Bamfo, 2013). The amount of manpower, technological skills in computer hardware and software, financial backing, security equipment and networking required to implement these resolutions by any country is humongous (Grossman-Vermas, Huber & Kapitanskaya, 2010). Research Gap The socio-economic, security and political issues that African countries face stand in the way of their will to fight terrorism. Anti-terrorism assistance provided by the UN should consider the unique socio economic and political circumstances of the regions being supported (Grossman-Vermas et al., 2010). Terrorism is a product of a combination of factors that range from local to international. These factors revolve around… Continue Reading...

Strategic Policy and Planning at Dell Computers

involved in the development and retailing of computer-related products such as network switches, software, data storage devices, computer peripherals, as well as consumer electronics; all in which it commands a substantial share of the global market. Despite its robust position in the industry, the company has over the years faced significant competitive pressure, with the future presenting even more aggressive rivalry. This case study provides a strategic analysis of the company. First, a SWOT analysis of the company is provided. Second, attention is paid to the organization's corporate-level and business-level strategies. Third, the analysis identifies the structure and control… Continue Reading...

Amazon Vs Ebay

via the Web: videos, books and CDs along with computers (hardware and software) were the keys. Thus, the site began as an online bookstore in the same way eBay began humbly as an online garage sale store in 1995 (its original name was Auctionweb). Thus, while Amazon envisioned itself as a retailer, eBay envisioned itself always as an online auction site. Over the years, both sites have grown to appeal to producers of virtually everything. In fact, the only items not traditionally sold on either site are liquor/adult materials. Major suppliers are anyone who has merchandise to sell as… Continue Reading...

Business Ethics

of Long Working Hour. Journal of Business Ethics, 84(2). Retrieved, from http://link.springer.com/article/10.1007/s10551-008-9700-9 Poladian. (n.d.). Accounting software for Small Business - Intuit Quickbooks. Should You Give Employees Corporate Credit Cards? Retrieved September 8, 2016, from http://quickbooks.intuit.com/r/cash-flow/should-you-give-employees-corporate-credit-cards/ Writer Thoughts Continue Reading...

Apple Investment and Financial Analysis

is an American multinational company specializing in designing and producing mobile telecommunication devices that include iPhone, computer software and hardware, Apple TV, Apple Watch, iPod, and other electronic devices. Apple was incorporated and publicly registered in 1977. Headquartered in California, Apple is one of the most successful American companies in term of revenue with the annual revenue reaching $233.7 billion at the end of 2015 fiscal year. On February 2016, Apple recorded $521.3 billion worth of market capitalization. While Apple designs the bulk of their products in the United States, the company's manufacturing plants are located in China. Apple… Continue Reading...

Developmental Learning and Technology

assists by offering options to special needs students. For example, word processing software allows text to be enlarged, colored, and emphasized in ways that grabs a student's attention. Slide shows allow for use of visual aids. The internet allows teachers access to the most recent educational resources (Wilmore, 2013). However, technology integration is not the only aspect of special education that needs improvement. Research shows teachers may not willingly integrate technology into their daily instruction because of certain attitudes and perceptions (Vincenti, Buciero, & Vaz de Carvalho, 2014). These attitudes and perceptions often come from lack of training (Keengwe,… Continue Reading...

Etherneting

complex matter. However, the Cisco Valet Plus and other such units are bundled with software geared at making network setup a very simple task. Cisco's product, priced at $149, has one limitation: it is only operational on frequency 2.4-GHz. Therefore, for any organization or individual that wishes to add any personal Web server, storage device, or multimedia server, a router is needed which supports the frequency band 5-GHz, together with a number of Gigabit Ethernet sockets for enjoying high-speed wired connectivity. Dual-band (5- and 2.4- GHz) routers like the D-Link DIR-825 Xtreme N. Dual Band Gigabit router, which is… Continue Reading...

Future at Galaxy Toys Inc

increasing turnover faced by the company. In the recent periods, the company has faced employees leaving to other software companies. This is bound to impact the long-term viability of the company because personnel play a vital part. Another conclusion that is a prospective concern for the company in the long run is the lack of training of personnel. It can be deemed that the lack of knowledge and proficiency of personnel is bound to adversely impact the company in the future owing to lack of progression. A third conclusion is the aspect of poor maintenance not only with shipping,… Continue Reading...

Audit Planning Control at Home Depot

location is identified as having irregular numbers. So testing the software that manages the inventory is the most important way to look at this -- if the software is working as it should then the inventory counts should be fairly accurate. This can be combined, of course, with spot physical testing to verify that the software test did not yield a false negative. Cash is easier, because the company should have financial statements outlining the value of its various accounts. It will have some physical cash on hand (i.e. in its tills) and there could be a physical spot… Continue Reading...

Technology Adoption in a Call Center Enterprise

as well as in the process of manufacturing. It consists of sensors, software and devices needed for the control and monitoring of equipment in a plant as well as the plant as a whole. On the other hand, Information technology (IT) brings together all the required pieces of technology to help in the processing of information. The last decade saw several companies manage IT and OT as independent entities with different technology protocols, governance models, organizational units, stacks and protocols. Nonetheless, the past few years has seen OT continuously adopt IT- related technologies. For instance, IP (Internet Protocol) is… Continue Reading...

Supply Chain Management and Logistics

carry out their business operations. The team selected for the project will complete every requisite software and hardware resource (Rutner et al., 2012). Overall, this project will not be bound by ordinary ongoing operations; further, no mandatory research process will disturb everyday operations. This logistics and SCM project's scope encompasses secondary and primary information acquisition in case of civilian business and military logistics and SCM, information analysis, and report preparation (Spychalski, 2011). Additionally, the project scope covers complete manuals, documentation, and presentations which will supplement the project. The project will only be regarded as "completed" after successful research and… Continue Reading...

Eye in the Sky Film

the U.S. The U.S. -- based analyst then proceeds to run the videotape through the facial recognition's software, and obtains positive IDs (Browne, 2016). The film "Eye in the Sky" actually did a commendable job at depicting the all-inclusive work setting that persons involved in the program face. Using the doll as the general's daughter and the statement "I'm going to need you back here in 12 hours" were brilliant. It offered a true sense of the twin existence in all the drone community's aspects. The earlier exchange between the young sensor operator and the pilot showed that, apart… Continue Reading...

Team America Surveillance and Espionage

heard differently, because from year to year hardware and software considerations will change. Legislation also changes, often in favor of the government and its expanding powers of surveillance. Some legislation may redefine what specific activities a government entity is allowed to do to gather information. Interestingly, there are other ways of monitoring human behavior and even brainwashing as shown in Captain America: Civil War. Surveillance is only the tip of a large iceberg of rights erosion. For one, marketers collect purportedly anonymous data and usage statistics from customers and members of social media sites. Whenever a person uses a… Continue Reading...

Reducing Burn Care Unit Operating Costs

systems improvements. Organization Total Per PC IT SAVINGS One Time Annual Recurring 3-Year Total One Time Annual Recurring 3-Year Total software - Clients 300000 205000 915000 60 41 software - Servers 39800 57710 8 1 12 Hardware 36000 52200 7 1 10 IT Services 0 24000 72000 0 5 14 Power/Electricity Usage 224037 672111 0 45 Other IT Costs 0 11700 0 1 2 Total 375800 468307 1780721 75 94 Business SAVINGS Travel Expenses 73355 220066 0 15 44 Business Services 0 0 0 0 0 0 Other Business Expenses 0 0 0 0 0 0 Total 0 73355 220066 0 15 44 Total $375,800 $541,662 $2,000,787 $75 $108… Continue Reading...

Contract Law and Modern Communication

1997). In other cases, breaking the seal of a software product is sufficient to deem acceptance of the terms of use, as in Hill v. Gateway 2000 (Harper, 2004). In many instances, the same rules have been found to apply with instantaneous communication as with conventional. For example, in Rubenstein v. Clark & Green, a series of emails was exchanged. In those emails, one party made it clear that it intended to continue discussions with the other, in anticipation of forming a contract at a later date. If there was question about the formation of a contract, such communication… Continue Reading...

Database Design for Invoicing Using Rea Data Model

ship the order to the customer. Fig 3: Database for Order and Cash Receipts System Conclusion An accounting information system is a software the accounting professionals use to complete the accounting transactions. However, the database systems are required to develop the AIS to store information. The study uses the REA data model to develop the database for the invoicing and billing process. The first process is by developing the entity relation diagram revealing the entities and their relationships. The paper also develops the logical flow diagram to reveal data flow in the database. Finally, the study reveals the strategy that the database… Continue Reading...

Motivational Theories Of Animal Shelters

but the answers to the questions will be clustered using the software. Patterns of responses will be grouped according to participant gender. The MAWS results can be quantified as well. These two different survey methods will provide a broad means of testing the research hypothesis. Simple descriptive statistics will demonstrate the correlations between gender and different motivational factors and allow the researchers to ascertain the null hypotheses in each condition. If the numbers of male volunteers increases in both Group A and Group B. conditions, then the null hypotheses will be proven. If, however, there is an increase in… Continue Reading...

Accreditation Costs Of Healthcare Organizations

allocated to accreditation, a procedure that entails healthcare organizations pay to accrediting firm (consultancy services), the requisite software normally purchased from the accrediting firm, consultancy services normally delivered by the same accrediting firm, and human resource to handling the process. Overall, accreditation-linked costs to the U.S. health sector are prohibitively high (Curnayn, 2011). Numbers on true accreditation-linked expenses chiefly include dedicated workforce, manuals, review application, education/training with respect to accreditation standards, interim review conditions, review process, subsequent review by a federal- or state-level agency and findings resolution (Whitney, 2013) Further, a large number of healthcare providers raise concerns with… Continue Reading...

Supply Chain Strategies

is a technology organization that specializes in storage computing, hardware, software as well as network services. HP is well renowned for providing technological solutions to individual consumers, businesses as well as other entities across the globe. HP competes with IBM in providing CPUs, printers, lasers and other products as well (Hewlett-Packard, 2012). Hewlett-Packard has been on a journey to institute and steer greater efficacies in the supply chain and at the same time leveraging its competitive edge of a receptive, assimilated and commercial method to supply planning and consumer satisfaction. Having a consumer-centric tactic to operations within its supply… Continue Reading...

Todays Strategic Human Resource Management

development function is actually very important for the human resource manager. Development can include training on specific software or tools necessary for the job, and but it can also include things like leadership training as well. By ensuring a structured development plan an HR manager ensures the long-term value of an employee The longer an employee stay with the company they get more loyal and value the company's mission. The next key function is employee relations. This area is about ensuring that employees are motivated and engaged with the organization -- so it includes things like ensuring morale is… Continue Reading...

Project Management Infrastructure

workforce of professionals, which might encompass numerous project managers. They undertake numerous routing roles, for instance project appraisals and software assessments. In particular, these appraisals are a proper way of monitoring the espousal of the methodology and discover the best practices. Their prominence lies in providing a fitting project support services to project teams (Wysocki, 2011). 2. Temporary or Permanent Structure Temporary PSO structures are created to provide services for the administrative and managerial necessities of large projects. These projects are disintegrated into minor sub-projects and very one of them allocated a project manager. They are liable to the… Continue Reading...

Qualitative and Quantitative Data Analysis

data to answer some human resources related questions using the SPSS software. The screenshots of the entire data are presented in the Appendix 1 and Appendix 2. The report provides the findings for the HR (human resources) issues after carrying out the data analysis of employee's data. The outcome of the analysis reveals that workers between 25 and 55 years of age form the largest percentage of employees in the organization where the mean age of all the entire workforce is 39.19 years. However, workers between 18 and 29 years of age consist of 30.4% of the workforce. However,… Continue Reading...

Artificial Intelligence and the Human Brain

functionalism, early pioneers of AI thought of the human brain as the hardware and the human mind as the software. Eventually they began using examples such as running Microsoft Word program on numerous computers and comparing that to running the 'mind program' on any sort of hardware. They convinced themselves that the human brain is a computer and because the mind is its program, this program can then be not only replicated, but also transferred into other machines like robots. This sounds reasonable and potentially insightful. However, the brain is not a computer. The human brain cannot be regarded… Continue Reading...

Video Cameras and Public Safety

of video cameras could lead to further invasions of privacy like monitoring of data and using facial recognition software to actively identify people in public. One news article highlighted the use of cameras in a busy, public intersection in Orinda county. The placement of the cameras is on and near traffic poles and stop signs. The article noted other cities like Danville and Lafayette have begun using Reconyx cameras for public safety. "The cameras are intended to assist law enforcement by capturing images of fleeing thieves. But since the cameras are motion activated, they snap pictures of anything in… Continue Reading...

Information Technology Goes on and on

a system or developing their own from scratch. Topic 2: Open Source software The advantages of open source are cost, flexibility, and a community of support help. The disadvantages are privacy and competition. For certain applications that are general, open source is viable for the company for which the author works. UNIT 6 DISCUSSION Topic 1: Freedom of Speech The students actions were legal from both perspectives which is why they were not arrested. From the students' perspectives, their actions were ethical because they were helping people. From the transportation company's perspective they were not. Topic 2: Security Consultants (a)… Continue Reading...

Inventory and Supply Chain Management

SKUs and the two left-skewed SKUs (Cr108 and Cr1370. Using inventory management software, Vinod can input the data for each SKU, and come up with an appropriate scheme for managing safety stock. Examples of variables that can be input into the algorithm for optimal prevention of stockouts would include order data, shipment data, and existing inventory. 3. Vendor EJK from Korea has lead times of three months (machine parts) and four months (hydraulic parts). EJK is a critical partner, being the sole vendor for critical machines and parts for the most popular crane models: the EX300, EX270, EX150, and… Continue Reading...

Kings County Library Changes Needed

the meeting. Of course, there would be a cost associated with getting that software bought and installed. However, the money that stands to be saved, both by the library system and the people that are shuttling back and forth, would be substantial. It would also be wise to have a knowledge base and reposipority that people can share and contribute to. Thus, using Microsoft Onenote and Sharepoint (or a similar suite of programs) would greatly facilitate sharing and collaborating and would cut down on the amount of paper, physical handling of the same and so forth. Customer Satisfaction The… Continue Reading...

Importance Of Communication Skills

Sarkissian, N. (2016). Empirical study of communication structures and barriers in geographically distributed teams. IET software, 10(5), 147-153. Kenton, S. B. (1989). Speaker Credibility in Persuasive Business Communication: A Model Which Explains Gender Differences. Journal Of Business Communication, 26(2), 143- Martin, J. C., Davis, B. D., & Krapels, R. H. (2012). A Comparison Of The Top Six Journals Selected As Top Journals For Publication By Business Communication Educators. Journal Of Business Communication, 49(1), 3-20. doi:10.1177/0021943611425239 Ruppert, B., & Green, D. A. (2012). Practicing What We Teach: Credibility and Alignment in the Business Communication Classroom. Business Communication Quarterly, 75(1), 29-… Continue Reading...

Effort and Impact on Memory

refers to the method of instructional design. Using the similar example, the use of Rosetta Stone software, which relies on visuals, will have different memory recall effects than a conversational class or immersion into an Arabic society. Finally, germane cognitive load is a more abstract concept related to memory and refers to how individuals construct schemas that can be used to structure the information to aid in the recall process. All three of these types of cognitive load are instrumental in understanding the interaction between effort and recall, and it is predicted that there will also tend to be… Continue Reading...

Moral Issues with Internet Privacy

of internet privacy. Possibly the most straightforward moral problem under the 'internet privacy breach' umbrella is malicious software (e.g., spyware) utilization for perpetrating cybercrime and stealing private data. A number of cybercrimes are made illegal by the governments of nations like the United States, European nations, etc., thus echoing unanimity with the fact that it is wrong to steal. In America, in specific, federal governmental regulations against cybercrime encompass: Dishonest practices and acts; Providing fake information and IDs; Credit card frauds; Computer-related frauds; and Frauds linked to access devices. Interestingly, these regulations disallow invasion of others' privacy with the… Continue Reading...

Fujitsu Limited Case

products, ranging from servers and mobile devices to storage hardware, microprocessors, software, and cloud computing solutions. The firm continues to exploit opportunities in the ICT marketplace. Recently, in partnership with TechShop, a Silicon Valley start-up, the firm has introduced a mobile makerspace dubbed TechShop Inside (Edmondson & Harvey, 2016). Aimed at fostering learning in science, technology, engineering, arts, and maths across all ages, the mobile makerspace is a 24-foot mobile trailer equipped with mini 3D printers, laser cutters, tablets, and other electronic equipment. The trailer provides students with an environment for hands-on learning, an undoubtedly powerful and transformative innovation… Continue Reading...

Systems Development Process

the organization will be necessitated to give input. Open Source software You are the CIO of your company, and you have to develop an application of strategic importance to your firm. What are the advantages and disadvantages of using open-source software? Do you think that this is a viable option for your company? Comment by babyliza: Not answered One of the advantages of open source software is that it is cost-effective. Open source software is relatively cheaper than products commercially marketed as they are created to provide access to any individual. In addition, they can be beneficial in augmenting the… Continue Reading...

Types Of Information Systems for Startup Business

handling corporate financial records, including payroll, receipts, and depreciation (Al-Mamary et al., 2014). Shim (2000) asserts that accounting software's central job is automation of the routine activity of accounting transaction entry and posting. This data is electronically organized for developing financial statements. It is also easily accessible for aiding company leaders in managing the company. Finance information systems offer financial data to every financial manager in a company. Financial decisions will normally be made depending on data yielded by accounting systems. Human Resource Information Systems HR Information Systems deal with generating, categorizing, maintaining and distributing information on the workforce… Continue Reading...

Identifying Opportunities to Improve Revenues and Ridership Levels at Wmata

Table 1 below. Table 1. Current safety initiatives at WMATA Safety Initiative Description Safety -- Prevent near misses • Red Signal overruns -- new software onboard trains will prevent an inattentive train operator from passing a red signal by requiring the operator to perform multiple sequential actions before they can move their train. In addition, stations that have the highest frequency of red signal overruns are having their signals upgraded to LED bulbs to improve their visibility to operators and prevent overruns, which will be completed in early 2017. • Enhance technology for roadway worker protections in hazardous areas. • Complete work on schedule… Continue Reading...

Apple Vs Federal Government

(Stavridis). Unable to unlock the device due to Apple's strong encryption software, the Federal Bureau of Investigations (FBI) sought the intervention of the courts to compel Apple, under the premise of All Writs of 1789, to assist in gaining access to the device. Apple strongly defied the order, reiterating its commitment to protecting customer data. This paper looks at both sides of the debate, i.e. Apple's concerns over privacy versus the government's concerns over national security. For Apple, privacy is integral. Indeed, the right to privacy is a right expressly protected by the constitution in the First Amendment. Amidst… Continue Reading...

Business Ethics Crisis

the fact that Volkswagen ultimately admitted that roughly 11 million of its manufactured vehicles were fitted out with software that was employed to falsify emission tests. Specifically, the fitted out software detected when the car was being tested and then activated apparatus that decreased emissions. Another essential detail of the scandal is that during the course of regular driving, the software somewhat muted the device, which in sequence brought about an increase in emissions that were exceptionally past the legal confines. This was, it would seem, with the key purpose of attaining fuel savings or to supplement the rotating… Continue Reading...

Budgeting

A third threat to organizational information systems is theft. The loss of significant hardware, software or data can have dire consequences on an organization's efficiency. Theft can be categorized into three groups including physical theft, data theft, and identity theft. The best way to mitigate this threat is to have physical security system processes. This largely ensures that key personnel are granted access to the system. Another mitigation approach is constantly changing security codes given to the key personnel (Alghazzawi et al., 2014). There are key considerations for a continuity plan. This is because sustaining security within the organization… Continue Reading...

Qualitative, Quantitative, and Mixed Methods Research

dependent and independent variables; 4) reporting the statistical procedures conducted; 5) identifying the statistics and the computer software used to generate the statistics; and 6) presentation and interpretation of findings using figures and tables. The importance of these steps cannot be overemphasised. As quantitative research involves formulating a hypothesis or a set of hypotheses and collecting data to test the hypotheses, the procedures utilised in testing the hypotheses must be properly documented and justified. This is important for reinforcing the validity, reliability, and credibility of the findings. Also, the six steps are important for evaluating criminal justice data and… Continue Reading...

Activity Based Costing

and can offer training on its application and administration. The utilization of software can bring into play an extra expense for the execution and computerization of the manual elements that encompass using the activity-based costing system (Lal, 2009). The ABC system is also considered to have a flaw as it misconstrues data. The information reported by an activity-based system takes into account data, for instance, product margins, which are completely dissimilar from the information that is produced by a traditional costing approach. Moreover, it is conceivable that a number of costs entailed in the ABC system may be immaterial… Continue Reading...

Research Literature

the user interface of a system is vital and fundamental to the success of the software. The presentation and unveiling of concepts through an information system interface can play a significant part in facilitating and encouraging the integration of conceptions in the electronic brainstorming system (EBS), which as a result can give rise to enhancing the level of productivity. In delineation, EBS is a computer-based system that simplifies and enables brainstorming between the group members. The aspect in this case is that electronic brainstorming system is bound to have a greater impact in comparison to the custom approach of… Continue Reading...

Economic and Environmental Benefits Of Short Sea Shipping

over the limitations. Data Analysis All data collected was analyzed using SPSS software. The software made it easy for us to plot and graph the data in order to identify the information. From the results, it was clear that making use of short sea shipping offered the country better economies and allowed the shipper to reduce their overall shipping costs when compared to traditional transportation methods. We did delve deeper into the European Union website for us to retrieve the data we required, and it all pointed out the fact that short sea shipping reduced air pollution tremendously. From the data… Continue Reading...

Marketing Tools for Business Strategy

be skeptical about setting the budget to hire a videographer and the right hosting software. The result is that the company lags behind because the right resources weren't in place to get ahead of the competition on the adoption of new technology. Further, when the shift involves things like the customer base -- if the personas start to change, for example -- the company won't be responsive, it will miss great new potential opportunities, and ultimately there will be friction between the people who are aware of the external environment and leaders who are not that could cause the… Continue Reading...

Career Planning Development and Management

of product development and marketing. I prefer to deal with products such as high-tech and software. The primary goal of brand managers is to manage and strengthen the brands since their decisions have a great impact on the company's success. I believe that I will serve well as a product manager because I have the required skills for the position: tactical and strategic skills. My strategic skills will allow me to assess the industry trends, plan the future of the product and market the product to consumers. The tactical skills will help me to devise promotional campaigns for my… Continue Reading...

Worldcom Accounting Fraud and the Law

it was able to do so. Despite the fact that Arthur Anderson's software flagged WorldCom as a potential high risk and the complexity of WorldCom's accounting statements, the external auditing firm did not exercise due diligence in reviewing accounting statements for attempts at deliberate fraud. Betty Vinson: victim or villain? Should criminal fraud charges have been brought against her? How should employees react when ordered by their employer to do something they do not believe in or feel comfortable doing? It is extremely difficult for any employee to speak up about wrongdoing at his or her company, which is… Continue Reading...

Behaviorally Targeted Ads As Implied Social Labels Article Analysis

about customers’ clicking patterns, purchase histories, and web searches. Increasing number of firms are also using the software to identify people’s psychographic traits such as personality, values, and social identities. Additionally, firms use the social labels to develop consumer explicit characterizations based on their personality, beliefs and behavior. Based on self-perception theory that reveals how people demonstrate certain behaviors based on their traits, the authors argue that implied social label can be used to develop the consumer identity to design behavioral consumer adverts.  However, Summers, et al. (2016) point out there is still short of research that clarifies the… Continue Reading...

White Box Software Testing for Android

The testing of software application internal infrastructure and coding is referred to as white box testing. White box testing is also called open box testing, clear box testing, transparent box testing, glass box testing, structural testing, or code-based testing [1]. White box testing primarily focuses on the internal structure, design, and implementation of the software with the aim of strengthening security, improving design and usability, and the flows of input and output within the application. When using this approach, the tester concentrates on how the software performs… Continue Reading...

Digitalization to Enhance Customer Satisfaction at Apm Terminals

the research topic. The survey data will be analyzed using SPSS version 17. The software will be specifically used to generate descriptive statistics as well as statistical tests. Descriptive statistics will involve averages and frequencies. For instance, the analysis will determine the proportion of customers that feel satisfied with the firm's customer service processes. As for statistical tests, correlation and regression analyses will be performed to determine the nature and magnitude of the relationship between digitalization and customer satisfaction at the firm. Limitations This research will focus on a single organization. This means that the findings will be limited… Continue Reading...

Management and Operation Consulting for Google

enormous competition from other companies like Microsoft due to the free software made available by Google. Thus, an operations consulting will have financial benefits to the business such as providing its executives with compliance advice. Such a move for the business will mean the protection of their stakeholders and shielding of the company from lawsuits. Moreover, they will develop better information about their company operations and this will enable them to avoid making bad decisions in future operations. Consultancy services show an organization the importance of carrying out internal reforms that would look at exposing their feeble compliance culture… Continue Reading...

Apple Market Share Increase for Ipad 4

is in the USA with branches across the world and deals in computer software and consumer electronic goods. The well known products from Apple are the iPhone, the Mcintosh computers and the iPod, on the other hand its software that give it an edge over competitors are the iTunes and the Mac Operating System. The iPad 4 has significant qualities that easily endear the American customer base like the long battery life, the metallic casing, the highly sensitive touch screen, unique design and the multiplicity of applications that can run in its operating system. The marketing plan that is… Continue Reading...

Apple Increase in Market Share for Ipad 4

base is in the USA with branches across the world and deals in computer software and consumer electronic goods. The well known products from Apple are the iPhone, the Mcintosh computers and the iPod, on the other hand its software that give it an edge over competitors are the iTunes and the Mac Operating System. The iPad 4 has significant qualities that easily endear the American customer base like the long battery life, the metallic casing, the highly sensitive touch screen, unique design and the multiplicity of applications that can run in its operating system. The marketing plan that… Continue Reading...

Review Of Human Resource Management

the world with respect to the manufacturing and marketing of computer hardware, software in addition to hosting and consultation services in different fields. With the advancement of technology in the present day in addition to globalization, there is an increased level of competition amongst companies and a fight for greater levels of innovation (Harzing and Noorderhaven, 2003). In this case, the role that the subsidiary should play in the host-country is that of an integrated player. This encompasses having high outflow and high inflow. Integrated players take part in the transfer of knowledge to other organizational divisions. However, it… Continue Reading...

Pop and Ilp Policing

on analysis and use of better tools for data analysis including predictive software and so forth, can lead to a better chance at understanding the nature of the crime, why and where it happened, and ways to prevent or stop it. Effective analysis can determine the ways criminals behave and can help for more complex crimes that involved organizations and criminals with experience. This level of crime often requires a deeper knowledge and insight of pre-existing patterns and common locations where crime may occur. Crimes like human trafficking for example, could benefit from effective analysis to keep criminals from… Continue Reading...

Product Strategy and Product Life Cycle

the marketing strategy and promotional initiatives. An example of a product strategy is the introduction of a new software product in the market. Product Life Cycle for a software Marcu & Gherman (2010) define product life cycle as the period between the product appearance on the market and its disappearance from circulation. Consequently, the product life cycle is a reflection of the evolving stages of a product over its lifetime. When creating a product strategy, it's important to consider the various stages of the product life cycle because sales and profits of a product undergoes significant changes during the… Continue Reading...

Adp Systems

is defined as a system of one or numerous computers and associated software that have a common storage. This system is often referred to as ADPS meaning automatic data processing system prompting system. The various computers in this system and the associated artifacts are meant to work in a coherent manner or as a coherent entity. There are various uses and importance of ADP systems implemented in several organizations. The ADP system is often used in payroll processing and payroll outsourcing for some organizations. In this case, there is a vendor that the organization gets linked to and helps… Continue Reading...

Cloud Service and Prescription

prescription process. The INPUTS side has cloud service costs, prescription and patient data, and updated software/maintenance costs. This is what goes into sending a prescription, receiving a prescription, and performing the necessary tasks to get the prescription to the patient. The OUTPUTS involve a cloud service license, support and maintenance, and generated prescriptions requests. The next part involves ENABLERS and these are doctors and nurses, the billing department, pharmacists, Information Technology (IT), and healthcare. These are areas the patient, doctors/nurses, and pharmacists must communicate and interact in, to achieve the result of getting the patient his or her prescribed medication.… Continue Reading...

Technical Writing Describing a Smartphone

applications, and photography operations. Telephony functions include voice calling and SMS; computer functions include Internet access, game play, and software applications; and photography operations depend on a built-in camera and photography processing applications. A smartphone consists of both its hardware and its software. Hardware The smartphone includes a chassis plus the internal components. Those internal components include a battery plus the circuit board. Features like the SIM card, camera, and microphone are integrated into the circuit board. All smartphones have rechargeable batteries. A cross section of an open smartphone appears as follows: The user interacts with the smartphone in… Continue Reading...

Apple Corporation Summary and Review

they employ about 116,000 employees (Yahoo Finance, 2017; Reuters, 2017). They produce both software and hardware items and solutions including the iPod, the iPad, the iPhone, iTunes Store, their personal computer line and a few other items. The iPod is Apple's line of MP3 players. They are digital versions of the mobile cassette and CD players of the past. The iPad is a computer condensed to paper-sized form. It has the mobility of a smartphone (which is what the iPhone is) but the power of a laptop. The iTunes store is a sales portal that can be used to… Continue Reading...

Technical Instruction for Hp Pavilion

strong password. Technical Terms CD-ROM is the compact disc that contains audio, video or software data. Diskette is the type of floppy disk that composes of magnetic storage medium used to store information. The laptop is the computer systems that can be moved from one place to the other. The workstation is the special computer system that is designed for scientific and technical applications. Computer components are the computer peripherals needed for the computer operation. ESC is the escape key on the laptop is to exit the current window. Window; is the computer operating system that assists the computer to function… Continue Reading...

Ethics and Business Information Systems

costs with the recent problems of pirating. This is a particular issue in the software businesses where some unscrupulous individuals may develop the copies of the original products and sell them on the internet at cheap prices. These issues have made many firms to lose millions of dollars and unable to recover the costs of operations in the process. Violation of intellectual properties has been the greatest problems that businesses face with the recent advanced information systems. Some companies have experienced their intellectual properties being stolen, and their products available online before they are even launched. In the contemporary… Continue Reading...

Legalshield Pre-paid Legal Services Essay

no lawyer-client relationship and supply documents that can be customized using interactive software (McKitterick, 2015, p. 5).  With growing numbers of consumers and small businesses becoming expert with interactive websites, it is not surprising that the online legal services industry has experienced this level of sustained growth. Websites that provide legal document services allow consumers and small businesses to create generic legal documents such as wills, trusts, powers of attorney, and business incorporation documents (McKitterick, 2015). Unlike the business model used by LegalShield, though, this type of online legal service has been somewhat controversial because these enterprises are not… Continue Reading...

Conflict Resolution Leadership and Teams

strategy for conflict resolution, I will be able to develop the mobile software application for patient monitoring within the 30-day limit. Plan B My Plan B is to change our team to a virtual team. However, I do not believe this is the best solution. Virtual teams experience less conflict but they may also be far less productive (Thomas & Peterson, 2018). Likewise, I could request that one or the other member of the team be removed but I would not want to resort to this extreme measure. Doing this would also reflect poorly on me as a leader,… Continue Reading...

The Role Of Sarbanes Oxley Act in Curbing Corporate Fraud

Tesco engage in fraud deliberately to uphold a company’s economic health. In as much as the AIS software was created to be computerized which makes it difficult to manipulate, such companies find a way to alter the system (Wells, 2017). Tesco possibly used special accounts to hide transactions or created separate entities to hide debts particularly considering they failed to pay the suppliers. Failure of Tesco’s internal controls included: Segregation of Duties The company had a limited number of employees working in the accounting department which resulted in combining all vital duties and delegating them to only a few… Continue Reading...

Financial Planning and Digital Literacy for Students

tools for networking. Digital tools can be used for networking within my organization, such as using collaboration software. I can also network outside of my organization such as by finding new partners, clients, or job opportunities. Digital tools can be helpful for creative and professional development, such as by taking online courses. By starting a blog and polishing that blog, I can use digital tools to create a personal portfolio of my work. Linking together my different social networks online, I can also ensure that I am maximizing the potential of my digital tools in order to become a… Continue Reading...

Intelligent Information Systems for Cars and Highways

both vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) technologies. Both V2V and V2I technologies capitalize on software and hardware systems that have already been integrated into many newer automobiles, such as GPS and WiFi. Some systems also require Dedicated Short Range Communication (DRSC), which is a WiFi system with dedicated bandwidth for vehicle use (Gandhi, Singh, Mukherjee, and Chandak, 2014, p. 262). Because DRSC allows integration between onboard equipment and roadside equipment, it is currently “the only available technology which provide the latency, precision and consistency needed for active safety,” (Gandhi, Singh, Mukherjee, and Chandak, 2014, p.… Continue Reading...

Job Descriptions and How My Scores Reflect Them

employees, and communicate effectively with each of them. I need to make sure all of our software systems have been upgraded and updated, and the same with our networking and communications systems. The effective organization and functioning of the office, down to the smallest detail, depends on me doing my work well. Enjoyable Tasks and Responsibilities The primary tasks and responsibilities required for the job include making and taking calls, communicating and coordinating meetings with others, keeping track of the necessary inventory items the office needs to function optimally, and maintaining a schedule for regular building and maintenance tasks… Continue Reading...

Recruitment Problem at Rtmm Inc

RTMM Inc. is a software development company that seeks to enhance its success and profitability in the market. This company recognizes that one of the crucial components towards enhancing profitability is recruiting and retaining a highly-qualified workforce. However, the software company is experiencing tremendous challenges in recruitment and retaining such a workforce. While the firm has attracted a considerable number of qualified candidates, hiring and retaining them has proven to be a significant challenge. Therefore, the company needs to develop and utilize a course of action to enhance its staff recruitment and retaining strategy… Continue Reading...

Oral History Project

so bad with computers now, one of them works in software, but you know my grandkids are about a million times smarter with computers. They'll program circles around you one day, I bet. What were the big things, the big moments back in the day? People always think it was something like Vietnam, but I was in college so it wasn't part of my world. A few protests, lots of talk about it, but it didn't affect my day to day. I was too busy with my studies and working at the school paper. The big thing for me… Continue Reading...

How to Understand the Stock Market

person is going to be able to have access to the kinds of software that the pros use—software that trades on microsecond intervals and not after several minutes of deliberation (Tepper 1). Aside from becoming a day trader, an ordinary investor can keep better tabs on their stocks, set stop loss alerts on the individual stocks we purchase. We can keep our eyes out for interesting opportunities like the IEX or crypto-currency and try and subvert the money market managers that way. As a long-term investor, it does matter that the market is rigged. I would prefer it if… Continue Reading...

Best Practices Involved in Changing the Accounting Information System Ais

the excessive complications experienced by ALF, they made an effort to figure out the IBM’s ERP software. Nevertheless, American LaFrance was not able to solve these major conflicts and underwent loss consequently. The consequences included, incapacity to manage inventory, distribute finished products as well as produce cash flow. This particular liquidity crisis is exactly what inevitably bankrupted this multinational enterprise. Lessons learned The procedure for applying a financial management info product is a rigorous process which must be perfectly planned prior to initiation of project. The project unit that's tasked with the integration of the AIS must be properly… Continue Reading...

Home Health Care Business Plan

to ensure that demand is met. There may be extra costs, such as the need for scheduling software, if that software can be proven to deliver a positive ROI by eliminating scheduling waste. There are a lot of variables, and things that can go wrong with scheduling, so there might be an opportunity there as well. If three or four of these key things are done to help support what needs to be done on the human resources side, then Passion Home Health will be in a much better position to execute all of these recommendations – they all… Continue Reading...

Walmart's Use Of Technology for a Competitive Advantage

and Wal-Mart has a reputation for being just that in terms of its supply chain. References ASA (2011). Supply chain. Accounting software Advisor. Retrieved December 19, 2017 from http://www.asaresearch.com/ecommerce/supplychain.htm Fishman, C. (2003) The Wal-Mart you don't know. Fast Company. Retrieved December 19, 2017 from https://www.fastcompany.com/47593/wal-mart-you-dont-know Kosasi, S., Kom, M. & Saragith, H. (2014) How RFID technology boosts Wal-Mart's supply chain management. International Journal of Information Technology and Business Management. Vol. 24 (1) 29-37. Lu, C. (2014) Walmart's successful supply chain management. Trade Gecko. Retrieved December 19, 2017 from https://www.tradegecko.com/blog/incredibly-successful-supply-chain-management-walmart Prisco, G. (2016) Wal-Mart testing blockchain technology for supply chain management. Bitcoin… Continue Reading...

Use Of Cerner Software in Acute Patient Settings

CERNER software is built to allow for an enterprise-wide view of a patient\'s clinical information in order to coordinate patient care and document at which point care was delivered especially in acute patient settings. Using the software providers will have access to the right information and at the right time within the clinical workflows in order to make the best possible decision regarding patient care (Curry, 2010). In acute patient settings, it is vital that a nurse has the right information before they start… Continue Reading...

Electronic Health Records Implementation Challenges

“EHR needs assessment should be completed prior to purchasing the EHR software or making process changes” (p. 9). A budget comes in handy in setting achievable targets and defining priorities so as to ensure that EHRs implementation is smooth and seamless. Next, we have customization issues. When it comes to the implementation of EHRs, it is important to note that one size does not fit all. Failure to customize EHRs to the special needs and circumstances of an entity could totally interfere with the workflow and thus mess up processes and systems to the detriment of quality and safety… Continue Reading...

The Culture Of the Eastern Band Cherokee

are doing everything they can to facilitate this endeavor. For instance, one particular tribal member has developed language software to make learning the Cherokee language easier for young students. Language being the main connection to the past, it is this that best helps the Cherokee to pass on to the next generation the cultural link needed for cultural survival. Language is recognized as one of the main ways that the Cherokee can sustain its culture—which is why it is viewed as being important that students in the Eastern Band learn it before graduating. This learning of the language is… Continue Reading...

Conducting an Interview with Education Stakeholder

help teachers make adjustments to curriculum where needed. Data is communicated via software that provides teachers and administrators with access to a “dashboard” where targeted areas (interests and needs) are identified and described by the data presented by the data manager. The principal described a vision for the school that embraced diversity and the concept of community. The principal wants students to feel comfortable so that they can “fully maximize potential” (Principal, personal communication, Jan. 25, 2018). The principal wants to promote social justice at the school and have teachers there who have the same ethnicity as the students.… Continue Reading...

Electronic Waste

of exchange do these products leverage (e.g., information, money, software, or other media)? Give several concrete examples and explain them as clearly as you can in your own words. Network effect refers to the phenomenon whereby a service or product will gain additional value as more people use the service or product. An example of network effects is the rise social media. The more users who are present on Twitter, sharing comments, media, and links, the more powerful the platform becomes to the public. The same effect of growth through traffic was experienced by Facebook, Instagram, and YouTube where… Continue Reading...

Meaningful Usage Of Health Information Technology Hit

supports meaningful use through the institution of disincentives and incentives for encouraging healthcare organization implementation of specialized software facilitating electronic transmission of prescriptions by physicians to pharmacists instead of handwritten prescriptions, saving $142 billion (Freedman, 2009; Jones et al., 2014). Once again, here, meaningful use influenced by technological advancements makes the need for health IT projects a regulatory prerequisite. Health IT aids attempts at reshaping the system of documentation, exchange and use of health information, via appropriate funding and infrastructure never before seen by the electronic health domain. HIT is really capable of acting beyond mere talk of what… Continue Reading...

How the Internet Has Changed Society

replace the more static Web-driven model. The Internet has radically transformed the ways hardware and software developers envision their future products, and what consumers expect from the technologies they use every day. Although the Internet has revealed some global inequities, those inequities are shrinking as Internet infrastructure becomes more robust around the world. The greatest challenges for the future of Internet is undoubtedly within the realm of cybersecurity, as both businesses and governments battle a new wave of cyberterrorists and hackers. References Castells, M. (2014). The impact of the internet on society: a global perspective. MIT Technology Review. https://www.technologyreview.com/s/530566/the-impact-of-the-internet-on-society-a-global-perspective/… Continue Reading...

Police Culture

it is deemed necessary. Moreover, police operate vehicles and use hardware and software for communications, background checks, and data analysis. Interaction with Others Police culture is segmented, making interactions with others highly proscribed. Between officers, interactions will be different than they are between officers and their supervisors but especially different than the interactions between officers and civilians. References McCartney, S. & Parent, R. (2012). Police subculture. Ethics in Law Enforcement. https://opentextbc.ca/ethicsinlawenforcement/chapter/8-1-police-culture/ Nhan, J. (2014). Police culture. The Encyclopedia of Criminology and Criminal Justice. DOI: 10.1002/9781118517383.wbeccj371 “Police Culture,” (n.d.). http://sociologyindex.com/police_culture.htm “The Police Culture,” (n.d.). https://www.sagepub.com/sites/default/files/upm-binaries/38432_4.pdf “The Police Culture and Work… Continue Reading...

Transitioning to Computers and Electronic Medical Records in Healthcare

to embrace a new one, even if it lacks the older system’s inferior features. Finally, “All software has the potential to have issues, but having unresponsive or cumbersome support becomes a problem” and “many practices are finding that their system is inflexible and does not adequately support the functionality or workflow requirements of their particular specialty” because of inappropriate choices of specific systems (Schaeffer, 2013, par.7). All training for a new system is expensive, but transitional costs plus the costs of implementation for a new system further compound the problem. References Jawhari, B., Keenan, L., Zakus, D., Ludwick, D,… Continue Reading...

Warehouse Management Information Systems and Technology

1. Privacy laws are continually in flux. The most recent blow to consumer privacy was the 2017 Congressional overturning of Internet privacy protections. According to the ACLU, those pro-privacy laws “would have prevented ISPs from sharing our browsing history with advertisers, forced ISPs to be clear about what information they’re collecting, and required ISPs to take reasonable steps to protect our data from hackers,” (ACLU, 2018). Several states, including Alaska, Washington, Oregon, Hawaii, and most of the Northeast have since begun the difficult process of working to reinstate Internet privacy laws (ACLU, 2018). The decision made in Washington, supported by… Continue Reading...

Russian Meddling in U.s. Election Essay

military intelligence executed a cyberattack on at least one U.S. voting software supplier (Bump 2017).  This allegation is especially important given that election day results in several key districts throughout the United States had results that were substantially different from poll results in the days prior to the election and from exit poll results the day of the election.  If these voting systems were compromised, then Russia did not just manage to exert influence on the 2016 election, but actually managed to deprive American citizens of their votes in the election. The Role of the Electoral College Looking at… Continue Reading...

Social Media Essay

of communication. References Bires, M. (2017, February 13). Thinking outside the box: Police use of social media to catch criminals. Retrieved from https://www.policeone.com/police-products/investigation/Investigative- software/articles/290047006-Thinking-outside-the-box-Police-use-of-social-media-to-catch-criminals/ Constine, J. (2017, June 27). Facebook now has 2 billion monthly users… and responsibility. Retrieved from https://techcrunch.com/2017/06/27/facebook-2-billion-users/ Darrow, B. (2017, April 24). LinkedIn Says It Broke the 500 Million-User Mark. Retrieved from http://fortune.com/2017/04/24/linkedin-users/ DeMers, J. (2015, July 22). 10 Reasons Your Brand Needs to Be On LinkedIn. Retrieved from https://www.forbes.com/sites/jaysondemers/2015/07/22/10-reasons-your-brand-needs-to-be-on-linkedin/#55f47c313aca Ergas, T. (2017, March 16). Kardashian Sisters Make How Much for Instagram Ads? Retrieved from https://www.usmagazine.com/celebrity-news/news/kardashian-sisters-make-how-much-for-instagram-ads-w472080/ Fox-Brewster, T. (2016, June 29). Facebook Is Playing Games With Your Privacy And There's Nothing You Can Do… Continue Reading...

Internet Terms Essay

of immediate cross-referencing (Search Win Development, 2014). Web Browser One of the largest software being made is that of the web browser. It is software which is unique. It would be used for getting online accessibility for several electronic exchange services like e-learning, e-commerce, e-banking, e-mail, and so on. Hackers have an understanding that browsers could be identified on all tablets, smart phone, computers, and so on (Serrhini, 2013). The browser is usually an operator’s window to the outside world, offering them with an interface to conduct an extensive level of activities such as professional business, personal financial management, social networking,… Continue Reading...

Dark Net Essay

operating systems.  Using Tor is not illegal, but it is often used to accomplish illegal goals.  Other software that people use include I2P and Freenet. Criminal Activity The dark web is the venue of choice for criminals who want to use the internet to promote or maintain their business.  Users can find almost anything on the dark web.  For example, when Target was hacked, their customer information was placed for sale on the dark web (Reilly, 2017).  The dark net has a number of black market marketplaces where a person can buy or sell illegal goods and services.  Some… Continue Reading...

Bitcoin Essay

This bitcoin essay offers a brief background of bitcoin and other cryptocurrencies, also referring to the blockchain software that underlies them. Then, this bitcoin essay explores what financial analysts say about the viability of bitcoin as an investment. Finally, this essay will how and why people purchase bitcoin, as well as how bitcoin can be used as both currency or as investment. Because they are taking the financial world by storm, is important to learn about bitcoin and other cryptocurrencies. This bitcoin essay will explain bitcoin in simple terms anyone can understand. Ultimately, this essay will show that bitcoin… Continue Reading...

Net Neutrality Essay

service providers would have used for upkeep and improvement of the hardware and software that they use to provide internet services for their customers.  They argue that allowing them to charge higher fees, either to users who use more bandwidth or to websites that transmit more data and use more bandwidth, they would have the resources to build the types of advanced fiber networks that would increase internet access for consumers as a whole (Pogue, 2014).  In addition, there is the fact that questionable content, whether it is access to illegal P2P websites or even to dark web sites,… Continue Reading...

Healthcare Management for Eldercare Advocacy Organization

the gaps in administering care at home including the use of software systems, health monitoring devices and telephony (Tao, &McRoy, 2015, p.34). To meet this objective, organizations need to develop some key character traits (four pillars) to help them address “three critical roles” that they need to play in the delivery of home-based health care services. The four pillars: Patient and person centered: provide individualized care for every patient and taking into consideration the unique values of each patient when making clinical decisions (Landers et al, 2016, p. 272). Seamlessly connected and coordinated: there should be a seamless flow… Continue Reading...

Dark Web, Darknet, Deep Web Essay

illegal, but it is often used to accomplish illegal goals.  Other software that people use include I2P and Freenet. Criminal Activity The dark web is the venue of choice for criminals who want to use the internet to promote or maintain their business.  Users can find almost anything on the dark web.  For example, when Target was hacked, their customer information was placed for sale on the dark web (Reilly, 2017).  The dark net has a number of black market marketplaces where a person can buy or sell illegal goods and services.  Some of those marketplaces have been successfully… Continue Reading...

Welfare System Essay

employees $17,000 Hire two more designers new attorneys Salary, as well as benefits Recruitment prices training and Orientation $65,000 $11,350 $5,000 Two additional workstations Furniture and hardware software licenses $4,000 $2,000 Pay for the Upgrade Two weeks at $7,500 revenue per week $15,000 Total $150,760 Benefits Benefit Benefit Within 12 Months 50 percent income boost $193,000 Permanent paralegals $190 a week and consultants $220 per week with fringe benefits and time off with pay $100,000 10 percent improved productivity per consultant and paralegal($6,500 + $5,750 = $19,250 income for each week with a 10 percent = $1,200/week) $58,500 Improved permanent slots for all the paralegals and then to upgrade their… Continue Reading...

Tim's Coffee Shop Business Simulation

results of your email campaigns right from your Square Dashboard (Square Systems, N.d.). Figure - Square POS software (Square Systems, N.d.) Train employees on the new system and improve order accuracy. The POS system should definitely help with order accuracy and if Tim uses the module that allows email receipts then the business could get more feedback electronically through the feedback system. Train employees on customer satisfaction issues and coordination with management in regards to scheduling. The POS system could help with scheduling as well. Clean and organize both the break room and the storage areas to be incompliance with… Continue Reading...

Chef Grant Achatz Biography Essay

chose Grant Achatz) A chef, nutritionist, scientist or even a software mogul that decided to study the science of food. Write a small biography of that person. Then write about one of the discoveries or innovations that they have contributed to the culinary world. In that research you should discuss the driving force that led to that discovery, how or what the process was that occurred to make the innovation and then discuss the impact of the innovation on the culinary world as well as the rest of the world or region that may be affected by it. Then,… Continue Reading...

Quantitative and Qualitative Data Analysis Essay

to answer some human resources related questions using the SPSS software. The screenshots of the entire data are presented in the Appendix 1 and Appendix 2. The report provides the findings for the HR (human resources) issues after carrying out the data analysis of employee’s data. The outcome of the analysis reveals that workers between 25 and 55 years of age form the largest percentage of employees in the organization where the mean age of all the entire workforce is 39.19 years. However, workers between 18 and 29 years of age consist of 30.4% of the workforce. However, workers… Continue Reading...

Cryptocurrency

of the blockchain. Bitcoin works when the Bitcoin client software generates" unique, mathematically linked keys", one private and one public, and these keys are used to bring two parties together and verify that the money being exchanged is real (Simonite, 2011). The client will then verify the transaction by sending it to all other users who are online. The transaction will be logged by Bitcoin miners who race to solve a cryptographic puzzle (Simonite, 2011). This process in theory guarantees security and trust in the transaction. The mining is the means by which Bitcoins are created, answering the supply… Continue Reading...

The Volkswagen Emissions Scandal

(EPA) which had found out that “many VW cars being sold in America had a ‘defeat device’ – or software – in diesel engines that could detect when they were being tested, changing the performance accordingly to improve the results” (Hotten, 2015). Thanks to the emissions scandal, the company has had to contend with various costs – ranging from loss of confidence on the part of its customers, to actual monetary losses, to much more. It should be noted, from the onset, that the automaker may have lost the confidence of many of its loyal customers following the scandal.… Continue Reading...

Healthcare Advocacy Team & Technology

issues that may come up. Lastly is the lead super user who customizes the EHR software to the organizational needs and creates workflows and standard operating procedures (SOPs) to deal with issues raised by front-line users (Hodgkins, n.d) Setting goals and empowering the team According to WHO, goals are broad statements that describe the overall expected improvements related to the implementation of EHR (WHO,2017). The next stage is to harness clear goals derived from the situational analysis. This is the role of the coordinating team and implementation committee and the aim is to clarify the interventions to make it… Continue Reading...

Human Robot Interaction

does not really convey a sophisticated level of interaction. From a software side, the ability of the Elf to do things like remember people so that it would greet you by name if you had interacted with it previously and given it that information, would also be valuable, especially since this robot is designed to work in a customer service setting. Assignment 2 The authors studied the impacts of HRI, using a small sample size to draw their conclusions. This tested robot-assisted learning, so there was a teacher, but the robot was the variable that was changed between the control… Continue Reading...

How to Purchase a Computer

from Windows, I prefer it to Windows 10, which to me feels like software that is too counter-intuitive. I would rather stick with the older edition as long as I can reasonably do so. I will need my computer to have Internet access capability mainly for work but also for pleasure, as I enjoy streaming a movie or sports game from time to time. The capabilities my computer will require to access the Internet from anywhere will be Wi-Fi and the services that I will need to have access to the Internet from my home will include having an… Continue Reading...

Ethics and Morality Of Intellectual Property Rights

by deontological ethics as well, in denying superior outcomes to others. b) People absolutely should develop devices and software to remove digital rights restrictions. I do not think that anybody has an ethical or legal obligation to do so, however. That would seem to imply that anybody capable of developing such tools has a right or obligation to develop them, and I disagree with that. Each person has talents, and there are probably millions of people with the particular talent to develop such tools. The reality is that each person should utilize their talents in the best possible way, and… Continue Reading...

Trade and International Business

to attract a lot of investment in the form of service industries, software, and simply companies headquartered there whose profits flow through Ireland. The number of greenfield startups in Ireland and Japan are not much different, but on average investments in Ireland are larger (Santander, 2018). This is in part because such investments are not just for the Irish market, but for the entire EU, which is a market twice the size of Japan. That alone appears to have explanatory power for the difference in inbound FDI, but there are political and cultural considerations as well. Japan, in contrast,… Continue Reading...

Adhd in the Classroom

effective for the child. Assessments can be formally distributed using software on the computer (tests are typically included in educational software for learners using CAI). Assessments can also be informal and consist of direct observation of the learner by the teacher. Either of these two examples can be effective ways for teachers to measure the extent to which students with ADHD are meeting cognitive targets. In conclusion, students with ADHD can be supported by non-traditional methods of instruction, such as computer-assisted instruction, as well as by proactive and reactive strategies that can help both the student and the teacher… Continue Reading...

Digital Rights Management Ethical Dilemmas

example writers, visual artists, or even project managers such as directors or the team who write code for software. All of these are actively involved in the creative process. When they are doing as employees or contractors of a company, then typically the rights flow to the company, as the financier of the project. But someone creating on their own should have full right to distribute as they please, whether or not this involves active digital rights management. There are examples of star acts that have sought to exert greater control over their work, using digital distribution models to… Continue Reading...

Indwelling Urinary Catheter Care

are enrolled into the research. There will also be the use of training material, data collection score sheets, excel software for data entry and analysis. Data analysis The number of infections on both arms will be tabulated in different tables and over the month the trend graphs will be developed every two weeks. This will help in showing the trajectory of the research in terms of percentage of infections in both arms hence continuous monitoring of the research questions and the hypothesis. The final data will be tabulated and the final figures put on the comparison graphs in terms… Continue Reading...

Banking and Blockchain Technology

company, but it has transitioned into a full-service blockchain technology company. Bitfury develops software and creates hardware solutions for businesses and governments” (Laurence & Wiley Publishing, Inc. Staff, 2017, p. 197). The company processes both public and private blockchain transactions. They assist clients with blockchain analytics as well as utilize the Bitcoin transactions, conducting advanced data research and analysis for transaction histories. The Bitcoin blockchain and the company’s ability to analyze has led to government use of this technology to track down criminal activities (Laurence & Wiley Publishing, Inc. Staff, 2017). Among the various processes the company performs it… Continue Reading...

Virtual Teams Challenges and Solutions

Cormican, and Folan, 2015). This could include investing in the appropriate software and hardware. Further, there is also need to ensure that communication is collaborated and coordinated via the utilization of the correct communication channels so as to ensure that effective communication occurs across the board. The most appropriate channel is dependent upon the specific circumstances of an organization. Considerations in this case could include, but they are not limited to, conference calls, email, Skype, phone calls, etc. Cultural concerns, on the other hand, could be effectively addressed via the appreciation of the inherent diversity of team members and… Continue Reading...

The Problem Statement Related to Virtual Teams

sentiment analysis Orta-Castanon, P., Urbina-Coronado, P., Ahuett-Garza, H., et al. (2018). Social collaboration software for virtual teams: case studies. International Journal on Interactive Design and Manufacturing 12(1): 15-24. Quisenberry, W.L. (2018). Exploring how emotional intelligence contributes to virtual teams. European Scientific Journal 14(5): http://eujournal.org/index.php/esj/article/view/10483/9991 Continue Reading...

Marketing Goods or Services

can be found with services that are described only in terms of their measurable attributes. software is a good example of this – there is little physical with software – even when there is a physical "good", it is just a hard disc that runs the software. Almost everything you get from software is a service, regardless of how you get it. Code is one of the least tangible of tangible things. Kerin and Hartley (2016) note that whether something is a good or a service can influence the pricing decision as well. Services need to take perishability into… Continue Reading...

Nightclub Business Plan New York

people in the city are often able to land fairly good jobs, especially in industries like software, where the skills possessed by young people are in high demand. The social environment is also favorable. Young people with money love to have a great time, and nightclubs have honestly never gone out of style. There are always entertainment businesses competing for this market, but ultimately the nightclub business has been attractive to our target market for decades. The biggest trend that will impact the market is the declining number of people in our target market. This will mean that competition… Continue Reading...

Apple Finance Department

of consumer electronics. The company’s products include computers, smartphones, tablets, wearables, as well as the software that powers these devices. Apple is based in California, but contracts out manufacturing to third parties, typically in China. It runs physical retail stores, and online stores, in dozens of countries around the world. The global nature of Apple’s business presents significant challenges for the finance department. In recent years, the company has been so profitable that it had massive cash holdings. These have typically been either returned to shareholders via dividends, and or invested in short-term securities, both of which provide more… Continue Reading...

Use Of Technology in the Special Education Classroom

in these conventional suites, there has been a great deal of scholarship invested in developing other software tools for special educational needs students (McCrea, 2014). For example, the ClickShare application developed by Banco provides the ability for teachers to facilitate collaboration on coursework among numerous students (McCrea, 2014). Likewise, the literacy application developed by Texthelp helps young learners who are struggling to learn how to read and write and so-called “smart boards” can make these applications even more effective. According to McCrea, “At the Glenholme School in Washington, CT, teachers combine their Smart Boards with Read & Write Gold… Continue Reading...

How Environment Influences Business

and MacAir. In addition, the company also manufactures the software that is employed in the running of these devices and its business also takes into account a variety of media such as movies, music, e-books, in addition to software applications. Most of all, the company has also integrated a cloud storage service in recent ties and an electronic apple payment processing system (Yahoo Finance, 2018). PESTLE Analysis Pestle analysis is delineated as a tool employed in the analysis and monitoring of the external environment of an organization. It is a framework that facilitates the comprehension of the external influences… Continue Reading...

Business Plan for Yolo Concepts

quite favorable. Young people in the city are often able to land fairly good jobs, especially in industries like software, where the skills possessed by young people are in high demand. The social environment is also favorable. Young people with money love to have a great time, and nightclubs have honestly never gone out of style. There are always entertainment businesses competing for this market, but ultimately the nightclub business has been attractive to our target market for decades. The biggest trend that will impact the market is the declining number of people in our target market. This will… Continue Reading...

Tesla's Terrible Pricing Strategy

challenging that life cycle by making it possible to deliver numerous software updates and upgrades to its products year round and year after year (Stringham et al., 2015). This allows the company to differentiate itself by extending the product life cycle, which means an alternate pricing strategy is required—one that takes into consideration that extended life cycle of its cars. That is why Tesla’s EVs are priced so high: they are built to last and not to be recycled every four to seven years. Critical Factors Tesla’s technology is innovative and revolutionary: it has combined style with battery-powered, computer-based… Continue Reading...

Education Research into Dual Credit Equity

lunch programs. After the surveys have been returned, they will be tabulated using statistics software like SPSS. The results will be classified according to target population (independent variable) and responses to the survey items. Items will be focused on the three main themes: perceived and actual cost of Dual Credit programs, how well the Dual Credit programs are being promoted to students, and how culturally relevant both the promotion of the programs and the programs themselves have been to new immigrants and ELLs. One open-ended question will be included at the end of each survey to allow participants to… Continue Reading...

Systems Thinking in New Product Development

The focal point of this paper will be a case study, featuring a software company that is working on a new product. While confidentiality agreements preclude me from naming the company or its product, this is the company's second product. The first has been a tremendous success, but there was no process for the first. Only with the second new product launch has the company started to consider the role of process. Thus, this makes for a good case study as to what companies do today with respect to incorporating systems thinking , but more importantly how they can… Continue Reading...

Recruitment Plan and Staffing Plan at Amazon

Amazon cut staffing costs (Charan, Barton & Carey, 2015). If Amazon uses a specific warehouse and inventory management software system, the candidate would either need to already have mastered that system or receive training at the company’s expense. Therefore, careful consideration should be made for selecting candidates on the basis of other skill sets such as leadership or communications. Specific training in software applications may ultimately prove less expensive and more effective than leadership and communications skills development training. The assessments used during selection and staffing processes would include those with elements covering problem solving, analytics, organization, and numeracy.… Continue Reading...

Conducting a Security Assessment Of a Building

the emergency stairs, if those companies have locked down their facilities (as is the case). Most tenants are software companies, marketing companies and other small businesses in the tech, marketing or legal sectors. There is a fitness facility in the basement that has high traffic. These businesses range from five or fewer employees to around 75 at the largest. A total of around 400 people can be expected to work in the building on any given day. All businesses in the Sun Tower conduct more or less regular office hours. The fitness facility opens earlier than other businesses, to accommodate… Continue Reading...

How to Cite References Properly

first place. Students ultimately do need to master citations, but if the software makes this job easier, there is no inherent value in learning where to place a comma or when to italicize something. Citation formats are technical issues that have nothing to do with student learning. These are issues that unnecessarily detail-oriented, best kept within the province of the editorial board of academic journals. As long as students give credit where credit is due, they should not receive any points off for making small mistakes to how to cite a YouTube video in MLA format. The whole point… Continue Reading...

Virtual Team Life Cycle

conference, video calls (e.g. Skype) and video conferences. There is a great amount of software and telecom options for those that want to maximize remote productivity levels (Gertel, Geister & Konradt, 2005). Conclusion There are several factors that are very important when it comes to virtual teams. The tools that are available (e.g. software, etc.), the people involved, how well they are trained and how adept the leadership happens to be are all important. Getting the team ramped up or shut down is important. Also important would be the management of performance and the development of the team while… Continue Reading...

Marketing B2b and B2c

which the laptop will operate. Each company has its own software stack with which it works, and the choice of laptop will be reflected in what tech is needed. Some companies need a fairly minimal stack, and can maybe use weaker laptops. Other companies might have demand for powerful computers. Road warriors within a company might need sturdier computers. There is also the dynamic of whether a company has such a range, and to what extent it can meet the demands of its customers for a wide range of products. This high degree of customization is one of the… Continue Reading...

How to Select Materials for Curriculum

need to include the appropriate educational technologies for instance the inclusion of computers and the appropriate software. The materials also need to give a large range of opportunities to develop knowledge for both the students and the teachers (National Academy of Science, 2018). Frequently Asked Questions (FAQ) on curriculum material 1. Is the material accessible to both the students and teachers 2. Is the material contemporary enough 3. Does the material in line with the national guidelines in the case of sciences 4. Dos the material encourage motivation and development among teachers and students? 5. Does the material balance… Continue Reading...

Health Care Information Technology

Economic and Clinical Health (HITECH) Act, HIT is defined as ““hardware, software, integrated technologies or related licenses, intellectual property, upgrades, or packaged solutions sold as services that are designed for or support the use by health care entities or patients for the electronic creation, maintenance, access, or exchange of health information” (Zeng X, 2009). HIT in a nutshell avails high quality, real time access to critical information to the patient, it is patient centered. HIT, from the definition could also mean a range of services like robotic surgeries to complex processes like chronic diseases home monitoring devices, though this… Continue Reading...

Database Professionals Employment Trends in Us and Monaco

the operations of the different database architectures and workings of each database. Obtaining certification from the software vendors means that the individual is well versed with the particular database and they have undergone the requisite training for this particular database (Ray and McCoy). On the other hand, if one receives certification from independent organizations it would be hard to establish if they have actually studied the particular database or they have undergone a generalized training on databases. Therefore, it would be good for an individual to obtain certification from the software vendors. Certifications by independent organizations will attempt to… Continue Reading...

Healthcare Organization

Innovation 1. Complexity 2. High cost of health care 3. Lack of standardization 4. Ineffective documentation practices 5. Use of different software 6. Lack of standard patient charge master Opportunities Threats 1. Mergers and Acquisition 2. Bargaining Power 3. Organizational Improvement 4. IT alignment 1. Poor economy 2. Change in payment structure 3. Decreased monitoring 4. Ambiguity in the future direction 5. New regulations Strengths Strengths delineate what an entity prospers at and separates it from the rivals in the market place. Some of these strengths comprise of aspects such as strong brand, loyal consumer base, distinctive technology and others. The following are the… Continue Reading...

Business Programs in Canada

are part of the program as well, like managerial accounting, course offering consisting of data structures and software construction are the focus for the first two years. Then for years 3 and 4, students learn software engineering, artificial intelligence, and management of information systems. The degree has a core of basic business courses with heavy emphasis on computer science principles. Stephen J.R. Smith School of Business at Queen's University The next school to examine is the Stephen J.R. Smith School of Business at Queen's University. This is a business school within a university that aims to encourage students interested… Continue Reading...

Management and Leadership Dream Job Cfo

is responsible for accuracy and accountability to meet legal and ethical requirements (Durr, n.d.). software and other technologies can help the CFO with organization, especially with complex projects. The CFO can also rely on a team to help with organizing complex data sets and tasks that are concurrent and ongoing. Controlling Controlling from a managerial perspective is not about wielding power, but about ensuring adherence to standards (“Planning, Organization, Leading, and Controlling,” 2018). Metrics like production data, performance results, tax and financial statements, audits, surveys, and other data can be used in the act of controlling. A CFO remains… Continue Reading...

Critical Infrastructure Security Information Technology

and counted upon to preserve national security interests. Hardware manufacturers and the members of their supply chains, software developers, and service providers all fall under the general rubric of information technology critical infrastructure (GAO, 2017). Various vulnerability assessment methods can be used to evaluate the nation’s information technology critical infrastructure. One assessment tool is the Infrastructure Survey Tool offered by the Department of Homeland Security. This tool is a web-based security survey that focuses mainly on physical facilities and is therefore limited in scope. A systems dynamics approach uses “stocks, flows, and feedback loops” to account for the complexities… Continue Reading...

Social Sciences and Its Statistical Package

are the major benefits to using the statistical package for the social sciences (SPSS) software? SPSS, akin to several other tools like Stata and SAS, offers the simple know-how and ability to undertake descriptive statistics, regression, and correlations. Through different add-ons, SPSS can facilitate the performance of more advanced research needs such as multivariate analysis, conjoint analysis in addition to neural networks. The software package has the advantage in that it provide the expediency in automating numerous tasks like cleansing and organizing data, together with generating charts together with other kinds of output. The researcher is also able to… Continue Reading...

Bill Gates As an Ethical Leader

(operating system) besides a broad range of popular organizational software. At present, he heads the largest charitable organization across the globe – the Bill and Melinda Gates Foundation (Americans That Matter, n.d). Thirty years as the leader of Microsoft gave Gates the reputation of one among the globe’s most ruthless capitalist leaders. However, ever since his focus shifted to charitable works, he has begun showing his more empathetic side (Ethical Corporation, 2008). Therefore, Gates warrants recognition as an ethical manager and leader, at the very least for inspiring another quest for organizational social opportunity, in which firms are genuinely… Continue Reading...

Security Management Civil Action

recruiters have, for several decades, been banking on ATSs (Applicant Tracking Systems), the idea of smart screening software is fairly new (Anderson, 8). Intelligent screening examines current resume databases for ascertaining which recruits ended up unsuccessful and which enjoyed success on the basis of their tenure, turnover and performance. Rather than manually screening all resumes, such software applies whatever information is gleaned about current employees’ skills and experience and screens, grades, and shortlists candidates. 4. Several federal acts protect the privacy of individuals. If an employer in the process of screening an application discovers an open arrest record for an… Continue Reading...

Unit Of Analysis in a Research Project

and object (Dumi?i? & Žmuk, 2012). G*Power represents a statistical analysis software package which aids quantitative research scholars in performing analyses of sample size (Faul, Erdfelder, Buchner, & Lang, 2009). SP analysis by utilizing v. 3.1.9 of the G*Power software may help decide on appropriate research sample size. For the current research, a priori SP analysis which assumes medium effect size (f 2 = .15), ? = .05, may identify the minimum size of sample required for achieving a power value of .80 as 68; incorporation of 146 respondents is linked to an increased power value of .99. Thus, 68… Continue Reading...

How to Present the Project to Interested Parties

familiar with the event mission and who the attendees normally are (Ricci, 2012). Powerpoint, Keynote and a couple of other software are traditionally used in making formal presentations. The tools can have a great impact on your audience if they are used properly and optimally. They can help you to lead your formal audience to the direction that you desire with ease. These mediums of presentation have an edge because they enable you to interact with your audience (Morton, 2016). References Mistry, D. (2012, March 06). Make your Findings Effective: Choosing the Right Method to Present Research | UX Booth.… Continue Reading...

Corporate Social Responsibility Its Success and Failure

did not know of the developments. The established chain of command from the software development that designed the conditions that placed the vehicle in the test mode emission amounts and reverted to circulation mode also referred to as the dirty mode after the end of the test are audited fully and also documented fully in the internal testing processes. It is possible to track every process, and the people responsible for them. It is now evident that the best software usage is to leave it open so that the code can be inspected. Indeed, software has turned into an… Continue Reading...

Key Resources Critical Infrastructure

is made up of distributed and virtual functions that offer IT services and products such as software, hardware and services (Fisher & Norman, 2010). National Icons and Monuments: The sector comprises of different assets situated in various U.S. territories. The icons and monuments are either historic landmarks, or listed in the historic sites national register (Moteff & Parfomak, 2004). They may include physical structures or monuments. Nuclear waste, materials and reactors: This sector is made up of nuclear power stations, testing and research without nuclear power reactors and nuclear materials applied for academic, industrial and medical settings, fuel fabricator… Continue Reading...

The Success Of Indie Music

studios. Today, everyone can have their own personal recording studio with the right software and an iMac. Pro Tools gives every indie artist the same level of gear as professional recording studios—so in that sense, yes, the recording industry is less powerful today than in the past. However, there are many other aspects to the recording industry—studios themselves are just a drop in the bucket. Where the music industry is still dominant is in “publishing; music retail; the music press; music hardware, including musical instruments, sound recording and reproduction technology; tours and concerts, and associated merchandising (posters, t-shirts, etc);… Continue Reading...

Security for Mobile Devices

the street whose integrity is dubious at best. Another critical defense is to update one’s mobile device software regularly. This ensures that it has the latest line of defense against the latest line of attacks. Mobile device that do not update regularly are left without patches and are thus left vulnerable to criminals seeking entry into their systems. To recap, the best lines of defense for mobile protection: 1) Install anti-malware, as this will reduce the risk of malware being downloaded and gaining control over a system. Anti-malware should be the first step that a mobile user takes in providing… Continue Reading...

Emirates Airlines Pestle and Swot Analysis

its technological and electronic systems are extensively checked and software anti-viruses installed in the systems to guarantee system safety. References Arabian Business. (2011). Emirates faces $1bn bill over EU carbon tax. Retrieved from: https://www.arabianbusiness.com/emirates-faces-1bn-bill-over-eu-carbon-tax-414760.html Craig, T., & Campbell, D. (2012). Organizations and the business environment. New York: Routledge. Diaa, S. (2018). Emirates Airline eyes expansion in Iran, India. Gulf News. Retrieved from: https://gulfnews.com/business/aviation/emirates-airline-eyes-expansion-in-iran-india-1.2210492 Emirates. (2018). Annual Report. Retrieved from: https://cdn.ek.aero/downloads/ek/pdfs/report/annual_report_2018.pdf Fahim, K. (2015). Airlines Suspend Flights to Iraq’s Baghdad Airport After Jet Is Hit by Gunfire. New York Times. Retrieved from: https://www.nytimes.com/2015/01/28/world/middleeast/flydubai-jet-hit-by-gunfire-as-it-lands-at-baghdad-airport.html Fortune. (2017). Trump's Travel Ban and Brexit Crushed… Continue Reading...

Human Resources

employee’s benefits do not yet kick in. Specific departments might have specialized training needs, from using new equipment and software to adopting a new set of practices based on changes in the law.  Human Resources Issues The most pressing issues in human resources include handling toxic workplace environments, promoting employee satisfaction and wellbeing, providing adequate benefits including healthcare plans, cultural competence, and conflict resolution. Toxic workplace environments refer to a number of situations that not only adversely impact employee retention, turnover, and productivity metrics, but also reflect poorly on the company, adversely affect its reputation with consumers or suppliers,… Continue Reading...

Agent Based Simulation in Public Policy

not offended or turned off. Agent-based modeling and simulation could be implemented using computer simulation software to create a real-world situation simulation in which the personal characteristics and behaviors of all important members of the administration and stakeholders are incorporated into the model. This provides the environment for obtaining precise data for forecasting scenarios and seeing what the outcomes would be for specific types of responses to a scandal. In conclusion, agent-based modeling and simulation could be used in any number of different ways in the public sector—not just to address potential problems. They could be used to obtain a… Continue Reading...

Team Development Leadership Emotional Intelligence

Burton, J., & Beecham, S. (2012). A process framework for global software engineering teams. Information and software Technology, 54(11), 1175-1191. https://doi.org/10.1016/j.infsof.2012.05.002 As talent management in a global workplace environment becomes increasingly complex, researchers in leadership development need to understand the most important factors that promote global team efficacy. This research uses an extensive literature review to uncover themes related to global team management, focusing specifically on teams of software engineers. Moreover, the authors analyze potential threats to global software development teams. Whether implemented for cost-effectiveness or by necessity, the model of the global team is becoming ubiquitous. Research like… Continue Reading...

Understanding Supply Chain Management

in the supply chain policies of AADC. As soon as parts are approved for requisition, data management software should issue a real-time alert to the departments responsible for disseminating requests for quotations. Data integration solutions such as Talend with Microsoft Azure or Dell Boomi have cloud-based platforms where such information is readily exchanged, and alerts can be issued as part of their messaging capabilities (Microsoft Azure). The request for quotation departments should implement and maintain a database in which they keep a supply of vendors from whom to issue parts. When personnel in this department are not issuing quotes… Continue Reading...

Positive and Negative Stress in the Workplace

be ensured by making sure that all data is entered into the SPSS computer software as is in the filled questionnaire. The researcher will not manipulate the data in any way. An independent data entry assistant will be used to enter the data into the statistical program. The same data entry assistant will be used to produce the results of the study independently of the researcher to avoid subjective collaboration. 13. Analysis Power analysis sample size and power are two important concepts in the design of research studies. The power of the study can be defined as the probability… Continue Reading...

Managing the Automation Industry

Hill Professional. Master Control. (2012). Automotive Quality Control and Assurance software Systems. Retrieved from: https://www.mastercontrol.com/quality-management-software/quality-control/automotive.html Nazaruk, A. (2015). Project Management Methodology: Kanban. Retrieved from: https://explore.easyprojects.net/blog/project-management-methodology-kanban Peavler, R. (2018). Just-in-Time Inventory Management. The Balance Small Business. Retrieved from: https://www.thebalancesmb.com/just-in-time-jit-inventory-management-393301 The Luminous Group. (2016). Three Key GM BIQS Controls Every Organization Should Implement. Beacon Quality. Retrieved from: https://www.beaconquality.com/blog/three-key-gm-biqs-controls-every-organization-should-implement Theodore Farris, M., & Hutchison, P. D. (2002). Cash-to-cash: the new supply chain management metric. International Journal of Physical Distribution & Logistics Management, 32(4), 288-298. Toma, S. G., & Naruo, S. (2017). Total Quality Management and Business Excellence: The Best Practices at Toyota Motor Corporation. Amfiteatru Economic, 19(45),… Continue Reading...

Venture Capital and Industry Description

Ansarada, which is a startup dealing with data room software and $US15 million Series A round for Myriota, a startup dealing with space internet of things and situated in Adelaide” (businessinsider.com). Although Australia’s venture capital industry has been increasing year over year it is still miniscule in its comparison of the United States. “The United States continues to dominate the global venture capital industry with an investing of US $28.2 billion in the first financial quarter of 2018 (Pash, 2018). Nonetheless, there is hope, owing to the recent growth in funding for start-ups in Australia. According to the article… Continue Reading...

Mobile Devices Networking Performance and Security Related Issues

Consequently, this makes it significantly easy for data interception owing to spyware and Trojans. The lack of security software is also a major issue. Usually, mobile devices lack such software unlike computer devices. Furthermore, users fail to perceive the need for installation. Consequently, this increases the security risk of attacks. What is more, in the event that operating systems might be outdated implies that it is easy for attackers to intercept data using different malware. Performance issues are also a prevalent problem in mobile device networks. For starters, bearing in mind that TCP flow control mechanisms were meant for… Continue Reading...

Hardware and Software Uses on a Computer

Computer Maintenance Importance of Hardware and software for the Computer Computer hardware refers to the physical entities of a computer like a motherboard, keyboard, mouse, RAM, hard drive etc. These components are designed to perform particular functions that are directed by the software. The hardware components are used to power and control the computer making is usable. Most of the hardware components are mostly hidden meaning that they are not seen and are enclosed within the casing of the computer. Hardware and software are interconnected. Without software hardware of… Continue Reading...

Relationship Between Creativity and Temperament

be used mainly for data analysis. Additional funds will be requested to purchase for IBM SPSS statistical software and office supplies. Personnel, travel, participants and supplies costs are treated as directs costs. Therefore, indirect costs for the study will be approximately 37.5 percent of total direct costs. This money will be paid directly to the university to cater for private rooms where the tests will be conducted and other operating costs. Budget for this study is provided in Appendix A. References Baas, M., Roskes, M., Sligte, D., Nijstad, B. A., & De Dreu, C. K. (2013). Personality and Creativity: The Dual Pathway to Creativity Model and… Continue Reading...

Nike's Agile Transformation Plan

project management techniques have traditionally been applied to IT projects because the use of these techniques in software development transform a project with low chances of completion into successful ones that delivery results in a timely manner (Vandersluis, 2014). However, agile project management techniques can be applied to non-IT projects since they are no longer sought by IT companies only. This paper discusses the application of agile transformation strategies at Nike’s research and development teams and project management processes. Overview of Agile Transformation Strategies Agile transformation strategies or project management techniques have dominated the tech world and traditionally applied… Continue Reading...

The Link Between Temperament and Creativity

Additional funds will be requested to purchase for IBM SPSS statistical software and office supplies. Personnel, travel, participants and supplies costs are treated as directs costs. Therefore, indirect costs for the study will be approximately 37.5 percent of total direct costs. This money will be paid directly to the university to cater for private rooms where the tests will be conducted and other operating costs. Budget for this study is provided in Appendix A. References Baas, M., Roskes, M., Sligte, D., Nijstad, B. A., & De Dreu, C. K. (2013). Personality and Creativity: The Dual Pathway to Creativity Model… Continue Reading...