Free Essay

Wireless and Mobile Technologies

In: Computers and Technology

Submitted By garnettwj
Words 1658
Pages 7
Case Study 2:
Wireless and Mobile Technologies
Name
CIS 500
March 16, 2015
Dr.

Wireless and Mobile Technologies Wireless technology is defined as a technology, for example, PDAs, that uses radio waves to transmit and get information. It is utilized increasingly for information transmission. This definition is a bit excessively restricted as it recommends that wireless technology is empowered just by radio waves. Yet radio is stand out little, however imperative piece of the vitality that we can and do utilization to convey information that empowers electronic items to speak and interact with one another by exchanging information. Electronic items and frameworks that interact by using electromagnetic vitality to convey information between them so they can correspond with one another. The expression "wireless" alludes, in the most essential and evident sense, to interchanges sent without wires or links. It is a wide term that includes a wide range of wireless technologies and gadgets, including cell interchanges, networking between PCs with wireless connectors, and wireless PC extras. Wireless interchanges go over the air through electromagnetic waves (radio frequencies, infrared, satellite, and so on). (Pinola, 2015)
Mobile technology is the technology utilized for cell correspondence. Mobile code division various access (CDMA) technology has developed quickly over the recent years. Mobile technology gadgets are a combination of equipment, operating frameworks, networking and programming. Equipment includes PDAs, in the same way as Palm Pilot or Handspring, mobile telephones, and feature amusement players. Applications are the projects, in the same way as telephone directories and datebook programs. As of now, numerous competing operating frameworks leave the business with no agreeable business pioneer. Systems are the infrastructure that backings the exchange of information. The current mobile system is your nearby cell technology. (Rosen, 2007)
There is much interest in the thought that the utilization of mobile and wireless technologies is enabling more noteworthy decision in how businesses captivate with learning exercises, and from the business point of perspective, more adaptable methodologies to learning configuration. Similarly as with any new technology, there is an interest for convincing cases of where it has been trialed, assessed and found to have some valuable results. At the point when it comes to selecting samples to represent what is going on in mobile and wireless learning, there is a situation as to where to begin. The absolute most interesting cases are innovatively complex and logistically perplexing, and can incite the reaction: "we couldn't do that here". Easier samples that utilization daily gadgets (e.g. mobile telephones) can be exceptionally powerful and less demanding to receive into practice, however may fail to offer the "amazing" component that is by one means or another expected of a region that is generally seen to be innovative and exciting. We have chosen to include cases spanning both closures of the scale. (Gruman, 2013) Delta New Wi-Fi technologies have now permitted Wi-Fi access to end up accessible in-flight locally available business planes. A considerable lot of the major U.S. airlines have now started to furnish their planes with new in-flight Wi-Fi administration. We have assembled an in-flight Wi-Fi administration charges table for the major U.S. airlines. Most of the airlines utilize the Gogo as a part of flight Wi-Fi administration which permits any Wi-Fi empower gadgets (from smart phone to cell phone) to join with the Internet in-flight. Most United States transporters have, as of late, declared upgrades and enhancements to their residential in-flight tech that, now and again, even give free entertainment to the poor souls back in mentor. These new administrations let you utilize your own particular mobile gadgets, in the same way as tablets, laptops and telephones, to either stream free substance like TV, music or amusements, or to lease motion pictures and TV without having to pay for a Wi-Fi arrangement. At the core of numerous new offerings is Gogo Air, the in-flight Internet pioneer that gives both Wi-Fi on planes and all the more undeniable entertainment alternatives. Delta Air Lines' new Delta Studio administration, for instance, depends on Gogo. The administration, discharged in August, is accessible to all travelers on any flight more than 90 minutes, letting them stream satellite TV, music and feature recreations on an individual gadget without paying for a Wi-Fi arrangement. (Wood, 2014) The furiously aggressive airline industry is always tested to enhance efficiencies and security. To do both, airlines depend intensely on wireless technology, for example, two-way radios, headsets, and lattice systems. As they seek after the faithfulness of travelers, they must verify that workers, vehicles, administrations, supplies, and planes are at the opportune spot at the correct time. Overall revenues are thin, so augmentation of all advantages – material and human – is foremost. There are three essential zones where wireless technology is being connected. The principal is traveler administration, or correspondences inside the terminal territory. This involves client administration, door check-in, entry/flight coordination, supervisory task of faculty to the doors, and reaction to issues and deferrals. Second, wireless technology is having an effect on slope operations. Here, as well, radios have been valuable, particularly those than withstand wet, filthy, and cruel situations. Third, maintenance groups are occupied day and night, monitoring each bit of supplies and each vehicle to verify they stick to the most elevated models. (Gray, 2013) Implementation Tesco, Britain's leading retailer works more than 2,200 stores as far and wide as possible. A long-term devotee to the estimation of wireless technology, Tesco is quickly upgrading its stores and circulation focuses in the United Kingdom with another wireless system infrastructure oversaw by a single, focal installation of Wavelink Mobile Manager. For Tesco, the key advantages of Wavelink Mobile Manager are the capacity to manage high volume, make a stable domain and afterward effortlessly locate when a right to gain entrance point has happened," says Glenn Couch, a Tesco Infrastructure Project Manager. For the previous year, Couch has been managing a fast rollout of Tesco's new wireless system that presently covers their bigger stores in Scotland, England, Wales and Northern Ireland. The organization is presently looking at extending administration to Tesco outlets in the Republic of Ireland and Central Europe. With more than 5000 wireless access points and diverse settings for each one store, to protect the right settings without focal administration would be a full time work. We needed to give our in-store staff with a vigorous wireless system, however expected to convey it in a savvy manner, said Couch. (Wavelink Corporation, 2014)
Best Strategy Delta as well as Tesco both the firms strategically employed the mobile and wireless technology to enhance their operations and productivity. I believe that the Delta Airline is employing the technology to enhance the customer experience and customer perspective rather the Tesco is focusing on enhancing their operations and productivity through business intelligence and integration and communication among its different stores. Both firms as discussed above employ the technologies in more sophisticated ways to provide the best services and gain a competitive edge among competition.
Operational and Enterprise Systems Everywhere you go today you see someone on their laptop or cell phone, surfing the web, or chatting with a friend. Much like the Linux or Windows operating framework controls your desktop or portable computer, a mobile operating framework is the product stage on top of which different projects can run on mobile gadgets. A mobile operating framework, additionally called a mobile OS, is an operating framework that is particularly intended to run on mobile gadgets, for example, mobile telephones, cell phones, PDAs, tablet PCs and other handheld gadgets. The operating framework is in charge of determining the capacities and gimmicks accessible on your gadget, for example, thumbwheel, consoles, WAP, synchronization with applications, email, content messaging and then some. The mobile OS will likewise determine which outsider applications (mobile applications) can be utilized on your gadget. (Beal, 2011) The firms discussed above employed these mobile operating systems to enhance the implication of mobile and wireless technologies. came after Target's 2014 Q1 net pay dropped 16% from the earlier year. The U.s. Securities and Exchange Commission, the U.s. Government Trade Commission, and various state lawyers general had opened examinations concerning Target's operations after the data breach. Parts of Congress communicated shock about how Target stores - and the retail industry as a rule - took care of the security and security of client's private data. As the request about the Target data breach and its system security disappointments proceeded with, the organization's officials were considered responsible. (Carlson, 2015)

References
Beal V., (2011), “Mobile Operating Systems (Mobile OS) Explained”. Retrieved from: http://www.webopedia.com/DidYouKnow/Hardware_Software/mobile-operating-systems-mobile-os-explained.html Delta Airlines, (2012), “Delta Named Top Tech-Friendly U.S. Airline”. Retrieved from: http://news.delta.com/index.php?s=20295&item=123856
Gray M., (2013), “Wireless Technology Gives Airlines a Competitive Edge”. Retrieved from: http://www.todayswirelessworld.com/2013/12/air-travel-industry-finds-much-needed-efficiencies/ Gruman G., (2013), “The 5 mobile technologies to watch in 2014”. Retrieved from: http://www.infoworld.com/article/2609702/smartphones/article.html
Pinola M., (2015), “What is Wireless?” Retrieved from: http://mobileoffice.about.com/od/glossary/g/wireless.htm
Rosen A., (2010), “Mobile Technologies Definition”. Retrieved from: http://www.askjim.biz/answers/mobile-technologies-definition_2576.php
UMR, (2015), “The Future of Wireless Technologies in Airplanes ”. Retrieved from: http://web.mst.edu/~mobildat/Airplane%20Applications/index.html
Wavelink Corporation, (2014), “Tesco Picks Wavelink To Manage Over 5000 Wireless Access
Points Across More Than 600 Stores”. Retrieved from: https://www.wavelink.com/case-study/Tesco-Picks-Wavelink-To-Manage-Over-5000-Wireless-Access-Points-Across-More-Than-600-Stores/ Wood M., (2014), “Cramped in Coach, but With Better Entertainment”. Retrieved from:
http://www.nytimes.com/2014/12/18/technology/personaltech/improving-in-flight-wi-fi-and-streaming-from-virgin-america-jetblue-and-more.html?_r=0

Similar Documents

Premium Essay

Mobile Wireless Technologies

...Mobile and wireless technologies have evolved beyond recognition in today’s technology environment. The advent of mobile phones and similar devices has transformed business and social interactions, and Internet access no longer depends on a wired system such as a modem connected to a telephone landline, but rather, it can be achieved using a mobile enabled device whenever and wherever a mobile access point is available. Such access points or hot spots are now widely available in airports, hotels, educational institutions and other public buildings, and increasing numbers of wireless networks are being installed in commercial buildings and private homes. The term "wireless" refers, in the most basic and obvious sense, to communications sent without wires or cables. It is a broad term that encompasses all sorts of wireless technologies and devices, including cellular communications, networking between computers with wireless adapters, and wireless computer accessories. Mobile technology extends computing and the Internet into the wireless medium, and provides greater flexibility in communication, collaboration, and information sharing. Mobile technology, which can support computing on the move using portable devices through wireless networks (Varshney and Vetter, 2000; Malladi and Agrawal, 2002), has emerged as the next wave in IT revolution. Mobile technology includes technological infrastructure for connectivity such as Wireless......

Words: 1822 - Pages: 8

Premium Essay

Cis 500 - Wireless and Mobile Technologies

...Case Study #2 Wireless and Mobile Technologies CIS 500: Information Systems for Decision-Making Wireless and Mobile Technologies Wireless technologies make use of radio waves, to connect with other devices or networks in order, to transmit/receive data. A wireless technology can be as simple as using a garage door opener or as complex running applications on Enterprise Resource Planning software. Wireless technologies make use of various types of hardware, from Bluetooth™ capable devices (printers, keyboards, earpieces, etc.) to offsite data warehouses to satellites, all of which communicate through networks, via radio waves. Wireless technologies are used by fixed/stationary items such as a desktop computer, as well as various mobile devices, tablets, cell/smart phones, laptops, GPS and others. Mobile technologies are, as the name implies, mobile. These devices are portable and can be used in route, from one place to the next, by accessing and using wireless networks. Mobile technologies are not just hardware but include special platforms in which these devices and the users interface. The combination of the wireless and mobile technologies has opened new methods for businesses to improve productivity.  Wireless and Mobile technologies allow staff members to have real-time communication with the business and operations, from relatively anywhere in the world.  Wireless and Mobile technologies provide a faster connectivity to vendors and customers......

Words: 1916 - Pages: 8

Premium Essay

Netw 562 Final Exam Keller

...com/p/9vFZ/ Product Description First page 1. (TCO A) Explain how a wireless handset initiates a call. When a mobile phone is powered up, it registers, or identifies itself to a base station. Information about a phone such as the… (TCO B) Give an example of a mobile marketing campaign utilizing a mobile wireless application. How does the campaign capitalize on the mobile factor? Mobile Marketing is just another way of reaching out to target consumers via mobile devices and… (TCO B) List and explain three prominent applications of WDAs, and the markets where they are used. I-MODE – iMode was the original mobile data technology. iMode mobile Internet technology was introduced in Japan in… (TCO C) Explain the effects of J2ME and BREW on mobile application development. BREW and J2ME are intended to provide a standard protocol for downloading executable applications to… (TCO C) What role can Java play in enhancing the mobile shopping experience? Java reduces the cost of downloading and developing moving images that are written in HTML because…. (TCO D) Discuss why a company would deploy WDAs versus laptops. A mobility increase production in most enterprise but the same doesn’t apply to others due to some… (TCO D) Describe 2 challenges of managing mobile devices in the enterprise. Two key challenges IT department faces in managing Mobile device in an enterprise are: Mobile applications compatibilities and… (TCO E) Give 3 reasons why WDAs......

Words: 1693 - Pages: 7

Premium Essay

Wifi and Mobile Tech

...Case Study 2: Wireless and Mobile Technology By Terry Boone Dr. Stevens CIS 500: Information Systems for Decision Making 5/24/2014 Wireless and mobile technologies have transformed our daily lives, and also made a huge impact on the business world. The definition of the terms wireless and mobile technologies are often used interchangeably; however, this is not the case. Wireless technology is the ability to communicate on the internet via devices without a wire. Mobile technology is the ability to communicate on the internet via wireless and over a wired connection. Mobile technology allow for a user to access the internet anywhere at any time; conversely, wireless technology is only limited to the broadcast area emanating from the router and modem combination. Businesses use wireless and mobile technologies to increase efficiency by saving money on installation costs freeing up funding to be used elsewhere. Businesses can use wireless technology to connect employees throughout building, but still be connected to important software that runs the businesses operations through portable devices. Cell phones, laptops, and tablets in conjunction with wireless technologies have created the possibility for employees to become more powerful. Smaller organizations must maximize the efficiency of workers, so they can compete. Small organizations must ensure that employees are always connected, in addition to not being tied down to a single location (Koose, n.d.). Smart......

Words: 1500 - Pages: 6

Premium Essay

Mobile Device

...Mobile Devices Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs (Patricia & Donna, 2008). In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.  Risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. This open connectivity brings with it risks, however, some of which are similar to those in......

Words: 671 - Pages: 3

Premium Essay

Mobile Computing and Social Networks

...Assignment 3: Mobile Computing and Social Networking CIS 500 November 24, 2013 Introduction The U.S. market for advanced patient monitoring systems has grown from $3.9 billion in 2007 to $8.9 billion in 2011 and is forecast to reach $20.9 billion by 2016, according to a study by Kalorama Information. Efforts to reduce costs in healthcare, avoid emergency room overcrowding, and prepare for a growing number of elderly patients in the years to come are a few of the drivers for the adoption of these systems. (Remote Patient Monitoring, 2012) Compare and contrast monitoring of patient vital signs using mobile computing technology to in-patient visits to the doctor’s office or hospital. Advances in remote patient monitoring include new peripherals, real-time audio and video for "face-to-face" interaction between clinicians and patients, and devices that are expected to transmit data to a physician's EMR system. The use of smart phones and broadband-enabled devises has allowed patients to do their own monitoring of vital signs and body functions and upload them to their medical provider’s clinical servers. For example, a glucose monitor that can also track a patient's blood pressure, another trend is the increasing use of patient monitoring systems that come with data processing applications and equipment that use algorithms to evaluate monitoring measurements for a patient's specific condition. (Remote Patient Monitoring, 2012)   Hospitals and physician’s offices are...

Words: 1468 - Pages: 6

Premium Essay

Bis 220 Final Paper

...Wireless Technologies Proposal Keshia Smith, Joshua Crouch, Amber Kelly, JaLynn Coombs BIS 220 January 16, 2012 Michael Chu Wireless Technologies Proposal Mobile computing and mobile commerce in addition to a traditional computer system is what Party Plates will use to house information for the company at one location that could be accessible by a wireless device as well. If Party Plates want their services readily available, convenient to their customers, and to remain productive; then they may consider the use of wireless devices to compete with other businesses that supply the same services. Mobile services allow Party Plates as well as their customers to access information real-time while connecting from mobile devices and other computing environments. Whether Party Plates use mobile devices or remain in its current position, we are recommending mobile computing and mobile commerce as wireless services to move Party Plates into the future. The pros and cons of each service are listed within this proposal. Mobile computing refers to real-time wireless connection between a mobile device and other computing environments, such as the Internet. These days it is spreading everywhere, at work, at home, in education, health care, entertainment, and in so many other areas. The pros of mobile computing is its mobility to take a small hand held device and go anywhere and its broad reach to just about anywhere instantly [ (Rainer & Cegielski, 2011) ]. Mobile......

Words: 619 - Pages: 3

Free Essay

Course Project Hr 587

...AT&T Historical Perspective AT&T Wireless according to their licenses that they have with the Federal Communications Commission (FCC) has the potential to serve 99% of the United States (US) population because of the territories that’s covered by their licenses. Currently AT&T Wireless serves more than 20 million subscribers. Through AT&T’s WorldConnect services all their subscribers can get services in more than 100 countries (Funding Universe, 2011). The origins of AT&T Wireless stems from the merger between AT&T Corp with McCaw Cellular Communications. The development of wireless technology first began with AT&T Corporation, where cellular technology was invented 1947 in the Bell laboratories for law enforcement (Funding Universe, 2011). The main reason these systems were developed for law enforcement was so that patrol cars can stay in contact with each other, because prior to this they communicated through radio frequencies which tend to collapse if too many patrol cars were using it. AT&T engineers solved the solution of the issues with the radio frequency by creating special transmitters capable of sending calls between patrol cars regardless of what area they were located in this was a precursor to the creation of cellular towers in the 20th century (Funding Universe, 2011). The first actual cellular systems were not developed until 1984 by AT&T Corp. in the cities of Chicago and Washington, D.C. Even though AT&T Corps was the first to develop......

Words: 1423 - Pages: 6

Premium Essay

M Commerce

...M-commerce(Mobile Commerce) is “the delivery of electronic commerce capabilities directly into the hands, anywhere, via wireless technology” and “putting a retail outlet in the customer’s hands anywhere.” This can be done with just a mobile phone, a PDA connected to a mobile phone or even a portable PC connected to a mobile phone. M-commerce is the buying and selling of goods and services through wireless handheld devices such as cell phones and personal digital assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users to access the Internet without needing to find a place to plug in. The emerging technology behind m-commerce, which is based on the Wireless Application Protocol, has made far greater strides in Europe. M-commerce allows one to reach the consumer directly, not his fax machine, his desk, his secretary or his mailbox, but ones consumer directly, regardless of where he is. Internet use has grown to such a level on the strength of PC networks. Due to the huge base of installed PCs, which is predicted to grow in a faster pace in the days to come, electronic commerce and other communication applications are bound to thrive further. Also, these computing systems will have greater power and storage capability, the best ever price-performance ratios, more powerful and sophisticated applications will likely emerge for desktop computing and the Internet. However, there are two major limitations on PCs. First , users have to sit in front of......

Words: 709 - Pages: 3

Premium Essay

Wireless Signals

...Wireless Communications are very important in our daily lives. Practically everywhere we turn we can see someone working away on a laptop, an iPad, or some other form of wireless PDA. This form of communication is usually used for personal and professional reasons. There are four main types of wireless technology in play here. The four types of wireless technology is Wi-Fi, Cellular, Bluetooth and WiMAX (Cox, 2013). Wi-Fi is the most popular form of wireless technology that we come to depend on today. Wi-Fi uses IEEE 802.11 specifications to provide secure network connections at home, in the office and in the public at places like libraries, coffee houses. Many business offices have Wi-Fi set up so that their employees can be more mobile using laptops they can retreat from their desk and in to a conference room for a quiet space to work. Wi-Fi connection within a network presents challenges for any IT group with regard to security as well as architecture of the network. Many wireless Routers and AP’s are designed to provide quick speeds and secure connection for Wi-Fi some more powerful than others. Many PDA devices are being designed to act as a hot spot, providing Wi-Fi access to laptops and other devices. This brings me to speak about Cellular technology. When we think of cellular technology, we mostly think about being on the go and needing to make a phone call with a wireless phone. Cellular signals use connected transmitters or cells as Michael Cox calls them......

Words: 725 - Pages: 3

Free Essay

Mobile Computing and Social Networking

...4G Wireless Networks INTRODUCTION 4G stands for “4th generation” mobile data protocol but 4G users called it as the speed, succeeding 3G and preceding 5G. 4G LTE is a term used for the particular 4G protocol that delivers the fastest mobile Internet experience. A 4G LTE network operates at the leading edge of speed and reliability. Potential and current applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, 3D television, and cloud computing. 4G networks are becoming pretty standard, so most of the newest and most cutting-edge phones (Samsung Galaxy S3, iPhone 5, etc.) are typically 4G phones.  4G network can download files from the Internet up to 10 times faster than with 3G. With 4G LTE, using the web from phone becomes as pleasurable as using it from computer. 3G is “3rd generation,” refers to a networking standard in cell phone technology that is capable of providing high-speed data service to mobile devices. 3G wireless networks became more widespread and made smartphones truly feasible however phones were used merely for voice calls and text messaging. A world where it’s perfectly ordinary to download huge data to the phone from the Internet, to stream audio and video to people thousands of miles away effortlessly and wirelessly. It changed the way millions of people communicate, and set the stage for even more advanced mobile technologies. 3G telecommunication networks support services that......

Words: 854 - Pages: 4

Free Essay

4g Networks

...fulfillment of the requirements for CPET2324, Computer Network Systems. The 4G network was chosen for this topic because of the impact it has on wireless communications. I think the most important tool a person can carry these days is the cell phone. My essay attempts to show how critical the 4G networks is to our beloved cell phone and other wireless devices. Abstract The 4G Networks In telecommunications, 4G is the fourth generation of mobile communication technology standards. It is a successor of the third generation (3G) standard. While all 4G service is called “4G,” the underlying technology is not the same. Sprint, for example, uses WiMax technology for its 4G network, while Verizon Wireless uses a technology called Long Term Evolution, or LTE. No matter what technology is behind it, 4G wireless is designed to deliver speed. The Origin and Definition of the Term The fourth generation is a promising generation of the mobile communications that is characterized by a high data rate and high-quality voice communications. Advanced technologies that make data communications at a rate, exceeding 100 megabits per second for mobile subscribers, belong to the fourth generation. As a rule, the specifications of any generation of the mobile communications refer to the...

Words: 1585 - Pages: 7

Premium Essay

Mobile Devices

...Case I Study: Mobile Devices Ditty A. Kone Dr. Alaba Oluyomi CIS 333 Networking Security Fundamentals April 17, 2012 Case I Study: Mobile Devices Ditty A. Kone Dr. Alaba Oluyomi CIS 333 Networking Security Fundamentals April 17, 2012 Nowadays, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Risks inherent in the use of wireless and mobile technologies Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Each wireless device, such as a laptop or PDA, that is equipped with a wireless card and is turned on is constantly sending out signals called "probes," indicating that it is seeking to "hook up" with a nearby access point. This probe automatically detects the nearest access point, called a hot spot. A screen is then displayed to instruct the user on how......

Words: 789 - Pages: 4

Premium Essay

Cis500 Week 7 Assignment 3

...Mobile Computing and Social Networking Louis F DeWeaver III Strayer University CIS500 Week 7 Assignment 3: Mobile Computing and Social Networking Instructor: Albert Dominic November 24, 2013 Introduction With the many advancements in mobile technology, the health care industry has been able to use this technology to enhance the quality of the services they provide. Thus the birth of wireless medical patient monitoring. Monitoring Patient Vital Signs via Mobile Computing Versus In-Patient Visits Mobile monitoring of patient vital signs has become more popular than ever. Imagine being able to monitor your blood pressure, glucose levels (diabetes), your body temperature and many others using mobile technologies that have surfaced today. I remember when a patient would have to make a trip to the doctor’s office to have their vital signs taken. Now vital signs can be recorded and stored on a mobile device, uploaded to a database that can be accessed by the doctor’s office. Storing vital sign stats on mobile devices is light years ahead of having a person physically take those vital have to enter them on a chart and then enter them into a computer system. The mobile technology also saves time by allowing instant access to the data instead of waiting hours. Patients are able to take advantage of the new smartphones and can monitor their own vitals and have a digital record they can share with the doctor anytime. They are also able to chat real-time with the doctor...

Words: 1309 - Pages: 6

Premium Essay

Mobile Devices

...Computing technology advances in the past decade have created a more easy and flexible work place. Mobile technology can mean greater productivity, but it also has inadequate security measures to mitigate the risks inherent in the use of mobile devices. There are many factors to consider when deciding if wireless networking or in specifically if wireless technology is a reliable and safe route for the healthcare systems. Given the type of wireless infrastructure and different construction techniques, there are many ways to develop safe, reliable and most importantly a secure wireless health care technology. First, the important thing to consider is the assurance and security that we may face in today's enterprise healthcare systems. For this particular case, there are multiple office spaces in the professional building. With that said there may be multiple wireless transmitters and due to a radio-frequency wireless application may be a source of interference for another application. Security for wireless medical devices and systems must be addressed and make sure that it is able to handle such risks that can be involved. Some things to keep in mind would be if this exchangeability is worth the risks with such diligent information. With these interferences, it's a matter of manageability for a safe and secure method of transferring patient data from one space to another. Secondly, threats differ by groups whether they may be a police force or a medical team and most......

Words: 529 - Pages: 3