StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Types of Technology in a Business Environment - Literature review Example

Cite this document
Summary
This review 'Types of Technology in a Business Environment' lookes into four types of technology which businesses will have to access if they want to be competitive in their industry. The technologies that will discuss in this paper will enable businesses to cut on labor and professional costs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Types of Technology in a Business Environment
Read Text Preview

Extract of sample "Types of Technology in a Business Environment"

? Types of Technology in a Business Environment My CIS 270 Business IT Application 11 September of My of My Types of Technology in a Business Environment Abstract There are several types of technology that can be used for business. Many of the technology are inexpensive and, yet, they are capable of multiplying the capacities and potential of an organization. Some of the technologies for business include the mobile computer, scanners/barcode/RFID devices, IP video systems, and Voice over Internet Protocol. The technology that will be available to business will increase in the coming years. Failure to take advantage of technology provides advantage to the competition. Types of Technology in a Business Environment Table of Contents Section Page Title Page Abstract 1 Table of Contents 2 1.0 Introduction 3 2.0 Mobile Computers 3 3.0 Scanners, Barcode and RFID Devices 4 4.0 IP Video Systems for Monitoring Operation and Security 5 5.0 Voice over Internet Protocol 6 6.0 Conclusion 7 References 8 List of Figure Figure Number Title Page 1 Mobile computer in action 4 2 Scanners as used for inventories 5 3 IP Video Systems 6 Types of Technology in a Business Environment 1.0. Introduction Technology is crucial for war, peace, business, and life. This is the reason why man has abandoned the technology of the bow and arrows to move on to the technology of the nuclear bomb. It is also the rationale why man has to improve his means of communication. Businesses prosper and become competitive only when the most advanced technology is used and life only becomes comfortable when the most advanced technology is tapped. Given the current economic environment of financial crisis where costs have to be tapered down and yet operational efficiency and power must be maintained, technology is a crucial part of the solution for business survival. It is therefore imperative to look into the types of technology that businesses can use to maintain competitiveness, efficiency, and survival if not profitability. In this work, I looked into four types of technology which I believe businesses will have to access if they want to be competitive in their industry. My impression is that the technologies that I will discuss will enable businesses to cut on labor and professional costs while making work and life easier for labor as they make the latter more productive. 2.0. Mobile Computers One type of technology which I consider has been significantly changing the way we conduct businesses are the mobile computers. Of course, we have witnessed how the laptop enabled an element of the work force to be productive wherever he or she may be. The laptop enabled the businessman to bring anywhere not only his or her organization’s business data but also the means through which data can be analyzed: accounting, financial, planning, and management computer software. A fairly recent development that can be used by businesses is in the area of mobile computers. According to BearCom (2011a, p. 8), the mobile computers are “making processes more efficient.” BearCom cited several success stories that benefitted from mobile computing. In particular, BearCom cited the case of Huntsman Corporation where “with real­-time wireless tracking of rounds activity, the number of pumps requiring daily inspections has been reduced by 50 percent---allowing more time for other crucial inspection areas” (2011, p. 8). Further, according to BearCom (2011, p. 8), with mobile computing “defect elimination work requests are now initiated in the field in real time.” In Figure 1 below, an application of mobile computing is shown where recording, computation of the bill and billing become part of a single step. Figure 1. Mobile computer in action Source: BearCom, 2011, p. 8 It is obvious from Figure 1 that with mobile computing, several processes of business operations can be reduced into a single step thereby reducing costs, promoting productivity, and enhancing efficiency. Obviously, there will savings. There are obviously savings in professional service fees but the adoption of the technology will have to depend on actual savings based on experience. 3.0. Scanners, Barcode and RFID Devices According to BearCom (2011b), another type of technology is comprised of scanners, barcode, and RFID devices. BearCom (2011b) reported that a recent development is that scanners have become more durable because, in the past, scanners only lasted six months. For BearcCom (2011b), the net result from adopting the barcode technology is “competitive advantage.” Although the texts of the BearCom (2011b) had largely pertained to the use of barcodes during national elections, in Figure 2 of the next page, it is clear that barcode scanners can be used to make quick inventories on the assets of business. Figure 2. Scanner as used for inventories Source: BearCom, 2011, p. 10 4.0. IP Video Systems for Monitoring Operations and Security IP video systems are being used by business today for at least two uses. First, IP video systems are being for monitoring company security. Second, IP video systems are also good for monitoring customer traffic, customer behavior, and the workforce efficiency. In short, IP video systems can be a fundamental foundation of managing business operations. They are inexpensive and, perhaps, one the best evidence of this is that, according to BearCom (2011c, p. 18), the key market of “continues to be the small and medium-sized business sector, where video surveillance offer a cost-effective way to monitor and protect their assets and employee.” IP video systems offer at least two advantages over other video systems. First, video footages are easily searchable because they can be stored digitally. Second, IP video systems have the capability to be configured to respond to specific events like “detection of motion after business hours” (BearCom, 2010c, p. 18). In many cities, video systems are widely used. For example, “there are more than 100 surveillance cameras” in the downtown area of Dallas (BearCom, 2011c, p. 18). This situation provides a possibility for linking IP video systems in an area for enhancing performance monitoring and safety promotion work. Figure 3 below indicate us exactly us widespread is the use of IP video systems in our cities. Figure 3. Source: BearCom, 2011, p. 18 Prospects are bright for IP video systems. For example, for BearCom (2011, p. 18) which was likely produced in early 2011, the next areas of breakthroughs in IP video systems are in “facial recognition and repetitive pattern.” The areas of breakthroughs are not only important for security but also for studying consumer patterns and identifying regular customers as well. 5.0. Voice over Internet Protocol Voice over Internet Protocol is perhaps the best example of “convergence” in technology (Biggs, 2009, p. 1). It has been legalized in many countries of Europe, North America, and Asia (Biggs, 2009). It is inexpensive. Biggs (2009, p. cited, for example, that in May 2008, it was only “USD 19 a month for unlimited local and long distance calling within the U.S., Canada, and Puerto Rico” Business firms operating locally or internationally and whose businesses depend largely on phone calls to customers, clients, and partners would likely benefit from the Voice over Internet Protocol. In addition to inexpensive calls possible with Voice over Internet Protocols, some of the other possibilities with the technology are “real-time translation”, ”multipoint-video conferencing”, training in which the trainers and trainees are in different places of the globe, gaming, and workshops conducted across several countries simultaneously. Biggs (2009, p. 13) has covered many issues associated with the Voice over Internet Protocol but has nevertheless remained optimistic. Elgebaly et al. (2006, p. 77) predicted “seamless collaboration” or “enabling the best” on hardware and software in the future. 6.0. Conclusion Overall, our discussion indicates that there is a wide range of technology that can be used as we move into the 21st century. In addition, more technologies will be likely available as we move closer into the 22nd century. It is necessary for business to maximize the use of all the technology available for profitability as well as competitiveness. Failure to use the technology will only provide an advantage for the competition. References BearCom. (2011a). Making processes more efficient with mobile computers. In: BearCom, Today’s Wireless World (pp. 8-9). Dallas: BearCom. Retrieved: http://bearcom.com/source-library/TodaysWirelessWorldMagazine-2011WirelessTechnologyReport.PDF BearCom. (2011b). Advanced data capture/RFID devices: Putting the rugged back into barcode scanners. In: BearCom, Today’s Wireless World (p. 10). Dallas: BearCom. Retrieved: http://bearcom.com/resource-library/TodaysWirelessWorldMagazine-2011WirelessTechnologyReport.PDF BearCom. (2011c). Video surveillance systems to take a bite out of crime. In: BearCom, Today’s Wireless World (p. 18). Dallas: BearCom. Retrieved: http://bearcom.com/resource-library/TodaysWirelessWorldMagazine-2011WirelessTechnologyReport.PDF Biggs, P. (2009). Voice over internet protocol: Enemy or ally. GSR Discussion Paper 2009. Elgebaly, H., Adrangi, F. Muralidhar, R., Ramachandran, L., and Nair, Manish. (2006). Seamless collaboration-Enabling best-in-class VOIP experience in Intel, Centrino Mobile Technology. Intel Technology Journal, 10 (1), 77-87. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology Used in the Business Environment Research Paper”, n.d.)
Technology Used in the Business Environment Research Paper. Retrieved from https://studentshare.org/information-technology/1431538-technology-used-in-the-business-environment
(Technology Used in the Business Environment Research Paper)
Technology Used in the Business Environment Research Paper. https://studentshare.org/information-technology/1431538-technology-used-in-the-business-environment.
“Technology Used in the Business Environment Research Paper”, n.d. https://studentshare.org/information-technology/1431538-technology-used-in-the-business-environment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Types of Technology in a Business Environment

Important certifications / Eight types of people responsible for security

It mainly targets business processes instead of technology.... Important certifications / Eight types of people responsible for security Important certifications / Eight types of people responsible for security Author Author's Affiliation Date Essay 1 Question 1: What are some of the most important certification programs available to network security professionals?... Essay 2 Question 2: Describe the eight types of people responsible for security in an...
3 Pages (750 words) Research Paper

Business Environment: Macroeconomics Parameters

Others macroeconomic factors like production, inflation, employment, investment, domestic income, international business relationships, etc are discussed in Macro Economics.... The author examines macroeconomic parameters such as employment rate, GDP, GNP, PPP (Purchasing Power Parity), etc....
12 Pages (3000 words) Assignment

Analysis of Two Learning Environments

The problem-based learning design therefore integrates the two types of education.... When we talk of learning environment, a lot of research has been done on this topic whereby it has been found out that children learn in a variety of ways.... hellip; However different ways in which a child learns is partially related to the type of learning environment available.... In addition to this the learning environment may also affect the child's ability and motivation to learn....
12 Pages (3000 words) Essay

Literature Review on Web3D Technology

The literature review described will be based on the current trends and specifications of the concept of 3D as well as how this is changing specific concepts in terms of technology.... The Web 3D application is not only important to consider in terms of technological components for the Internet, but also becomes essential to understand with responses and the environment that is being created for end – users that are introduced to Web 3D.... One of the evolutions that are currently taking a strong space within programming and the This particular technology is beginning to transform the way that the Internet and various platforms are used and are looking at and are creating a different approach to programming and specific applications (Basanow et al, 65)....
15 Pages (3750 words) Essay

The Duration of Technology Licensing

In the mination of the actual technology transfer charge and the actual duration of the charge, certain factors such as the type of technology, the type of industry and competitive environment contribute to the consideration of the appropriate charging method.... s mentioned above, the two types of contracts widely employed in licensing innovation to companies include fixed-fee and royalty payments.... Licensing of the innovation during the usable duration of time that the producing company benefits for the technology introduces a difficult… In licensing, the factors that influence the cost and time allocation for the innovation form part of the technology transfer decision, two of the main ones including fixed fees and royalties....
4 Pages (1000 words) Research Paper

Virtual Workplace Environments

hellip; According to the research findings, it can, therefore, be said that now is a new age of technology that has minimized the distances among distantly located workplaces.... This paper presents a detailed overview of virtual workplace environments as a new paradigm of the business and organizational working environment.... Now there is a new term of Virtual workplace environment that incorporates the facilities of collaborative working among people those are located at remote locations....
12 Pages (3000 words) Research Paper

Wireless Technology Security and Its Types

This essay "Wireless Technology Security and Its Types" discusses three main types of wireless networks and types and security protocols namely, Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN).... With the integration of WiFi in some electronic consumer devices and the highly efficient power consumption of Bluetooth technology, the popularity of WPAN is growing (Pahlavan & Krishnamurthy, 2009)....
6 Pages (1500 words) Essay

Cloud Computing and Three Service Types

… Cloud computingApril 22, 2012IntroductionThis report is intended for the board of business.... It explains the concept and service models of cloud computing, highlights how the company can feasibly make use the cloud services, and outlines the potential Cloud computingApril 22, 2012IntroductionThis report is intended for the board of business.... The National Institute of Standards and technology has described IaaS, SaaS and PaaS as service model of cloud computing (Mell & Grance, 2011, p....
14 Pages (3500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us