Preview

VoIP at Butler University

Good Essays
Open Document
Open Document
987 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
VoIP at Butler University
Butler University identified weaknesses in the existing campus communication systems. Chief Information Office (CIO) Scott Kincaid’s identified the need to upgrade or replace the Centrex system as Butler student enrollment and administrative data communication needs had outgrown its usefulness. Arguments for the Centrex system were that users found the system reliability to be beneficial. Once employees have a system that meets their current needs, some are reluctant to go embrace the next step to enhancing job capabilities. The majority of students liked having campus provided email even though 92% had cell phones.
Various problems were associated with the existing system but it was not without failure.
For no other reason than advances in technology, the current analog system had become outdated and hard to customize. Moving lines was labor intensive with student and administrative shifts. Changes become labor intensive and difficult to perform because not only is the hardware difficult to repair, at a certain point the system will be so antiquated that it won’t be compatible with new vendor technology upgrades outside of Butler. A large amount of administrative time was spent reconciling the current billing system each month showing that again unnecessary labor was a hindrance to efficiency.
Changes aren’t without risk and administrative staff viewed merging data and voice networks was viewed as risky. A major concern was regarding the voice quality of VoIP technology. The IT department also knew that network security risks were a concern addressing other data network risk concerns post 9/11. An efficient and flexible integrated emergency notification system was required to remedy this concern. Campus administration also feared virus attacks that commonly affected data networks. Unified communications is a term used to describe a system that integrates call and data communication applications that are interactive and collaborative with real-time and

You May Also Find These Documents Helpful

  • Good Essays

    “The payroll department wants to purchase a new payroll software package. Human Resources has received many complaints regarding inconsistent calculations and delays in payment due to the current manually intensive process. Senior management has approved this as a top priority for the company.”…

    • 746 Words
    • 3 Pages
    Good Essays
  • Better Essays

    You are the systems administrator contracted by Leonard Cooper to upgrade the local area network to meet the ever-increasing needs of the building's students and faculty members. Your first task is to interview key stakeholders to determine what the key areas of concern are.…

    • 1095 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    C200 Task 1

    • 4180 Words
    • 12 Pages

    The organization chosen is ABE Defense Systems. ABE Defense Systems is a global organization and a premiere defense contractor, specializing in defense, aerospace and cyber security. The organization that will be discussed is the network operations center of ABE Defense Systems. The leader selected is the director of the network operations center. The reason the director of network operations center was selected was to better understand the role and requirements of the position. This is a challenging position, responsible for the oversight and operations of all information technology’s “break and fix” services provided to its customers, the engineers and non-technical employees of ABE Defense Systems.…

    • 4180 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kincaid and his team are looking to improve overall communications and campus safety. This will center on the students need to communicate within Butler University and their need for voice mailboxes (Valdes, Robert and David Ross). These improvements will also handle the countless number of calls that are frequent from employees and students.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the given scenario of being the system support tech at the Premier Collegiate School, performing a risk analysis of the school infrastructure is highly important when wanting to secure the network. The school has two servers, one for administration and the other for students which seems kind of odd. And has a wireless access for the students with their own laptops. There is also one computer lab that is dedicated for the students to perform their computer science studies.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1310 NFPA Codes

    • 1390 Words
    • 5 Pages

    In order for us as a person and an IT Administrator is to stay safe. History has shown the safety departments about having to write policies which are used to provide recommended practices for the design and installation of safety standards with the Telecommunications infrastructure that will support a wide variety of existing and future services, using industry accepted design and installation methods.…

    • 1390 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Final Exam Review

    • 1475 Words
    • 6 Pages

    | The efficient coexistent of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures…

    • 1475 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Kaplan 560

    • 604 Words
    • 3 Pages

    Butler’s decision to move towards of VOIP technology is a wonderful notion. VOIP is modernizing the way we communicate and will help line up Butler for great successes in area of communications and networking. Considering latest technology for communication available with other competitors in the industry, without the procurement of this new technology Butler’s is undertaking a huge disservice to its staff and students and may earn bad reviews in industry that can cause damage to its business. The new VOIP system will allow Butler to provide more immediate access to Butler’s personnel and student faster in case of any emergencies and critical times by using newer services such as multiline and self-labeling telephone devices and online directories (Brown, 180). This will reduce significant amount of manually work and processes from Butler’s IT department list. In long run this will not only save money to Butler in managing communication among personnel and student but will also make butler confident that in case of an emergency the system will work and keeps communications up.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    As the organization’s IT security professional, you have been asked by your organization’s CIO and CEO to suggest steps and techniques that would mitigate risks associated with VoIP and SIP applications at the same time, maintaining the controls provided via C-I-A model.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In today’s business environment, effective business communication is a necessary component of achieving results. Technology has improved so much that the postage stamp is rarely used to communicate in business. Gone are the days of fiber optics, now, a simple e-mail, and customers, clients and employee are notified within a mere second.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cisco Case Study Example

    • 291 Words
    • 2 Pages

    The President has approved the purchase of LAN hardware and software, the specific details of which shall be recommended by you, the Network Designer/ Administrator. All officers (i.e., chancellor, deans, college secretaries, and head librarian) shall each be provided a desktop PC, notebook computer and printer. The GSASE, GSE, GSM, XYZ-OU and PRMSPG shall each be provided a server, printer and fax as well as a PC for each of their staff. The TOP, Conference Room and the Graduate School Library shall have 10 PC units and 2 printers each.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays