Integrating Wireless Technology in the Enterprise: PDAs, Blackberries, and Mobile Devices

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Integrating Wireless Devices in the Enterprise provides a solution that every enterprise can use, described in terms of scope, feasibility and return on investment, architecture, and data structures. The solution Wheeler offers here is scalable from a single handheld and single desktop to small workgroup to large enterprise environments. The number of devices is not a determinant of success or failure. It's more often the planning and managing of them that's crucial. This book also provides tools to deal with the increase of devices, and the corresponding complexity of managing those resources and the increase in cost to the firm. *Synchronize networked data with the mobile device fleet*Synchronize a mobile device with networked data that is mission critical*Connect any device to any data source, over any network

Author(s): William Wheeler
Edition: 1
Year: 2003

Language: English
Pages: 403

Front Cover......Page 1
Integrating Wireless Technology in the Enterprise......Page 4
Copyright Page......Page 5
Contents......Page 8
Author Information......Page 18
Preface......Page 20
Acknowledgments......Page 28
Executive summary......Page 30
1.1 Avoiding the “that’s the way we’ve always done it” trap......Page 31
1.2 What is a personal digital assistant?......Page 32
1.3 What it is not…......Page 34
1.4 How do we get the most out of it?......Page 36
1.5 So we ask again, “what is a PDA?”......Page 37
1.6 So what does a PDA buy me?......Page 42
1.7 Use it like it was intended to be used......Page 45
1.8 Baseline features......Page 46
1.9 Calendar......Page 47
1.10 Contacts or phone book......Page 55
1.11 Tasks/to-do’s......Page 61
1.12 Notes/Memos......Page 65
1.13 Email......Page 69
Summary......Page 72
Executive summary......Page 74
2.1 Barcoding......Page 75
2.2 Barcode symbology and formats......Page 76
2.3 Scanners and decoders......Page 79
2.5 Wireless scanners......Page 80
2.6 Additional software and A-Os......Page 81
2.7 Cellular phones......Page 83
2.8 Wireless standards......Page 84
2.9 High points of the 802.11 standards......Page 85
Summary......Page 88
Executive summary......Page 90
3.1 Business justification......Page 91
3.2 Cost......Page 92
3.3 Scope......Page 93
3.5 Putting cost, scope, and schedule together......Page 94
3.6 Feasibility analysis......Page 95
3.8 Identify critical success factors......Page 96
Summary......Page 100
Executive summary......Page 102
4.2 Request for information system services......Page 103
4.3 Preliminary investigations......Page 104
4.5 Pest management problem description......Page 105
4.7 Problem or opportunity statements......Page 106
4.9 Problems, opportunities, objectives, and constraints matrix......Page 109
4.11 Solution analysis......Page 112
4.12 Candidate systems matrix......Page 113
4.13 Management approval......Page 115
Summary......Page 116
Executive summary......Page 118
5.2 It sounds expensive …......Page 119
5.3 When does it make sense and when doesn’t it?......Page 120
5.4 I’m a “bottom-line kind of guy.” Show me the numbers......Page 121
5.6 Preliminary investigations......Page 122
5.8 Requirements analysis......Page 123
5.9 Feasibility analysis......Page 124
5.10 The challenge......Page 126
5.11 The method......Page 132
5.12 Environment complexity......Page 133
5.14 Expanded requirements......Page 134
5.16 Decision tables......Page 135
5.18 How will I know if it makes money to do this?......Page 139
5.19 What are the next steps?......Page 142
5.20 The challenge......Page 143
5.21 End-user mobility......Page 145
5.23 Environment complexity......Page 146
5.24 Expanded requirements......Page 147
5.25 More decision tables......Page 150
Summary......Page 153
6.1 System requirements and analysis......Page 154
Summary......Page 163
Executive summary......Page 164
7.1 Methodology......Page 165
7.4 Waterfall method......Page 166
7.5 Extreme programming......Page 168
7.6 Differences in requirements focus......Page 169
7.7 Cultural differences......Page 170
7.8 Testing approaches......Page 171
7.9 Customer focus......Page 172
7.10 Methodology conclusions......Page 173
7.12 Code warrior......Page 175
7.13 PalmOS emulator (POSE)......Page 176
7.15 Satellite forms enterprise edition......Page 178
7.17 Conduit development kit (CDK)......Page 180
7.18 Java Development Environment......Page 182
7.19 Microsoft windows CE developer’s kit......Page 183
7.21 Design......Page 185
7.22 Data flow diagram......Page 186
7.27 Implementation schedule......Page 187
Summary......Page 192
Executive summary......Page 194
8.1 Topology terms and concepts......Page 195
8.2 Physical means of transmission......Page 200
8.3 Topology summary......Page 201
8.4 Other important terms and concepts......Page 204
8.5 Generalizations before we move forward with your project......Page 207
8.7 Design it, build it, and test it......Page 211
8.8 Communicate to death, and then communicate some more......Page 212
8.9 Are we ready yet?......Page 213
8.10 Build it and they will come......Page 215
8.12 We said what we were going to do; we did it, now we are going to tell you what we did......Page 216
8.14 Small business (single site) solution......Page 217
8.15 Enterprise solution (single or secure multi-site)......Page 220
8.16 Enterprise-wide wireless solution (EWWS)......Page 221
8.18 Small business (single site)......Page 223
8.19 Enterprise solution (single or secure multi-site)......Page 224
8.21 How do I connect this to what I have?......Page 225
Summary......Page 226
9.1 Sure it’s cool, but how does it work in my business?......Page 228
9.2 Case study 1–Pest Management Operators (PMO)......Page 233
9.3 Critical success factors......Page 237
9.4 Current situation......Page 243
9.5 Approach considerations......Page 245
9.6 Solution analysis......Page 248
9.9 Efficiency......Page 251
9.10 Forward-thinking flexibility......Page 252
9.11 Prototyping......Page 253
9.12 Architecture......Page 255
9.13 Suggestions and lessons learned......Page 257
9.14 Have you seen my workforce?......Page 259
Summary......Page 260
10.1 Mobile sales force......Page 262
10.2 Architecture......Page 265
10.3 Have you seen my workforce?......Page 267
10.4 Suggestions and lessons learned......Page 269
Summary......Page 270
11.1 It’s a harsh world; make the best of it......Page 272
11.2 Architecture......Page 277
11.3 Have you seen my workforce?......Page 278
11.4 Suggestions and lessons learned......Page 280
Summary......Page 281
Executive summary......Page 282
12.1 Our own worst enemy......Page 283
12.2 What is the end goal?......Page 284
12.3 Is this enterprise- or project-based?......Page 285
12.4 How does this affect enterprise support costs?......Page 287
12.6 Architecture......Page 288
12.7 Have you seen my workforce?......Page 289
12.8 Suggestions and lessons learned......Page 290
Summary......Page 291
13.1 Management technology......Page 292
13.2 Architecture......Page 294
13.3 Have you seen my workforce?......Page 296
13.4 Suggestions and lessons learned......Page 297
Summary......Page 299
Executive summary......Page 300
14.2 Education......Page 301
14.3 Hospitality......Page 302
14.4 Sales force automation and customer relationship management......Page 303
Summary......Page 304
Executive summary......Page 306
15.1 This shouldn’t be anything new......Page 307
15.3 Software standards......Page 309
15.4 User community standards......Page 311
15.5 Security standards......Page 312
15.6 Asset management overview......Page 313
15.7 Hardware management......Page 315
15.8 Software management......Page 316
15.9 Asset management......Page 317
15.10 Refresh cycle strategy......Page 318
15.11 Now that I can’t live without this, disaster strikes!......Page 321
15.12 Disaster recovery standards......Page 322
15.14 Ownership......Page 323
15.15 Usability......Page 324
15.16 Expectations......Page 325
15.17 Costs (mostly hidden)......Page 326
15.18 Training......Page 327
15.19 Post-training......Page 328
Summary......Page 329
Executive summary......Page 330
16.1 Implementation 1–Pest Control Operation......Page 334
16.2 Implementation 2–Outside Sales Organization......Page 338
16.3 Implementation 3–logistics......Page 342
16.4 Implementation 4–Information Services/Information Technology Support Applications......Page 345
16.5 Implementation 5–Executive Mobility......Page 348
16.6 When is it time to upgrade? I just paid for this!......Page 352
16.7 How do I possibly keep up?......Page 354
Here we go again......Page 355
Summary......Page 357
17.1 Where do we go from here?......Page 358
17.2 What can I expect tomorrow and how do I prepare now?......Page 359
17.3 Future devices and wearable computers......Page 364
17.4 What’s a wearable?......Page 365
17.5 What else is out there?......Page 369
17.6 About SyncML......Page 371
17.7 Managing the future......Page 372
17.8 Convergence of tools......Page 374
17.9 So what are the lessons learned?......Page 377
Summary......Page 378
Bibliography......Page 382
Glossary......Page 390
Appendix A......Page 408
Appendix B......Page 424
Appendix C......Page 426
Index......Page 428