Download presentation
Presentation is loading. Please wait.
1
Mobile Computing Overview
Amit Sachde CGI Director Consulting
2
Agenda Background Convergence Considerations Summary
3
Background Mobile Workforce
Technology options continue to grow at a fast pace Need for ability to communicate, collaborate, consume while not within the classic office environment
4
Convergence PDA? Tablet? Pocket PC? 9/19/2018
5
“Ultra-mobile PC (UMPC)”
Convergence Start with the requirements – not with the device “Ultra-mobile PC (UMPC)” Nokia Smartphone Samsung Q1 Tablet OQO Tablet Sony VAIO U “Tablet” HP iPAQ – Pocket PC Both! DualCor cPC Phone, PDA, Tablet 9/19/2018
6
Considerations Convergence
Full size tablets offer larger form factor, and run same applications as laptops/desktops But are bulkier, generally more expensive, and have shorter battery life Smart Phones / PDAs are lighter, photo & GPS capable and have longer battery life But have a smaller form factor, and resources not as rich Make sure you have enough memory to run your applications, (Palm Treo 700 – 32 MB) Requires soft reset Also make sure the device meets your networking requirements, WiFi, etc 9/19/2018
7
Wireless Provider Offerings
Integrated with fleet/field service management tools Cingular & GEOTAB Real Time Maps and Driving Directions Records trip information, including MPH Ability to record photo/timestamp/GPS-Stamp Proof of visit Proof of location Sprint/Nextel Xora Location enhanced mobile resource management services Gearworks (etrace) Measure, manage and optimize field service operations The Sprint Family Locator
8
Considerations Broadband Wireless WiFi, WiMAX, 3G, etc Gartner EVDO
Wireless broadband services are still evolving Predictions By 2008, wireless broadband services will be offered nationwide or regionally in 75 percent of the countries in Europe, North America and Asia/Pacific (0.8 probability) By 2012, mobile WiMAX ( , formerly known as e) will be the dominant technology used for wireless broadband deployments (0.6 probability). EVDO Wireless broadband access (3G) without needing a hotspot Offered by Sprint and Verizon 9/19/2018
9
Considerations (cont.)
Digital Pen Systems Print form (standard data pre-filled) Fill out form Upload using a device that captures information Theft Protection Everdream’s Theft Recovery Managed Service Special “Agent” Tracks Down Stolen Laptops Encrypt or delete data on the computer based on customer preference CREDANT Technologies Mobile Guardian Secure and manage disparate mobile & wireless devices Automatic fail-safe (“kill”) feature ensures that sensitive data can be erased in the event that the device has been lost or stolen Protective Casings 9/19/2018
10
Further Developments Microsoft developing next mobile OS – Crossbow
Crossbow will take aim at the Symbian and BlackBerry operating systems Eventual replacement for Windows Mobile 5.0 Intel's Eduwise low-cost PC revealed $400 designed to provide affordable collaborative learning environments for teachers and students N.Y. county enacts wireless security law Westchester County enacted a new law that requires local businesses to implement “minimum security measures” 9/19/2018
11
Summary First and foremost – the mobile devices are part of your enterprise network Clearly define the objectives and requirements: Both functional requirements and operational/technical requirements Start small: Keep it simple, build upon success Learn from one another: “loaner” program? 9/19/2018
12
Summary (cont.) Understand the architectural implications:
Integration Avoid lock-in (device, platform, vendor) Security Synchronization and maintenance Governance structure: Control the types of devices the users will bring on the network Or have an architecture that allows multiple devices Monitor and control the use of the devices Be aware of mobile computing and wireless broadband trends: Don’t get stuck with an obsolete solution 9/19/2018
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.