The advent of globalization led to the creation of virtual global organizations that develop business innovations through its members located in different regions in the world. Accordingly, the main aim of these virtual teams is to ensure that the members of these virtual teams interact and share knowledge and ideologies. The Amazon Company is a company in America that deals with electronic commerce and cloud computing with its headquarters in Washington. This paper explains the factors involved in the creation and sustaining global and virtual teams including the components of change and innovation, processes, technologies, and the standards and ...
Virtual Research Papers Samples For Students
46 samples of this type
During studying in college, you will certainly need to pen a lot of Research Papers on Virtual. Lucky you if putting words together and transforming them into meaningful text comes easy to you; if it's not the case, you can save the day by finding an already written Virtual Research Paper example and using it as a model to follow.
This is when you will certainly find WowEssays' free samples database extremely useful as it contains numerous skillfully written works on most various Virtual Research Papers topics. Ideally, you should be able to find a piece that meets your criteria and use it as a template to compose your own Research Paper. Alternatively, our competent essay writers can deliver you an original Virtual Research Paper model crafted from scratch according to your custom instructions.
Gladwell asserted that the world is in the midst of a revolution. The tool of this revolution is the social media but the causes can be as many as there are the countries in the world. However, technology has also a drawn a sharp contrast between social activism and interactions considering that in the past, most of the social protests began with interactions. Nowadays, social change begins with one strange tweet or even a video shared on Facebook such as was the case with the beginning of the Arab spring that began in 2011 and in countries like Syria ...
Introduction
Dittner & Rule (2011) describe virtualization as a methodology or framework of dividing the computer hardware’s resources into several execution environments, by utilizing the concepts or technologies, for example, complete or partial machine simulation, software and hardware partitioning, and time-sharing, among others. Virtualization is, thus, an abstraction of the resources of a computer hardware. As a software technology, virtualization facilitates the running of several operating systems on the similar server simultaneously (Cartwright, Mills, Langone, & Leibovici, 2014). In the contemporary information technology, there exist different forms of virtualization. The present paper delves into two of these forms, namely, server virtualization ...
IT331 Week 5
CSMA-CD is not used in wireless because it cannot detect whether a collision occurred or not, therefore, it will be of no use.
2.0 Price and performance
Considering the fact that about 100 employees will be connected to the network, I would recommend the use of wired network because wired LAN offers superior performance as compared to wireless LAN. It is prudent to use Ethernet switches since they are cheaper and also utilizes the available bandwidth. Ethernet switches are relatively cheaper than hubs hence most recommended (Laude, 2002). It is also important to note that hubs may suffer performance ...
Today one of the major problems of education implies a collision of information culture of students who called digital native and information culture of teachers who began to use the possibilities of these technologies in adulthood (digital immigrant). This led to a rapid rise of the amount of information that is really an information explosion. It also leads to large-scale changes in the methods and the nature of communication between people and development of the information society as one of the leading contemporary social processes. Such changes of socio-economic conditions can not affect the socio-psychological and psycho-pedagogical portrait of ...
Introduction
The current paper presents the proposal for the deployment of windows server in Contoso. The plan for the effective implementation and configuration for Windows Infrastructure is also enlightened. It is implied that the company possesses adequate capital for the effective deployment of the Windows network infrastructure due to which the proposal is focused to present the effective plan rather than incorporating the extreme cost efficient measures.
Features of Windows Server 2012
The features of Windows Server 2012, as inferred by Carvalho (2012), are discussed below:
Multi-server Support
A new and redesigned server is introduced in which cloud concept is incorporated so that server manager can manage ...
Samsung Gear VR and How it Relates to VR Industry
Samsung Electronics, along with a company called Oculus, developed a mobile headset based on the virtual reality technology and named it ‘Samsung Gear VR’. It was launched in the market in the year 2015 on November 27. It works with all the phones starting from Samsung Galaxy Note 5. With the headset, these phones work like a processor and display while the headset works as a controller. It contains the virtual reality based high view field, an inertial measurement device for capturing the movements. It connects to the handsets using a micro-USB connector and cable. The inertial measurement is ...
Suggest the issues that could have developed had the team not had taken a risk plan
Within a Satellite Development Project, new technology, with often untested outcomes, is involved. In the absence of a risk plan, the technology included in this project could have generated unexpected results that might have compromised the project. As the project’s description informs, the satellite development project implied many unknowns with variables that stretched across manufacture, supply chain system integration, etc. (Lavigne, n.d.). With the high amount of unknown factors, many aspects could have gone wrong in the project, which could have endangered its success. Risk refers to uncertainty regarding future events and outcomes, expressing “the likelihood and impact ...
Impact of Team-Based Approach on Productivity at Nestlé
Introduction
Companies in the contemporary business environment must rely more and more on intangible assets and develop competitive advantage beyond the hard and soft attributes of their products and services. Globalization and internationalization of supply chains demand more flexibility and resilience from the companies, placing pressure on their creative and innovative capabilities (Sims, 2007). That said Human Resource Management (HRM) has gone a long way in transforming from a simple administrative support function to a strategic element in most of the modern forward-looking organizations. Diversity is the key to building sustainable competitive ...
Communication in Social Networks
Abstract
Everything in world undergoes its continuous changes. Though unknown is always frightening, it also affirms the beginning of something new and thrilling. The same can be said about the invention of social networking. In the midst of social media revolution such social networks as Facebook, Twitter and Skype have opened before their users an amazing world of opportunities and unlimited online communication.
Knowledge and information could now be shared among various groups of people and even between different nationalities. People got the possibility to connect with the whole world and highly improve their communication skills.
Although social networks ...
Food deserts are those areas within cities where the local population has no or little access to fresh fruits and healthy vegetables. There is evidence that the food desert areas are more prevalent in the lower income neighborhoods. Lack of healthy foods leads to obesity and health ailments such as heart disease and diabetes. It is also seen that the neighborhoods with low-income are mostly African American. The essay discusses the Food deserts, what they mean and who is affected and how. Research works on food deserts in Baltimore city are looked into and how a lack of nutritious ...
Introduction
HRIS is an essential tool in large corporations as it helps in connecting HR management with all departmental roles. Technology is the key tool that connects organization systems and HR software. The HRIS allows the human resource management activities and process to be carried out electronically. The electronic systems and software enable the organization to undertake different activities such as management, accounting, and payroll. HRIS aims in increasing efficiency in decision making by HR (Martin, 2006). The decisions made are essential in increasing quality and productivity of both the human resource manager and employees. Furthermore, it offers different solutions ...
Violent Video Games
Introduction
Video games have become common among children especially when dealing with teenagers most of whom have access to video games. Video games are part of the media environment in which children are exposed to that help in defining their overall connection to their environments. Exposure of children to pro-social video game content may help in promoting overall brain development among children, as it makes it easier for these children to experience that overall connection towards their surrounding environments. For a very long time, it has become important for scientists to study the impacts associated with exposure of children ...
The requirements of today's market are not only a high level of service, reliability and flexibility, but also achievement of minimum cost. Expert experience has shown that management optimization allows the supply chain to achieve a significant improvement in performance, such as cost reductions in various categories, reduce inventory levels while increasing service levels, improve the accuracy of forecasting and planning quality and so on. The need for modernization is not only dictated by short-term supply chain needs in the economy, but also medium and long-term development plans. The leaders focus on strategic business results, looking for opportunities to ...
Pt14a
International Management
Abstract
The film and music industry have both evolved drastically during the past decades. From vinyl records to CD’s to digital mp3 files in the music industry, and from cassette tapes to mp4 files in the film industry. The evolution in both the film and music industry is most likely a result of the practicality demanded by the society. Individuals often seek easier and cheaper alternatives. In both of these relevant industries, the most practical solution is of course to have instant access to demanded content that is merely software and requires no type of disc. ...
Introduction
Posttraumatic stress disorder (PTSD) develops because of exposure to a traumatic experience. According to the Institute of Medicine (2012), the vital element of PTSD is the development of the characteristic symptoms that follow exposure to extreme traumatic stressors, including personal experiences. For an event to cause PTSD, it has should have had an actual or implied dire injury or near death experience to the victim. Such events could also threaten one’s physical and psychological integrity. The most common traumatic events happen during military combat, hostage situations, violent assault, torture, terrorist attacks, and disasters. While PSTD is most common ...
How To Become An Effective Leader for Your Team
Many books have been written on leadership and what the process looks like when handled correctly. But one of the keys to the successful leader begins with a leader understanding the methodology of leadership. There are differences relative to the leadership practice to include the transformational, situational, value based, and authentic leadership methodologies. Leadership within the team environment also has its challenges as the team environment can cause the leader to be placed under intense pressure sometimes having to push the team in order to get the job done. Add to this the stress factor and the leader has ...
DESIGN PROPOSAL
1.0 PHYSICAL NETWORK DESIGN
This design implementation must be on LAN systems because it is located in within the same building that has no structured facilities that aid data transfer from one network to another. Use of proper network topology helps in structuring the network with advantages such as cost reduction and less power consumption. The network nodes and connection lines are supposed to be designed in such a way that it reduces complexity and utilizes the available space properly. Currently, there are both physical and logical network topologies [3]. The physical aspect is defined as the actual geometric ...
The main provisions of the human capital theory are the base for realizing the improvement of the situation on the labor market in the phase of use of labor potential. They have further importance for creating an effective mechanism for regulation of reproduction of labor potential. Western management is a well-established position that only living human labor through previously invested in human investment and further effective application gives you the opportunity to make productive use of all other elements of capital and the efficiency of the use of formed human capital is determined by a flexible, economically sound human ...
L Brands Inc.: The Strategy
Introduction
L Brands Inc. evolved from a simple department store in early 1900s into one of the largest retailers of women’s fashion and apparel products today. It has acquired Victoria’s Secret and PINK, and has made other significant acquisitions. L Brands has branches for Victoria’s Secret products in more than 1,100 stores in North America, Canada and United Kingdom (Nasdaq, 2016). The company markets its products through retail stores located in malls, through international franchise and websites (United States Securities and Exchange Commission, 2016).
Strength
L Brand sells through shopping malls ...
Cyberbullying
Cyberbullying has seen its rise in recent decades, when internet came to practically every house and every school. Today in order to threaten someone you don’t need to have big muscles or own a weapon. In today’s world, an IP address is enough to make someone’s life miserable. While it may be seen as a harmless virtual naughtiness, it unfortunately has very physical and real life consequences. In last several years, cyberbullying became one of the most popular issues why children contact the ChildLine and one of the top reasons for adolescent suicide. Is there a ...
In a bid to make their products more reliable, scalable and manageable, Microsoft protects its customers from the ever increasing cyber risks. The company has devised different methods that are specifically crafted to curb the known and unknown sources of cybercrimes and cyber security risks. This methods seek to protect customers’ information, hardware and software from attack by criminals and dangerous programs. The protective strategies are designed right from the development stages and are meant to be user friendly in order to be applicable by all customers and potential customers. The strategies include the User Account Control, System Updates, ...
Communication System
The key elements of a data communication system are the source, the transmitter, the transmission system, the receiver and the destination. The source will be used in the generation of the data to be transmitted. The transmitter has a purpose of transforming and encoding the data into signals that can be transmittable for example the transformation from a digital bit stream to the corresponding analogue signal. The transmission system serves the purpose of carrying the data and it can be in terms of a transmission line or a complex network connecting the source and the destination. The receiver will ...
Electrical engineering is an engineering field with a wide range of applications and variable requested skills. And, like every occupation, it has a number of its discourse communities that determine its specifications and characteristics.
One of the discourse communities of electrical engineering is the Internet. The Internet is one of the central terms of the modern electrical engineering as it significantly boosted the development of the field and is widely used both for electrical engineering education and for practice. Nowadays, electrical engineers use the Internet in experiments, learning, Capstone projects, etc., and it also plays a key role in ...
Abstract
This paper is an introduction to simulation and a deep dive into the gaming industry which includes video and computer games. The last part also talks about the growth of this industry and job opportunities with a focus on international marketing profiles. Simulation is a process where a real life object is built using a model and digital prototype can be formed for experiencing the real object. It helps in testing and making sure the real life object is successful. Simulation is widely used in gaming industry with social games where people live as a simulated person and do ...
The First Amendment guarantees freedom of speech by restricting legislations that curtail this freedom. U.S. Supreme Court decisions reinforce respect for the freedom of speech against legislations by the federal and state governments. However, some forms of communication are exempt from First Amendment guarantees. Obscenity is one such exemption. In Roth v. the United States, the U.S. Supreme Court cited a series of cases dating back to 1877 to demonstrate the Court’s consistent regard of obscenity as an expression that is not protected by the First Amendment right to free speech. Since obscenity does not form part of ...
The First Amendment guarantees freedom of speech by restricting legislations that curtail this freedom. U.S. Supreme Court decisions reinforce respect for the freedom of speech against legislations by the federal and state governments. However, some forms of communication are exempt from First Amendment guarantees. Obscenity is one such exemption. In Roth v. the United States, the U.S. Supreme Court cited a series of cases dating back to 1877 to demonstrate the Court’s consistent regard of obscenity as an expression that is not protected by the First Amendment right to free speech. Since obscenity does not form part of ...
The First amendment guarantees freedom of speech by restricting legislations that curtail this freedom. U.S. Supreme Court decisions reinforce respect for the freedom of speech against legislations by the federal and state governments. However, some forms of communication are exempt from First Amendment guarantees. Obscenity is one such exemption. In Roth v. United States, the U.S. Supreme Court cited a series of cases dating back to 1877 to demonstrate the Court’s consistent regard of obscenity as an expression that is not protected by the First Amendment right to free speech. Since obscenity does not form part of protected ...
Introduction
Internet has paved the way for developments in the electrical engineering course. It is a valuable tool used by professors, practitioners, and students in the field of electrical engineering. This study focuses on the research question: how did advancements in the internet led to the development of the electrical engineering course. This paper will start with a brief history of electrical engineering and internet, respectively. Next, the role of internet in electrical engineering education will be discussed. Attention will be given on the use of remote laboratory experiments and internet’s role in problem and project-based learning approach. Next ...
Overview
Technology has both positive and negative implications on the lives of the people. The proliferation and advancement of technology tools have enormous effects on the lives of the people with respect to the odds of space and time thereby influencing the nature of social interactions. In particular, the technological advancements have direct effects on social evolution and social interaction across the globe, especially on the internet. The relationship between technology and social development results in the new realities of the individuals and the society. In particular, the relation between the society and technology encompasses the social networks sites, modern ...
The chapter under consideration is the Chapter 5, Financial Services: Savings Plans and Payment Accounts. The chapter gives to the reader five important aspects that contribute to the understanding of the personal finances.
1. The first aspect is the selection and use of the available financial services in the market and the factors that influence the decision to select a specific financial service. The selection of the financial service depends on of the needs of the client and the convenience of fees and conditions.
One of the financial services is the availability of cash. The cash is the most ...
Simulation in Nursing Education
The concept of simulation in healthcare education has been since the time of world II. The basic concepts of simulation in associate’s or bachelor’s nursing program comprised of CPR manikins, role playing, static manikins, and conventional techniques based on the utilization of various taught concepts were used as a teaching modality since over 5 decades (Norman J. 2012). The concept of high-fidelity education has been in place for over 2 decades but it is new and unique in the nursing education. The process involves the use of simulation with the help of high-end computer technology including simulation ...
The concept of Killer App
Killer application or killer app is a jargon used by the computer and technology industries for such programs which are considered as superior to those offered by rivals. Killer applications are highly innovative and add considerable value to technology. Operating systems, programming language, hardware, software and gaming consoles all are examples of killer applications. The aim of creating killer app is to introduce new technology at the global level. As globalization became a common phenomenon, innovation gained popularity too because the core of competition lied at the innovative capabilities of organizations. In order to survive global competition, organizations began ...
[Class Title]
Introduction
Vampires are mythical creatures that appear in ancient folklores. Most cultures have their own version of the vampire although they share a common characteristic; that is, the lust for human blood. There is no particular gender to the vampire character. Male and female vampires do exists even in ancient literatures, making the vampire one of the most gender neutral characters. The depiction of the female vampire in human culture, however, is an interesting way of looking into the development of women, particularly on how society views women and their social status over the course of time. ...
Introduction
According to Jones and Libicki (2013), Border and Transport Security is an important component of a nation’s security effort, which forms a critical component of the protection of citizens from terrorists and other forms of destruction. Massey (2012) holds the same opinion with the only difference being the introduction of a systems approach perspective. This way, Massey (2012) suggests that Border and Transportation Security (BTS) appears as a “series of concentric circles that from a shell-like structure in which the outer shell is comprised of all the preventive efforts operating beyond the country’s borders” (p.6). Therefore, BTS ...
Introduction
If an employee with access to sensitive information was terminated, then the employee is considered as an insider threat. These insiders can cause three types of threats to an organization: Sabotage, Fraud, or theft of intellectual property (IP) or data using Information Technology (IT). IT sabotage uses IT to harm the critical assets of the organization. IT can be used to steal data or IP or also for espionage by insiders. Using IT to tamper data, addition, or deletion of data for personal gain or to perform an identity crime can be considered IT fraud.
Hacker’s Targets
In the present scenario, ...
Information Technology
An asset can be defined as something that is valuable or of quality. In the IT sector, an asset comprises data, the systems that contain the data, IT infrastructure (hardware or software), or the human resources required to run them in order to achieve the business functions of an organization. Threats in the IT realm indicate expressions of intentions to cause injury or harm to IT assets, especially those aimed at data, computer networks, or other systems. There are two types of threats: internal and external. Internal threats emanate from within the organization, for example from disgruntled employees, while ...
[Class Title]
Introduction
Technology is often portrayed in popular media and literature as something that conflicts with man’s safety and well-being. Themes of apprehension regarding technology can be observed even in short stories, which aim to promote awareness towards the negative impact of technology to society. The American author, Ray Bradbury, is one of the many authors that express their activism towards the negative impact of technology. Two of his works, ‘The Veldt’ and ‘The Pedestrian,’ have themes that make people think about the underlying drawbacks of technology. In general, ‘The Veldt’ and ‘The Pedestrian,’ creates awareness about ...
Introduction
Social Media enables the effective communication of people via the use of technology. Facebook, LinkedIn, and Twitter are social media platforms that have become a part of people’s daily lives being used to communicate with loved ones who are near and far. This is a positive experience for most people; however, there are also negative experiences to include people living double lives, having affairs, and defaming people’s reputations sometimes without the knowledge of the very people who are being discussed. Businesses are also using social media to enhance their daily business operations. But with every benefit of ...
The Decline of Face to Face Communication
For a particular category of people, who have an outgoing nature and would have made friends quickly anyway, it's doubtful social media would make much of a difference. They would still have relationships and social circles outside the media. For them, the social media is just an extension of their real-world. It all depends on the person and how one uses it. Some people might use social media to enhance their relationships and meet new people, where others might use it to quantify the amount of friends they have or use it to spy on people so that they ...
[Subject/Course]
[Submission Date]
In the present era influenced by ideological and social revolutions, the rapid growth of technology has enabled social media to interconnect the minds of individuals with no need of their physical presence. This kind of innovative communication method is gradually changing the way we interact with others thus nurturing a new form of community called virtual community. Currently, Sina Weibo is an extremely popular social media website in China. By the third quarter of 2015, this micro-blogging site had 222 million registered users and 100 million daily active users. Sina Weibo gathers a lot of posted ...
Problem Statement
Understanding the impact of culture on student learning is very critical to the provision of good quality education to learners. The global population is made of people with different cultures. In learning institutions, it is common to find a class made up of students and instructors from different communities with different cultural perspectives. Culture defines people’s way of life and comprises beliefs, knowledge, symbols, values, and behaviors. In a learning environment, there is a student’s culture, instructor’s culture, and the culture of people in the surrounding environment. Culture in such a case can be homogenous (where ...
Introduction
Beginning the early 1990s, the number of multinational corporations has risen steadily as a result of globalization. This reason has caused organizations to realize the need for international human resource management as a determinant of success. International training and development is a tool that multinational enterprises (MNEs) are using to improve the quality of services that their employees provide. The main aim of training is to improve work skills and behaviors that an organization employee has in the current circumstances. On the other hand development is aimed at increasing working abilities with respect to a future task or job, ...
Technology
Healthcare Information System: Electronic Medical Records (EMR)
Abstract
The health information system encompasses collective number technology-based infrastructures that aid the healthcare sector in improving the quality of care provided to the people. EMR or the electronic medical records is an example of a system implemented to process of gathering and utilizing patient’s health information to facilitate care in the most efficient way. EMR allow clinicians to create patient’s chart electronically and easily access lab and other test results for accurate diagnosis of the patient’s condition. The EMR is made up of five components namely the progress ...
Introduction
Invading the privacy of businesses, institutions, and people, social engineering creates criminal acts using telephones, illegally accessing private information via computer accounts called "hacking", stealing bank account information, as well as eavesdropping are social engineering crimes. Two types of social engineering exist, including, human and technological based (Peltier, 2010). Social engineering uses deception, manipulating people into giving them personal information including social security and bank account numbers (Halles, 2008). Social engineers use tactics to extract private information including appealing to people's vanity, authority, look, over peoples' shoulders while entering pin numbers, and eaves drop. In his article, "Mitigating the ...
The connectivity of a computer to other of networks that allows communication with other computers presents many risks to the computer. According to Kallol Bagchi, (2003), internet security involves mechanisms and procedures taken to protect and secure files and data in the computer connected to the internet against intrusion by other internet users. The internet being insecure mediums of exchanging information presents high-risk attacks which results in loss of data or files, destruction of computer software or access of information by unwanted or unknown computer users. To protect the transfer of date via internet several methods such as encryption have ...