Reference no: EM131291688
Case Study: Wireless and Mobile Technologies
In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points to attract and retain customers.
Review this Article titled "Delta Named Top Tech-Friendly U.S. Airline", located here.
Use Internet to search articles on wireless and mobile technologies as well as the application in business. Select one company other than Delta which uses mobile and wireless technology.
Write a four to six page paper in which you:
1. Define wireless technologies and mobile technologies. Next, determine at least three ways which companies or organizations utilize such technologies to improve business efficiency.
2. Determine the wireless technologies and mobile technologies that Delta has implemented. Next, evaluate the level of efficiency of the technology implementation. Provide a rationale for your response.
3. Specify the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Next, evaluate the level of efficiency of such implementation within the selected company. Provide rationale for your response.
4. Give your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Justify your response.
5. Determine the operational and enterprise systems that support wireless and mobile technologies for each company. Provide a rationale for your response.
6. Use at least three quality references. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe the use of network management, Web, wireless, and mobility technologies.
• Compare and contrast operational and enterprise systems.
• Use technology and information resources to research issues in information systems and technology.
• Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.
Which industries will be most negatively impacted
: Which industries will be most negatively impacted by this action, and why?- Which industries (if any) might be positively impacted by this action, and why?
|
Estimating the modularizing code
: Imagine you are a part of a team that is tasked with writing a mobile application (app) that will allow users to send pictures to their friends. The manager does not want to waste time creating code modules. Describe at least one (1) advantage of ..
|
Evaluate the forensic psychology and risk assessment
: Evaluate the forensic psychology and risk assessment.Identify and describe the role and purpose of the report. Comment on whether the evaluation was or was not necessary. State the reasons for your opinion.
|
Development of applications in a clustered environment
: What advantage does the aggregate data model offer for development of applications in a clustered environment? How does aggregate orientation (i.e., the aggregate data model compare to the relational model? How do NoSQL databases differ from the rela..
|
Determine the wireless technologies and mobile technologies
: Determine the wireless technologies and mobile technologies that Delta has implemented. Next, evaluate the level of efficiency of the technology implementation. Provide a rationale for your response.
|
Transport layer protocol
: Transport Layer Protocol, provides server authentication, data confidentiality, and data integrity with forward secrecy (i.e., if a key is compromised during one session, the knowledge does not affect the security of earlier sessions).
|
Discuss a real world example of negotiation
: Discuss a real-world example of negotiation in terms of maximized joint value, bargaining weights, and a disagreement point?
|
Discuss how the social growth and development
: Discuss how the social growth and development in infancy are related to the development of the five senses (hearing, sight, taste, smell, and touch) and speech.
|
Computer operating systems that allows users
: Rlogin is a software utility for Unix-like computer operating systems that allows users to log in on another host via a network, communicating via TCP port 513. Rlogin is most commonly deployed on corporate or academic networks
|