“ We expect specialized devices to be deployed for specific tasks (e.g., ruggedized handhelds for industrial workers, smart phone devices for wireless email, wireless handhelds for sales force, etc Its important to look at how the device will be used most of the time, what type of work and tasks do the techs do most of the time, and what are needed but less frequent, or by exception. That will influence greatly the form factor. The software running on the device is also a consideration on how the user will interact with the device. “ Organizations will attempt to standardize on specific families of devices to limit device diversity, but this will not be possible for all groups across the entire enterprise with varying needs. This means that IT groups will not only be forced to continue to manage notebooks, but will also be increasingly forced to include other data-centric pervasive devices in the mix. The days of WinTel domination and the standardization it brought are over when it comes to the mobile world. This will fundamentally challenge the tools, processes and policies put in place to deploy, secure and manage applications.” Reduced Costs Lower cost of replacement vs. tablet pc Declining average sales price for ruggedized EDAs Always in your pocket Rugged Durability unmatched Unmatched portability Significant weight savings Instant On Longer battery life than laptop or pc Short boot times and always on Always Connected Telephone with Bluetooth accessories Inherently connected nature – for voice and data Allows for wireless printing of invoices for customers Better manageability and security Enforcement of policies Higher confidence for device wipes.
Enterprise Mobility and HTML5
On average, organizations state that 44% of their workforce is considered mobile. Best-in-Class organizations (top 20%) are leveraging their enterprise mobility solutions as an integrated part of their overall business strategy. Adoption of mobile solutions is driven by the need to:As competitive pressures escalate, an organizations success is increasinglyintertwined with its ability to enable its workforce to be as effective and productiveon the move as it is at the office.
» Repair cycle time improvements of 30% - 50%» Time to invoice up 40% - 60%» Warranty sales up 15% - 40%» Service response time improvements of 50% - 80%» Time to collection dropped 25% - 50%» Call avoidance improved 30%» Cross-selling up 100%» Travel costs drop 35%» Technicians handle 20% more calls
Enabling mobile workers real-time access to enterprise applications wirelessly Global Positioning Systems (GPS) for real-time location based services Convergence of voice and data Parts tracking / dynamic provisioning using bar-coding and RFID Dynamic dispatch and scheduling systems
Increasing diversity within mobility space:Multiple form factors (tablet, mobile, etc.)Multiple Platforms and Operating Systems ◦ Windows XP/7 ◦ Windows Phone 7 ◦ Windows Mobile/Embedded ◦ Windows 8 (Q4 2012) ◦ Android “Flavors” ◦ iOS (iPhone/iPad) ◦ BlackberryConvergence of device usage (personal and business)Growing mobility diversity within corporate environments - BYOD
Selection Criteria % of RespondentsAbility to integrate with existing 64%systemsAbility to stand up to tough 32%conditionsAnticipated lifecycle costs 28%Ability to ensure security of data 22%
Environmental Conditions• Know your environment and user culture before you choose a device• Rugged vs Non-Rugged• Integrated Bar Code Scanners• Screen - durability and brightness• Keyboard - Numeric, QWERTY, Soft keyboard• Downtime and MaintenanceSupport and Operations• IT support – help desk• Platform Life span Roadmap• Hardware and accessories, credit card readers, RFID, GPS• Software OS and APP and Device Mgmt
Native mobility applications, tools and technologies are highly proprietary, complex and incompatible ◦ Windows (.NET) ◦ Windows Phone 7 (Silverlight) ◦ Windows Mobile (.NET CF) ◦ iPhone/iPad (X-Code, Objective C) ◦ Android (JAVA - multiple “versions” OS) No single mobility platform will be the “winner” Growing diversity at break-neck pace Very expensive to develop native for all
HTML5 is a language for structuring and presenting content for the World Wide Web In addition to specifying markup, HTML5 specifies scripting application programming interfaces (APIs) It’s Not One “Big” Thing ◦ HTML5 is a collection of individual features with their own evolution
New web browsers have been built around the HTML5- based “WebKit” browser ◦ Windows browsers, Blackberry browser (ver 6.0+), Chrome browser, Safari browser, Android browser and the S60 browser on Symbian mobile phones. As of the first half of 2010, analyst estimates place the cumulative number of mobile handsets shipped with a WebKit-based browser at 350 million.
Vice-President of Engineering and Technology Evangelist ◦ Driving and showcasing HTML5 technologies ◦ Google’s Mobile Phone Applications and Development Efforts ◦ The man behind Google+ ◦ Google GadgetsVic Gundotra ◦ Google Gears ◦ More than 40 product APIs Google exposes• Jan 2009 ◦ Considered to be Googles Social Czar • Demonstrates new mobile HTML5 Gmail client • Disconnected mode – offline caching • Native user experience (non-browser experience) • Illustrates new possibilities with WebKit engine and HTML5
Extends to multiple operating systems and form factors Key Technology Capabilities Rich Client User Interface – native look and feel Full SQL Database on Device Fully Disconnected Mode“A cross-platform strategy enablescompanies to concentrate onfeature/functions and use whatever devicemakes the most sense for their businessrequirements”
• Geolocation API • The geolocation API lets you share your GPS location with a web application on the device. This can be used for device tracking or providing location-based services on the device such as mapping.
• WebSQL (SQLite) – offline data storage • In 2007, Google launched Gears, an open source cross-browser plugin which included an embedded database based on SQLite. • This early prototype later influenced the creation of the Web SQL Database specification. • Web SQL Database provides a thin wrapper around a SQL database, allowing you access to a local database from a web application.
• Cache Manifest • An offline web application revolves around a cache manifest. This contains references to all resources that your web application needs (i.e. cache) to operate completely disconnected from the network.
WebSockets ◦ WebSocket is a technology providing for bi-directional, full-duplex communications channels over a TCP socket. Web Workers ◦ Web Workers define an API for running scripts in the background independently of any user interface. This allows for long-running scripts that are not dependent on user interactions.
• Networked Computers • Mobile Devices • Unlimited bandwidth • • No need to prioritize bandwidth • Local support for users • IT can easily get to devices • All Windows PCs • Physical building security
Typical corporate mobile infrastructures will encompass hundreds of devices and users with multiple operating systems These roaming mobile assets are becoming more of a security and data risk for corporations Majority of businesses have no comprehensive mobile device management strategy in place today but are currently searching for one All mobile devices will need to be centrally managed and secured as organizations move toward centralized IT control of mobile devices
As larger percentages of the workforce carry sophisticated mobiledevices that contain sensitive company data, the need for theenterprise to secure these devices increases greatly.
A mobile device management console that provides a convenient way to view all mobile assets and give flexibility to filter and sort devices by: Locations Users Device types Groups Software packages• Console that provides easy-to-use tools for modifying settings, locations, groups, users and packages assigned to devices• Ability to send messages to multiple devices simultaneously targeting specific groups or users
Ability for an authorized administrator to take full control of the device remotely through a console: ◦ Check and modify device settings ◦ Setup software on the device ◦ Troubleshoot problems on the device ◦ Remotely stop processes ◦ Copy files from the device ◦ Capture screen shots ◦ Send a message to the device
Password protection Device wipe and lockdown Authentication Data encryption