Integrating Wireless Technology in the Enterprise

  • ID: 1766614
  • Book
  • 403 Pages
  • Elsevier Science and Technology
1 of 4
Integrating Wireless Devices in the Enterprise provides a solution that every enterprise can use, described in terms of scope, feasibility and return on investment, architecture, and data structures. The solution Wheeler offers here is scalable from a single handheld and single desktop to small workgroup to large enterprise environments. The number of devices is not a determinant of success or failure. It's more often the planning and managing of them that's crucial. This book also provides tools to deal with the increase of devices, and the corresponding complexity of managing those resources and the increase in cost to the firm.

*Synchronize networked data with the mobile device fleet
*Synchronize a mobile device with networked data that is mission critical
*Connect any device to any data source, over any network
Note: Product cover images may vary from those shown
2 of 4
Author Information

Preface


Acknowledgments


1 Introduction and Handheld Basics


Executive Summary


1.1 Avoiding the "That's the Way We've always Done it” Trap


1.2 What is a Personal Digital assistant?


1.3 What it is Not?


1.4 How Do We Get the Most Out of it?


1.5 So We Ask again, "What is a PDA?”


1.5.1 It is Portable


1.5.2 It is Convenient


1.5.3 It Helps You Remember


1.5.4 It is Scalable


1.5.5 It Comes in Different Flavors


1.5.6 It is an Extension to Your PC


1.5.7 It is Open to Software Developers to Solve Your Problems


1.6 So What Does a PDA Buy Me?


1.6.1 It Promotes a Professional Image


1.6.2 It Reduces Paperwork


1.6.3 It Reduces Errors


1.6.4 It is Cool!


1.7 Use it Like it Was intended to be Used


1.8 Baseline Features


1.9 Calendar


1.10 Contacts or Phone Book


1.11 Tasks/To-Do's


1.12 Notes/Memos


1.13 Email


Summary


2 Handhelds as industrial Strength tools


Executive Summary


2.1 Barcoding


2.2 Barcode Symbology and Formats


2.3 Scanners and Decoders


2.4 Batch Scanners


2.5 Wireless Scanners


2.6 Additional Software and A-Os


2.7 Cellular Phones


2.8 Wireless Standards


2.9 High Points of the 802.11 Standards


Summary


3 Laying the Groundwork for Success


Executive Summary


3.1 Business Justification


3.2 Cost


3.3 Scope


3.4 Schedule


3.5 Putting Cost, Scope, and Schedule Together


3.6 Feasibility Analysis


3.7 Feasibility Analysis Matrix


3.8 Identify Critical Success Factors


Summary


4 How Do We Know Where to Go Without a Plan?


Executive Summary


4.1 Planning


4.2 Request for Information System Services


4.3 Preliminary Investigations


4.4 Problem Analysis


4.5 Pest Management Problem Description


4.6 Describe Current Situation


4.7 Problem or Opportunity Statements


4.8 Basic Workflow (Process) Design


4.9 Problems, Opportunities, Objectives, and Constraints Matrix


4.10 Systems Analysis


4.11 Solution Analysis


4.12 Candidate Systems Matrix


4.13 Management Approval


Summary


5 When Does it Make Sense to Do a Project and When Doesn't it?


Executive Summary


5.1 OK, You've Got My attention, But Does it Make Sense to My Accounting Department?


5.2 It Sounds Expensive


5.3 When Does it Make Sense and When Doesn't it?


5.4 I'm a "Bottom-Line Kind of Guy.” Show Me the Numbers


5.5 Systems Analysis


5.6 Preliminary Investigations


5.7 Problem Analysis


5.8 Requirements Analysis


5.9 Feasibility Analysis


5.10 The Challenge


5.11 The Method


5.12 Environment Complexity


5.13 End-User Complexity


5.14 Expanded Requirements


5.15 The Results


5.16 Decision Tables


5.17 Decisions and Conclusions


5.18 How Will I Know if it Makes Money to Do This?


5.19 What are the Next Steps?


5.20 The Challenge


5.21 End-User Mobility


5.22 End-User Complexity


5.23 Environment Complexity


5.24 Expanded Requirements


5.25 More Decision Tables


5.26 Decisions and Conclusions


Summary


6 System Requirements and Project Success


Executive Summary


6.1 System Requirements and Analysis


Summary


7 Methodology, Application Development, and System Architecture


Executive Summary


7.1 Methodology


7.2 Approach Overview


7.3 Process Models


7.4 Waterfall Method


7.5 Extreme Programming


7.6 Differences in Requirements Focus


7.7 Cultural Differences


7.8 Testing Approaches


7.9 Customer Focus


7.10 Methodology Conclusions


7.11 Application Development Environments


7.12 Code Warrior


7.13 Palmos Emulator (POSE)


7.14 GCC Compiler/PRC-tools


7.15 Satellite Forms Enterprise Edition


7.16 Pendragon Forms


7.17 Conduit Development Kit (CDK)


7.18 Java Development Environment (for the Blackberry)


7.19 Microsoft Windows Ce Developer's Kit


7.20 Other Notable Products


7.21 Design


7.22 Data Flow Diagram


7.23 High-Level Design


7.24 Decomposition Diagram


7.25 Low-Level Design


7.26 How Long is This Supposed to Take?


7.27 Implementation Schedule


Summary


8 System architecture


Executive Summary


8.1 Topology Terms and Concepts


8.1.1 Topology


8.1.2 Protocols


8.1.3 Token Ring


8.1.4 Ethernet


8.1.5 Fiber (Fiber Distributed Data Interface-FDDI)


8.1.6 Wireless (or Unbounded Transmission Media)


8.2 Physical Means of Transmission


8.2.1 Sneakernet


8.2.2 Category 5 Cabling


8.2.3 Type 1 Cabling


8.3 Topology Summary


8.3.1 Bluetooth


8.3.2 Infrared


8.3.3 Laser


8.3.4 Microwave


8.3.5 Radio


8.4 Other Important Terms and Concepts


8.4.1 Host or Server


8.4.2 Node


8.4.3 Wireless Directional Communication


8.4.4 Wireless Conclusions


8.5 Generalizations before We Move Forward with Your Project


8.6 Do Your Homework


8.7 Design it, Build it, and Test it


8.8 Communicate to Death, and then Communicate Some More


8.9 Are We Ready Yet?


8.10 Build it and they Will Come


8.11 Take a Deep Breath, Flip the Switch, and Watch What Happens


8.12 We Said What We Were Going to Do; We Did it, Now We are Going to Tell You What We Did


8.13 Ok, I'm Sold. What Gadgets are Right for Me?


8.14 Small Business (Single Site) Solution


8.15 Enterprise Solution (Single or Secure Multi-Site)


8.16 Enterprise-Wide Wireless Solution (EWWS)


8.17 Project Specifications


8.18 Small Business (Single Site)


8.19 Enterprise Solution (Single or Secure Multi-Site)


8.20 Enterprise Wireless Solution


8.21 How Do I Connect This to What I Have?


Summary


9 My Firm Makes Widgets: What's in it for Me?


Executive Summary


9.1 Sure it's Cool, But How Does it Work in My Business?


9.1.1 Telecommuters


9.1.2 Road Warriors


9.1.3 Hallway or Corridor Cruisers


9.1.4 Cube or office Dwellers


9.1.5 What Do You Have?


9.2 Case Study 1-Pest Management Operators (PMO)


9.2.1 Request for Information System Services


9.2.2 Problem or Opportunity Statements


9.2.3 Basic Workflow (Process) Design


9.2.4 Problems, Opportunities, Objectives, and Constraints Matrix


9.2.5 Feasibility Analysis Matrix


9.3 Critical Success Factors


9.4 Current Situation


9.5 Approach Considerations


9.6 Solution Analysis


9.7 Accountability


9.8 Resources


9.9 Efficiency


9.10 Forward-Thinking Flexibility


9.11 Prototyping


9.12 architecture


9.13 Suggestions and Lessons Learned


9.14 Have You Seen My Workforce?


Summary


10 Case Study 2: Sales Force organization


Executive Summary


10.1 Mobile Sales Force


10.2 Architecture


10.3 Have You Seen My Workforce?


10.4 Suggestions and Lessons Learned


Summary


11 Case Study 3: Logistics


Executive Summary


11.1 It's a Harsh World; Make the best of it


11.2 Architecture


11.3 Have You Seen My Workforce?


11.4 Suggestions and Lessons Learned


Summary


12 Case Study 4: Information Services/Information Technology Applications


Executive Summary


12.1 Our Own Worst Enemy


12.2 What is the End Goal?


12.3 Is This Enterprise- or Project-Based?


12.4 How Does This affect Enterprise Support Costs?


12.5 is This the Best Choice?


12.6 Architecture


12.7 Have You Seen My Workforce?


12.8 Suggestions and Lessons Learned


Summary


13 Case Study 5: Executive Mobility


Executive Summary


13.1 Management Technology


13.2 Architecture


13.3 Have You Seen My Workforce?


13.4 Suggestions and Lessons Learned


Summary


14 Different Markets Have the Same Challenge


Executive Summary


14.1 advertising & Marketing


14.2 Education


14.3 Hospitality


14.4 Sales Force automation and Customer Relationship Management


14.5 Technology Firms


Summary


15 How am I Supposed to Manage This?


Executive Summary


15.1 This Shouldn't be Anything New


15.2 Hardware Standards


15.3 Software Standards


15.4 User Community Standards


15.5 Security Standards


15.6 Asset Management Overview


15.7 Hardware Management


15.8 Software Management


15.9 Asset Management


15.10 Refresh Cycle Strategy


15.11 Now That I Can't Live without This, Disaster Strikes!


15.12 Disaster Recovery Standards


15.13 Training? What Training?


15.14 Ownership


15.15 Usability


15.16 Expectations


15.17 Costs (Mostly Hidden)


15.18 Training


15.19 Post-Training


Summary


16 Now That it is Up and Running, How Do I Measure it?


Executive Summary


16.1 Implementation 1-Pest Control Operation


16.2 Implementation 2-Outside Sales organization


16.3 Implementation 3-Logistics


16.4 Implementation 4-Information Services/Information Technology Support Applications


16.5 Implementation 5-Executive Mobility


16.6 When is it Time to Upgrade? I Just Paid for This!


16.7 How Do I Possibly Keep Up?


Here We Go again


Summary


17 Future Trends


Executive Summary


17.1 Where Do We Go From Here?


17.2 What Can I Expect tomorrow and How Do I Prepare Now?


17.3 Future Devices and Wearable Computers


17.4 What's a Wearable?


17.5 What Else is Out there?


17.6 About SyncML


17.7 Managing the Future


17.8 Convergence of Tools


17.9 So What are the Lessons Learned?


17.9.1 Keep it Simple


17.9.2 Customization is the Key


17.9.3 Find Partners


17.9.4 become Device-Independent


Summary


Bibliography


Glossary
Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Wheeler, William
William Wheeler has over 15 years of MIS/IT experience, most at a major Fortune 100 company. He has a Masters Degree in Computer Resources and Information Management. He is uniquely qualified to author this text as he has worked to implement wireless devices to hundreds of employees in several companies. He is currently pursuing a Ph.D. concentrating on heuristics and artificial intelligence in information systems.
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll