Jill M. Forrester Director, Enterprise Systems Dickinson College Library and Information Services Enterprise Mobile Technologies Best Practices 1.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Speaker Name, Title Windows 8 Pro: For Small Business.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
CUPA-HR Strong – together!
CUPA-HR Strong – together!
WHY CMS? WHY NOW? CONTENT MANAGEMENT SYSTEM. CMS OVERVIEW Why CMS? What is it? What are the benefits and how can it help me? Centralia College web content.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Technology Plan EDLD 5362 Casey Smith.
© 2014 Citrix. Confidential. Mobile Workstyles & Mobile Workspaces The new reality Q
THE RIGHT TECHNOLOGY IN INVESTOR RELATIONS: WHAT TO DO ONLINE? THOMSON REUTERS Alex Ménage Head of Business Development Corporate Services Rapidly Developing.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Best Practices Using Enterprise Search Technology Aurelien Dubot Consultant – Media and Entertainment, Fast Search & Transfer (FAST) British Computer Society.
Portfolio Manager—ICBA Members ENERGY STAR  Tools For Benchmarking and Tracking Energy Use.
Plan Introduction What is Cloud Computing?
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
FIRST SCREEN In 1929, we were introduced to the “First Screen” Still today, Television advertising is a tremendously effective way to market.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
The Future of Flexibility BC Center for Work & Family Executive Briefing Series Boston College Center for Work and Family.
Club Presentation Press or left-click on mouse to advance to the next slide Welcome to ClubRunner ™ Discover a better way to communicate.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Increasing Your Impact Through Digital Technology Rae Davies Communities 2.0 Circuit Rider.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
©2013 Microsoft Corporation. SharePoint Innovations LLC. All rights reserved. M ODULE 13 – S HARE P OINT 2010 O VERVIEW OF S HARE P OINT 2013.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Presentation Title (view > header footer) Learning Innovation Back to the Future Thinking Alfred McAlpine IT Services Scott Moore.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Social Media Exploring Social Media to Enhance Interactive Communication and e-Learning for Students in Higher Education Billy Rector Texas Southern University.
In addition to Word, Excel, PowerPoint, and Access, Microsoft Office® 2013 includes additional applications, including Outlook, OneNote, and Office Web.
Kim Andreasson Managing Director DAKA advisory AB Bahrain International eGovernment Forum Kingdom of Bahrain 8-10 April 2013 Measuring E-Government.
Do You Have a Web Site?. Everyone does, don’t they?
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Improving Integration of Learning and Management Systems Paul Shoesmith Director of Technical Strategy Becta.
Getting the most out of ArcGIS Web Application Templates
Np163 Dennis Baron, April 3, 2008 Page 1 VoIP at MIT Merit VoIP Seminar Dennis Baron April 3, 2008.
Seamless Mobility: Michael Wehrs Director of Technology & Standards Mobile Device Division, Microsoft Corp. Wireless Software Innovations Spurring User.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
October 2012 Oregon Community College Mobile Initiative.
Enterprise Cybersecurity Strategy
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
LOCAL Y025 Strategy and Goals for Welcome to Y025! ◦ I would like to welcome you to the new Y025 executive. ◦ The objective of today, is for.
1 © 2016 Lifesize, Inc. All Rights Reserved. Confidential. Continuing the Conversation Beyond the Meeting Lifesize ® Cloud — Group Chat March 2016 Confidential.
TECHNOLOGY IN THE COMMUNITY Community Center Representative EDU 620 Meeting Individual Student Needs Instructor: Dusty Clark January 21 st 2016 Amber Currie.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
1 Transitioning TAC I/A Series ™ to SmartStruxure ™ solution 11 June 2016.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Moving to BYOD Gary Audin 1.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Education Portal Solutions for Higher Education Education portals create a common gateway to the data and services that the people throughout your university.
Workshifting Transform your business – empower your people.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Talking Points Provides EY people with greater working flexibility and collaboration opportunities. EY people can have access to technology that enables.
1 GLOBALMEET Name of Presenter. 2 HOW EFFECTIVE IS YOUR WEB CONFERENCING SOLUTION? Frustrated by the complexity of performing basic tasks? Do you demand.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Onboarding Learning Objectives Checklist
Jill Forrester and David Kelly| October 20, 2011
Copyright Jill Forrester, 2012
Assistant Vice President and Chief Technology Officer
Workplace Networking An EmpFinesseTM Enterprise Networking Solution.
Presentation transcript:

Jill M. Forrester Director, Enterprise Systems Dickinson College Library and Information Services Enterprise Mobile Technologies Best Practices 1

What we will cover… What are today’s challenges in mobile services support and delivery? How can we identify what mobile services we should be providing and supporting? How should we be providing these services? Can we ensure security? How do we measure our success and identify opportunities for improvement? 2

Changing Times… 3

4

Mobile Technologies Challenges Meeting consumer expectations Vendors unprepared Limited technology resources Security challenges Measuring success 5

Know your consumer Who will be using your services? It is the individual who is mobile! What is the expected experience level? StudentsAlumni FacultyParents AdministratorsVisitors NoviceExpert 6

Know your consumer How will your services be used? Short periods of focus Face interruptions Have a specific goal When will your services be used? At home Waiting in lines or for appointments Commuting to class or work Shopping Watching TV Miscellaneous downtime 7

Know your consumer What services do they want? Ask! A little research goes a long way Surveys Focus groups Observe Utilize existing service metrics Popular portal channels/web services Popular web pages Conduct a peer review 8

Know your environment Device Type Characterizations Smart PhoneTabletWeb Thumbs OnlyTouching and viewingThe default experience (for now…) Most common and critical tasks (micro-tasking) Consumption and collaboration: reading, watching, listening The kitchen sink: typing, working in multiple apps, entertainment, or serious work Duration: <3 minutesDuration: <30 minutesDuration is not a major factor Assume interruption Interruptions are not a major factor Provide relevant information quickly. Keep it simple and readable. Quick completion. Provide ability to drill-down, swipe, or surf for additional information or features. Take advantage of screen size. Provide a full-feature set. Use Conditions: Anywhere and anytime! Use conditions: Slightly more controlled environment than smart phone … but not by much! Use conditions: home, office, etc. 9

Know your environment Not just the miniaturization of IT Multi-sensory Seeing (camera, screen) Tactile (touchscreen, buttons) Vocal (microphone, speaker) Location aware 10

Know your environment BYOD Era Consumer driven Many choices (more each day) IT Concerns Support Training Security 11

Know your resources Increased demand for IT resources Leadership (strategic and tactical) Training Support Development Systems Options available Build internal skill set Vendor provided options Outsourcing Available frameworks Community resources 12

Know your resources The reality … Identify limitations Be agile (planning and development) Build for scalability Plan for frequent updates Strive for excellence. Not perfection. Build a mobile culture Device familiarity Design for mobile 13

Focus on outcomes Examples Our students will have access to personalized class schedules. Our faculty members will have access to his/her class location and registrant information. Our admissions counselors will be able to showcase sample lectures at a high school visit. Our visitors will be able take a self-guided tour and learn about important places and events on campus. Our advancement officers will be able to use a multi-media presentation to showcase the building of our new athletic facility. 14

Focus on outcomes Take a user-first approach Take time to learn the business goals Not just about your app TXT/SMS Phone Camera Browser Be accessible! 15

Focus on outcomes Consider native and web apps Need mobile-focused tools Provide a unified device presence for a select group of users (single department) Rapidly changing landscape Organization and presentation of services will impact the outcome Proliferation of apps and services Plan to provide for personalized and prioritized access to offered services Pre-defined tile-sets based on self-identified role Self-selected tile-sets 16

Promote security Protect critical data and ensure compliance Similar security threats as desktop computing but much easier to lose while on-the-go! taxi restaurant table store shelf how about you? Educate your community Mobile cyber threats Privacy concerns Awareness of protecting data 17

Promote security Consider access requirements based on an acceptable use policy Encryption Authentication (device password) Remote Wipe App black-list Challenge: How to enforce? IT Measures Require authentication for secure data access Set up a lost-phone hotline Firewall and other network controls 18

Measure what matters What makes an app successful? It’s not just the number of downloads! Make use of web analytics to measure what matters – learn from the past 15 years! Mobile Analytics: Key Performance Indicators Usage Are people finding and using your application? Reflects awareness and interest Engagement How engaged and loyal are your users? Reflects value of function and service 19

Measure what matters Mobile Analytics: Key Performance Indicators Purpose Are they engaging in high value activities? Measure reflects goal/purpose has been achieved Retention How do we retain customers and encourage usage? Measure reflects app’s relevance and usefulness 20

Measure what matters UsageEngagementPurposeRetention Total DownloadsFrequency of VisitAudience characteristics Stickiness App UsersDepth of VisitUser activitiesFeedback Active User RateDuration New UsersBounce Rate Example Total Downloads: 10,000 Losing audience … look at new users to see if you are staying ahead of attrition! March 2011April 2011May 2011 App Users4,0003,0002,500 Active User Rate40%30%25% 21

In Summary Consumer, consumer, consumer! Embrace the mobile ecosystem Leverage your resources Identify outcomes that utilize mobile services Promote security awareness and address concerns Plan to measure 22

Thank you! Jill M. Forrester Director, Enterprise Systems Dickinson College Library and Information Services 23