Wireless Connections

Gone are the days when one can only work in the confines of the four walls of an office. With the advent of wireless technology, one can do one’s job practically anywhere in the world where there is an internet connection available.

A wireless mouse and keyboard connected via radio frequency allows positioning of these devices to the comfort even of southpaws. Remote connections via infrared allows control over devices not close at hand. Bluetooth connections allow headphones and other devices to connect wirelessly. And WiFi and cellular data networks allow connections to the internet without messy cables and wires.

LAN vs. WiFi.

There was a time when the only way to connect computers was with a thick bulky RJ45 cable connected to a router in a local area network (LAN), allowing two or more computers to share files and an internet connection. But these wires had to be routed through walls, under furniture, along baselines, and were expensive and prone to breaks along its length.

LAN

A “wireless” network connection through a dial up modem was also possible, but this tied up the phone line and was practically useless at speeds of only 56kps.

modem

Wireless Fidelity or WiFi revolutionized all these. It allowed computers to access each other and the internet without cables or wires and at speeds rivaling those of wired networks.

Opportunities.

Being able to access files and individual computers anywhere at any time gives organizations the opportunity for better working efficiency. No longer do employees have to be physically present at the workplace at all times, with the costs and expenses that entails. This makes for a better working environment for employees and higher productivity.

The usual eight hour workweek may be extended indefinitely with these technologies in use, allowing the manager to continue his work even when the office is closed.

Safe usage.

Wireless technology allows the manager and his staff unlimited and unimpeded access to files and data at any time of the day from anywhere. However, others may also be able to access these same resources and use them to unscrupulous ends.

To ensure that no digital intrusions take place that would damage not just the reputation of the company but also is data, safeguards must be set in place, such as a secure connection via VPN instead of an open network, firewalls and routers to prevent unauthorized access, and anti virus programs to prevent infections from viruses and worms.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s