Tuesday, December 13, 2011

Homework #10

During the year in MIS I enjoyed and learned the most from the section Wireless Technology, and Mobil Computing. In this day and age as everything is becoming smaller and faster, wireless technology makes it easy for us to be on the move and still be able to access the internet. Wireless devices are small enough to easily carry or wear, have sufficient computing power to perform productive tasks and can communicate wirelessly with the Internet and other devices. Mobil computing is a huge asset to e business because it makes everything easier for business people to keep in contact with other members within the company, if when traveling they don’t need to have a computer; they can access everything from their hand with their smart phone. I learned that Mobil computing is put into five sections, Ubiquity which makes mobile devices that can provide information and communications regardless of user’s location. Convenience and Instant Connectivity, which makes internet-enabled mobile device to makes it easy and fast to access the web, intranets, and other mobile devices without booting up a PC or placing a call. Personalization, the information can be customized and sent to individual consumers. Localization of products and services, this is knowing a user’s location helps companies advertise their products and services. I learned that Wireless Technology is constantly changing and becoming better as time goes on. You can also use Wireless Technology for music, GPS, e- commerce, and other day to day processes. Wireless security is also a very important asset to the wireless technology age because keeping your information safe from outsiders is very important. I was taught that wireless security is put into four categories, Rogue access point which is an unauthorized access point to a wireless network, so you can use your smart phones on the go. The next one is War driving, which is the act of locating WLANs while driving around a city or elsewhere. Eavesdropping refers to efforts by unauthorized users to try to access data traveling over the wireless networks. Finally there is RF (Radio frequency) jamming, which is when a person or a device intentionally or unintentionally interferes with your wireless network transmissions, with intent to steal information. In closing the wireless generation is growing rapidly, and taking the place of desktop computers because people are more on the move now.
http://www.metro-magazine.com/news/story/2010/08/NYC-subways-to-get-Wi-Fi-cell-service.aspx

No comments: