question archive Identify the hard and soft technology used for both the domestic and global environments of Tmobile This is not about computers or software; see Lesson

Identify the hard and soft technology used for both the domestic and global environments of Tmobile This is not about computers or software; see Lesson

Subject:BusinessPrice:2.84 Bought6

  1. Identify the hard and soft technology used for both the domestic and global environments of Tmobile This is not about computers or software; see Lesson.
  2. Identify the technology barriers to your chosen company in both environments.
  3. Discuss how the company can overcome these barriers.
  4. Evaluate the strategy used and how the company should protect its technology.

 

 

lesson

 

Hard and Soft Technology Companies

The distinction that we make between "hard" and "soft" technology companies (not the technology itself) in business is helpful to understanding the Technological Environment.

 

hard technology company is a developer of technology; this company produces -- actually develops/makes/sells -- the technology itself and technology products - both hardware and software - as its primary business activity. Companies like Intel (PC chips), Cisco (network chips), Microsoft (PC software), Verizon (wireless networks), Apple (smart phones), etc. are clearly in this category. A soft technology  company is the user of the technology. 

 

For more than 50 years, virtually every enterprise (including corporations, non-profits, government agencies, military organizations) has been using technology to improve the administrative side (e.g., accounting, payroll, HR, inventory management) of their operations. More recently, technology has entered operational areas of the enterprise. Examples are customer service, supply chain management, automated manufacturing, and robotics.

 

Now, even traditional soft technology companies like Ford, GM, Boeing, GE, Frigidaire, etc. are building more and more embedded technology into their products to increase profit margins and customer appeal. A new car contains hundreds of microchips, actually small special purpose microcomputers), to implement new features customers demand. Same with a washer, dryer, refrigerator -- with control panels are looking more like the flight deck of a futuristic starship than an appliance.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

1.The company has designed code for a platform called Pacbot. 

Step-by-step explanation

T-Mobile uses the platform for security and compliance assessment and automation. By using the platform, the infrastructure
used by the organization for security is compared to other best practices for security which helps
improve the policy for governance and the internal security measures. Uses this to enhance data
security of its clients all over the world.
-Jazz which is a platform for developing applications without the use of a server. Jazz is a
platform that allows its users to create application with the click of a button which allows
organization to use application without necessary having a server. T-Mobile sell the access to
this platform to its clients who are able to create apps and websites.
2.The main barrier to the use of this technology is the high prevalence of security issues that
arise from the adoption of use of technology. When the organization offers Jazz to customers to
aid in developing of apps and websites, then it should increase the security on such a platform
since the compromise of that platform could lead to exposure of the data stored in such a
platform to people who are not authorized to access it.
3. To better protect its data, the organization should come up with ways to increase security of
the client's data. Since the organization employs less use of servers, then a firewall would not be
appropriate. 

4. Applications or platforms to improve security should be designed. Pacbot was
introduced by T-Mobile to help improve the compliance with the security best practices. This has
been used to improve the adherence with the AWS accounts of the organization and help to
better protect its client's data. All the resources used by the organization, including Jazz are
protected by Pacbot which check if the resources are compliant with the set security measures
and the reports for such an assessment is prepared improving security.

Related Questions