Free Essay

It 242 Individual Voip Case Study

In: Computers and Technology

Submitted By thecaptian88
Words 379
Pages 2
Individual Assignment: VoIP Case Study
IT-242
Instructor:

For this assignment I found one of the markets leading VoIP, IP and legacy systems wholesaler distributer and integrator Metaswitch- http://www.metaswitch.com/. Metaswitch has the ability to bring together legacy internal communications systems alongside new VoIP technologies that allow huge amounts of business to be generated and grown upon for carriers and communication service providers. For this case study I chose a company that is based in the state of New Mexico Plateau Wireless- http://www.plateautel.com/index.asp , with the case study of their integration with Metadata software and technologies- http://www.metaswitch.com/sites/default/files/Metaswitch-Case-Study-ENMR-Final.pdf . The need for Plateau to grow into offering more services is the real reason for them to take their legacy PBX system and merge it and grow it into a hybrid system that is more application and software based with VoIP. Plateau services over 13,000 hard lines for clients as well as moving into wireless communications and being the first to bring FTTH to New Mexico residents (which they don’t have for my area =(). Plateau was sold on Metaswitchs technology which allowed a cheap way to setup the companies growing customer base with the seamless integration of the Metadata soft switch and its ability to adapt and grow to Plateaus Fiber, Wireless and landline needs. Of course being that the basis of the softswitch is for VoIP, standard VoIP services are now able to be sold and supported which have all of the perks including E-mail and text voicemail scripts, call forwarding to cell phones, call forwarding to voicemail and on and on in an area I can say is not huge on its Carrier or ISP support in this field. Overall I see that VoIP allowed Plateau to expand and grow its business with very little cost and future maintenance by shifting away from traditional PBX systems and creating a hybrid system that allows a diverse range of products to be offered to its service area. Hosted VoIP allows you to minimize PBX hardware and eliminates the need to maintain idle telecom circuit capacity. A PBX with VoIP means that other apps can interact with it in the same service.

Similar Documents

Free Essay

Internet-Value-Chain-Economics - at Kearney

...Internet Value Chain Economics Gaining a deeper understanding of the Internet economy W hen considering the technological innovations of the past 50 years, the Internet is probably the one that has had the greatest impact on everyday life in developed economies. Nearly six out of 10 Americans now shop online and more than four out of 10 bank online. Twenty hours of video are uploaded to YouTube every minute, while 5 percent of all time online is spent on the social networking site, Facebook. The Internet has also changed the way in which businesses operate—today, 64 percent of C-level executives conduct six or more searches per day to locate business information. The Internet has been a source of great good—as evidenced by the role played by Internet-based mapping and communications in the relief effort following the recent Haiti earthquake. The Internet also has shown a negative side—more than 97 percent of all emails are spam, while more than 70 percent of Americans fear online identity theft and 57 percent feel that their personal privacy has been greatly diminished by the Internet.1 Behind these statistics and headlines, however, there remains a low level of understanding of how the Internet economy works. Who are the different players involved in the Internet, beyond the flagship names? How is the industry structured and how concentrated is it? How do players make money and how do revenues flow across the value chain? Is the industry attractive in terms of growth...

Words: 12241 - Pages: 49

Premium Essay

Voice, Video, Network

...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...

Words: 125371 - Pages: 502

Premium Essay

Map Hindustan

...other Internet-connected devices. Answer: TRUE Diff: 2 Page Ref: 224 AACSB: Use of IT CASE: Comprehension 2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. Answer: TRUE Diff: 2 Page Ref: 224 AACSB: Use of IT CASE: Comprehension 3) Viruses can be spread through e-mail. Answer: TRUE Diff: 1 Page Ref: 224 AACSB: Reflective Thinking CASE: Comprehension 4) The term cracker is used to identify a hacker whose specialty is breaking open security systems. Answer: FALSE Diff: 2 Page Ref: 228 AACSB: Use of IT CASE: Comprehension 5) To secure mobile devices, a company will need to implement special mobile device management software. Answer: TRUE Diff: 3 Page Ref: 248 AACSB: Use of IT CASE: Comprehension 6) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. Answer: TRUE Diff: 2 Page Ref: 225 AACSB: Use of IT CASE: Comprehension 7) Computer worms spread much more rapidly than computer viruses. Answer: TRUE Diff: 2 Page Ref: 226 AACSB: Reflective Thinking CASE: Comprehension 8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: TRUE Diff: 2 Page Ref: 228 AACSB: Reflective Thinking CASE: Comprehension 9) Sniffers enable hackers to steal proprietary information from anywhere...

Words: 5826 - Pages: 24

Premium Essay

Organizational Business

...China Mobile Organizational Behaviour BUS1020 Professor: Anna Bortolon December 9, 2015 Table of Contents Page Number Executive Summary 2 Statement of Research Questions 3 Company Background 5 Decision Criteria 5 Analysis of Situation 7 Alternatives 9 Recommendation and Conclusion 11 References 12 Executive Summary As the leader in China’s telecommunication industry, China Mobile should meet its consumer needs, however with customer expectations continuing to grow at an astounding rate, they organization has been struck with issues that stem from poor organizational management and behaviour (Hickie, 2012). Customer dissatisfaction and lack of customer loyalty has been a problem experienced by the organization stemming directly from a lack of employee satisfaction. To solve this problem the group has asked, “How can China Mobile increase its customer service satisfaction and in turn increase its customer loyalty?” Using the concepts and principles of organizational behaviour, the research questions have been analyzed resulting in recommendations and alternatives to overcome the issue. Job satisfaction, a reward system, goal setting and a change in organization culture is seen as the effective strategies in which to overcome employee dissatisfaction. Of these concepts, the reward system will best be applied to the organization. Outlined in the following document is our analytical...

Words: 2934 - Pages: 12

Premium Essay

Managing Information Technology (7th Edition)

...CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 ...

Words: 239887 - Pages: 960

Premium Essay

Churn Management

...Perspective Telecommunication Industry in Bangladesh Perspective Telecommunication Industry in Bangladesh Managing Churn in a Hypercompetitive Market Managing Churn in a Hypercompetitive Market Submitted to Farhana Sehreen Lecturer Department of Marketing Jahangirnagar University Submitted by Belal Hasan ID no. 1336 Session: 2009-10 Department of Marketing Jahangirnagar University Date: 12 September, 2013 August 16, 2013 To Farhana Sehreen Lecturer Department of Marketing Jahangirnagar University Subject: Submission of internship proposal Sir, I am glad to submit the internship report proposal on “Managing the churn in hypercompetitive market in Telecom Industry” as a requirement of internship program for the fulfillment of BBA Program In this report I would like to focus on strategies and application, execution model, current attack and defense to hold their position in perspective to other operator. I would like to scrutinize collect information for the report. I hope that the preparation of the report will help me to acquire knowledge about real life practice and help me in future. I will try to enhance my knowledge and make satisfactory report. I shall be happy to provide with any explanative information and clarification that might require. I hope that my potentiality will reach up to the mark of your expectation. Yours Sincerely Belal Hasan Introduction “Churn” is a common phenomenon that occurs in telecom industry...

Words: 8796 - Pages: 36

Premium Essay

Essentials of Management Information Systems

...this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these machines were being overwhelmed by malware (malicious software). Like any sports franchise, the Celtics are on the road a...

Words: 21009 - Pages: 85

Premium Essay

Telecom Industry

...ANNUAL REPORT 2010-2011 Department of Telecommunications Ministry of Communications & Information Technology Government of India New Delhi ANNUAL REPORT 2010-11 DEPARTMENT OF TELECOMMUNICATIONS MINISTRY OF COMMUNICATIONS & IT GOVERNMENT OF INDIA NEW DELHI CONTENTS I. II. III. Indian Telecom Sector: An Overview ...................................................................................1-14 Telecom Commission.................................................................................................................... 15 Department of Telecommunications .....................................................................................17-29 III. 1. III. 2. III. 3. III. 4. III. 5. III. 6. III. 7. III. 8. III. 9. IV. V. VI. VII. Wireless Planning and Coordination ..................................................................30-39 Telecom Engineering Centre .................................................................................40-42 Universal Service Obligation Fund .....................................................................43-47 Controller of Communication Accounts Offices ...............................................48-50 Vigiliance Activities .................................................................................................51-52 Telecom Network Security ....................................................................................53-56 Empowerment of Women .............................................

Words: 50069 - Pages: 201

Premium Essay

Management Information Systems

...Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and Design for the Small Enterprise, Third Edition • Harris Security Management of Information Security, Second Edition • Whitman, Mattord Principles of Information Security, Third Edition • Whitman, Mattord Readings and Cases in the Management of Information Security • Whitman, Mattord Hands-On Information Security...

Words: 223685 - Pages: 895

Premium Essay

Canhan

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES This book is printed on acid-free paper. Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945)...

Words: 175164 - Pages: 701

Premium Essay

Business and Management

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES This book is printed on acid-free paper. Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945)...

Words: 175164 - Pages: 701

Premium Essay

Mis Book

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition This book is printed on acid-free paper. Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please...

Words: 175167 - Pages: 701

Premium Essay

Smartphones Operating Systems

...Operating system : An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers. Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS. All these, except Windows, Windows Phone and z/OS, share roots in UNIX. Smartphone A Smartphone, or smart phone, is a mobile phone built on a mobile operating system, with more advanced computing capability and connectivity than a feature phone. The first smartphones combined the functions of a personal digital assistant (PDA), including email...

Words: 15551 - Pages: 63

Premium Essay

Crm Highlight

...Chapter 1 Introduction to customer relationship management This page intentionally left blank Chapter objectives By the end of this chapter, you will be aware of: 1. 2. 3. 4. 5. 6. four major perspectives on CRM: strategic, operational, analytical and collaborative several common misunderstandings about CRM a definition of CRM the six constituencies having an interest in CRM how important CRM issues vary across industries five generic models of CRM. Introduction The expression customer relationship management (CRM) has only been in use since the early 1990s. Since then there have been many attempts to define the domain of CRM, a number of which appear in Table 1.1. As a relatively immature business or organizational practice, a consensus has not yet emerged about what counts as CRM. Even the meaning of the three-letter acronym CRM is contested. For example, although most people would understand that CRM means customer relationship management, others have used the acronym to mean customer relationship marketing.1 Information technology (IT) companies have tended to use the term CRM to describe the software applications that automate the marketing, selling and service functions of businesses. This equates CRM with technology. Although the market for CRM software is now populated with many players, it started in 1993 when Tom Siebel founded Siebel Systems Inc. Use of the term CRM can be traced back to that period. Forrester, the technology research organization, estimates that...

Words: 8031 - Pages: 33

Premium Essay

Identifying and Managing Diversity of Workforce

...Lawsson R.D. - Identifying and Managing Diversity of Workforce 216 Business Intelligence Journal January OBJECTIVE The objective of this work is to complete a research proposal on the comparison of work values for gaining of knowledge for management of the multigeneration workforce. The specific focus is upon Generation ‘X’ and the Millennium Generation which are the two primary groups comprising the new workforce. INTRODUCTION The generation that a person is born within has some impact upon that individual in terms of work styles, work values and self-image. The demographic profile of the workforce is undergoing quite a change insofar as the representation of generations and the result is that organizations are experiencing a necessity to make changes as well. The workforce will become increasingly more diverse in the future and this greatly affects the organization in its capacity of hiring and retaining employees. The literature reviewed within this study illustrates the fact that the expectations of employees differ within the generations represented in today’s workforce and unless managers have a sound knowledge-base of the needs and expectations of the organization’s employees then keeping these employees motivated may prove to be quite difficult. 2001, many intelligence agencies have experienced a surge in hiring however; many of these employees have five (5) years experience or less. Furthermore, a recent...

Words: 18925 - Pages: 76