Skip to main content

CASE STUDY- VODAFONE GLOBAL COMPANY (LITERATURE REVIEW)

  Historically, The telecommunication in the UK was really started in 1870, when the post office acquired the UK Telegraph Service. This acquisition allowed the nation to use a wide communication service across the country easily, which contributed to increase the telecom transactions rapidly around 7 million telegraph in this year. (UK Telephone, 2020) Nowadays, with the noticeable evolution In the telecommunication services, the UK telecom sector is considered one of the largest telecom market in Europe. Numerous telecom companies compete to getting the latest telecom technology and offering different services. (GlobeNewswire, 2020) Various of telecom companies could compare them according to their market value, for example, the market value of the Vodafone company is around 63 billion$, which lead it to be on the top of the list of the strongest telecom companies in the UK as well as a big gap with Sky company which ranked second in the list with a value of 9 billion$. (Statista, 2020)
Sources:
Britishtelephones.com. 2020. UK TELEPHONE HISTORY. [online] Available at: <https://www.britishtelephones.com/histuk.htm> [Accessed 26 November 2020].
GlobeNewswire, 2020. The UK’S Telecom Market Remains One Of The Largest In Europe. [online] GlobeNewswire. Available at: <https://www.globenewswire.com/news-release/2020/05/25/2038174/0/en/The-UK-s-telecom-market-remains-one-of-the-largest-in-Europe.html> [Accessed 26 November 2020].
Statista, 2020. Most Valuable Telecom Brands In The UK 2020 | Statista. [online] Statista. Available at: <https://www.statista.com/statistics/292061/most-valuable-telecommunications-brands-in-the-united-kingdom/> [Accessed 26 November 2020].

Comments

Popular posts from this blog

WHAT IS THE CYBER SECURITY !!!!?

    Cyber security is the mode of defending computers, servers, mobile devices, electronic systems, networks, and data from hacker attacks. (What is Cyber Security?, 2020) we can be divided the cyber security into a few common categories: 1) Network security. 2)Application security. 3)Information security. 4)Operational security. 5)Disaster recovery and business continuity. 6)End-user education. (What is Cyber Security?, 2020)   An essential job in cyber security is protecting kinds of technology devices and Sensitive data from hacker attacks. (Taylor, H. 2020) These attacks impact on a different variety of users, whether if they are governments, individuals, institutions, banks, universities, Etc The methods of hacker attacks consist of many technical tools, these technical are developing rapidly to stay invisible and penetrate through the protective technical walls to harm or steal the personal data. (Taylor, H. 2020) The following types show the popular methods using by the hacker f

My First Step in the Technological World

(Wondershare Group., 2020)   Well👀 I think you are waiting for my story with the Technology💻. I used to collect many types of computer when I was 15 years, it was one of my interests.  I have been developing my skills in Technological space which contributed to change my concept about the Technology.  In Saudi Arabia, the Saudi Federation for Cybersecurity and programming are interesting in development and encouragement the Technology Fields in many ways 📣; I was very excited to discover where I can find my self in this project?💭They have been doing many conferences about the latest science in the field of Technology📷, and made technology competitions and many courses in Cybersecurity, Programming, Encryption and many other sections participating by many computer experts.   In 2018, the biggest Hackathon in the middle east was in Saudi Arabia called HACKATHON ALHAJJ, which supported by GOOGLE.  Many programmers and designers competed to find an application to help  visitors of  MA

SOFTWARE FUNCTIONALITIES EXPLAINED(CISCO PACKET TRACER)

Menu Bar: This bar shows  File ,  Edit ,  Options ,  View ,  Tools ,  Extensions , and  Help  menus. commands such as  Open ,  Save ,  Save as Pkz, Print , and  Preferences  in these menus.  Main toolbar: This bar shows  icons to the  File  and  Edit  menu commands, buttons for  Copy ,  Paste ,  Undo ,  Redo ,  Zoom , Drawing Palette ,  Custom Devices Dialog . On the right,  there the  Network Information. Real-time/simulation Bar: here you can choose between real-time mode or simulation mode. User Created Packet Window: This window shows the packets you place in the network during the simulation process. Network component box:  This bar contains all of the network and end devices available with Packet Tracer. Workspace: This is the area where the project is created, and simulations are displayed.