StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Embedded System for Universal Interactions - Case Study Example

Cite this document
Summary
The paper "Embedded System for Universal Interactions" is a wonderful example of an Information Technology Case Study. Following the introduction of computer technology, is various impacts in the modern world. This invention has developed the world through communication, through the introduction of Information Communication Technology, industrial development. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful

Extract of sample "Embedded System for Universal Interactions"

Car Smart-Lock Name: Institution: Executive Summary Technological advancement in the present world through the introduction of computer technology has significant impacts on the people. These impacts can be either positive or negative depending on the services provided. One of the discoveries through the computer system is the car smart-lock technology, which uses the principle of Bluetooth technology. Through this invention of car control technology by Amazing Ideas Group, car owners are capable of controlling their automobiles through various technologies such as mobile phones and internet services (Gerald, 1991, pp71). This helps the users in saving time in checking their automobiles, as they are able to perform such operations anytime in any location. In the present world, one of the challenges that people face in daily life is the rapid population growth. Through this rapid growth, it resulting to unemployment as most of the people is unable to get jobs due to fewer job opportunities. Therefore, using car smart-lock technology, car users are able to provide maximum security over their cars, hence, help in reducing automobile thefts. On the other hand, through the introduction of this form of technology, it is essential for developers and designers of the invention to choose the appropriate market that would help them market their services to the people. Moreover, car users who are attractive in this form of technology must make sure that they are aware of some of the demerits of this form of technology in order to be prepared for the challenges. Table of Contents Introduction 4 Thesis 4 Background Information 5 Operation of the System 6 Target Market 7 Importance of the System 9 Demerits of the System……………………………………………………. ................................11 Conclusion…………………………………………………………………………………..…...12 References…………………………………………………………………………….………...13 Introduction: Following the introduction of computer technology, is various impacts in the modern world. This invention has developed the world through communication, through the introduction of Information Communication Technology, industrial development as computers are used in driving and controlling heavy machinery in industries (L, 2004, pp88). Apart from communication, the invention has also improved education sector, where students can learn and do their researches online. Moreover, through the invention of the computers, banking services have been made easy as transactions can be done online through mobile phones or thorough other banking services such as Automated Teller Machines (ATMs), which allow bank account holders to access banking services easily without going to banking halls. Although computers were invented many years ago in some countries like China and Japan, there are still many discoveries that are being invented through the use of computers. Therefore, it is essential to encourage use computers to in order to have trouble-free sessions in performing daily activities. Thesis: Security is one of the fundament aspects that one needs to consider in order to provide maximum protection over him or herself or against properties and information transmitted from one location to another. Through the invention of computers, this security protection has been taken care of in many ways. This is discovered through the internet during transmission of information from one location to another. Therefore, in order to come up with more discoveries in order to provide maximum-security using computers, we students, through the research, discovered the use of Bluetooth technology in locking and unlocking of cars known as Home Smart-Lock (Huber & Huber, 2004, pp120). This technology gives car owners the opportunity to either lock or unlock their cars when in a different location. It is better for it to be introduced in the market in order to provide more security to the people. Therefore, through the organization, Amazing Ideas, there is high demand to introduce this form of technology into the market and attract many clients to use the technology. This is to be achieved through choosing one of the target markets such as China in order to do the marketing, provide in details how the system works and operates, provide some of the application areas, and give some of the merits and demerits of using the system. Moreover, to provide various challenges in developing the system in order to show how the system can be maintained. Background Information of Home Smart-Lock: In the modern days, internet and related electronic devices have become common and helps in conducting various activities. Through internet invention, it has led to the introduction of Bluetooth technology that facilitates car smart-lock, which operates through wireless services. Therefore, through car smart-lock, car owners are capable of controlling their cars via wireless technology at far distances without the use of the car keys. The car owners will have the chance to control the locking and unlocking of their cars online using this technology (Coleman, 1998, pp130). Therefore, they will be required to have mobile phones, which are Bluetooth enable in order to accept wireless settings. In the absence of mobile phones, the operation can also be controlled through internet services. Internet technology is the technology that facilitates communication through a given media and helps in passing given information from one location to another. Because internet technology operates under electronic devices, the information passed is through electronic signals. Therefore, in the use of internet technology in using the car smart-lock, car owners will be required to create an online account, having their user names and secrete passwords through the internet. With the help of the usernames and passwords, owners of automobiles will have the opportunity to control the process of locking and unlocking of their cars online, without having personal contact with their cars. Internet technology is used, in order to maintain security on the access of their information. Therefore, they need to secure their secrete passwords and usernames in order to prevent unauthorized people from controlling their cars (Huber & Huber, 2004, pp120). This problem of unauthorized access resulted due to increased numbers of hackers who may hack private information to either for gain or pleasure. Consequently, it is advisable for the car smart-lock users to use alphanumerical passwords, passwords, which contain both longer characters and numbers in order to reduce chances of hacking processes. Moreover, in case the passwords and user names are to be sending to their close partners, they need to encrypt the information in such a way only the recipient can interpret the information. Through this process, it will hackers difficult time in knowing the information in order to get access to the cars. Operations of Car Smart-Lock: This form of technology operates by the use of computers connected through the internet or mobile phones that have Bluetooth settings. Therefore, in order for the device to be connected through the internet, at the side of the device is the blinking part that shows the activation of Bluetooth device (Howard, 2012, pp1). Apart from the Bluetooth, the device also has an inbuilt operating system that allows the installation of various programs in the device in order for it to operate as required. Therefore, this is another device that can be used instead of the computer or phone. These programs make easy for designers to modify the devices in order to provide better services to the users. Another component connected to the device is wireless locks, which is placed, in the car. Therefore, through that deadbolt the system can be able to operate. During the installation of the system, wireless car locks are placed in the car doors. Therefore, in the use of computers in controlling the process of locking and unlocking the car door, it will require the car owners to log in through their accounts in order to operate the system (Barboza &b Bradsher, 2012, pp1). This is a much secure and appropriate method to use because it can be done anywhere using different computers, as long as the car owners is connected to the internet. Therefore, in dealing with computers in a public place like cyber cafe, it is essential for the car owners to log off their accounts after operating their cars. Failure to log off may allow the second party who may use the same computer the opportunity to access services and be able to control the car. In order for the wireless car smart-locks to operate, the user will be required to signal the wireless car door lock to open and communicate through the wireless bridge through the compute or the phone used. This is done through sending of signals to the car door in order for the car door to open (Gerald, 1991, pp79). This process is the same when one wants to lock the car doors. Therefore, this process of locking and unlocking of the car depends on the wireless door lock. For instance, if the process is successful, one would be required to open a website in order to make the system more available for the family as they can access the services through the website in your presence. When one has a website, he or she can be able to help his close partner in accessing the car because the car owner can control the car through the website. The Target Market (China): For any business organization to develop and penetrate into the international market, choice of market needs to be one of the major factors to be considered. This is the process of deciding the place to market and sell the services of the organization. During the emergence of new services in the market, various factors should be considered for success. For instance, the location, the country or place, in which such services are, required (L, 2004, pp90). Therefore, as Amazing Ideas Group, in order to introduce car smart-lock, one of the best countries that are suitable for these services is China. First, China is one of the leading countries in automobile development. Therefore, some of the materials used in the development of the car smart-locks are readily available, and the processes of developing the devices are cheap due to cheap labor and availability of designers of the device. Apart from the availability of designers, population of China stand a better chance of attracting many clients for the services, resulting to better sales. According to the current statistics of China, in every five people, there is one owning a car, therefore, due to the population of people having cars, there is demand for the automobile security, making the technology of car smart-lock one of the best business in the region (Huber & Huber, 2004, pp234). Another factor that makes China the targeted market for the Amazing Ideas Group is based on the population growth of the region. High rate of birth rate in China has resulted to high population. The presence of high population in the region symbolizes high rate of theft practiced in the region in order to make all ends meet. Therefore, because the number of people owning cars in the region is high, there is high demand for the car smart-lock technology to be introduced in order to guarantee security, as automobiles are concern. Through investing in China as the target market for Amazing Ideas Group, the organization will be able to attract many clients into their services as most of the people in the region own cars. Therefore, through the system, they will be able to protect their cars. The region, under the leadership of the government, has the opportunities of introducing new ideas and development into their country in order to be one of the developed countries in the world due to the industrial development in China (Coleman, 1998, pp178). Consequently, they have better rules and regulations that govern business environment such as cheaper registration fees among other. When Amazing Group ventures in such country, it will be able to have time in penetration into the international market and have better sales of services. Moreover, the organization will have easy ways of operating in such countries due to low taxations and availability of raw materials for making the devices. Thus, it is better for any upcoming organization that wishes to introduce any new products or services in the market like the Amazing Ideas Group to consider these factors in order to have better chances of maintaining their services provision. Therefore, it is better for the organization to use some of the ways of introducing new services into the market in order to attract the attention of the public. For instance, the Amazing Ideas Group has come up with various advertisement methods that will be used in introducing the system into the market. Some of the advertisement techniques to be used are use of billboards that will show the importance of the system in the society (Howard, 2012, pp1). They will provide some free installation of the devices on various cars in order to prove their services to the people. Moreover, the organization is has the plan of providing cheaper services to their clients for them to attract more in the business in order to realize better sales as the system is new in the market. In addition, the organization also has plans of collaborating with various automobile companies. Through this, other organizations will be able to buy their services at cheaper prices in order to develop vehicle with the car smart-locks already installed. Therefore, through these plans, Amazing Group will be able to have better development in the car industry. Importance of Car Smart-Locks: Car smart-locks are extremely beneficial to the users due to various reasons. For instance, with this technology, users have the opportunity to reduce chances of car thefts because they are able to control their automobiles from any location provided they can access the internet. Therefore, the users are able to check the conditions of their cars whenever they feel like (Barboza &b Bradsher, 2012, pp1). Another importance of the Bluetooth technology in control cars through car smart-locks is the ability of the car owners to trace and locate their cars in case of car theft. This may be resulted due to providing information to other people who may have the desire of owning the car. In such cases, car owners, through their websites or phone can be able to locate the location of their cars and be able to switch off the engine. Therefore, this reduces chances of car theft in the modern world. Another importance of this form of technology is that the process helps in saving time as compared to the manual system of car operation. For instance, in case the owner of the car is at work and there is a valuable document in the car that need to be accessed by the family at home, he or she will just operate the car without having to go home in order to provide keys for the car to the family. Through this, it helps in time saving because controls of the car are conducted online, therefore, carters for the time that could have been consumed through travelling (Gerald, 1991, pp83). The use of car smart-lock is also significant because it reflects the current technology, representing wireless world, which leads to the reduction of effects of global warming in the world. This form of technology uses internet as the key element of the process, therefore, has minimal effect on the global technology, hence, stand the best chance to be used by the car owners. Moreover, another advantage of the car smart-lock technology is that in the absence of internet services and power failures, cars still operates under the manual system, making the system multipurpose and not restricted to some use. Demerits of Car Smart-Lock Technology: Apart from the importance, this form of technology also has various disadvantages that need to be considered in order to use the system. For instance, the system operates under the control of computers and internet service, therefore, anyone interested in the technology must be computer literate in order to be able to use the system (L, 2004, pp92). Hence, computers illiterates interested in technology will have to learn how to operate computers before they start using the system. Internet is another factor that should be considered in order for the system to operate as expected. The internet technology also depends on some of the networking services to operate, therefore, in case of these network failures, accessing car smart-lock services would be difficult forcing car owners to use the manual system during the time, hence, not good in the absence of internet services. Computers are electronic devices that require some form of energy to operate. In the absence of electricity, it would be difficult to operate these computers, as they will lack the power to function. This is disadvantageous to the car smart-lock users because the technology operates under the influence of electricity making it difficult to control their cars during power failures. The use of internet services in car smart-lock technology is not suitable due to rampant hacking processes in the Information Communication Technology (Huber & Huber, 2004, pp205). Through communication technology, presences of hackers make it difficult for car owners to keep some of their private information such as usernames and password. This is because theses hackers use their skill in obtaining this information, making the information be unsecure. Therefore, it is advisable for the internet users, who use internet services in control their cars to come up with proper measures of protecting their information. This can be achieved through keeping the information secret and only disclosing the information to the authorized people. Moreover, they should come up with longer usernames and passwords in order to for these internet frauds to be prevented. Conclusion: The introduction of computer technology is beneficial in the modern world because it has resulted to various technologies that have changed the world in various ways. Through computers, people are able to perform various tasks faster at a cheaper cost, which resulted to high quality services. These qualified services are significant because they help various organizations to provide better services to the people (Howard, 2012, pp1). By introducing the car smart-lock by Amazing Ideas Group, it will help in solving various issues such as car thefts, as the system will provide the user with the opportunity to locate the car through the system, time saving as the system users will have the chance to control and operate their automobile in any place. Moreover, the system is significant because it allow users to use both manual and the computerized systems, therefore, in case of failure in one system they will still be able to control their cars, and the only different is that the manual system provides direct contact with the car. References: Gerald W. Grumet, 1991, ‘Tyranny of the Obsessional Character’ Psychological Reports, 68, 1, pp. 71-93. L, Iftode, 2004, ‘Smart Phone: an embedded system for universal interactions’, IEEE Xplore, pp. 88-94. Huber, Alexander, Joseph, Huber, Josef, Franz, 2002, Umts and Mobile Computing, London: Artech House. Coleman, Ron, 1998, Carsmart: Save Hundreds on Car Repairs and Avoid Rip-Offs, New York City: Autowise Publishing. Howard, Bill, 2012, Ford smart car locks your phone when you’re stressed or distracted, media Release, 4 July, Viewed 25th September 2012, http://www.extremetech.com/extreme/132247-this-smart-car-locks-out-calls-and-texts-but-only-when-it-senses-heavy-traffic Barboza, David, Bradsher, Keith, 2012, Riot at Foxconn Factory Underscore Rift China, media release, 25 September, Viewed 25th September 2012, http://www.nytimes.com/pages/technology/index.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Embedded System for Universal Interactions Case Study, n.d.)
Embedded System for Universal Interactions Case Study. https://studentshare.org/information-technology/2079812-home-smart-lock
(Embedded System for Universal Interactions Case Study)
Embedded System for Universal Interactions Case Study. https://studentshare.org/information-technology/2079812-home-smart-lock.
“Embedded System for Universal Interactions Case Study”. https://studentshare.org/information-technology/2079812-home-smart-lock.
  • Cited: 0 times

CHECK THESE SAMPLES OF Embedded System for Universal Interactions

Why They Kill by Richard Rhodes: analysis in regard to gender and class

Clients Name ... ame of Professor ... ame of Class ... ate ... hy They Kill: Analysis in Regard to Gender and Class ... The book Why They Kill is a discussion of the theories of Lonnie Athens and the way in which he developed those theories about violence.... .... ... ... Clients Name Name of Professor Name of Class Date Why They Kill: Analysis in Regard to Gender and Class The book Why They Kill is a discussion of the theories of Lonnie Athens and the way in which he developed those theories about violence....
8 Pages (2000 words) Book Report/Review

Mind-body Interaction Involving Systems Thinking

Daoism practice is connected with the traditional Chinese medical theory that views the body as 'a complex system of interacting energy circuits'.... Taking into account historical analysis it is possible to say that the significant contribution to the theory of mind-body interaction was made by Descartes, who in the 17th century introduced a dualistic ontological system explaining that a universe of mental substances and physical substances are closely connected....
12 Pages (3000 words) Essay

The Mobile Operating System

The paper 'the Mobile Operating system' seeks to explore the mobile industry, the fastest evolving segment both technologically and economically.... The author explains that the operating system of the mobile phone is the key to all functional aspects and user satisfaction.... All elements of signal diversity and volume, speed, and ease of use are dependent on the operating system.... All these are resource intensive and successful operation, to the satisfaction of the user and optimal use of the mobile networks depends largely on the protocols controlling data management and negotiation with the network, that is an integral part of the mobile's operating system....
8 Pages (2000 words) Dissertation

United States Uniform Personnel Identification System

The major study of this thesis paper is to guarantee an impregnable security of the citizens of the United States of America through the introduction of unique Identity Cards displaying biometric holograms and microchip identifiers conjoined with the implementation of the.... ... ...
35 Pages (8750 words) Thesis

LINGUISTICS - Discuss the role and status of pidgin and creole languages in post-colonial contexts

Although animals similarly have communication systems that enable them to interact with their species, the communication systems of animals do not possess the richness and.... ... ... (Deacon, cited in Harley, 2001, p.... 50) Thus, language is “so uniquely human, distinguishing us so clearly from other animals, that our species might be more appropriately named homo loquens than homo sapiens” (Widdowson, 1996, p....
21 Pages (5250 words) Essay

Sociocultural and Ecological Human Developmental Theories

He focused on the cognitive development of children which he believed is achieved through social interactions with parents, teachers, peers, and more knowledgeable persons.... An author of this essay "Sociocultural and Ecological Human Developmental Theories" will analyze the sociocultural and ecological theories of human development....
6 Pages (1500 words) Term Paper

Symbols in Eastern Religions: Hinduism, Buddhism, Taoism

This is a universal law of life.... 'Religious experiences are expressed through symbols and these symbols are embedded in these practices' (Cacho, 2007).... This report "Symbols in Eastern Religions: Hinduism, Buddhism, Taoism" discusses the value of symbols represented in Eastern religions as Hinduism, Buddhism, and Taoism that is extremely important....
9 Pages (2250 words) Report

Business Information System

However, the definition is still not universal because the essence of the 'systems' concept was used only to some extent thus loses generality.... As the paper "Business Information system" tells, the term information systems are interpreted based on a specific purpose.... The information system is a logical and physical interaction between hardware, software, data, information, communication, applications, and people.... The majority of textbooks according to Mora (2003), refer to some system concepts such as input/output procedures, control mechanisms, and open systems that are all non-standard definitions of the term....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us