Sunday, February 16, 2020

Impact of telecommunications in the work setting Research Paper

Impact of telecommunications in the work setting - Research Paper Example 1). Another more detailed definition of the term disclosed its meaning as the â€Å"science and technology associated, in general, with communications at a distance. A telecommunications system requires a analog or digital transmitter, a compatible receiver, and a physical (cable or wire) or non-physical (wireless) connection† (Web Finance, Inc., 2013, par. 1). Messerschmitt (1996) revealed that â€Å"the term telecommunications is derived from â€Å"tele†, meaning at a distance, and â€Å"communications†, meaning exchanging of information† (p. 1). If defining the term apparently generated voluminous results, one was more intrigued on how telecommunications have evolved and impacted the contemporary work setting. In this regard, the current discourse aims to present the impact of telecommunications in contemporary work settings, or how telecommunications have significantly shaped the work place. Historical Overview of Telecommunications A discussion on the historical background of telecommunication actually traced its origins from the discovery of the telephone by Alexander Graham Bell in 1876 (von Alven, 1998), 137 years from now. Previous to that, it was interesting to note that forms of communication included fire signals, carrier pigeons, and even a line of canon that relayed relevant messages (von Alven, 1998). Also, other communication patterns such as the Chappe brothers’ semaphore system which â€Å"consisted of movable arms on a pole whose positions denoted letters of the alphabet† (von Alven: Early Beginnings, 1998, par. 1) and the electric telegraph were also noted. Telecommunications in the 21st century has evolved in a rapidly changing pace due to the merging with the computer industry and the emergence of the Internet (Messerschmitt, 1996). As such, it pervaded vast industries and endeavors that transformed diverse facets of the work setting through increased access to information and through the use of ne w technologies and communications facilities that provided new applications in faster, greater and wider scope. The statistics from axvoice.com (2013) presented the changes in market shares of telecommunications in the United States from 2010 to 2015, as shown in Figure 1 below: Figure 1: Changes in Market Shares of US Telecom, 2010 to 2014 Source: Axvoice, 2013 Effect of Telecommunications in the Work Setting Telecommunications have evidently transformed contemporary work settings in terms of eliminating barriers to time, space, and locations. As confirmed â€Å"advances in telecommunications have not only untethered people from desks, but they have also made it possible for people who might traditionally be unable to be in the workforce- such as those who are caring for children, or those who are disabled- to have exciting jobs and contribute to the business community† (Alexis, 2010, par. 7). The evolution of telecommunications have enabled the establishment of diverse work settings, from the traditional office-based work place to varied work centers (Kurland & Bailey, 1999). Due to developments in telecommunications, there emerged four distinct work settings such as home-based; use of satellite offices; the existence of neighborhood work centers; and mobile working (Kurland & Bailey, 1999). This provided greater opportunities for increasing productivity, higher morale, lesser absenteeism, and minimizing costs and expenses. Likewise, through developments accorded by increased access

Sunday, February 2, 2020

Pre-Attack Techniques Coursework Example | Topics and Well Written Essays - 1250 words

Pre-Attack Techniques - Coursework Example Unnecessary software and daemons should be deactivated and disabled given that they are most vulnerable for attack. Constant patching to system application and software should be done in order to eliminate the gaps and security holes that exist. Installation of new updates and new versions of existing application will ensure heighten and improved security. Constant updates ensure that al the patches are fixed thus eliminating system vulnerabilities (Scambray, 2009). Both hardware and software application forms of firewall such Symantec-Axents Firewall/VPN 100 Appliance and Zone Alarm can be installed in an organization’s system and network. Firewall installation discriminate against access request from unknown and unauthorized sources that may be of potential threat to computer systems and network. Network security assessment is done in order to see and expose the vulnerability that exists within a network and a system. Port scanning an organizations network will reveal the exposed services. Running a vulnerability scanner against an organization’s servers ensures that all the vulnerabilities are exposed and necessary actions taken to eliminate them in order to secure servers. Most of these pre-attack techniques and method for preventing hack attack against an organization are controllable from an organizations perspective. It is up to an organization to put up measures and install the necessary application in order to ensure the security of its systems and information including the network.