Tian

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 16 of 16 - About 154 Essays
  • Great Essays

    Each of these areas functioned autonomously, giving rise to a freewheeling corporate culture where non-standardized processes were adapted on the fly, and problems were resolved in an ad hoc manner. This high degree of autonomy and flexible culture enabled Keda to achieve its “pursuit of perfection” through “endless innovation” in the global market. Indeed, innovation had been essential to the firm’s success in the market. In 1999, Keda had rolled out the first 3,200-ton pressing machine in…

    • 5955 Words
    • 24 Pages
    Great Essays
  • Great Essays

    Supercapacitor Case Study

    • 3512 Words
    • 15 Pages

    ELECTROCHEMICAL SUPERCAPACITOR – APPLICATION AND GLOBAL DEMAND ABSTRACT: The steep increase in the energy utilization leads us to search for a perfect alternative that can replace the conventional source and introduces a new-generation capacitors called supercapacitors with incredible storage capacity. Much research and investment have been carried out in this impressive technology. It is same as that of the normal capacitor the only thing is it utilizes higher surface area electrode and…

    • 3512 Words
    • 15 Pages
    Great Essays
  • Great Essays

    Bread and Circuses, a very effective form of authority throughout Roman history, were key contributing factors to the end of the Roman republic because they pacified the plebs to a point where they stopped thinking for themselves and allowed the government and politicians to become their lifeline for food, entertainment and the political direction of Rome. The Roman Bread and Circuses, wildly extravagant and free events, gathered masses of people to enjoy the violent and bloody spectacle of men…

    • 4000 Words
    • 16 Pages
    Great Essays
  • Decent Essays

    While ubiquitous Internet access is extremely convenient and enables marvelous new applications for mobile users, it also creates a major security vulnerability—by placing a passive receiver in the vicinity of the wireless transmitter, that receiver can obtain a copy of every packet that is transmitted! These packets can contain all kinds of sensitive information, including passwords, social security numbers, trade secrets, and private personal messages. A passive receiver that records a copy of…

    • 69202 Words
    • 277 Pages
    Decent Essays
  • Page 1 8 9 10 11 12 13 14 15 16
    Next