Mobile Computing Overview Amit Sachde CGI Director Consulting
Agenda Background Convergence Considerations Summary
Background Mobile Workforce Technology options continue to grow at a fast pace Need for ability to communicate, collaborate, consume while not within the classic office environment
Convergence PDA? Tablet? Pocket PC? 9/19/2018
“Ultra-mobile PC (UMPC)” Convergence Start with the requirements – not with the device “Ultra-mobile PC (UMPC)” Nokia Smartphone Samsung Q1 Tablet OQO Tablet Sony VAIO U “Tablet” HP iPAQ – Pocket PC Both! DualCor cPC Phone, PDA, Tablet 9/19/2018
Considerations Convergence Full size tablets offer larger form factor, and run same applications as laptops/desktops But are bulkier, generally more expensive, and have shorter battery life Smart Phones / PDAs are lighter, photo & GPS capable and have longer battery life But have a smaller form factor, and resources not as rich Make sure you have enough memory to run your applications, (Palm Treo 700 – 32 MB) Requires soft reset Also make sure the device meets your networking requirements, WiFi, etc 9/19/2018
Wireless Provider Offerings Integrated with fleet/field service management tools Cingular & GEOTAB Real Time Maps and Driving Directions Records trip information, including MPH Ability to record photo/timestamp/GPS-Stamp Proof of visit Proof of location Sprint/Nextel Xora Location enhanced mobile resource management services Gearworks (etrace) Measure, manage and optimize field service operations The Sprint Family Locator
Considerations Broadband Wireless WiFi, WiMAX, 3G, etc Gartner EVDO Wireless broadband services are still evolving Predictions By 2008, wireless broadband services will be offered nationwide or regionally in 75 percent of the countries in Europe, North America and Asia/Pacific (0.8 probability) By 2012, mobile WiMAX (802.16-2005, formerly known as 802.16e) will be the dominant technology used for wireless broadband deployments (0.6 probability). EVDO Wireless broadband access (3G) without needing a hotspot Offered by Sprint and Verizon 9/19/2018
Considerations (cont.) Digital Pen Systems Print form (standard data pre-filled) Fill out form Upload using a device that captures information Theft Protection Everdream’s Theft Recovery Managed Service Special “Agent” Tracks Down Stolen Laptops Encrypt or delete data on the computer based on customer preference CREDANT Technologies Mobile Guardian Secure and manage disparate mobile & wireless devices Automatic fail-safe (“kill”) feature ensures that sensitive data can be erased in the event that the device has been lost or stolen Protective Casings 9/19/2018
Further Developments Microsoft developing next mobile OS – Crossbow Crossbow will take aim at the Symbian and BlackBerry operating systems Eventual replacement for Windows Mobile 5.0 http://www.pcworld.com/resource/article/0,aid,125513,pg,1,RSS,RSS,00.asp Intel's Eduwise low-cost PC revealed $400 designed to provide affordable collaborative learning environments for teachers and students http://seattlepi.nwsource.com/business/268946_techcon04.html N.Y. county enacts wireless security law Westchester County enacted a new law that requires local businesses to implement “minimum security measures” http://www.westchestergov.com/currentnews/2006pr/Wifinew.htm 9/19/2018
Summary First and foremost – the mobile devices are part of your enterprise network Clearly define the objectives and requirements: Both functional requirements and operational/technical requirements Start small: Keep it simple, build upon success Learn from one another: “loaner” program? 9/19/2018
Summary (cont.) Understand the architectural implications: Integration Avoid lock-in (device, platform, vendor) Security Synchronization and maintenance Governance structure: Control the types of devices the users will bring on the network Or have an architecture that allows multiple devices Monitor and control the use of the devices Be aware of mobile computing and wireless broadband trends: Don’t get stuck with an obsolete solution 9/19/2018