Telecommunications, the Internet and Wireless Technology Report (Assessment)

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Feb 15th, 2024

Business advantages of using Voice over Internet Protocol (VoIP)

VoIP is cost-effective and saves a lot of money, as the only cost incurred is quality internet access cost. The hardware used is inexpensive as sound cards, speakers and microphones are the only needed devices. Additionally, the software is also less expensive and easily available; for instance, the use of Skype. VoIP allows real-time communication through video conferencing or phone calls, thus allowing a prompt response from the audience. Since information delivery and response is instant, customer relationship is enhanced, while service delivery and productivity are likely to improve. Moreover, it enhances the portability and flexibility of communication over a large geographical spread.1.

We will write a custom essay on your topic a custom Assessment on Telecommunications, the Internet and Wireless Technology
808 writers online

RFID systems use in inventory control and supply chain management

RFID uses microchips embedded in tiny tags. These microchips possess data relating to a particular item, including the identification number and location. The rest of the tag is an antenna that transmits data to a reader using radio waves. The RFID reader also has an antenna that constantly transmits data such that, if it senses a tag, it interrogates it and decodes the data carried in it. The readers then send data to the host system over wired or wireless connections, which in turn show the exact location of the item.

Wireless sensor networks

Wireless Sensor Networks (WSNs) are networks of hundreds or thousands of interconnected wireless devices embedded into the physical environment to provide measurements of many points over large spaces. These devices have in-built processing, storage, and radiofrequency sensors and antenna. They require low power, long-lasting batteries and the ability to endure the field without maintenance. The network is organized into nodes, lower nodes and upper nodes. Generally, the lower nodes forward data to each other, or to higher-level nodes, which transmit data more rapidly and speed up network performance. Then, the network routes the data to a computer for analysis. The server to which the sensors’ data is sent to acts as a gateway to a network based on internet technology. The main uses of these WSNs include monitoring building security, detecting hazardous substances in the air, monitoring environmental changes, traffic, or military activity.

Web 3.0

Web 3.0 is intelligent, meaning-based, semantic computing projected to improve the web in order to make searching the Web more productive and meaningful to people. There is an increase in cloud computing, hence diverse and unlimited connectivity between mobile and other access devices.2. This will make the Web a smoother experience. Businesses apply the consumer-driven design, with socially connected mobile applications presenting a marketing application but at more advanced levels. Mobile applications for Smartphone that scan barcodes and present pricing along with customer reviews, are becoming common.

In addition, companies’ ratings are now being accessed with product information, showing if the product in question is offered by a company with responsible investment policies, equitable hiring practices, an appropriate commitment to philanthropy, and a firm policy toward workplace diversity. This will make the market place more personal, and companies carry higher moral responsibilities. Web 3.0 will bring the revolution in social businesses.

Blogs, Wikis and social networking sites use in business

There is increased usage of Web 2.0 tools by organizations in a bid to foster a relationship with the main stakeholders, including associates and clients. They offer a wide range of advantages, such as interactivity and user-generated content. For example, Wikis are used in businesses to share information, like list answers to FAQs about each product, and consumers have added significant contributions. Secondly, consumers can discuss among themselves a topic of their choosing. Thirdly, some social networks provide financial platforms aimed at enhancing the participation of firms’ clients.

Bibliography

Laudon, K & J Laudon, Management Information Systems, Prentice Hall PTR, NY, 2011.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Footnotes

  1. K Laudon & J Laudon, Management Information Systems, Prentice Hall PTR, NY, 2011.
  2. K Laudon & J Laudon, Management Information Systems, Prentice Hall PTR, NY, 2011.
Print
Need an custom research paper on Telecommunications, the Internet and Wireless Technology written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, February 15). Telecommunications, the Internet and Wireless Technology. https://ivypanda.com/essays/telecommunications-the-internet-and-wireless-technology/

Work Cited

"Telecommunications, the Internet and Wireless Technology." IvyPanda, 15 Feb. 2024, ivypanda.com/essays/telecommunications-the-internet-and-wireless-technology/.

References

IvyPanda. (2024) 'Telecommunications, the Internet and Wireless Technology'. 15 February.

References

IvyPanda. 2024. "Telecommunications, the Internet and Wireless Technology." February 15, 2024. https://ivypanda.com/essays/telecommunications-the-internet-and-wireless-technology/.

1. IvyPanda. "Telecommunications, the Internet and Wireless Technology." February 15, 2024. https://ivypanda.com/essays/telecommunications-the-internet-and-wireless-technology/.


Bibliography


IvyPanda. "Telecommunications, the Internet and Wireless Technology." February 15, 2024. https://ivypanda.com/essays/telecommunications-the-internet-and-wireless-technology/.

Powered by CiteTotal, easy essay referencing maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1