The Role of Technology in Management Leadership Essay

This essay has a total of 1873 words and 8 pages.

The Role of Technology in Management Leadership

Over the last sixty years of business activity, there has been new ways and means of
conducting business through something we call technology. Technology is the advancement
and use of electronic devices and other high-tech equipment to produce and progress
knowledge into the future. Advancements in technology have affected management leadership
in many ways over the last sixty years. New technology has altered leaders' consciousness,
language, and the way they view their organization. Technological advancements have made
things easier for those in management leadership roles. But as with anything, there are
positive and negative aspects of technology on leadership. Some of the positive aspects of
technology are: the availability and use of wireless networking, collaboration tools,
digital video, handheld devices, and videoconferencing. On the other hand, the negative
aspects of technology are: it offers less privacy, it allows for less interaction with
others, and it runs a high risk of contact with viruses.

On the more positive side, wireless networking allows leaders to share resources with
their team operating by means of wireless media, such as microwaves, cellular technology,
and radio frequencies. Wireless networking is paving the way for technology integration
around the world. The use of collaboration tools allows ongoing conversations among
leaders, their subordinates, board members, and community members. Professional
development is one area where collaboration can have an enormous impact on management
leadership. When leaders can casually share new approaches and practices with each other
through a technology connection to their workplace, both leaders and their team will
benefit. One way of doing this is to create an Internet mailing list where they can share
questions, problems, solutions, successful techniques, and less successful techniques. The
Internet is enabling digital video to achieve professional-quality and two-way
interaction. This will be one of the rare cases where management leadership will be
leading a technological shift in society as a whole. Hand-held devices are high-tech
gadgets, now more powerful than early Windows or Macintosh machines. Handheld devices
offer more versatility than full-size computers and are much more portable than the
alternative personal device, the laptop. For leaders especially, this take-along advantage
lets them develop a feeling of ownership, as the device is ever-present and ready to take
on the current task. In addition, many of the newest handheld models can be wirelessly
networked, which means leaders can send and receive e-mail and surf the Web without having
to "synch up" to a computer. Video-conferencing is a three-dimensional, top-quality audio
and video virtual reality telecommunication that will allow leaders to examine minute
objects through remotely controlled microscopes. Videoconferencing technologies use a
compressed video system to transmit information from one location to another either via
the Internet or a telephone line.

On a more negative note, when leaders are using some of the technological advantages as
mentioned above, they run the risk of reducing the privacy of their organization. Privacy
is a privilege that we take for granted in this country, yet it is strongly threatened by
advances in technology. The ability of political and economic institutions to discover
private information about individuals and organizations is overwhelming. Some of the
various ways that information about an organization's activities can be collected without
their knowledge or consent are: through cookies, browsers, search engines, electronic
commerce, E-mail, and spam. The threat of spyware and other security threats are
unlikely to be eradicated. Hackers, criminals, and others with ill intent will always
attempt to avoid the intentions and protections of users in an effort to exploit PCs and
networks for vandalism or profit. Viruses are called viruses because they share some of
the traits of biological viruses. A virus passes from computer to computer like a
biological virus passes from person to person. Viruses show us how vulnerable we are. A
properly engineered virus can have an amazing effect on the worldwide Internet. On the
other hand, they show how sophisticated and interconnected human beings have become.

In top performing organizations, each area is strong and constantly improving. For
example, in our technological age, leaders need to ensure that they're constantly
upgrading their technical expertise and technological tools. They can't afford to fall
behind. In many cases, the laptop computer can be a huge help with email, time management,
storing and easily retrieving information, keeping contact and project records,
maintaining databases, developing slides for presentations and workshops, and accessing a
multitude of information and research through the Internet. Without it, most leaders would
be thirty to forty percent less productive and would need much more administrative help.

If leaders' understanding of their organization's expectations is only partially accurate,
expensive technology and reengineered processes will only deliver partial results. If
leaders in our organizations cannot communicate face-to-face, electronic communications
won't improve communications very much. If management leadership has not established the
discipline of setting priorities for their time or organizing themselves, a laptop
computer or other wireless mobile device will not do it for them.

Systems and processes are also an extremely important area. An organization can be using
the latest technologies and be highly people-focused, but if the methods and approaches
used to structure and organize work is weak, performance will suffer badly. Leaders in
organizations can be empowered, energized, and enlightened, but if systems, processes, and
technologies don't enable them to perform well, they won't. Developing the discipline and
using the most effective tools and techniques of management leadership, organization
systems, and processes is a critical element of high performance.

The Performance Balance triangle has management leadership at its base, which is very
deliberate. In well-balanced, high performing teams or organizations, technology, systems,
and processes serve people.

We have the opportunity to use technology for positive changes; however, ignoring the
possible negative effects is not only naive but potentially dangerous. Moreover, leaders
have to take actions to overcome the negative aspects of technology. In order to tackle
the risk of computer viruses, leaders should enlist the help of an information technology
specialist who will then reassure the users and explain to them the no-fault assumption
Continues for 4 more pages >>




  • HewlettPackard Strategy
    HewlettPackard Strategy Strategy Paper Hewlett Packard, Inc. (NYSE: HWP) TABLE OF CONTENTS SECTION 1 2 BACKGROUND 2 SECTION 2 2 MISSION, GOALS, AND STRATEGIES 2 Company Mission 2 Company Goals 2 Company Strategies 2 Management By Wandering Around. 2 Management By Objective. 2 Open-Door-Policy 2 Open Communication 2 SECTION 3 2 STAKEHOLDERS 2 Stockholders: 2 Employees: 2 Competition: 2 Major suppliers: 2 SECTION 4 2 EXTERNAL ENVIRONMENT 2 Industry Environment 2 Differentiation versus Commodity 2
  • Censorship
    Censorship The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer children not to explore. In the physical world society as a whole conspires to protect children, but there are no social or physical constraints to Internet surfing. The Internet Censorship Bill of 1995, also known as the Exon/Coats Communications Decency Act, has been introduced in the U.S. Congress. It would make it a criminal
  • Computer Viruses
    Computer Viruses Computer Viruses Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthori
  • Computer Viruses1
    Computer Viruses1 Computer Viruses Essay written by Jeramiah Billings Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it\'s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justi
  • Contrast DOS to Unix
    Contrast DOS to Unix Compare and Contrast Microsoft DOS with UNIX Arthur Bennis Microcomputer Operating Systems CGS 1560 INTRODUCTION As is suggestive of its name, an operating system (OS) is a collection of programs that operate the personal computer (PC). Its primary purpose is to support programs that actually do the work one is interested in, and to allow competing programs to share the resources of the computer. However, the OS also controls the inner workings of the computer, acting as a t
  • DESIGNING A NETWORK
    DESIGNING A NETWORK I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important issu
  • Electronic Commerce
    Electronic Commerce Table of Contents Introduction…………………………………………………………………2 History of E-commerce……………………………………………………..4 Economic Impact……………………………………………………………5 Advantages of E-commerce…………………………………………………5 Disadvantages of E-commerce……………………………………………...7 The Future of E-commerce………………………………………………….9 Summary…………………………………………………………………...11 References………………………………………………………………….12 Electronic Commerce Electronic commerce, or e-commerce has developed very rapidly in the last few years and has left some
  • Government Censorship
    Government Censorship Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas on the Internet; therefore, government should not encourage censorship. Introduction I. In the Internet community, there is a large volume of technical terms. For this reason, it is first necessary to examine the terminology specific to Internet. 1.The internet is a world wide computer network. 1.Electronic mail (email), which is one component of the Internet, approximates person to pe
  • Hacking a Art
    Hacking a Art In today\'s fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younger than I have, so consequently I have to search for a career in a field that will offer me adequate financial rewards in a limited amount of time. I started working with computers four years ago, upgrading systems, and increasing modem speeds to enable me access to the World Wide Web. I find programming to be the most interesting
  • How to design a network
    how to design a network I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important
  • Networking and Telecommunication Management
    Networking and Telecommunication Management Networking and Telecommunication Management “The AT&T long-distance networks crashes and millions of calls go unanswered. A computer hacker reprograms a switching station and calls to a Florida probation office are shunted to a New York phone-sex hotline. An illegal computer bulletin board publishes a pilfered BellSouth document on the 911 emergency system, which made it available to anyone who dials up”. The above incidents are described in Bruce Ster
  • Networking1
    Networking1 Design and Installation of Internal Network for the Air Force Base Computer Training Center CMIS 370 INTRODUCTION The Air Force Base Network Standardization and Evaluation Section is responsible for the training, licensing, and certifying of network professionals through the use of in-residence courses, computer based training (CBT), and formal task evaluations. There are 18 Network Control Center (NCC) personnel assigned to manage the backbone of the base network and over 40 system
  • None Provided1
    None Provided1 In today\'s fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younger than I have, so consequently I have to search for a career in a field that will offer me adequate financial rewards in a limited amount of time. I started working with computers four years ago, upgrading systems, and increasing modem speeds to enable me access to the World Wide Web. I find programming to be the most interestin
  • None Provided3
    None Provided3 ______________________________________________________________________ Untold Windows Tips and Secrets By Ankit Fadia ankit@bol.net.in _______________________________________________________________________ Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully
  • NT Server
    NT Server NT Server 4.0 study notes How do you move a PDC or a BDC to a new domain? Change the Domain Name System Policy Editor will allow you to restrict logon times - true or false? False What is the correct syntax to start a program such as Network Monitor with a low priority start /low netmon A local group is located in each computers account database Why would you run Win16 apps in a separate NTVDMS? To allow a Win16 app to interoperate with other apps in a separate memory space Will it min
  • Operating Systems
    Operating Systems Purpose The first thing I wanted to do for this project was to determine how the computer system I chose was going to be used. I wanted to purchase a personal computer system, with monitor and printer that I could use to do Web-based research. The research will be done out of my house. It will be primarily based on comparing different start-up companies to determine investments for the future. Since I determined that all my research was going to be over the Internet, it was imp
  • Oppertunities and challenges of the internet
    oppertunities and challenges of the internet Opportunities and Challenges of the Internet In a world of light-speed data transmission, any individual with little training and expertise can make a fortune from the Internet. Many companies, like E-bay or Amazon.com, thrive from business done only through Internet transactions. As computer technology progresses, data transmission becomes faster, and as high level encryption becomes available for public use, the amount of Internet consumers also gro
  • TCPIP Security
    TCPIP Security TCP/IP Security The TCP/IP protocols, the basis for today\'s Internet, lack even the most basic mechanisms for security, such as authentication or encryption. As usage of the Internet and TCP/IP protocols increases, their lack of built-in security has become more and more problematic. This paper describes a variety of basic flaws in TCP/IP protocols and their implementations, and discusses solutions and work-arounds to these problems. Also covered is the new IPv6, the next-generat
  • Windows Evolution
    Windows Evolution Microsoft: The Company It wouldnt be fair to talk about the Windows Operating System without first looking at the origins of the company that developed it. William H. Gates III and Paul Allen founded Microsoft in 1975. They were both only 19 years old. In 1980 International Business Machines Corporation (IBM) chose Microsoft to write the operating system for the IBM PC personal computer, to be introduced the following year. As part of its contract with IBM, Microsoft was permi
  • Windows NT
    Windows NT Windows NT Operating System Windows NT History. Since it was first released in 1993, Microsoft Windows NT Server has established itself as the network operating system (NOS) of choice for countless organizations of all sizes in private industry and public agencies. They have discovered that Windows NT Server is extremely reliable, highly scalable, and capable of handling the complex, mission-critical demands of even large Fortune 500 corporations. But the widespread adoption of Window
  • Wireless Technology
    Wireless Technology Wireless Technology applied to Computer Processing I. Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set of operatio
  • Prodigy
    prodigy ______________________________________________________________________ Untold Windows Tips and Secrets By Ankit Fadia ankit@bol.net.in _______________________________________________________________________ Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully reap th
  • Sun vs Microsoft
    Sun vs Microsoft Sun Microsystems, Inc. Introduction By 1998 Sun had become a global Fortune 500 leader in enterprise network computing with operations in 150 countries and generating billion in revenues. Sun’s competitors in the technical markets were primarily Intel, Hewlett-Packard (HP), International Business Machine (IBM), Compaq Computer Corporation (CPQ) and Silicon Graphics, Inc. (SGI). The information technology industry, the market for Sun’s services and products, was extremely comp
  • Ecommerce Market Study
    Ecommerce Market Study Prepared for: Paul Boray, MBA Prepared by: Pat Wilson June 10, 1999 Student Number: 100077846 Executive Summary The firms objectives can be met and a goahead is suggested subject to addressing the recommendations. Macrosegmentation of the market identified machinery, wood, base metals and plastics as target markets for the firm. Revenue expectation based on a 0.4% market share is 9,000. Break even is 9,000 and requires contributions from 17 customer projects at an
  • Annual report project
    annual report project 1. Company Information and History 1.Objective and core values The main objective of Motorola is to create shareholder value by continuing to be the world\'s premier electronic and communications equipment company from a creative, strategic and financial standpoint. Motorola supports its objectives with a set of core values. · To anticipate and exceed the needs of its customers. · To provide an environment for growth for the individual dedicated to professionalism and creat
  • Ecommerce1
    ecommerce1 With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means there are few companies that do not use e-commerce. To emphasize the point that the effect of the Internet is so widespread in today’s business communities, one online article stated that more than 100000 companies have Internet
  • Ecommerce2
    ecommerce2 With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means there are few companies that do not use e-commerce. To emphasize the point that the effect of the Internet is so widespread in today’s business communities, one online article stated that more than 100000 companies have Internet
  • Ecommerce3
    ecommerce3 E - Commerce: An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means there are few companies that do not use e-commerce. To emphasize the point that the effect of the Internet is so widespread in today\'s business communities, one on-line article stated that "more th
  • Ecommerce4
    ecommerce4 Electronic Commerce Edward Caputo Many new and exciting business and purchasing opportunities are becoming available due to the phenomenal growth of the Internet and peoples interest to save time and money by purchasing goods via the web. If you think about all the companies that you know that don’t use computers for their everyday business than you either are stumped or just thought of one that will soon be forced to evolve or will soon go out of business. There are very few successf
  • Electronic commerce
    electronic commerce Electronic Commerce There are very few successful companies that do not use computers in their everyday business activities, which also means there are few companies that do not use e-commerce. To emphasize the point that the effect of the Internet is so widespread in today’s business communities, one online article stated that more than 100,000 companies have Internet addresses, and 20000 companies have home pages on the Internet as of February 1999 (DataQuest, 1999). These
  • How To Be a Hacker
    How To Be a Hacker How To Become A Hacker Why This Document? As editor of the Jargon File, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizard hacker?". Oddly enough there don\'t seem to be any FAQs or Web documents that address this vital question, so here\'s mine. If you are reading a snapshot of this document offline, the current version lives at http://www.tuxedo.org/esr/faqs/hacker-howto.html. What Is A Hacker? The Jargon File cont
  • Internet and Networking
    Internet and Networking In the 1960s, time-sharing brought about the first interactive access to computers. This was a mix of data transmission technology and a teletypewriter. The result was an interactive terminal. These terminals were connected to a server with low-speed lines, allowing the users to interact with the computer and take advantage of its resources. Time-sharing gave multiple users the ability to use the computer at the same time, for completely separate tasks, and provided them
  • Intro computing
    intro computing Introduction The relentless advance of IT and telecommunications systems has brought dramatic benefits to individuals, businesses and other organisations. These years, the world has developed into an information economy, and the applying of new technologies is at the centre of the activity. New technologies are being developed at a record pace. Those celebrities such as Bill Gates of Microsoft, Steven Jobs of Apple all emerged to create information technology dynasties for 1980s
  • Job Design and Staffing
    Job Design and Staffing Abstract The Analysis of Jobs A focus on jobs as important elements in organizational structures and information systems may help with investigation and evaluation of work and work experience. These notes/checklists are offered to aid examination of your own job from a self-development point of view. They may also help · In projects that generally involve the design of jobs for an organization. · Those involved in staff recruitment, training, employee appraisal and reward
  • Linux
    Linux Introduction · TOPIC: Can Linux succeed in a Windows world? Linux is a Unix-language-based computer platform and is described as being slimmer, faster, more reliable and flexible than Windows and can better serve consumers and businesses. Is there any truth in the statements being made about this rival operating system? · Brief history about the origins of Windows and Linux · General functions of any operating system · The capabilities of Windows and Linux and what requirements of an opera
  • Network
    network In today\'s world of technology the faulty security is becoming an almost incurable problem In today\'s world, there are several opportunities for the everyday user to breach security networks. The opportunities are endless for intrusions on networks. In 1997, thirty-five hackers hired by the National Security Agency launched several simulated attacks on the U.S electronic info-structure. The project was called Eligible Receiver and its main goal was to gain root level access to thirty-s
  • Network Security
    Network Security Network Security Network security, what is it? In today’s society not many people understand what network security is or how it works. As a person or as a network administrator you must understand the steps and processes of setting up a network security system. One of the first items that you have to come up with is an idea of why you want a network. Once you have figured this out you then have to secure many areas of the computer some of the areas include the securing of deskto
  • WIRELESS LOCAL AREA NETWORK WLAN
    WIRELESS LOCAL AREA NETWORK WLAN WIRELESS LOCAL AREA NETWORK (WLAN) 1. Introduction. A wireless LAN (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN within a building or campus. Using electromagnetic waves, WLANs transmit and receive data over the air, minimizing the need for wired connections. Thus, WLANs combine data connectivity with user mobility, and, through simplified configuration, enable movable LANs. Over the last seve
  • Wireless Technology applied to Computer Processing
    Wireless Technology applied to Computer Processing Wireless Technology applied to Computer Processing Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which
  • E commerce
    E commerce Remember the time when there was no Internet? Where advances in telecommunications and computing largely occurred side-by-side in the past, today, they converge in the Internet. Timesharing, the concept of linking a large numbers of users to a single computer via remote terminals, was developed at MIT in the late 50s and early 60s. In 1973, Bob Kahn and Vint Cerf developed the basic ideas of the Internet. Now days almost everybody is connected to Internet. WORLD INTERNET CONNECTIVITY
  • History of the Internet
    History of the Internet The technology revolution is upon us. In the past there have been many triumphs in the world of technology. To this date, people are able to communicate over thousands of miles with the greatest of ease. The Internet connects nearly 400 million users worldwide and is an essential part of how we work, play, communicate, and conduct commerce. We use the Internet in ways that seemed unimaginable The term "Internet" refers to the global information system that -- (i) is logic
  • History of the Internet
    History of the Internet The technology revolution is upon us. In the past there have been many triumphs in the world of technology. To this date, people are able to communicate over thousands of miles with the greatest of ease. The Internet connects nearly 400 million users worldwide and is an essential part of how we work, play, communicate, and conduct commerce. We use the Internet in ways that seemed unimaginable The term "Internet" refers to the global information system that -- (i) is logic
  • Security
    Security Overview Security is the discipline of using effective protection measures to safeguard important assets from abuse. In other words, “security” is about protecting important things. Protection involves not just mechanisms (such as locks and doors), but also proper selection and use of mechanisms. Properly applied, the various disciplines of information security really come down to risk management that is not fundamentally different from risk management in other situations such as financ
  • Wireless Technology and Computers
    Wireless Technology and Computers Wireless Technology applied to Computer Processing Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set
  • Ecommerce
    Ecommerce E-Commerce Table of Contents I. E-Commerce: An Introduction II. History of E-Commerce III. Economic Impact IV. Advantages of E-Commerce V. Disadvantages of E-Commerce VI. The Future of E-Commerce E-Commerce ‘V An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means th
  • Ecommerce
    Ecommerce E-Commerce Table of Contents I. E-Commerce: An Introduction II. History of E-Commerce III. Economic Impact IV. Advantages of E-Commerce V. Disadvantages of E-Commerce VI. The Future of E-Commerce E-Commerce ‘V An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means th
  • Ecommerce
    Ecommerce E-Commerce Table of Contents I. E-Commerce: An Introduction II. History of E-Commerce III. Economic Impact IV. Advantages of E-Commerce V. Disadvantages of E-Commerce VI. The Future of E-Commerce E-Commerce ‘V An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means th
  • Ecommerce
    Ecommerce E-Commerce Table of Contents I. E-Commerce: An Introduction II. History of E-Commerce III. Economic Impact IV. Advantages of E-Commerce V. Disadvantages of E-Commerce VI. The Future of E-Commerce E-Commerce ‘V An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means th
  • HewlettPackard Strategy
    HewlettPackard Strategy Strategy Paper Hewlett Packard, Inc. (NYSE: HWP) TABLE OF CONTENTS SECTION 1 2 BACKGROUND 2 SECTION 2 2 MISSION, GOALS, AND STRATEGIES 2 Company Mission 2 Company Goals 2 Company Strategies 2 Management By Wandering Around. 2 Management By Objective. 2 Open-Door-Policy 2 Open Communication 2 SECTION 3 2 STAKEHOLDERS 2 Stockholders: 2 Employees: 2 Competition: 2 Major suppliers: 2 SECTION 4 2 EXTERNAL ENVIRONMENT 2 Industry Environment 2 Differentiation versus Commodity 2
  • Internet
    internet Emanuel HALAPCIUC Ruxandra ICA Internet-ul si (r)evolutia comunicatiilor Fac. Management, anul II, gr.126 Cuprins: · Internetul – aparitie, scurt istoric · E-business, afacerea sec. 21 · Nevoia de viteza si noile tehnologii de comunicatie · Mobilitate maxima: cu Internetul la plimbare · Tendinte pentru viitorul apropiat · Bibliografie Acum 4 decenii se lansa cu mare pompa primul satelit de comunicatii, Echo 1. La acea vreme, evenimentul capta atentia intregii lumi. Azi, lansarea unui s