Saturday, February 10, 2007
Wednesday, February 07, 2007
AppForge, Inc.: Promise Behind Uncompromised Mobility
Gary Warren, Chairman & CEO, AppForge, Inc.
About 30 different mobile web browsers on the market today.
Web browser:
- simple text
- reliable consistent connectivity
- update and delivery vehicle for rich apps
Rich Apps
- graphically intense
- transaction focused
- brand / user experience
- unknown connectivity
Thick Apps
-
-
-
Software Industry use to focus on stand alone software. Now they are focused on web services rendering. Content or data industry through web browsing - customer-facing applications.
Connectivity is not as stable as we would expect. Mobile apps must be able to handle offline use. If you had to go get your email, mobile devices would be limited because of connectivity. But since email is pushed, continuous connectivity is not so significant.
Go to mobile.appforge.com on your mobile device and download a mobile copy of the app as a plane delay demo.
Recap
- powerful user experience
-
-
Currently supports over 600 mobile devices.
Pocket Power: Annual Update on Mobile Devices
Ken Dulaney - VP, Distinguished Analyst, Gartner
IPhone - not an enterprise device at all. It is a pretty lousy phone. You can't feel the keys so it is difficult to dial while driving. It is a good multimedia type toy device, but pretty lousy as a phone.
More radios than you can imagine - FM or digital radio, GPS, digital TV, ultrawideband, Bluetooth, WiFi, broadband - much smaller real estate than a PC, but much more antennas - this requires integration.
Openwave research - How much of the audience do I loose with mobile design? Answer: 50% of users for each layer a user has to drill down. Every click looses 50% of the audience.
If deploying handheld devices, they might as well be wireless.
Have mobile devices sync directly to the server, not to the PC first. PC sync is a bad design and difficult to support.
GPS: upcoming technology will allow GPS to work indoors. GPS can be used for security or convenience purposes, but you really need to keep an eye on privacy.
Email Devices: are devices closing in on BlackBerry?
T-Mobile dash: close in design to RIM. There is hardware out there that gives RIM a run for their money. Still software security issues, but still a good piece of hardware.
Desk phones are really a device of the past and prevalent primarily in North America only. Will your company be able to get away from their 50 year old buying practices?
If your company uses fixed price per minute for wireless, consider switching to WiFi on campuses to save money. Each minute on WiFi is saved money.
Design devices and applications in a way no user manual is needed.
Microsoft Wireless - does not have a good transport in place to support application usage on handheld devices.
Workers with walking sticks:
- security on a stick
- apps on a stick
* good idea but not really sufficient just yet.
Tablets:
- embedded 3G - okay for vertical applications
- field upgradable - requires knowledgeable workers
- USB tethered devices - will be good option for 3G handhelds to allow voice and data usage at the same time
* keep in mind it generally costs about $250 to have a laptop sent back in for upgrades
RIM - the Macintosh of the handheld world?
- not a licensed OS for other handhelds
- no one else makes their handsets
* 2007 will be an important year for RIM, especially regarding the release of new Microsoft OS.
HTC - rising hardware company. #1 supplier for Microsoft. Its the new HP of handheld designs.
Symbian - Used by Nokia - okay in Europe, but not so much in North America. Its up to Nokia to grow market in North America.
Consider changing dictoral policy on handheld devices. Allow users to choose devices they want but provide expectations before they purchase.
This whole slide show presentation was great - I will try to post the entire slide show unless there are legal issues.
Tuesday, February 06, 2007
Directions for WiFi: N and Beyond
Drank Hanzlik, Managing Director, WiFi Alliance
82% of hotels in the U.S. Offer WiFi.
What to look for during 2007:
- Not just laptops - adoption of other enabled devices
- Voice as a "killer app" to provide cost savings and mobile convergence
Battery life expectations should increase.
If considering VOiP:
- coverage and range
- quality of service
- security
- power management
- interoperability
802.11n:
- up to 6x increase in throughput and improved range
- introduction of certification program
- Finalization in October, 2008, IEEE standard will be ratified
Using the Changing Landscape of Wired and Wireless Operators for Competitive Advantage
Phil Redman and Michael King, Gartner
On average across major carriers, consumer customers maintain about 75% of the voice and data revenue.
Carriers are spending billions towards their voice and data networks and want people to use them. Use this to your advantage!
If you see significant drops in cost for devices and technologies, do your research - chances are something new is coming out and you may be releasing equipment that will soon be out dated.
Watch for incremental changes in device charges. If the carrier advises devices will be be software upgradable (not hardware) for near future changes in the network, get it in writing.
Gartner noticed significantly slower speeds in a loaded production environment than in lab stats provided by the carriers from their laboratory tests.
Gartner tests showed a 50% increase in packet size decreases slowdowns by 25%.
Keep asking questions - not only surrounding technology changes but also pricing.
RFID: Technology and Application Update
Dwight Klappich, Research VP, Gartner
RFID is not going to be used to replace bar coding, but not in many instances. However, RFID can be more applicable where bar coding cannot be effective.
Sensory Network: real-time visibility of events that facilitate the management of, and ongoing analysis across, the extended supply chain.
Example: car manufacturers for trading vehicles during manufacture. Or warehouses wanting to track specific items.
What to track
- larger items to smaller assets until the business case reaches the point of diminishing returns.
- expensive high-valued items (cost of tagging should be less than 5% of the cost of items)
Building a business case
- small to mid-scale: $0.5 million to $1 million
- large scale: $1 million to $5 million+
Payback: expect ROI of one to three years
Implementation: pilot six to 12 months, full deployment one to two years
Myth of the 5 cent No current leaders in the magic quadrant.
Useful for companies that are concerned about loosing assets within company facilities. It cannot tell you an asset is currently located at this residence or in this country.
Evolved down to case level, not item level (referencing retail usage).
People or Asset Tracking - fixed readers in the floor, ceiling or at every door, but then we can find people or assets.
What roll can a wireless provider play in RFID tracking? Unknown.
Wireless in the Enterprise: Mobility Services Case Studies
Hitachi, UC Berkeley and Global Manufacture of Consumer Goods
Early Deployment Challenges
- some kind of way to dynamically change channels on wireless networks, and find products to address scalability and coverage.
- trying to get to a single system to allow users to go anywhere, be able to open up their laptops, and work without IT intervention. Machine and user certs. Automatic renewal of certs.
- ubiquitous SSID for entire corporation
- Security in shared areas with other companies
- Guest networks
802.11 to locate assets / location based services - location based service allowed the company to locate an infected laptop within 15 minutes after a virus was detected.
The Evolution of WiMAX
Ron Resnick, President & Chairman, WiMAX Forum
Some carriers are upset because this technology allows different players to compete.
Complimentary to cellular, not a competitor. It can easily integrate with 3G technologies.
- Delivers broadband anywhere, anytime
- Internet technology from the ground up
- One common standard globally
- Delivers highest throughput and capacity
Wireless technologies are evolving to OFDMA.
Development Requirements
- Easy to use
- Affordable
- Works on a variety of form factors
- Multiple usage models
- Broadband experience similar to fixed
- Different operator types
- Global roaming
Expect to see global WiMAX roaming in 2008-2009.
Monday, February 05, 2007
Strategic Mobility in the Enterprise
Evan Miller, Mobile Solutions Director, Texas Instruments
- immediate access to time-critical information, improves workflow 29%
- downtime conversion into productive time 196 hours / year / person
Business culture change helped increase in net profit.
Value Stack - Mobile Phone > Secure Email & PIM > Intranet Web > Mobile Apps
Beyond Mobile Email
- location based apps
- browser based apps
- instant messaging / unified messaging
Support and web based ordering process was developed in house - not outsourced. They have smart people.
Company Profile
Mobile handhelds: 3500
Support personnel: 8 dedicated SLS and 4 help desk
Best Practices for Mobilizing Enterprise Applications
Dan Rudolph, Director of Product Marketing, Motorola Good Technology Group
Best Practices
IT dept should have centralized control over itpolicies.
Avoid
- cables or cradles to load or update software
- 1/2-2 hours per device for update
- installing desktop software
- requiring the use of a sync cable
- limited visibility of HH data
Best Practices
- OTA provisioning
- OTA policy control
- no desktop software
- end to end visibility (reports HH data)
Consistency is important!
Wireless Broadband Scenario
David Willis, Research VP, Gartner
Pay as you go vs unlimited service
- Users traveling one to three days per week would be okay with pay as you go services
- Users traveling four or more days per week would make better use of unlimited plans
Group workers into worker types.
TCO $-$$$$
- Alert Workers
- Forms Workers
- Traveling Workers
- Day Extenders
- Campus Workers
- Teleworkers
Should 3G be Embedded?
- No. Technology continues to move forward and upgrades could cost more than expected.
Options - tethered or secondary external device.
Recommendations
- categorize users by need
- capture total spending
- concentrate on high volume users first
- use wireless as part of business recovery strategy
- embrace broadband aggregator and 3G services plans for mobile professionals
- use process-focused, mobile-workforce focused or mobile portfolio planning strategy to optimize ROI
- invest in a mobile application architecture
- examine acceleration technologies (e.g. SoftWOCs)
- expect a multi-network strategy, combining 3G, WiFi, and wired options
74% increase in data speeds for embedded 3G is a bunch of BS.
Wireless Security Scenarios
John Pescatore - Secret Service, NSA, VP Distinguished Analyst, Gartner
Focus on how to support mobility and how to do it securely.
Successful business are the ones that take risks - but enterprises must take into account security.
Vulnerabilities and attacks for mobile devices will increase through this year and into next year.
All corporate mobile email should flow through email server malware removal.
Focus on strong device configuration compliance processes.
All mobile communications services should include malware filtering. If we we're renewing our services, ask providers if they provide and maintain malware support. If it is built in, it will reduce our cost of ownership and maintenance. Force vendors to step up.
Client side anti-viral should be the last resort - and won't work anyway.
In 2006, average enterprises spent 6% of IT budget on security.
Extend established security processes to deal with mobile business threats.
Perform an inventory and discovery. Focus on content discovery for mobile platforms.
For other mobile devices, force sync to server, not to the PC - this will cut down on sensitive data leaving the company. How, I'm not sure.
Windows Mobile 5 does not have decent security and companies must take additional measures. Windows Mobile 6 will provide increased security.
Mobile Scenario For the Future
Nick Jones, VP Distinguished Analyst, Gartner
My BlackBerry errored out and closed out my notes twice during the session. I lost all my notes. I will have to add more later.
Keep an eye on Nokia E Series and Windows Smartphone.
Don't buy devices with embedded 3G unless you take into account future upgrade costs.
Mobile users will expect to carry both a laptop and a mobile device through 2008 - no integration to a single device until after that.
If corporations are going to secure a device, the corporation must own the device.
Mobile threats will continue to grow through 2010, but security will be manageable
Don't focus on new corporate applications that don't add any real value.
On mobile applications, don't ask for information that is already known or can be deducted.
A Vision for Networks in 2012
David Willis, Research VP, Gartner
A CIO's View
If you want to thrive in your company, put yourself in your boss's position.
- efficiency and cost management
- assets effectively managed - using wifi or rfid to manage fixed or mobile assets
- enhanced productivity
- no security issues
- high user satisfaction
- earn trust in the business
A User's View
- Control
- Convenience
- Security
Goal: no user training required
An Administrator's View
- Application Enhancement
- Automation
- Security
- Architecture
Goal: no new labor
Wireless Services on a Global Scale
- will require use of multiple carriers; do not expect to have one carrier for complete global services
By the end of the decade, RIM will be one of the top 10 contenders in the wireless market.
Driving Costs Down
- Strategic Planning
- Standardization
- Process and Governance
- Change Management
Look beyond IT costs to company benefit.
Saturday, February 03, 2007
Waiting For Breakfast
Yes, we are one of those couples that eats breakfast at 11:30am. But hey, its Saturday! We are waiting for a table with a host of other people here at Ginger Brown's Restaurant. This place is well worth the wait. If you ever make it to Lake Worth, be sure to stop by Ginger Brown's for breakfast. If it's your birthday, your meal is free!