Justification of Wireless Technologies

Submitted by: Submitted by

Views: 1264

Words: 359

Pages: 2

Category: Business and Industry

Date Submitted: 06/13/2012 12:14 AM

Report This Essay

Justification of Wireless Technologies

Darren Koettel

BIS220

May 28, 2012

Jan Martin

Justification of Wireless Technologies

The need for Wireless Technologies needed to improve Party Plates are smart phones, mobile computers, and implementing the use of RFID device’s commonly known as radio frequency identification technology out way the risks and financial cost to Party Plates. The key to the expansion and prepare the company for the future is wireless technology.

Implementation of Smart Phones and Mobile Computers

Smart phones and mobile computers are an important factor in staying competitive with rival companies and to keep up with growth of the company. To combat the cost of smart phones and mobile computers sales personnel and salaried team members are the only personal receiving this technology. This will allow these individuals the capability to conduct business outside their offices. Sales personnel and salaried team members can access company e-mail, calendars, global address books, and to perform their duties faster and more efficient than conventional means according to (Rainer & Cegielski, 2011). The risk of security breaches to the company’s private information is low with the use of Security Software to protect these mobile devices.

Implementation of Radio Frequency Identification Technology

The two main concerns for implementing RFID technology is cost and security. Cost of RFID tags is expensive but can solve any problems. These tags provide the ability to check the availability of products, create an audit trail, inform the warehouse or stores of misplaced products, and track product through the supply chain. This information helps the company save money, time, and reducing employees to keep up with these problems. RFID chips have security options built-in to allow only authorized access to the information stored on the chips according to (McGregor, 2007). These features address the concerns of cost and security proving...