+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Integrating Wireless Technology in the Enterprise

  • ID: 1766614
  • Book
  • 403 Pages
  • Elsevier Science and Technology
1 of 3

Integrating Wireless Devices in the Enterprise provides a solution that every enterprise can use, described in terms of scope, feasibility and return on investment, architecture, and data structures. The solution Wheeler offers here is scalable from a single handheld and single desktop to small workgroup to large enterprise environments. The number of devices is not a determinant of success or failure. It's more often the planning and managing of them that's crucial. This book also provides tools to deal with the increase of devices, and the corresponding complexity of managing those resources and the increase in cost to the firm.

*Synchronize networked data with the mobile device fleet
*Synchronize a mobile device with networked data that is mission critical
*Connect any device to any data source, over any network

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 3
Author Information



1 Introduction and Handheld Basics

Executive Summary

1.1 Avoiding the "That's the Way We've always Done it” Trap

1.2 What is a Personal Digital assistant?

1.3 What it is Not?

1.4 How Do We Get the Most Out of it?

1.5 So We Ask again, "What is a PDA?”

1.5.1 It is Portable

1.5.2 It is Convenient

1.5.3 It Helps You Remember

1.5.4 It is Scalable

1.5.5 It Comes in Different Flavors

1.5.6 It is an Extension to Your PC

1.5.7 It is Open to Software Developers to Solve Your Problems

1.6 So What Does a PDA Buy Me?

1.6.1 It Promotes a Professional Image

1.6.2 It Reduces Paperwork

1.6.3 It Reduces Errors

1.6.4 It is Cool!

1.7 Use it Like it Was intended to be Used

1.8 Baseline Features

1.9 Calendar

1.10 Contacts or Phone Book

1.11 Tasks/To-Do's

1.12 Notes/Memos

1.13 Email


2 Handhelds as industrial Strength tools

Executive Summary

2.1 Barcoding

2.2 Barcode Symbology and Formats

2.3 Scanners and Decoders

2.4 Batch Scanners

2.5 Wireless Scanners

2.6 Additional Software and A-Os

2.7 Cellular Phones

2.8 Wireless Standards

2.9 High Points of the 802.11 Standards


3 Laying the Groundwork for Success

Executive Summary

3.1 Business Justification

3.2 Cost

3.3 Scope

3.4 Schedule

3.5 Putting Cost, Scope, and Schedule Together

3.6 Feasibility Analysis

3.7 Feasibility Analysis Matrix

3.8 Identify Critical Success Factors


4 How Do We Know Where to Go Without a Plan?

Executive Summary

4.1 Planning

4.2 Request for Information System Services

4.3 Preliminary Investigations

4.4 Problem Analysis

4.5 Pest Management Problem Description

4.6 Describe Current Situation

4.7 Problem or Opportunity Statements

4.8 Basic Workflow (Process) Design

4.9 Problems, Opportunities, Objectives, and Constraints Matrix

4.10 Systems Analysis

4.11 Solution Analysis

4.12 Candidate Systems Matrix

4.13 Management Approval


5 When Does it Make Sense to Do a Project and When Doesn't it?

Executive Summary

5.1 OK, You've Got My attention, But Does it Make Sense to My Accounting Department?

5.2 It Sounds Expensive

5.3 When Does it Make Sense and When Doesn't it?

5.4 I'm a "Bottom-Line Kind of Guy.” Show Me the Numbers

5.5 Systems Analysis

5.6 Preliminary Investigations

5.7 Problem Analysis

5.8 Requirements Analysis

5.9 Feasibility Analysis

5.10 The Challenge

5.11 The Method

5.12 Environment Complexity

5.13 End-User Complexity

5.14 Expanded Requirements

5.15 The Results

5.16 Decision Tables

5.17 Decisions and Conclusions

5.18 How Will I Know if it Makes Money to Do This?

5.19 What are the Next Steps?

5.20 The Challenge

5.21 End-User Mobility

5.22 End-User Complexity

5.23 Environment Complexity

5.24 Expanded Requirements

5.25 More Decision Tables

5.26 Decisions and Conclusions


6 System Requirements and Project Success

Executive Summary

6.1 System Requirements and Analysis


7 Methodology, Application Development, and System Architecture

Executive Summary

7.1 Methodology

7.2 Approach Overview

7.3 Process Models

7.4 Waterfall Method

7.5 Extreme Programming

7.6 Differences in Requirements Focus

7.7 Cultural Differences

7.8 Testing Approaches

7.9 Customer Focus

7.10 Methodology Conclusions

7.11 Application Development Environments

7.12 Code Warrior

7.13 Palmos Emulator (POSE)

7.14 GCC Compiler/PRC-tools

7.15 Satellite Forms Enterprise Edition

7.16 Pendragon Forms

7.17 Conduit Development Kit (CDK)

7.18 Java Development Environment (for the Blackberry)

7.19 Microsoft Windows Ce Developer's Kit

7.20 Other Notable Products

7.21 Design

7.22 Data Flow Diagram

7.23 High-Level Design

7.24 Decomposition Diagram

7.25 Low-Level Design

7.26 How Long is This Supposed to Take?

7.27 Implementation Schedule


8 System architecture

Executive Summary

8.1 Topology Terms and Concepts

8.1.1 Topology

8.1.2 Protocols

8.1.3 Token Ring

8.1.4 Ethernet

8.1.5 Fiber (Fiber Distributed Data Interface-FDDI)

8.1.6 Wireless (or Unbounded Transmission Media)

8.2 Physical Means of Transmission

8.2.1 Sneakernet

8.2.2 Category 5 Cabling

8.2.3 Type 1 Cabling

8.3 Topology Summary

8.3.1 Bluetooth

8.3.2 Infrared

8.3.3 Laser

8.3.4 Microwave

8.3.5 Radio

8.4 Other Important Terms and Concepts

8.4.1 Host or Server

8.4.2 Node

8.4.3 Wireless Directional Communication

8.4.4 Wireless Conclusions

8.5 Generalizations before We Move Forward with Your Project

8.6 Do Your Homework

8.7 Design it, Build it, and Test it

8.8 Communicate to Death, and then Communicate Some More

8.9 Are We Ready Yet?

8.10 Build it and they Will Come

8.11 Take a Deep Breath, Flip the Switch, and Watch What Happens

8.12 We Said What We Were Going to Do; We Did it, Now We are Going to Tell You What We Did

8.13 Ok, I'm Sold. What Gadgets are Right for Me?

8.14 Small Business (Single Site) Solution

8.15 Enterprise Solution (Single or Secure Multi-Site)

8.16 Enterprise-Wide Wireless Solution (EWWS)

8.17 Project Specifications

8.18 Small Business (Single Site)

8.19 Enterprise Solution (Single or Secure Multi-Site)

8.20 Enterprise Wireless Solution

8.21 How Do I Connect This to What I Have?


9 My Firm Makes Widgets: What's in it for Me?

Executive Summary

9.1 Sure it's Cool, But How Does it Work in My Business?

9.1.1 Telecommuters

9.1.2 Road Warriors

9.1.3 Hallway or Corridor Cruisers

9.1.4 Cube or office Dwellers

9.1.5 What Do You Have?

9.2 Case Study 1-Pest Management Operators (PMO)

9.2.1 Request for Information System Services

9.2.2 Problem or Opportunity Statements

9.2.3 Basic Workflow (Process) Design

9.2.4 Problems, Opportunities, Objectives, and Constraints Matrix

9.2.5 Feasibility Analysis Matrix

9.3 Critical Success Factors

9.4 Current Situation

9.5 Approach Considerations

9.6 Solution Analysis

9.7 Accountability

9.8 Resources

9.9 Efficiency

9.10 Forward-Thinking Flexibility

9.11 Prototyping

9.12 architecture

9.13 Suggestions and Lessons Learned

9.14 Have You Seen My Workforce?


10 Case Study 2: Sales Force organization

Executive Summary

10.1 Mobile Sales Force

10.2 Architecture

10.3 Have You Seen My Workforce?

10.4 Suggestions and Lessons Learned


11 Case Study 3: Logistics

Executive Summary

11.1 It's a Harsh World; Make the best of it

11.2 Architecture

11.3 Have You Seen My Workforce?

11.4 Suggestions and Lessons Learned


12 Case Study 4: Information Services/Information Technology Applications

Executive Summary

12.1 Our Own Worst Enemy

12.2 What is the End Goal?

12.3 Is This Enterprise- or Project-Based?

12.4 How Does This affect Enterprise Support Costs?

12.5 is This the Best Choice?

12.6 Architecture

12.7 Have You Seen My Workforce?

12.8 Suggestions and Lessons Learned


13 Case Study 5: Executive Mobility

Executive Summary

13.1 Management Technology

13.2 Architecture

13.3 Have You Seen My Workforce?

13.4 Suggestions and Lessons Learned


14 Different Markets Have the Same Challenge

Executive Summary

14.1 advertising & Marketing

14.2 Education

14.3 Hospitality

14.4 Sales Force automation and Customer Relationship Management

14.5 Technology Firms


15 How am I Supposed to Manage This?

Executive Summary

15.1 This Shouldn't be Anything New

15.2 Hardware Standards

15.3 Software Standards

15.4 User Community Standards

15.5 Security Standards

15.6 Asset Management Overview

15.7 Hardware Management

15.8 Software Management

15.9 Asset Management

15.10 Refresh Cycle Strategy

15.11 Now That I Can't Live without This, Disaster Strikes!

15.12 Disaster Recovery Standards

15.13 Training? What Training?

15.14 Ownership

15.15 Usability

15.16 Expectations

15.17 Costs (Mostly Hidden)

15.18 Training

15.19 Post-Training


16 Now That it is Up and Running, How Do I Measure it?

Executive Summary

16.1 Implementation 1-Pest Control Operation

16.2 Implementation 2-Outside Sales organization

16.3 Implementation 3-Logistics

16.4 Implementation 4-Information Services/Information Technology Support Applications

16.5 Implementation 5-Executive Mobility

16.6 When is it Time to Upgrade? I Just Paid for This!

16.7 How Do I Possibly Keep Up?

Here We Go again


17 Future Trends

Executive Summary

17.1 Where Do We Go From Here?

17.2 What Can I Expect tomorrow and How Do I Prepare Now?

17.3 Future Devices and Wearable Computers

17.4 What's a Wearable?

17.5 What Else is Out there?

17.6 About SyncML

17.7 Managing the Future

17.8 Convergence of Tools

17.9 So What are the Lessons Learned?

17.9.1 Keep it Simple

17.9.2 Customization is the Key

17.9.3 Find Partners

17.9.4 become Device-Independent



Note: Product cover images may vary from those shown
3 of 3


4 of 3
Wheeler, William
William Wheeler has over 15 years of MIS/IT experience, most at a major Fortune 100 company. He has a Masters Degree in Computer Resources and Information Management. He is uniquely qualified to author this text as he has worked to implement wireless devices to hundreds of employees in several companies. He is currently pursuing a Ph.D. concentrating on heuristics and artificial intelligence in information systems.
Note: Product cover images may vary from those shown