Tuesday, September 10, 2019
Information Systems - UPS Case Study Example | Topics and Well Written Essays - 500 words
Information Systems - UPS - Case Study Example Aside from being able to communicate better with other UPS staffs and its global business partners, the use of a highly reliable networking technology made it possible for UPS to create competitive advantage by allowing its customers track down the status of their packages. To improve the efficiency of its delivery services, UPS decided to invest in networking technologies such as wireless LANs, latest scanners, GPS, wireless Bluetooth connection worldwide, WiFi technology, PDAs, mobile phones, and Ethernet among others. Using these technologies, UPS was able to integrate information concerning its trucking system, ship-based and airplane shipments. It is said that UPS sends the information coming from the scanned labels using Bluetooth devices to allow the retransmission to wireless LAN. The problem with using the Bluetooth technology is that errors may occur in the ACL packet (Olenewa 173). In case the UPS staff has failed to retransmit the data, there is a risk wherein certain information will not be integrated together with the entire UPS package tracking information that is supposed to be available worldwide. Often times, error connection using the Bluetooth devices can either be classified as the ââ¬Ë1/3 rate Forward Error Correction (FEC)ââ¬â¢, the ââ¬Ë2/3 rate Forward Error Correction (FEC)ââ¬â¢, and the Automatic Retransmission Request (ARQ)ââ¬â¢ (Olenewa 173). Specifically the use of Bluetooth can lead to security problems such as virus attacks (Oates) or disclosure of private information (Laurie and Laurie). On top of security concerns, it is important to take note that Bluetooth devices are dependent on the use of battery (Olenewa 173). In the absence of charger, UPS staff will not be able to send out important data on a timely basis. To avoid communication and coordination problems, UPS staff should be trained on how to handle cases related to security problems and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment