Verified Document

Telecommunications Issues In Telecommunications Networks Essay

There are many different methods for creating and utilizing such systems, and one large set or class of such approaches has been labeled the Systems Development Lifecycle Approach. In this perspective, systems or projects are seen as being continuous processes made up of constituent parts, each one of which feeds into the next. There are many different ways to view or arrange separate system elements or project phases within the larger Systems Development Lifecycle Approach, but regardless of which specific system perspective is utilized the basic structure remains the same: one part of a system or project must be competed and the output utilized further along, possibly in a cyclical relationship and sometimes in a more linear fashion (Kay, 2002; Radack, 2012). Using this approach in large corporations is now quite commonplace. In order to begin the standardized use of a Systems Development Lifecycle Approach within a multinational organization, there would first need to be an intense educational program within the organization. The importance of utilizing such a system and achieving organizational consistency in its use should be made clear to all relevant organizational members, and this importance is difficult to overstate. As this approach has implications for security, efficiency, and operations, deviance can cause significant problems (Raback, 2012; Kay, 2002).

Once the overall importance of the Systems Lifecycle Development Approach has been established through the educational initiative, examples of its use should be given using real projects in the company. That is, the individuals involved in these projects should need to create and utilize work breakdowns based on the identified approach and guided as necessary b those already familiar with the system....

This will enable the practice and the necessary knowledge to become embedded in the company from the bottom up, beginning with smaller projects and eventually being applied to larger and more complex undertakings at the company. Different specific approaches within the larger set of Systems Lifecycle Development Approach can also be incorporated into the learning that takes place in the organization as the overall approach becomes more familiar, enhancing the usefulness and the degree of complexity that this perspective can be applied to (Kay, 2002).
Like any project, the transition to the use of a Systems Development Lifecycle Approach must be undertaken in phases, and proper controls must be utilized in each of these phases in order to properly control the overall outcome. With proper education and development, the implementation and standardization of such a perspective and organizational approach can lead to a significant enhancement in the efficiency and the general capabilities of the organization and its members through the use of more comprehensive and detailed analyses of project needs. This can only lead to more effective growth for the business.

References

Hussain, K. & Hussain, D. (1997). Telecommunications and networks. New York: Elsevier.

Kay, R. (2002). Systems Development Life Cycle. Accessed 25 February 2012. http://www.computerworld.com/s/article/71151/System_Development_Life_Cycle

Malphrus, S. (2010). Undersea Cables and International Telecommunications Resiliency. Washington, DC: Board of Governors, Federal Reserve System.

Radack, S. (2012). The System Development Lifecycle. Accessed 25 February 2012. http://csrc.nist.gov/publications/nistbul/april2009_system-development-life-cycle.pdf

Sources used in this document:
References

Hussain, K. & Hussain, D. (1997). Telecommunications and networks. New York: Elsevier.

Kay, R. (2002). Systems Development Life Cycle. Accessed 25 February 2012. http://www.computerworld.com/s/article/71151/System_Development_Life_Cycle

Malphrus, S. (2010). Undersea Cables and International Telecommunications Resiliency. Washington, DC: Board of Governors, Federal Reserve System.

Radack, S. (2012). The System Development Lifecycle. Accessed 25 February 2012. http://csrc.nist.gov/publications/nistbul/april2009_system-development-life-cycle.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Features of Telecommunications Networks, Including Key Networking
Words: 1323 Length: 4 Document Type: Essay

features of telecommunications networks, including key networking technologies. Cover the Open Systems Interconnection (OSI) model, including each logical layer. The OSI layer covers the different layers and types of communication that occurs within a network. The layers, in order of complexity from greatest to lowest are application, presentation, session, transport, network, data link and physical. The physical layer is the actual transport medium like network cable and such while routers

Telecommunications the Business Case FedEx
Words: 1786 Length: 6 Document Type: Research Paper

It is not known what cost FedEx will have to pay for a durable but reliable smartphone. Most such devices are not designed with longevity in mind, and FedEx normally utilizes devices with long lives. FedEx would be equipping upwards of 200,000 workers, so even negotiating a deal to pay $200 per unit would cost the company $40 million. In all likelihood, however, the cost will be much higher,

Telecommunications Law the USA Patriot
Words: 7930 Length: 25 Document Type: Thesis

The law's intended purpose of preventing and detecting future attacks was the dominant concern of lawmakers. Yet, the hasty manner in which the law passed through Congressional lawmaking processes causes opponents to argue that lawmakers gave disproportionate consideration to the law enforcement and intelligence community's viewpoint in drafting the provisions. It is thought that in the future the law will face many challenges in the court system. Even though

Telecommunications - Jordan the Impact
Words: 11320 Length: 34 Document Type: Multiple Chapters

According to Reidenberg (2000: 1318), policy in the United States protects personal information according to a market-dominated paradigm, where limited statutory and common law rights are granted for information privacy. In Europe, on the other hand, the privacy protection norm is dominated by privacy rights. The European Union, for example, requires Member States to include comprehensive statutory protections for its citizens when it comes to privacy rights. The fact that

Telecommunications and Diplomacy Telecommunications Is
Words: 2980 Length: 10 Document Type: Term Paper

Track II diplomacy takes over when Track I fails. A third great revolution has been described as enveloping the world in modern times (Wriston 1997) and the catalyst has been technological change. Technology, or telecommunications, has astoundingly affected the sovereignty of governments, the world economy, and military strategy. What took a century for the Industrial Revolution to do is nothing like what the combination of computers and telecommunications has been

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now