Case Atlantic Computer

Page 9 of 50 - About 500 Essays
  • Premium Essay

    Digital Music Era

    in the 1970s followed by the revolutionary digital technology of a compact disc. Now, we are in an era that is progressively becoming more and more digitized with different audio formats through the Internet. Every day, thousands of people with a computer or access to one participate in peer-2-peer networks to share digitized formats of music, videogames, movies or other applications (“Peer-to-Peer File-Sharing”). The shift of music from compact discs to mp3’s has financially affected the music industry

    Words: 2074 - Pages: 9

  • Premium Essay

    Effects of Technology

    of everyday life. There are many reasons why technology is good and should be used daily. Some people can’t even imagine their day without the use of modern day technology. Computers, mobile phones, tablets, and other devices have become an integral part of everyday life of most people. Of course, that’s not only the case with adults but with children as well. Some people believe technology is a solution to many problems of a modern person. “Technology has improved quality of life - taking into

    Words: 1014 - Pages: 5

  • Premium Essay

    Business

    resources pursuing antitrust cases against Microsoft over the past decade. While the antitrust cases began in similar fashions, the US and EU have diverged significantly in responding to Microsoft’s business practices. Given the similarity of US and EU antitrust law, it is debatable why the Microsoft antitrust litigation developed differently in each jurisdiction. While the US case generally ended in a settlement that has been criticized as too lenient on Microsoft, the EU case ended in a decision imposing

    Words: 5438 - Pages: 22

  • Premium Essay

    Jet Copies Case Problem

    statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important for organizations like Gawker Media to be socially responsible. It will determine factors CEOs should consider when responding to a security breach. Finally, it will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue and state the rationale. Apply your theory to a real-world case in which

    Words: 1981 - Pages: 8

  • Premium Essay

    Bringing Video Gaming and Bd-Live from Being an Entertainment Tool to a Becoming a Distance Learning Tool

    sixth and seventh generation video game console can be adapted to deliver vocational instruction through the gaming consoles. Apart from the video game console we would also be discussing on the use of the BD-Live feature on the BluRay disc. Using the case studies of Xbox 360, WII, Play Station 3 and BD-Live, we would like propose how video game and BluRay consoles can be used to deliver vocational education through the distance learning mode. The advent of the internet, motion technology and 3D technology

    Words: 3146 - Pages: 13

  • Free Essay

    Bioprinting

    Three Dimensional Printers in Medicine “Printing of a kidney or another human organ may sound like something out of a science fiction novel, but with the advancements in 3D printing technology, the idea may not be so far-fetched” (Thompson). Addictive manufacturing, or three dimensional printing, occurs when three dimensional solid objects are created from a digital model. Plastic, ceramic, glass, or metal can be combined into successive layers by using additive processes in order to print an object

    Words: 1663 - Pages: 7

  • Free Essay

    English Essay

    study of this lake trout provided substantial evidence that more contaminated areas of the lake had a higher effect on the trout. The water pollution, caused by anything as small as a tin can or large as an old computer, provided enough harmful resources to sicken, weaken and in most cases kill the lake trout. (Michigan State University, Enivroment 110). These polluted areas are overlooked by a majority of people due to the façade of the lake’s natural beauty. However, underneath lies a more malevolent

    Words: 1041 - Pages: 5

  • Premium Essay

    Tale of Two Airlines Case

    F . WARREN MCFARLAN Tale of Two Airlines in The Network Age: Or Why The Spirit of King George III Is Alive and Well! As Professor Roger McPherson’s wait to go through the security process a second time dragged on into its third hour on this Spring day in 2002, (all passengers had to be rescreened upon the discovery that one of the airport screening machines was unplugged) he was reminded of another delayed business trip and the role that information technology played in the story. At 5:30pm

    Words: 1006 - Pages: 5

  • Premium Essay

    Employment-at-Will Doctrine

    address the following scenario involving skills, competence, and abilities: The employee seems to be unable to learn the computer applications that are basic to her job responsibilities, but, consistently “tells” her boss that she is “a good worker and a genius” and that he does not “appreciate her.” Even after a few months of training and support, she is unable to use the computer tools to be productive and efficient in completing the required tasks. There are several strategies that can be used

    Words: 2062 - Pages: 9

  • Premium Essay

    Governance (Cyber Ethics Scope)

    The Internet has taken an intricate and deceptive approach in the 21st century. With the always-constant advancement of technology, the Internet has grown to be a medium where, individuals utilize it as a platform to conduct criminal activities. Some criminal activities account for: fraud, cyber warfare, financial misconduct, and cyber-bullying. This has grown to be an incredible concern as human safety has been established as the main topic of conversation. With regards too the governance geography

    Words: 845 - Pages: 4

Page   1 6 7 8 9 10 11 12 13 50