...Erik Peterson, general manager of Green Mountain Cellular Company (GMCT), a Cellular Communication Services, Inc. (CelluComm) subsidiary located in New Hampshire and Vermont, currently has 2 weeks to prepare for a meeting with Chip Knight, the recently appointed director of pre-operating systems for CelluComm. Peterson has faced numerous issues that prior management seems to ignore or consider inaccurate, and thus, Peterson feels that it is of upmost importance to accurately explain current issues to a new voice of reason. The first issue facing Peterson is that GMCT is a relatively new division in the CulluComm family, meaning that Peterson will be challenged by occurrences that previously haven’t been documented. Initially, Peterson was under the impression that he would be reporting to Ric Jenkins, CelluComm’s president and founder. However, Peterson soon found out that he would actually be reporting to Jeff Hardy, director of budgets and planning. To Peterson’s dismay, Hardy has little prior experience and is unable to offer advice and support to a new manager who could use minor guidance in regard to these two areas of company growth. Cell tower construction is also several weeks behind schedule, which means that the turn on rate for new customers is not what it should be and thus, cell service is disrupted. Efforts to get the subcontractor to increase construction completion times failed and aggravated customers have begun to complain of poor cell phone coverage, as expected...
Words: 1112 - Pages: 5
...Erik Peterson Starting a new position does not always go as planned. For Erik Peterson, a newly appointed GM, he faced problems in concerns to the turn on date for Green Mountain Cellular Telephone Company (GMCT). Problems delaying the date began right away. Erik planned on reporting to the tough and impressive president of CelluComm the fast growing cellular company, Ric Jenkins, however he was reporting to Jeff Hardy, Director of Budgets and Plans of CelluComm. Another problem Erik faced was the frequently used subcontractor company that was constructing the cell towers was behind schedule and facing complaints from citizens related to cutting private property. To make matters even more complicated, Curt Andrews the Chief Engineer at GMCT was a poor planner and failed to prepare the five activities necessary for the turn on date. To help pick up the pace, Erik hired three more young professionals who unfortunately did not have a lot of experience in the industry but did have impressive credentials. When Curt and another employee found out about the new employee's salaries, their protests led to the new employee taking a pay cut. Another obstacle was that the equipment selection was delayed because headquarters delayed decisions and made changes to the specified equipment resulting in constant changes in patterns for GMCT. Altogether, Peterson faced problems with communication, employees, money, subcontractors, citizens, zoning, and time constraints. Luckily...
Words: 1300 - Pages: 6
...11 PLAN OBJECTIVES 11 PLAN ASSUMPTIONS 12 Definitions 12 PROCESSING ENVIRONMENT 13 Scope of Recovery 13 Environment Description 13 Essential Equipment 13 Disaster Recovery Scripts 15 RECOVERY PLAN ELEMENTS 17 1. Recovery Plan for Major Disasters 17 A. Detection and Reaction 17 B. Identifying the problem – Notifying the authorities 17 C. Establishing a Command Center 17 D. Reducing Exposure 17 2. Roles and Responsibilities 20 A. Management / Damage Assessment Team: Initial Response 21 B. Disaster Recovery Teams — Emergency Contact List 22 (AGENCY) FUNCTIONAL AREA MANAGERS 23 3. Recovery Plan for Major Disasters 24 A. Establishment of Full Recovery at Backup Site 24 B. Disaster Recovery Team Checklists 24 C. Restoration of Facilities and Operations at the Original and/or Alternate Site 24 4. DISASTER RECOVERY TEAMS 24 A. Emergency Contact List in Section 2-B & Activity Checklists Provided in Section 3-B 24 B. Description and Responsibilities 24 C. On-going Functional Responsibilities 29 5. Providers 30 A. New and Used Hardware Providers 31 B. Software Providers 31 C. Communications Providers 31 D. Special Equipment...
Words: 17396 - Pages: 70
...Rodger Covino 21NOV13 COM/150 Week 7 – Introduction and Conclusion Today, the world is more dependent on technology than ever before. More than 90% of Americans own a computerized device (Gahran, 2011). People received text messages and emails on their cell phones, go online to order food, cars are able to park themselves, and while driving, the lights are controlled by centralized computer system (Greenman, 1998). The truth of the matter is, that people have become so dependent on technology that they are not prepared for any type of service interuptions. With non-disaster related blackouts up 124% since the early 90’s (Patterson, 2010) and the increase in disruptive weather patterns, people should start taking steps to sever their dependency on technology, or at the very least have a solid plan in place for when things go black. We should also pay more attention to the information that we make available online. The most damaging information is the information that we make readily available with little regard for who might be viewing it. People are entirely too dependent on technology related services for communication, commerce, and social media. Our over reliance on technology is causing the social life of many individuals to become distorted. Before the boom of technological growth, people socialized and interacted, but today many people prefer connecting with their friends and family through social media, as opposed to face to face communication. The relationships...
Words: 1481 - Pages: 6
...business’ best interest to practice backup quite often. That will ensure the most up to date information being stored and saved. With natural disasters occurring every day, a business must always prepare for the worst. That is why having a disaster recovery plan is critical to ensure the business isn’t halted for hours, days or weeks. A disaster recovery plan is a plan to basically be able to get back to work after a disaster. This includes recovering information, recovering the system, and having a new location already set for you to get the ball rolling again. Most organizations have either a hot cite, warm site, or cold site. A hot site, which is a separate facility with fully loaded equipment standing by, is probably the best option to have. A warm site has the computer equipment, but needs to be installed and properly configured. A cold site has none of the above, but is simply a...
Words: 510 - Pages: 3
...To identify the areas of environmental concerns I will discuss the four pillars of the army’s environmental strategy model. The areas of environmental concerns for the mission will include archaeological sites, air & water pollution, endangered plants and animals, hazardous waste and solid waste, management of pesticides use, transportation of hazardous materials, handling usage and disposal of military munitions. To prevent the environment from damage and contamination I will brief my soldiers on the four pillars, which are compliance, restoration, prevention and conservation. Identify the mission related environment risk by using the military decision making process. (MDMP) This process is made up of 7 steps receipt of mission, mission analysis, COA development, COA analysis, COA comparison, COA approval and orders production. This will help identify environmental hazards, assess environmental hazards to determine risk, develop & implement controls, supervise and evaluate. For this mission I would inform the soldiers of all the environmental hazards and inform them of all the risk. Then I will implement a course of action to protect the environment and monitor the activity. To identify potential effects of environmental factors on missions and operations you must know the ground, know the weather and your victory will be total. This will give you strategic, operational and tactical advantage. Some of the potential environmental factors are battle space...
Words: 264 - Pages: 2
...There is little doubt that the use of GPS for navigation purposes is a huge industry. That was, after all, one of the initial impetus behind the Department of Defense creating the satellite system. They wanted a way to know where they assets were but they also wanted to us it to tell where there assets were going. GPS navigation has become the norm in many families across America with Garmins or TomToms or Magellans replacing the friendly AAA triptiks of two decades ago. I still remember as a child going into the AAA office with my mother to get a triptik ready for a family vacation. Now, you just enter your trip into the GPS and it does all the routing for you. Cell phone companies realized that this was a huge market and that their technology could easily break into it. They could either us GPS technology to do the mapping just like a Garmin can, or they could leverage the cellular signals they were already broadcasting to create new navigation systems. Some companies decided to go with GPS and other stuck with the cell signal. Either way you look at, cell phones now use GPS or a GPS-like technology to give turn-by-turn directions to drivers all over the country. While this isn’t GPS tracking as most would think of it, it still is using a cellular phone to track and record position information. It can tell people how to fast you are traveling, an ETA (estimated time of arrival), and it can actively tell you your current location. This is GPS tracking if you ask me....
Words: 844 - Pages: 4
...Objective APPLICATIONS CITY CLERK HR FINANCE Millennium – Internal Payroll Processing 0 0 0 Access to External Ameripay Payroll Service 0 0 0 Collector’s Office System (Access) 1 Week 1 Week 1 Week Building Department System (Access) 1 Week 1 Week 1 Week Water Department System (Access) 1 Week 1 Week 1 Week PeopleSoft (HR System) N/A 0 N/A Because the applications within each of the departments itemized above have differing RTOs and RPOs, the Disaster Recovery Technology Strategy will be dictated by those applications requiring the lowest RPOs (zero (0)): Millennium-Internal Payroll Processing, Access to External Ameripay Payroll Service, and PeopleSoft (HR System). b. Disaster Recovery Technology Strategy: Option #1 – A Hot Site for Continuous Availability utilizing an internal strategy which...
Words: 1796 - Pages: 8
...and cold recovery sites. Cold recovery sites This is an appropriately configured room or space in a building with no server-related equipment pre-installed. It provides power, cooling and office which is used in case of an outage or disaster in the main work site. The staff moves to this site when a disaster is declared. It does not include any backed up copies of the data and information from the main or original work site location. For this reason it is considered the most inexpensive backup as there is minimal start-up cost. However, it takes more time to have it running at a capacity almost the same or the same as that of the original site before the disaster. For the service to be restored, the last backups from the off-site storage locations must be delivered and a few hardware components set up before recovery can start. Hot recovery site This is an exact copy of the main work site of the organization or the datacenter, it is actually said to mirror the original site. It is equipped with full computers and complete backups for the user data. There also servers, cooling systems power and an office space (if needed). Using a wide area network and specialized software, the site is run concurrently with the original site to provide an immediate failover system in case of a disaster. It takes the organization few hours or less to recover from a disaster with minimal losses. An organization can have the capacity to relocate all the personnel to the hot site if necessary. This...
Words: 693 - Pages: 3
...unreliability. Physical Preparations: * All pets wear collars that are clearly marked and coincide with their primary key in our database. * Backup lighting installed and inspected quarterly - 12hr battery life. * Backup generator with fuel to last 72 hours. * Emergency food and water stored in basement. * Three hard copy evacuation routes for each hot site location * Emergency printable animal / owner roster pre-created & available to be printed at any time. * Emergency backup power for server and main computer (allow time for generator to power on) Before: This is a challenging step because in this part of the plan you must decide if you will be staying or evacuating. The safest time to evacuate is prior to the emergency. If you've determined the hurricane will be manageable and you stay, you will have to: Monitor news, check battery levels, maintain accurate roster, touch base with alternate hot sites, prepare a go kit should you have to move (includes evacuation route maps, swappable hard disks, pet / owner rosters, employee emergency contacts, DR plan), contact hot sites and determine availability During: Unfortunately, this is often the most helpless of the steps. Number one priority should be safety. Individuals should move to predetermined hurricane locations in the center of the building under tables or other supportive objects. This is a time to keep each other calm and wait it out. Things to consider doing if safely able to...
Words: 765 - Pages: 4
...Laboratory 7: Security Basics December 1, 2014 Lab 7: Security Basics Task 1: Procedure 1. Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Locate an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zonelabs Zone-Alarm firewall is an example of a software firewall. a. Cisco RV082 Dual WAN VPN Router i. Dual Fast Ethernet WAN ports for load balancing and/or business continuity ii. Built-in 8-port Fast Ethernet switch iii. Strong security iv. High capacity VPN capabilities v. Optional cloud-based web security service vi. Support for Small Business QuickVPN software b. Linksys WRT54GS Wireless i. G Broadband Router with SpeedBooster IEEE 802.3/3u, IEEE 802.11b/g ii. VPN Pass Through iii. Stateful Packet Inspection (SPI) Firewall, Internet Policy Wi-Fi Protected Access 2 (WPA2), WEP, Wireless MAC Filtering Task 2: Procedure 1. By 2010 the number of different known viruses numbered over 4 million. Many companies produce anti-virus programs to help protect your computer against these threats. Some of the companies are Panda, Norton, McAfee, AVG, and Kaspersky. Which of these companies provide free versions of their software? Which ones provide trial versions? a. Free versions i. AVG b. Trial versions i. Panda ii. Norton iii. McAfee iv. AVG v. Kaspersky 2. Viruses and other...
Words: 1291 - Pages: 6
...Optimized Location Aware Applications on iOS Content 1. Abstract………………………………………………………………1 2. Introduction…………………………………….…………………….1 3. Design & Analysis…..……………………………………………….2 3.1. Positioning Technologies………………………………………2 3.1.1. Cellular Triangulation……………………………………2 3.1.2. Global Positioning System (GPS).……………………….3 3.1.3. Assisted GPS (A-GPS).…………………………………..4 3.1.4. Wireless Positioning System (WPS)……………………..4 3.2. Location Detection on iOS…………………………………......5 3.2.1. Standard Location Service……………………………….5 3.2.2. Significant Location Change Service…………………….6 3.2.3. Region Monitoring Service……………………………....6 3.3. Challenges on iOS……………………………………………...6 3.3.1. Inaccurate Location Updates……………………………..6 3.3.2. Invalid Location Updates………………………………...7 3.3.3. Battery Drain…………………………………………......7 3.3.4. Limitations of Application Background Mode…………..7 3.3.5. Challenges with Significant Location Change (SLC).…...8 3.3.6. Challenges with Region Monitoring……………………..8 3.3.7. Privacy and Security……………………………………..9 3.4. Optimized Geo-fencing solution on iOS……………………….9 3.5. Addressing Privacy and Security Concerns……………………11 4. Conclusion…………………………………………………...............12 Optimized Location Aware Applications on iOS 1 Sourabh Raheja Abstract Location aware applications are intuitive and have much better user experience. However there are number of challenges associated with development of location aware applications for mobile devices. Some of them being battery drainage by accurate...
Words: 4684 - Pages: 19
...master’s degree from Dartmouth’s Thayer School of engineering. He had worked as designer engineer at avionics equipment. Moreover he had been an Officer in the US Army Signal Corps. He interviewed companies in industry as part of his second year job search, and interviewed by Ric Jenkins, its president and founder. He had no previous worked experience in cellular industry. Cellucomm Organization was a challenge for Peterson he felt very fortunate to have opportunity to work directly under Jenkins. Background: Erik Peterson was hired as general manager at Green mountain Cellular, (GMCT) one of Cellucomm ‘s subsidiaries. It is a “pre operating “system and still in construction phase. GMCT will serve 400,000 people and operate 21 cell sites, 16 sites were anticipated to be ready by turn on date and five other in eight month following GMCT is one month behind the target because of numerous problem, the revised turn on date is April 1st and Peterson is schedule to meet Knight in two weeks to discuss various problem that have led to delay. Cellular Telephone Industry Overview: The cellular mobile telephone industry was established in early 1980s. It was new technology that allowed geographic area to be divided into “Cell”. Within each cells a tower communicated with the cellular mobile phone via radio signals. Each tower is...
Words: 485 - Pages: 2
...Cellular Debate Name Course Date Tutor Network Security Issues on Cellular Network One major advantage of Cellular network security is the ability of communication to be done “Wirelessly” (Xiao et al, 2007). This means that the signals do not follow a specific assigned signal path which may be destroyed by vandals or even by nature, as in case of copper conductors or other physical media such as fiber optic. In addition, data security is enhanced by used of packed switched data in which data is send in form of packets and at no particular order only to be reconstructed at the receiver which makes intercepting such messages cumbersome. In addition, user authentication allows only specific users registered to a specific cellular service provider to use their resources thus allow proper billing to be charged according to the usage of the network(Xiao et al, 2007). A security issue that arises from the use of the cellular networks is subscriber authentication. These systems consist of a large number of subscribers who need to be identified and verified before they can enjoy the services offered by the provider. If authentication is not properly done, then the network is vulnerable to misuse by subscribers not entitled to use the network leading to the service provider incurring losses. Confidentiality is another security issue that can be noted in cellular network (Ciampa, 2009). This is because the ‘air’ channel can be intercepted by malicious people and...
Words: 785 - Pages: 4
...Mobile Databases Roosevelt Smith, Jr. DBM 384 November 12, 2012 Jim Cervi Mobile Databases Databases provide individuals and organizations the means to track various types of information. According to Stephens (2009), “A database is a tool that accumulates information, and lets one produce, read, revise, and remove the data in some manner.” (p. 23) A mobile databases is a databases that can be connected with by a linking with a laptop device over a mobile system. A mobile database provides a portable and physically separate system form the main system; however, it is still able to link to the main system through remote sites for various file sharing of company data. Mobile Database Platforms The incorporation of mobile databases in use throughout society today, provides the integration of various platforms devices. Some of the mobile database platforms devices include laptops, personal data assistants or (PDA’s), and cellular phones. In addition to the mobile platform devices, on must also consider the various server support for the client platforms that include: * Java * Android * Blackberry * Windows Desktop & Mobile * Linux Many programs and applications like databases require the need or capability to acquire data from an intelligence depository and conduct operations on this data even after out of area. SQL Support Sybase Inc.’s SQL Anywhere controls the mobile-database arena, surrounding 68 percent of the mobile marketplace...
Words: 506 - Pages: 3