Installation of dispersion-shifted fibre in the british telecom trunk network

1988 ◽  
Vol 24 (9) ◽  
pp. 536 ◽  
Author(s):  
A.R. Hunwicks ◽  
P.A. Rosher ◽  
L. Bickers ◽  
D. Stanley
1989 ◽  
Vol 2 (2) ◽  
pp. 107-112 ◽  
Author(s):  
E. J. Boswell ◽  
J. R. Fox ◽  
W. K. Ritchie
Keyword(s):  
Cable Tv ◽  

Facilities ◽  
1987 ◽  
Vol 5 (6) ◽  
pp. 4-6 ◽  
Keyword(s):  

Author(s):  
David J. Myers ◽  
Charley Nightingale
Keyword(s):  

Author(s):  
Mehdi Khosrow-Pour, D.B.A.

During the past two decades, the business world has witnessed a technological revolution known today as electronic commerce or ecommerce. This revolution has allowed businesses all over the world to conduct business in ways that were unimaginable two decades ago. Through the use of e-commerce technologies, businesses can share and disseminate information electronically and conduct business online so consumers, regardless of their locations, can obtain goods and services from the businesses. Because of the many opportunities e-commerce technologies offer in today’s competitive marketplace, it is essential for organizations to have e-commerce presence and effectively utilize the Internet to expand their businesses. With this Internet presence, ensuring security of their data and sales experiences is of paramount importance. Through the use of effective e-commerce security tools, business can increase their sales,Guy Fitzgerald is professor of information systems at Brunel University and is head of the Department of Information Systems and Computing. Prior to this he was the cable and wireless professor of business information systems at Birkbeck College, University of London, and before that he was at Templeton College, Oxford University. As well as being an academic, he has also worked in the computer industry with companies such as British Telecom, Mitsubishi, and CACI Inc., International. His research concerns the effective management and development of information systems and he has published widely in these areas. He is probably best known for his work in relation to development techniques and methodologies and is the author of a major text in this area entitled Information Systems Development: Methodologies, Techniques and Tools, now in its fourth edition. He is also well known for his research in the areas of strategy, outsourcing, and executive information systems. His most recent research is concerned with the development of flexible information systems to enhance organizational agility. He is founder and co-editor of the Information Systems Journal (ISJ), an international journal from Blackwell Publishing, and he has been a member of many international Program Committees, including the International Conference on Information Systems (ICIS) and the European Conference on Information Systems (ECIS).


Author(s):  
John Davies (BT) ◽  
Ian Thurlow (BT) ◽  
Paul Warren (Eurescom)
Keyword(s):  

2009 ◽  
pp. 1175-1182
Author(s):  
David Wright

At the time of writing (1Q06) most countries have a small number (2-6) of major cellular operators offering competing 2.5G and 3G cellular services. In addition, there is a much larger number of operators of WiFi networks. In some cases, a major cellular operator, for example, Deutsche Telekomm and British Telecom, also offers a WiFi service. In other cases, WiFi services are provided by a proliferation of smaller network operators, such as restaurants, laundromats, airports, railways, community associations and municipal governments. Many organizations offer WiFi free of charge as a hospitality service, for example, restaurants. Cellular services offer ubiquitous, low data rate communications for mobile computing and commerce, whereas WiFi offers higher data rates, but less ubiquitous coverage, with limitations on mobility due to business as opposed to technology reasons. Emerging networks for mobile computing and commerce include WiMAX and WiMobile (Wright, 2006), which offer higher data rates, lower costs and city-wide coverage with handoff of calls among multiple base stations. These new technologies may be deployed by the organizations that currently deploy cellular and WiFi networks, and also may give rise to a new group of competitive wireless network operators. This article identifies the capabilities needed for mobile computing and commerce and assesses their technology and business implications. It identifies developments in the wireless networks that can be used for mobile computing and commerce, together with the services that can be provided over such networks. It provides a business analysis indicating which network operators can profitably deploy new networks, and which network operators need to establish business and technology links with each other so as to better serve their customers. The resulting range of next generation service, technologies and network operators available for mobile computing and commerce is identified.


Technovation ◽  
1986 ◽  
Vol 5 (1-3) ◽  
pp. 115-124
Author(s):  
Jeffery J. Wheatley
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document