...Analysis of Case 6: Considerations for Voice Over IP Telephony Discussion Questions 1. Should the vice president’s approach put greater stress on the need to replace an obsolete system (risk mitigation) or on the desirability of improving the organization’s ability to implement new applications (enable new opportunities) 2. How should he engage the organization in learning about the potential of VoIP and developing plans for potential uses of the technology? 3. If a result of this learning is a belief that the VoIP technology is not fully mature, how should Forest assess whether it should proceed or not? Overview The vice president of support services will need to take a systematic approach in dealing with the issue at hand: 1) Assemble a committee of stakeholders and experts 2) Identify vendors of both VoIP and old supported systems that offer products that generally meet the standards and requirements of the organization 3) Send out RFPs to identified vendors 4) Conduct a formal financial analysis with a scoring system that offers a fair valuation of either system in order to identify the preferred system that is aligned with Forest’s overall plans and strategies 5) Present the preferred choice to the executive with clear reasons why he thinks it is the preferred choice Proposed Detailed Action Plan Budget considerations According to Wickham, Wager and Glaser (2009), there are four classes of investment that reflect in an organization’s budgetary allocation...
Words: 311 - Pages: 2
...New Telephone System Research Josh Foster I have been given the task to design the telephone system for the company’s new location that is going to be built shortly. To accomplish this I first need to understand what kind of telephone system the company currently uses today. Which is The Plain Old Telephone Service (POTS) is what most companies are running today. So when researching this system out I found out that there are several different components that make up the POTS system. When the POTS system first started back in 1877 it was with Bell Telephone Company. Then it was one line one house which was a fixed –line system. Now everything runs to a central office and is distributed from there. The POTS system we have now starts out at your local telephone company’s office this is referred to as a central office. There are many lines coming out of the office going everywhere but one will get to our office so we could have service. The line that comes from the central office to our building will connect us to the system and that line will be a twisted pair cable (which is a copper cable). This will give us a local loop to the telephone company. In some remote location the telephone companies have to install remote sites to shorten loop lengths to provide better quality service for all rural areas. There are a few more things I would like to mention that is in the POTS system. The first is that it has long distance, which gives you the ability to call out of your geographical...
Words: 1236 - Pages: 5
... voice messages systems, and caller ID’s are examples of technologies requiring Congress to pass the Telephone Consumer Protection Act (TCPA) in 1991, which the Federal Communications Commission (FCC) quickly adopted. According to Federal Communications Commission (n.d.), “In June 2003, the FCC supplemented its original rules implementing the TCPA and established, together with the Federal Trade Commission (FTC), the national Do-Not-Call list.” These acts are in place to protect the general populace from unsolicited telephone marketing calls. The Telephone Consumer Protection Act (TCPA), which went into effect on December 20, 1992 to protect consumers from unsolicited telephone marketing calls ("What Is The Tcpa?", n.d.). This act forces guidelines requiring ethical use of telephone systems on businesses that may use auto dialers, pre-recorded messages, or even facsimile (Fax) machines to contact consumers. Among these guidelines is the rule that unsolicited calls to an individual’s home must not happen before eight a.m. or after nine p.m (Federal Communications Commission, n.d.). In 2003, a joint venture with the Federal Trade Commission (FTC) the FCC supplemented the TCPA of 1991 to include The National Do-Not-Call List (Federal Communications Commission, n.d.). The National Do-Not-Call list prohibits solicitors from calling the telephone number that has been added to the National Do-Not-Call list after 31 days from the date registered, the telephone number must be removed...
Words: 627 - Pages: 3
...Transport Area is a U.S. term that refers to a geographic region assigned to one or more telephone companies for providing communication services. A connection between two telephone companies within the same region is referred to as intraLATA. A connection between two local exchange carriers in different regions is called interLATA, which is the same as long-distance service. Long Distance – Calling anywhere out of your local area or zip code area that you live in can be long distance calling. Although land lines only bill to the person starting the call, Cell phone carriers bill both the person calling and the person receiving the call. This is why many people don’t do long distance calling because the other person may not want to receive the charge for the call. Local Loop – In telephony, a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals Data Over Telephone Lines – Telephone was originally invented to transfer voice. However, now you can transmit data over the telephone. The fixed-line telephone is on analog systems capable of transmitting only a narrow range of audio frequencies. Because it only transmits...
Words: 321 - Pages: 2
...Internet. VoIP is a new application of Internet Protocols (IP) that enables the conversion of voice communications into data packets and then these packets are transmitted via an IP network such as the Internet. “VoIP services convert your voice into a digital signal that travels over the Internet”. (fcc.gov) Similar to using your analog phone system and going through a Public Switched Telephone Network (PSTN), now you will be using a digital phone and going through the Internet. All you need to get the ball rolling and to be part of this new trend is a decent Internet connection at home and you could say goodbye to that plain old analog telephone line forever. Most cable companies are offering service bundles that include cable television, Internet access and telephone services. These companies are transitioning from the telephone analog system to the VoIP systems. A lot of costumers are switching over to VoIP for the simple reason of saving money. VoIP services usually offer better rates for local and international calls compare to the traditional telephone company rates. VoIP is the technology that makes it possible to have a telephone conversation over the Internet or a dedicated Internet Protocol network instead of dedicated voice transmission lines. This allows the elimination of circuit switching and the associated...
Words: 3242 - Pages: 13
...1876- Alexander Graham Bell invents the telephone. 1888 - The Bell Company telephone monopoly is established. 1894 - Non-Bell companies enter the rural telephone market. 1919 - Rotary-dial service is introduced. Rotary-dial service permitted the installation of switching systems which rendered the calling process a little more automatic.2 1963 - Touch-tone service is introduced.3 Touch-tone service permitted the use of now infamous automated phone menus. "Touch 1 for Sales, touch 2 for Customer Service, and touch 3 for ..." 1967 - Toll-free (800) service is introduced. 1984 - The AT&T monopoly is dissolved. 1988 - Commercial voicemail service is introduced. Until 1988, telephone companies were legally barred from offering voicemail to their subscribers as part of an effort by the Federal Communications Commission (FCC) to protect telephone answering businesses.4 1992 - The first smartphone is introduced. 1993 - Digital cellular service is introduced. 1995 - The first Internet (VoIP) phone is introduced. 1996 - The Telecommunications Act of 1996 is enacted. 2002 - 3G (Third Generation) cellular service is introduced. 2008 - 4G (Fourth Generation) cellular service is introduced. 2010 - 4G LTE (Fourth Generation Long-Term Evolution) cellular service is introduced. 2012 - The 4G Apple iPhone 5 is introduced 1 The telephone system that was to evolve into today's multi-faceted telecommunications system began with Bell's invention. Without bell going forward with this...
Words: 554 - Pages: 3
...The Telephone, the Device that Changed the Way We Communicate The Telephone, the Device that Changed the Way We Communicate Voice communication is the most commonly used way of expressing our wants, needs and thoughts. The telephone changed the way we communicate. It has been allowing people to talk in almost real time without seeing each other since its development in 1876. Until then, mail and the telegraph was the normal and only means to talk across the country. Although it was effective, those methods were all silent. Now with the telephone, you could truly convey your feelings to someone in a personal way. The other end could hear the happiness, the sadness, or the anger in your voice. Can you imagine life today without it? The telephone, which means far speaking in Greek, was developed in 1784. For years many people were working to bring this concept into reality. In March 10, 1876 a functioning model was completed by Alexander Graham Bell. “Mr. Watson, come here, I want you!” (Casson, p.12) were the first words spoken by Bell to his assistant, Thomas A. Watson. Finally, after many years of working on a way to transmit the voice over wires, Bell was successful with his design and protection of his product. He even had the foresight to have the patent paper work already done days before his invention was working. The next task would be getting people to use the telephone. When the telephone was invented it wasn’t very popular. In fact people didn’t...
Words: 1423 - Pages: 6
...Activity 1: Assignment 1. Voice vs. Data * Cell phones: is a phone that can make and receive telephone calls over a radio link while moving around in a wide geographic area. It does so by connecting to a cellular network provider by a mobile phone operator, allowing access to the public telephone network. * Landline phones: (also known as home phone, fixed-line, and wire line) refers to a phone that uses a solid medium telephone line such as a metal wire or fiber optic cable for transmission as distinguished from a mobile cellular line, which uses radio waves for transmission. * SMS / Text Messaging: is a text messaging service component of phone, Web, or mobile communication systems. It uses standardized communications protocols to allow fixed line or mobile phone devices to exchange short text messages. * Fax Machines: it’s a telephonic transmission of scanned printed material, normally to a telephone number connected to a printer or other output device. The original document is scanned with a fax machine, which processes the contents as a single fixed graphic image, converting it into a bitmap, and then transmitting it through the telephone system. * Pagers: is a wireless telecommunications device that receives and displays numeric or text messages, or receives and announces voice messages. One-way pagers can only receive messages, while response pagers and two-way pagers can also acknowledge, reply to, and originate messages using an internal...
Words: 308 - Pages: 2
...commerce focuses on the use of ICT to enable the external activities and relationships of the business with individuals, groups and other businesses. Electronic business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers. Key-Words: - VoIP, gatekeeper, endpoint, gateway, softphone, asterisk 1 Introduction E-business involves business processes spanning the entire value chain: electronic purchasing and supply chain management, processing orders electronically, handling customer service, and cooperating with business partners. Special technical standards for e-business facilitate the exchange of data between companies. E-business software solutions allow the integration of intra and inter firm business processes. E-business can be conducted using the Web, the Internet, intranets, extranets, or some combination of these. Applications for electronic business can be divided into three categories: a) Internal business systems: o customer relationship management o enterprise resource planning o document management systems o human resources management b) Enterprise...
Words: 5944 - Pages: 24
...[pic] [pic] By XXXX IP Telephony/VOIP Instructor: xxxx Date: 08/18/2010 Table of Content Company History------------------------------------------------------------------------------------3 Technology-------------------------------------------------------------------------------------------4 Technical Objective---------------------------------------------------------------------------------5 Background-------------------------------------------------------------------------------------------6 Advantages and Disadvantages--------------------------------------------------------------------7 Why should I use it in my business----------------------------------------------------------------9 Key to Successful Business VoIP Implementation --------------------------------------------11 • Planning and assessment • Design, testing and implementation • Operations and Optimization Predicted reasons why UPS should implement VoIP -----------------------------------------15 VoIP Security Intrusion Prevention -------------------------------------------------------------16 Conclusion-------------------------------------------------------------------------------------------17 Bibliography-----------------------------------------------------------------------------------------19 Company History: UPS was founded in 1907 as a messenger company in the United States. It has grown into a $49.7 billion...
Words: 2768 - Pages: 12
...into an enormous enterprise since then. I will be presenting an overview of the technologies that brought VoIP to fruition, the methods of connecting, benefits, and drawbacks. IP Telephony allows organizations to reuse their existing network infrastructure. With IP Telephony, employees can use IP handsets or softphones anywhere on the corporate network. Generally only a single Ethernet port is required to provide both desktop and IP Telephony (voice) services. Power over Ethernet using the 802.3af standard or pre-standards based power can be used with great advantage throughout an IP Telephony environment to power other network appliances such as 802.11a/b/g wireless access points, IP video surveillance cameras and IP phones. IP Telephony systems also provide the advantage of lower cost moves/adds/changes administration allowing employees and departments to more easily move from location to location without the burdens of administration and service interruption. Because IP Telephony works with packet networks, the model of support used for IP Telephony can be the same as the one used for the desktop, thereby reducing and simplifying staffing requirements. Since the IP phone or softphone is an intelligent endpoint on the network, it has the intelligence to seek out communications services from one or many IP Telephony call processing services. In addition, clustering and high availability networking technologies provide for a much more business resilient environment at a far lower...
Words: 1929 - Pages: 8
...confidentiality, integrity and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirements. Confidentiality is provided by two factors: a unique access card and a PIN that functions as a password. A user must have both of these to access the system. Confidentiality is compromised by the fact that most ATM systems connect to various banks, and the source of information cannot be guaranteed to be from a proper ATM. Also, ATMs are public, and can be accessed by the entire population, allowing things like card swipe readers to be used to attack them. The importance of confidentiality is medium to high. If it is the loss of confidence in a limited number of accounts, it is medium, because it does not stop the main functions of the organization and can be corrected. It would be high if a large number of accounts were compromised. Integrity of information at the ATM is provided by the very limited interface that the machine provides to the data stored on the back end. There is no comprehensive GUI or CLI to provide a point of attack. However, the previously mentioned public access and data exchange are threats to integrity. The importance of integrity is medium to high. The alteration of a small number of accounts does not stop the main functions of the organization and can be corrected. The alteration of many could be catastrophic. Availability of the system (and the currency or information it dispenses) is provided by having...
Words: 594 - Pages: 3
...portfolio included the electrical coil, radio waves and a host of other patents which he still owns till this day. Tesla was born in 1856 in in the Austrian Empire now the modern day Croatia; he was an electrical and mechanical engineer, a physicist and above all an inventor holding over 300 documented patents in the fields of science and technology. What makes him so great was his aspiration to move the human race forward through his inventions, his patents were “freeware” he was not stringent on people stealing his ideas and using it “I don't care that they stole my idea…. I care that they don't have any of their own”- Nikola Tesla. His most prominent inventions are the AC (Alternating Current); which developed polyphase alternating current system of generators, motors and transformers which were a huge usurper to the DC (Direct Current) Technology which...
Words: 1152 - Pages: 5
... the telephone, radio/TV, the internet, and cell phones. 1. The telegraph (in my opinion) is by far the most important electronic communications development in our history. For millennia societies have communicated over long distances strictly using the physical environment; smoke screens, reflected light, pyres, etc., have been used long before electric technology was introduced. While effective, the physical environment can only “reach” so far; the electric telegraph enabled entire regions, countries, and governments to connect instantly. The ability to send messages- or simply communicate- via electric wires was undoubtedly the fastest leap communications has ever seen; in a matter of decades the world was covered in wires. The telegraph enabled globalization, better government communications, and a widespread need to speak to one another. While the telegraph is somewhat obsolete today, the invention opened the door to the telephone, the radio, and (quite literally) laid the foundation of all electric communications. http://classroom.synonym.com/significance-samuel-morse-inventing-telegraph-10183.html http://history1800s.about.com/od/inventioninnovation/a/telegraph01.htm http://en.wikipedia.org/wiki/Telegraphy 2. The second most important electronic development would be the telephone. Founded on the same ideas as the telegraph, the telephone enabled people to literally “send” their voices to one another. While the telegraph was the foundation, the telephone enabled...
Words: 1352 - Pages: 6
...and problem resolution. • Many help desks are organized in a multiplayer system. The lowest level is an incident screener. Common features of ACD: Skill set distribution , overflow routing, call accounting, queue time. The information Technology Infrastructure Library ITIL, is one of many evolving frameworks, guidelines and standards. The Physical Environment of a help desk facility includes the Workspace, furniture, equipment and computer systems help desk agents. Support workers may be vulnerable to job stress when the expectations of a position do not match personal characteristics of a worker. Key Terms: Archive – An incident archive is a database or paper file used to store and retain records relating to closed incidents. Asynchronous – A method of communication In which the communicators do not have to participate at the same time; e-mail and web based communication are examples. Authentication procedure – An incident management step in which an agent determines whether the help desk is authorized to handle a call. ACD- A computer telephony system that automates many of the first steps in incident management, such as a greeting. Best Practices – Procedures, tools and methods that successful support groups employ; these practices often set apart very successful support operation s from mediocre ones. Call Management – A process followed by help desk staff when handling telephone contracts between end users and support staff. Client Feedback – Evaluations...
Words: 553 - Pages: 3