SlideShare a Scribd company logo
SOLUTION BRIEF
Intel®Core™Processor Family
Government/Public Sector
Cloud Computing Solutions
Consumerization of IT
Creating a single view
Challenges
• Reduce complexity. Create a solution that enables social workers to access all the information they
need, quickly and accurately from one central point
• Stay mobile. Ensure the new solution works seamlessly from employees’ mobile devices to keep them
connected at all times and in all situations
Solutions
• Single View of the Child*. Avco Systems created an application tailored to pull all information strands
together and deliver them to child support officers
• Recommended devices. IT solutions provider SCC identified Intel® Core™ processor-based mobile
devices as best for performance, touch and security
Impact
• New customers. The combined software and hardware solution enables Avco to engage new types
of customers in the local government space
• Deployment already. Customers have already deployed the Avco solution to hundreds of
employees
• Great flexibility. The solution can be tailored for any user group, with other versions already planned
Avco Systems and SCC centralize information streams to boost social workers’ effectiveness using Intel®technology-
based devices
“This mission critical application
requires a device that can support
a range of features including a
touch screen interface, the power
to process large amounts of data
and – crucially – gold standard
security. We believe that to best
meet the project's specific needs,
mobile computing hardware
basedontheIntel®Core™processor
represents the best solution.”
Guy Hodges,
Public Sector Sales Director,
SCC
Complexities of social care
Local governments everywhere are challenged with
delivering the best possible quality of service to
their citizens, wherever and whenever the two
come into contact. While taxpayers expect to see
the funds they generate being put to good use,
often the responsibility to provide excellent service
goes beyond the purely financial.
Some groups of public servants, such as child- and
family-support officers, work closely with vulner-
able people within the community, and frequently
have to deal with sensitive issues. In these cases,
it may be essential to make a fast decision to re-
solve emergencies and critical situations appropri-
ately and quickly. These decisions can be difficult,
with many variables and background details to
take into account, so the social worker making
them must have all the relevant information at
hand, such as case history notes, medical records
and notes from colleagues who have also been
involved.
Such a variety of information can be difficult to
keep track of, especially when social workers are
out in the field and only have a mobile computing
device. Flicking between applications and informa-
tion sources can be time-consuming, and may add
complexity to an already fraught or delicate situation.
An adaptable solution
Pulling together multiple strands of information is
a challenge Avco Systems has experience solving.
“We had developed an application called Single
View of the Vehicle*, which offers an overview
of all available information to analysts at credit
reference agencies,” explains David Robertson,
consultant, Avco Systems. “We’d spoken to a local
authority about its desire to better equip mobile
social workers with the information they need,
and we saw that our application could be easily
adapted to fit this requirement.”
Avco Systems therefore developed an application
called Single View of the Child for use by child
support officers. The solution provides a single-
interface overview of all the information these
specialists need when they are away from the
office and dealing with a case, as well as enabling
Copyright
©2014, Intel Corporation. All rights reserved. Intel, the Intel logo, Ultrabook, Intel Core and Core inside, are trademarks of Intel Corporation in the U.S. and other countries.
This document and the information given are for the convenience of Intel’s customer base and are provided “AS IS” WITH NO WARRANTIES WHATSOEVER, EXPRESS OR IMPLIED,
INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. Receipt or
possession of this document does not grant any license to any of the intellectual property described, displayed, or contained herein. Intel® products are not intended for use in
medical, lifesaving, life-sustaining, critical control, or safety systems, or in nuclear facility applications.
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark,
are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should
consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with
other products. For more information go to http://www.intel.com/performance.
Ultrabook™ products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook™ manufacturer. For more information and details,
visit http://www.intel.com/ultrabook
*Other names and brands may be claimed as the property of others. 1013/JNW/RLC/XX/PDF 329756-001EN
them to share and print information and carry out
risk assessments. The application addresses local
governments’ need to deliver large amounts of
information to users in a digestible form, but Avco
Systems knew that to offer the best solution to
its customers, it needed to go beyond the software
element.
“We wanted to find the best mobile computing de-
vice or devices that would deliver the performance,
security and usability features needed to get the
most out of our application,” says David Robertson.
Avco Systems began working with a leading Euro-
pean IT solutions provider, SCC, to help it identify
the most suitable device model for the application,
and to take the combined software and hardware
solution to the marketplace.
Guy Hodges, public sector sales director, SCC says:
“Keeping pace with user demand, the application
is designed to work well with the touch-based
interfaces now common across a range of mobile
computing devices like tablets and convertible
Ultrabook™ devices. Because it needs to process
large volumes of information from multiple govern-
ment sources quickly and efficiently, performance
is also an important requirement. Finally, of course,
security is absolutely key. These users have ac-
cess to a lot of highly sensitive information, often
protected by stringent legal regulations, and it is
therefore essential to ensure that only authorized
people can view it.”
Taking these requirements into account, and based
on its extensive experience designing and imple-
menting IT solutions for its customers, SCC rec-
ommended that the Single View of the Child
application be deployed on devices powered by
the Intel Core processor. SCC has already been
speaking to local government bodies about the
solution, with some implementations already
complete.
Visit Intel's Technology Provider website at
www.inteltechnologyprovider.com.
Find the solution that’s right for your organization.
Contact your Intel representative, visit Intel’s
Business Success Stories for IT Managers
(www.intel.co.uk/Itcasestudies) or explore the
Intel.co.uk IT Center (www.intel.co.uk/itcenter).
Lessons learned
Specialist workers need specialist tools, and
often these tools come in the shape of tailored
software programs. However, getting the
best value from these applications means
making sure the hardware on which they
run is up to task. By getting both elements
right, organizations can drive huge efficiency
benefits for their end users and boost the
quality of service they deliver. SCC and Avco
Systems worked together to create the per-
fect combination of Avco software and Intel®
technology-based mobile computing devices.
Software specialist works with leading IT solutions
provider to boost application value with Intel®
technology
I.T. SOFTWARE DEVELOPMENT

More Related Content

What's hot

Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
spencerharry
 
EdisonV2 - Smart Vision for Visually Impaired
EdisonV2 - Smart Vision for Visually ImpairedEdisonV2 - Smart Vision for Visually Impaired
EdisonV2 - Smart Vision for Visually Impaired
Vamshi Krishna
 
iCloud WebPACS for Radiology
iCloud WebPACS for RadiologyiCloud WebPACS for Radiology
iCloud WebPACS for Radiology
iCloud Inc.
 
A system design approach to onboarding
A system design approach to onboardingA system design approach to onboarding
A system design approach to onboarding
LaurieBrewster1
 
Pitch Deck
Pitch DeckPitch Deck
Pitch Deck
Pete Wassell
 
Guardhat Award Write Up
Guardhat Award Write UpGuardhat Award Write Up
Guardhat Award Write Up
Claudia Toscano
 
Healthcare trends and information management strategy
Healthcare trends and information management strategyHealthcare trends and information management strategy
Healthcare trends and information management strategy
Christopher Wynder
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
DImension Data
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
Cisco Services
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
Daniel L. Cruz
 
The costly shortcomings_of_legacy_ediscovery_solutions (1)
The costly shortcomings_of_legacy_ediscovery_solutions (1)The costly shortcomings_of_legacy_ediscovery_solutions (1)
The costly shortcomings_of_legacy_ediscovery_solutions (1)
Shannalyn West
 
Como criar um mundo autônomo e conectado - Jomar Silva
Como criar um mundo autônomo e conectado - Jomar SilvaComo criar um mundo autônomo e conectado - Jomar Silva
Como criar um mundo autônomo e conectado - Jomar Silva
iMasters
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
Ed Dodds
 
1ii. Mandarine.Tech AI MINT - OVERVIEW
1ii. Mandarine.Tech AI  MINT - OVERVIEW1ii. Mandarine.Tech AI  MINT - OVERVIEW
1ii. Mandarine.Tech AI MINT - OVERVIEWDavid von Ackerman
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
Vinod Kashyap
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco
 
The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...
RES
 
Intel Symantec Alliance Infographic
Intel Symantec Alliance InfographicIntel Symantec Alliance Infographic
Intel Symantec Alliance Infographic
Kenn Peterson
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
Softchoice Corporation
 

What's hot (20)

Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
EdisonV2 - Smart Vision for Visually Impaired
EdisonV2 - Smart Vision for Visually ImpairedEdisonV2 - Smart Vision for Visually Impaired
EdisonV2 - Smart Vision for Visually Impaired
 
iCloud WebPACS for Radiology
iCloud WebPACS for RadiologyiCloud WebPACS for Radiology
iCloud WebPACS for Radiology
 
A system design approach to onboarding
A system design approach to onboardingA system design approach to onboarding
A system design approach to onboarding
 
Pitch Deck
Pitch DeckPitch Deck
Pitch Deck
 
Guardhat Award Write Up
Guardhat Award Write UpGuardhat Award Write Up
Guardhat Award Write Up
 
Healthcare trends and information management strategy
Healthcare trends and information management strategyHealthcare trends and information management strategy
Healthcare trends and information management strategy
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
 
The costly shortcomings_of_legacy_ediscovery_solutions (1)
The costly shortcomings_of_legacy_ediscovery_solutions (1)The costly shortcomings_of_legacy_ediscovery_solutions (1)
The costly shortcomings_of_legacy_ediscovery_solutions (1)
 
Como criar um mundo autônomo e conectado - Jomar Silva
Como criar um mundo autônomo e conectado - Jomar SilvaComo criar um mundo autônomo e conectado - Jomar Silva
Como criar um mundo autônomo e conectado - Jomar Silva
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
 
1ii. Mandarine.Tech AI MINT - OVERVIEW
1ii. Mandarine.Tech AI  MINT - OVERVIEW1ii. Mandarine.Tech AI  MINT - OVERVIEW
1ii. Mandarine.Tech AI MINT - OVERVIEW
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...
 
NarendraKolla
NarendraKollaNarendraKolla
NarendraKolla
 
Intel Symantec Alliance Infographic
Intel Symantec Alliance InfographicIntel Symantec Alliance Infographic
Intel Symantec Alliance Infographic
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 

Viewers also liked

Malla cristobal colón
Malla cristobal colónMalla cristobal colón
Malla cristobal colón
Proyectoocho UniSalle
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
amyawhittingham
 
5 dicas rápidas
5 dicas rápidas5 dicas rápidas
TRABALHO DE PORTUGUES
TRABALHO DE PORTUGUESTRABALHO DE PORTUGUES
TRABALHO DE PORTUGUES
Aninhamaatos
 
MinistryPurposeStatement
MinistryPurposeStatementMinistryPurposeStatement
MinistryPurposeStatementBarrett Davis
 
Letter of Reference - Naomi Boyce - Khumani Projects
Letter of Reference - Naomi Boyce - Khumani ProjectsLetter of Reference - Naomi Boyce - Khumani Projects
Letter of Reference - Naomi Boyce - Khumani ProjectsNaomi Boyce
 
Κειμενογράφος: Φύλλο εργασίας για το Πολυτεχνείο (οδηγίες)
Κειμενογράφος: Φύλλο εργασίας για το Πολυτεχνείο (οδηγίες)Κειμενογράφος: Φύλλο εργασίας για το Πολυτεχνείο (οδηγίες)
Κειμενογράφος: Φύλλο εργασίας για το Πολυτεχνείο (οδηγίες)
Penelope Markellou
 
An inspector calls.docx 1447174821819
An inspector calls.docx 1447174821819An inspector calls.docx 1447174821819
An inspector calls.docx 1447174821819
totaaalupiii
 
Pro Tools New Session
Pro Tools New SessionPro Tools New Session
Pro Tools New Session
Senio Corbini
 
TC 3053-SK-150 Merchandising plan 26OCT15
TC 3053-SK-150 Merchandising plan 26OCT15TC 3053-SK-150 Merchandising plan 26OCT15
TC 3053-SK-150 Merchandising plan 26OCT15Tracy Mack
 
Techno Sell: COPPER
Techno Sell: COPPERTechno Sell: COPPER
Techno Sell: COPPER
choice broking
 

Viewers also liked (20)

Letter of Merit _ CCNA 3
Letter of Merit _ CCNA 3Letter of Merit _ CCNA 3
Letter of Merit _ CCNA 3
 
Malla cristobal colón
Malla cristobal colónMalla cristobal colón
Malla cristobal colón
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
CON_068_Hotdog_05
CON_068_Hotdog_05CON_068_Hotdog_05
CON_068_Hotdog_05
 
5 dicas rápidas
5 dicas rápidas5 dicas rápidas
5 dicas rápidas
 
TRABALHO DE PORTUGUES
TRABALHO DE PORTUGUESTRABALHO DE PORTUGUES
TRABALHO DE PORTUGUES
 
MinistryPurposeStatement
MinistryPurposeStatementMinistryPurposeStatement
MinistryPurposeStatement
 
PM reference
PM referencePM reference
PM reference
 
Letter of Reference - Naomi Boyce - Khumani Projects
Letter of Reference - Naomi Boyce - Khumani ProjectsLetter of Reference - Naomi Boyce - Khumani Projects
Letter of Reference - Naomi Boyce - Khumani Projects
 
Artículo william
Artículo williamArtículo william
Artículo william
 
HRAnnouncement
HRAnnouncementHRAnnouncement
HRAnnouncement
 
Κειμενογράφος: Φύλλο εργασίας για το Πολυτεχνείο (οδηγίες)
Κειμενογράφος: Φύλλο εργασίας για το Πολυτεχνείο (οδηγίες)Κειμενογράφος: Φύλλο εργασίας για το Πολυτεχνείο (οδηγίες)
Κειμενογράφος: Φύλλο εργασίας για το Πολυτεχνείο (οδηγίες)
 
Professional Resume
Professional ResumeProfessional Resume
Professional Resume
 
HENGST a marca do filtro original
HENGST a marca do filtro originalHENGST a marca do filtro original
HENGST a marca do filtro original
 
Certification_CCNA 3
Certification_CCNA 3Certification_CCNA 3
Certification_CCNA 3
 
gayathri
gayathrigayathri
gayathri
 
An inspector calls.docx 1447174821819
An inspector calls.docx 1447174821819An inspector calls.docx 1447174821819
An inspector calls.docx 1447174821819
 
Pro Tools New Session
Pro Tools New SessionPro Tools New Session
Pro Tools New Session
 
TC 3053-SK-150 Merchandising plan 26OCT15
TC 3053-SK-150 Merchandising plan 26OCT15TC 3053-SK-150 Merchandising plan 26OCT15
TC 3053-SK-150 Merchandising plan 26OCT15
 
Techno Sell: COPPER
Techno Sell: COPPERTechno Sell: COPPER
Techno Sell: COPPER
 

Similar to Avco Systems SCC Creating Single View

Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
Intel IoT
 
Open Text Everywhere
Open Text Everywhere Open Text Everywhere
Open Text Everywhere Micah Kalen
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceTricia Stream
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Cxo cockpit customer newsletter - october 2013
Cxo cockpit customer newsletter - october 2013Cxo cockpit customer newsletter - october 2013
Cxo cockpit customer newsletter - october 2013
Richard Wolters
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
Schneider Electric
 
Jon Hill InVMA - Real Industrial Case Studies creating Value with IoT
Jon Hill InVMA - Real Industrial Case Studies creating Value with IoTJon Hill InVMA - Real Industrial Case Studies creating Value with IoT
Jon Hill InVMA - Real Industrial Case Studies creating Value with IoT
WMG, University of Warwick
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Alex Zaltsman
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft Private Cloud
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
Info-Tech Research Group
 
Intel-Case study
Intel-Case studyIntel-Case study
Intel-Case studyJacob Jose
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochureDan Smith
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Digitalization of Public Sector: How to LeapFrog with ICT - global best pract...
Digitalization of Public Sector: How to LeapFrog with ICT - global best pract...Digitalization of Public Sector: How to LeapFrog with ICT - global best pract...
Digitalization of Public Sector: How to LeapFrog with ICT - global best pract...
Christian Wernberg-Tougaard
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platforms
Alex Zaltsman
 
Smart applications smart platforms, security, processes and interactions
Smart applications   smart platforms, security, processes and interactionsSmart applications   smart platforms, security, processes and interactions
Smart applications smart platforms, security, processes and interactions
BellaRobert139
 
0455 riverbed steel_central_pfb_060915as
0455 riverbed steel_central_pfb_060915as0455 riverbed steel_central_pfb_060915as
0455 riverbed steel_central_pfb_060915as
Dhanoj Jadhav, PMP, CISA, CISSP
 
Bgg Mobile: Top 10 Tech Trends 2014
Bgg Mobile:  Top 10 Tech Trends 2014Bgg Mobile:  Top 10 Tech Trends 2014
Bgg Mobile: Top 10 Tech Trends 2014
BGGMobile-- Sheila Bacon
 
White papers of inuit technology.
White papers of inuit technology.White papers of inuit technology.
White papers of inuit technology.Kamal Tej
 

Similar to Avco Systems SCC Creating Single View (20)

Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
 
Open Text Everywhere
Open Text Everywhere Open Text Everywhere
Open Text Everywhere
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital Workspace
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Cxo cockpit customer newsletter - october 2013
Cxo cockpit customer newsletter - october 2013Cxo cockpit customer newsletter - october 2013
Cxo cockpit customer newsletter - october 2013
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
Jon Hill InVMA - Real Industrial Case Studies creating Value with IoT
Jon Hill InVMA - Real Industrial Case Studies creating Value with IoTJon Hill InVMA - Real Industrial Case Studies creating Value with IoT
Jon Hill InVMA - Real Industrial Case Studies creating Value with IoT
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
Intel-Case study
Intel-Case studyIntel-Case study
Intel-Case study
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Digitalization of Public Sector: How to LeapFrog with ICT - global best pract...
Digitalization of Public Sector: How to LeapFrog with ICT - global best pract...Digitalization of Public Sector: How to LeapFrog with ICT - global best pract...
Digitalization of Public Sector: How to LeapFrog with ICT - global best pract...
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platforms
 
Smart applications smart platforms, security, processes and interactions
Smart applications   smart platforms, security, processes and interactionsSmart applications   smart platforms, security, processes and interactions
Smart applications smart platforms, security, processes and interactions
 
0455 riverbed steel_central_pfb_060915as
0455 riverbed steel_central_pfb_060915as0455 riverbed steel_central_pfb_060915as
0455 riverbed steel_central_pfb_060915as
 
Bgg Mobile: Top 10 Tech Trends 2014
Bgg Mobile:  Top 10 Tech Trends 2014Bgg Mobile:  Top 10 Tech Trends 2014
Bgg Mobile: Top 10 Tech Trends 2014
 
White papers of inuit technology.
White papers of inuit technology.White papers of inuit technology.
White papers of inuit technology.
 

More from xband

Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
xband
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
xband
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
xband
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
xband
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
xband
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
xband
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
xband
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
xband
 
API Connect Presentation
API Connect PresentationAPI Connect Presentation
API Connect Presentation
xband
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Report
xband
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
xband
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
xband
 
Hipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourceHipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResource
xband
 
The Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data VirtualizationThe Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data Virtualization
xband
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
xband
 
Big Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in BetweenBig Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in Between
xband
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
xband
 
Charles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsCharles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsxband
 
Fujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationFujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationxband
 

More from xband (20)

Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
API Connect Presentation
API Connect PresentationAPI Connect Presentation
API Connect Presentation
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Report
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Hipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourceHipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResource
 
The Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data VirtualizationThe Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data Virtualization
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
Big Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in BetweenBig Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in Between
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
Charles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsCharles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limits
 
Fujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationFujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administration
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Avco Systems SCC Creating Single View

  • 1. SOLUTION BRIEF Intel®Core™Processor Family Government/Public Sector Cloud Computing Solutions Consumerization of IT Creating a single view Challenges • Reduce complexity. Create a solution that enables social workers to access all the information they need, quickly and accurately from one central point • Stay mobile. Ensure the new solution works seamlessly from employees’ mobile devices to keep them connected at all times and in all situations Solutions • Single View of the Child*. Avco Systems created an application tailored to pull all information strands together and deliver them to child support officers • Recommended devices. IT solutions provider SCC identified Intel® Core™ processor-based mobile devices as best for performance, touch and security Impact • New customers. The combined software and hardware solution enables Avco to engage new types of customers in the local government space • Deployment already. Customers have already deployed the Avco solution to hundreds of employees • Great flexibility. The solution can be tailored for any user group, with other versions already planned Avco Systems and SCC centralize information streams to boost social workers’ effectiveness using Intel®technology- based devices “This mission critical application requires a device that can support a range of features including a touch screen interface, the power to process large amounts of data and – crucially – gold standard security. We believe that to best meet the project's specific needs, mobile computing hardware basedontheIntel®Core™processor represents the best solution.” Guy Hodges, Public Sector Sales Director, SCC Complexities of social care Local governments everywhere are challenged with delivering the best possible quality of service to their citizens, wherever and whenever the two come into contact. While taxpayers expect to see the funds they generate being put to good use, often the responsibility to provide excellent service goes beyond the purely financial. Some groups of public servants, such as child- and family-support officers, work closely with vulner- able people within the community, and frequently have to deal with sensitive issues. In these cases, it may be essential to make a fast decision to re- solve emergencies and critical situations appropri- ately and quickly. These decisions can be difficult, with many variables and background details to take into account, so the social worker making them must have all the relevant information at hand, such as case history notes, medical records and notes from colleagues who have also been involved. Such a variety of information can be difficult to keep track of, especially when social workers are out in the field and only have a mobile computing device. Flicking between applications and informa- tion sources can be time-consuming, and may add complexity to an already fraught or delicate situation. An adaptable solution Pulling together multiple strands of information is a challenge Avco Systems has experience solving. “We had developed an application called Single View of the Vehicle*, which offers an overview of all available information to analysts at credit reference agencies,” explains David Robertson, consultant, Avco Systems. “We’d spoken to a local authority about its desire to better equip mobile social workers with the information they need, and we saw that our application could be easily adapted to fit this requirement.” Avco Systems therefore developed an application called Single View of the Child for use by child support officers. The solution provides a single- interface overview of all the information these specialists need when they are away from the office and dealing with a case, as well as enabling
  • 2. Copyright ©2014, Intel Corporation. All rights reserved. Intel, the Intel logo, Ultrabook, Intel Core and Core inside, are trademarks of Intel Corporation in the U.S. and other countries. This document and the information given are for the convenience of Intel’s customer base and are provided “AS IS” WITH NO WARRANTIES WHATSOEVER, EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. Receipt or possession of this document does not grant any license to any of the intellectual property described, displayed, or contained herein. Intel® products are not intended for use in medical, lifesaving, life-sustaining, critical control, or safety systems, or in nuclear facility applications. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance. Ultrabook™ products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook™ manufacturer. For more information and details, visit http://www.intel.com/ultrabook *Other names and brands may be claimed as the property of others. 1013/JNW/RLC/XX/PDF 329756-001EN them to share and print information and carry out risk assessments. The application addresses local governments’ need to deliver large amounts of information to users in a digestible form, but Avco Systems knew that to offer the best solution to its customers, it needed to go beyond the software element. “We wanted to find the best mobile computing de- vice or devices that would deliver the performance, security and usability features needed to get the most out of our application,” says David Robertson. Avco Systems began working with a leading Euro- pean IT solutions provider, SCC, to help it identify the most suitable device model for the application, and to take the combined software and hardware solution to the marketplace. Guy Hodges, public sector sales director, SCC says: “Keeping pace with user demand, the application is designed to work well with the touch-based interfaces now common across a range of mobile computing devices like tablets and convertible Ultrabook™ devices. Because it needs to process large volumes of information from multiple govern- ment sources quickly and efficiently, performance is also an important requirement. Finally, of course, security is absolutely key. These users have ac- cess to a lot of highly sensitive information, often protected by stringent legal regulations, and it is therefore essential to ensure that only authorized people can view it.” Taking these requirements into account, and based on its extensive experience designing and imple- menting IT solutions for its customers, SCC rec- ommended that the Single View of the Child application be deployed on devices powered by the Intel Core processor. SCC has already been speaking to local government bodies about the solution, with some implementations already complete. Visit Intel's Technology Provider website at www.inteltechnologyprovider.com. Find the solution that’s right for your organization. Contact your Intel representative, visit Intel’s Business Success Stories for IT Managers (www.intel.co.uk/Itcasestudies) or explore the Intel.co.uk IT Center (www.intel.co.uk/itcenter). Lessons learned Specialist workers need specialist tools, and often these tools come in the shape of tailored software programs. However, getting the best value from these applications means making sure the hardware on which they run is up to task. By getting both elements right, organizations can drive huge efficiency benefits for their end users and boost the quality of service they deliver. SCC and Avco Systems worked together to create the per- fect combination of Avco software and Intel® technology-based mobile computing devices. Software specialist works with leading IT solutions provider to boost application value with Intel® technology I.T. SOFTWARE DEVELOPMENT