M-Global Executive Summary

Great Essays
INTRODUCTORY SUMMARY The internet of things is a global infrastructure for technology, enabling services by connecting things based on existing and evolving information and communication (Brown, 2015). After checking useful websites and reviewing books and articles, I recommend M-Global should include a new department for internet of things. The department will conveniently manage our technological connections as well as improve communication with other companies and government agency’s equipment. This report highlights advantages and disadvantages of the new department, costs, and facts about the current and future of the internet of things.

USAGES The five main usages of internet of things would be the following: Optical Tags and Quick Response Codes, Bluetooth Low Energy, RFID and Near-Field Communication, Wi-Fi, and Li-Fi. Optical Tags and Quick Response Codes (QR codes) A useful example of internet things includes the low cost tagging method offered by Quick Response codes. These codes can be used anywhere from newspapers, magazines, coupons, and billboards. They utilize the high resolution cameras found in modern smartphones. The QR code is decoded using image-processing techniques yielding a number, text or URL (Brown, 2015). The internet of things department could help create QR codes to manage the specifications as well as keeping track of our equipment. In addition, on advertisements, we can place a QR code to allow clients to easily access our website and contact information without having to search or type it in manually. Even though the technology offers many benefits, it offers poor customer response because of the additional preinstalled app the user would need in order to decode the code. Additionally, clients will have to position their phone so their camera can focus to read the QR code, which stands as an inconvenience to some individuals (Brown, 2015). Even with these disadvantages QR codes continue to thrive in our community. Bluetooth Low Energy (BLE) Internet of things enables devices to utilize bluetooth, a powerful tool that can connect multiple devices together. It is a powered tag that relies on batteries at low energy consumption. Currently, BLE costs under $5 and it is likely to drop further and it is advertised to operate for up to one year using a lithium coin cell battery (Brown, 2015). Having an internet of things department will allow M-Global to manage all their bluetooth devices as well as keep track of what devices are connected to each other. In addition, bluetooth offers a convenient method to transfer files to other employees and clients. The only challenge with bluetooth, however, would be the range. To connect to another device with bluetooth low energy the devices must be within 10 meters of each other (McCarthy, 2015). Thus, bluetooth is an effective method for mainly meetings, conferences, or other situations where devices are close together. RFID and Near-Field Communication (NFC) One of the simplest internet of things technology is near-field communication (NFC) and radio-frequency identification
…show more content…
Wi-fi provides long range allowing multiple devices to connect to its network. It is also a secure and reliable infrastructure that has lasted for sixteen years so far (Malik, 2015). M-Global requires wifi in order for the company to function and communicate with employees as well as clients. The internet of things department could manage our wifi routers as well as the bills that come with it. This would help us divide our labor efficiently by category instead of having the financial department manage all our finances. The primary disadvantage of wi-fi comes with its cost, since it battery powered and the company needs to pay fees charged by a carrier. Despite the main disadvantage, wi-fi is essential for every company if they would like to connect with clients or other …show more content…
Employees will need to ensure clients their information is safe when connecting to our new technology. M-Global must also employ security tactics to ensure our company’s confidential information is not in danger. In addition, M-Global must ensure that no one else is reading the sensor data, so technologies like NFC, RFID, as well as Li-Fi can prevent the spread of private information from being leaked because the devices must be in the same room as the technology in order to connect. There will always be the issue of security as new technology is created, but employing good security practices will prevent potential

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 2 Case Study

    • 177 Words
    • 1 Pages

    The next challenge would be to determine if the budget allows an upgrade from WEP to WPA2 in order to protect the company’s data. WPA2 being the best and may not be available on current equipment. Most small business do…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CSE 543: Individual Report

    • 1293 Words
    • 6 Pages

    Implications of IoT in Health-care Data Security CSE 543 – Individual Report Nishtha Punjabi Computer Science (MCS), Ira A. Fulton School of Engineering Arizona State University, Tempe, AZ, United States npunjab1@asu.edu Abstract— As society increasingly relies on digitally stored and accessed information, traditional information security technologies, policies, management and practices are found more and more limited in satisfying the security and assurance needs of modern information systems and applications. Incorporating new technology into the healthcare organization’s processes is risky because of the potential for patient information being disclosed. The Internet of things (IoT) is the inter-networking of physical devices, vehicles…

    • 1293 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    First responders (police officers, firefighters, paramedics) are not intrinsically mobile. They have traditionally relied on brick and mortar institutions as the brains of their operations and only left these buildings to respond to emergencies. Radios were, and continue to be, the primary source of communication; relaying information from computing resources found within the office to officers in the field. However, the evolution of mobile technology has increased the autonomy of first-responders in the field, with nearly all emergency vehicles now equipped with on-board computers. Nonetheless, the capabilities of these devices remain limited and first-responders are still tethered to their vehicles and radios for decision-making.…

    • 1415 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The FCC, with Ajit Pai as the current chairman, is trying to repeal the Title II net neutrality regulations. “At the May 18, 2017 Open Commission Meeting, the Commission adopted a Notice of Proposed Rulemaking that proposes to restore the Internet to a light-touch regulatory framework by classifying broadband Internet access service as an information service and by seeking comment on the existing rules governing Internet service providers' practices” (FCC Initiatives). Broadband providers are currently classified as common carriers under Title II regulations. A Title I classification classified providers as information services, which allowed information service providers to get away with doing some scummy things. For example, even while classified…

    • 692 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Movistar Mexico Case

    • 498 Words
    • 2 Pages

    The recommendations for Telefonica Movistar Mexico and regarding the information, the company is composed not only of the internal employees, they are composed of other teams and providers, all the employees have goals to achieve but as normal employee you need the be support for your providers or partners, so is important to include the external people in the evaluations to review that the evaluation is 360 grades in spiral. Movistar can request this new evaluation in the success factor module to measure them and complete the scene. In other aspects, the “go-to-market strategy” will be good during 2011 to 2014 because Movistar became the first in launching new technology and offers to customers, but sometimes you need to aggressive in the…

    • 498 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Introduction: Technology has definitely changed the last century. However, the last 10 years technology has made a dramatic change. In just 10 years, our nation has gone from house phones to smart phones. Our smart phones can almost do as much as our laptops. Social networking has become the rage to the way we communicate with each other.…

    • 606 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. Where did the idea for your grant program come from? I understand that getting a business idea off the ground is difficult for young students or entrepreneurs. Some young minds have amazing ideas, but the state of the economy would not allow them to save enough money to get started. Even the $500 that I give to some grantees have went a long way.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In a world that we live in, highly involved with internet connections for all the parts it plays a role in, uses efficient methods and management to make it no surprise that technology is the base of future. Technology is the collection of tools that make the exchange of information easier to use, create, and manage its…

    • 58 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    After viewing all the videos I am left with mixed emotions. On one hand, I believe privacy is very important. On the other hand, I believe surveillance is important but invasive at the same time. I will analyze the three videos and their implications in a political, social, cultural, economical, environmental, and ethical view.…

    • 989 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays