This document discusses selecting the right mobile device for retail stores. It begins by explaining that while many shoppers research online, most still prefer to shop in brick-and-mortar stores. It then discusses the importance of customer service in winning sales and retaining customers. The document advocates for outfitting associates with mobile devices to help improve customer service. It stresses that selecting the right mobile device is critical for success, and that enterprise-class devices provide the best value compared to consumer devices or bring-your-own-device (BYOD) programs. The document is intended to examine the pros and cons of different device options and their ability to meet retail requirements.
Challenges and issues of mCommerce - ecommerce solution providerVineela Kanapala
Mobile use is increasing exponential which has given a boost to mCommerce. mCommerce is trending and growing at very rapid speed. However this faces few challenges. This presentation covers issues and challenges of mCommerce.
- What is mCommerce
- mCommerce flow
- Advantages of mCommerce
- Disadvantages of mCommerce
- Challenges of mCommerce
- Issues of mCommerce
Ref - www.ifour-consultancy.com/ecommerce-solutions.aspx
Wearable Devices: The Next Big Thing in CRMCognizant
When integrated with CRM systems, wearable devices offer the same type of digital experience as desktops, laptops, smartphone or tablets, but with the convenience afforded by watches, eyeglasses and headbands. Wearables apply across the CRM spectrum - from sales, to marketing, to services.
This is the presentation on m-Commerce applications and its use in information system.
Outline of presentation:
Introduction
History
Overview
Services and Applications
CLOs(Class Learning Objective of Managing Information of Business)
Advantages
Disadvantages
Challenges and issues of mCommerce - ecommerce solution providerVineela Kanapala
Mobile use is increasing exponential which has given a boost to mCommerce. mCommerce is trending and growing at very rapid speed. However this faces few challenges. This presentation covers issues and challenges of mCommerce.
- What is mCommerce
- mCommerce flow
- Advantages of mCommerce
- Disadvantages of mCommerce
- Challenges of mCommerce
- Issues of mCommerce
Ref - www.ifour-consultancy.com/ecommerce-solutions.aspx
Wearable Devices: The Next Big Thing in CRMCognizant
When integrated with CRM systems, wearable devices offer the same type of digital experience as desktops, laptops, smartphone or tablets, but with the convenience afforded by watches, eyeglasses and headbands. Wearables apply across the CRM spectrum - from sales, to marketing, to services.
This is the presentation on m-Commerce applications and its use in information system.
Outline of presentation:
Introduction
History
Overview
Services and Applications
CLOs(Class Learning Objective of Managing Information of Business)
Advantages
Disadvantages
What Is E-Commerce ?
What Is M-Commerce ?
Why Mobile Commerce?
Evolution Of Mobile Payments
Mobile Commerce: Beyond e-commerce
Mobile Payment Gateway Integration
Key Issues in Mobile Commerce
Diagrams
Adequate Solution for Business to Customer (B2C) by an ongoing Mobile SystemAM Publications
Today’s the era of mobile science and mobile secure technology in which business needs a solution that
impact on current scenario to their customers for making the easy purchase of the goods and items. Mobile system
based application have the design formation in the different developing languages which developed the systematic
arrangement of selling goods and particular as orders have been made by their premium customer, those could
consider as the adequate management system for business to customer. This solution would resolve by the design
views of application over mobile technology those helps for placing orders of goods as customer opted on the
application system.
The series of presentations contains the information about "Management Information System" subject of SEIT for University of Pune.
Subject Teacher: Tushar B Kute (Sandip Institute of Technology and Research Centre, Nashik)
http://www.tusharkute.com
The Mobile Commerce Impact – From Characteristics to ImplementationZoyabennet
This paper clearly illustrates the M-commerce’s impact on today’s world – right from characteristics to implementation. M-commerce however is not a technology, but it is about discovering innovative ways to define value for customers as well as to conduct business.
The changing landscape of consumer lifestyle is one of the biggest factor in the evolution mobile commerce in the world. The fast pacing transition of payment services and systems, which are often viewed to be the “umbilical cord” of the whole financial services ecosystem that links all stakeholders; telco, banks, retailers, technology/solution providers and consumer together.
mCommerce and Mobile Banking_Michael HanleySara Quinn
Part of the Mobile Communications Resource Center, this is one of several presentations created by Michael Hanley for Ball State University's College of Communication, Information and Media. All rights are reserved.
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
The mobile security status quo—a motley assortment of products including Mobile Device Management (MDM) and Mobile Application Management (MAM)—are impractical, unpopular with employees, and do not address all of today’s security and compliance requirements.
This papers compares legacy mobile security products to Virtual Mobile Infrastructure as alternative ways to solve BYOD security challenges.
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
As mobile becomes a primary computing platform for the enterprise, every business function will mobilize core operations through apps. These apps live outside the enterprise perimeter and can run on personally-owned or minimally managed devices. Mobile IT must protect the app data while preserving the user experience.
More than 1 billion cell phones and 179 billion mobile applications downloaded every year, mobile
development is surely one of the imaginative and effectively developing division. The mobile
application business sector is seemingly overwhelmed by Google applications (Gmail, Maps,
Search), Social media (Facebook, Instagram, Twitter, Youtube) and Gaming applications (Angry
winged creatures, Temple Run). Enormous players like Walmart, Bank of America and Amazon are
utilizing mobile applications for marking, enhancing client engagement, direct showcasing and so
forth. Little and medium size organizations are additionally taking after the mobile pattern,
understanding that a viable mobile system includes more than only a mobile-accommodating site.
its all about m-commerce
how m-commerece is useful and fruitful for you and everybody
nowadays we use m-commerece in our daily life for eg;marketing , bussiness etc.
What Is E-Commerce ?
What Is M-Commerce ?
Why Mobile Commerce?
Evolution Of Mobile Payments
Mobile Commerce: Beyond e-commerce
Mobile Payment Gateway Integration
Key Issues in Mobile Commerce
Diagrams
Adequate Solution for Business to Customer (B2C) by an ongoing Mobile SystemAM Publications
Today’s the era of mobile science and mobile secure technology in which business needs a solution that
impact on current scenario to their customers for making the easy purchase of the goods and items. Mobile system
based application have the design formation in the different developing languages which developed the systematic
arrangement of selling goods and particular as orders have been made by their premium customer, those could
consider as the adequate management system for business to customer. This solution would resolve by the design
views of application over mobile technology those helps for placing orders of goods as customer opted on the
application system.
The series of presentations contains the information about "Management Information System" subject of SEIT for University of Pune.
Subject Teacher: Tushar B Kute (Sandip Institute of Technology and Research Centre, Nashik)
http://www.tusharkute.com
The Mobile Commerce Impact – From Characteristics to ImplementationZoyabennet
This paper clearly illustrates the M-commerce’s impact on today’s world – right from characteristics to implementation. M-commerce however is not a technology, but it is about discovering innovative ways to define value for customers as well as to conduct business.
The changing landscape of consumer lifestyle is one of the biggest factor in the evolution mobile commerce in the world. The fast pacing transition of payment services and systems, which are often viewed to be the “umbilical cord” of the whole financial services ecosystem that links all stakeholders; telco, banks, retailers, technology/solution providers and consumer together.
mCommerce and Mobile Banking_Michael HanleySara Quinn
Part of the Mobile Communications Resource Center, this is one of several presentations created by Michael Hanley for Ball State University's College of Communication, Information and Media. All rights are reserved.
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
The mobile security status quo—a motley assortment of products including Mobile Device Management (MDM) and Mobile Application Management (MAM)—are impractical, unpopular with employees, and do not address all of today’s security and compliance requirements.
This papers compares legacy mobile security products to Virtual Mobile Infrastructure as alternative ways to solve BYOD security challenges.
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
As mobile becomes a primary computing platform for the enterprise, every business function will mobilize core operations through apps. These apps live outside the enterprise perimeter and can run on personally-owned or minimally managed devices. Mobile IT must protect the app data while preserving the user experience.
More than 1 billion cell phones and 179 billion mobile applications downloaded every year, mobile
development is surely one of the imaginative and effectively developing division. The mobile
application business sector is seemingly overwhelmed by Google applications (Gmail, Maps,
Search), Social media (Facebook, Instagram, Twitter, Youtube) and Gaming applications (Angry
winged creatures, Temple Run). Enormous players like Walmart, Bank of America and Amazon are
utilizing mobile applications for marking, enhancing client engagement, direct showcasing and so
forth. Little and medium size organizations are additionally taking after the mobile pattern,
understanding that a viable mobile system includes more than only a mobile-accommodating site.
its all about m-commerce
how m-commerece is useful and fruitful for you and everybody
nowadays we use m-commerece in our daily life for eg;marketing , bussiness etc.
Electric Load Forecasting Using Genetic Algorithm – A Review IJMER
Many real-world problems from operations research and management science are very
complex in nature and quite hard to solve by conventional optimization techniques. So, intelligent
solutions based on genetic algorithm (GA), to solve these complicated practical problems in various
sectors are becoming more and more widespread nowadays. GAs are being developed and deployed
worldwide in myriad applications, mainly because of their symbolic reasoning, flexibility and
explanation capabilities.
This paper provides an overview of GAs, as well as their current use in the field of electric load
forecasting. The types of GA are outlined, leading to a discussion of the various types and parameters of
load forecasting. The paper concludes by sharing thoughts and estimations on GA for load forecasting
for future prospects in this area. This review reveals that although still regarded as a novel
methodology, GA technologies are shown to have matured to the point of offering real practical benefits
in many of their applications.
Incorporating Mobile Commerce in your Multi-Channel strategy IBM Software India
This whitepaper understates the importance of incorporating mobile commerce in your multi channel strategy. The authors of this whitepaper are Luis E Rodriguez and Michael Au respectively who are IBM experts.
Luxury customer journey: an overview of the new UHNW audience and how to use ...Diana Sherling
This is the session that I gave at the SuperYacht Luxury Marketing Conference #makeyourmark16. In this presentation I talk about the insights and attitudes of the UHNW luxury audience and how you can use the customer journey McKinsey loop as a tool to plan and refine your marketing. I am passionate about luxury marketing, so read my blog at www.dianasherling.com or have a look at my mini luxury brand that I am creating at www.lilyflojewellery.com
Product Lifecycle Analysis is an invaluable business framework for developing a robust product marketing strategy. This document details a 5-phase approach to proper Product Lifecycle Analysis and draws out key strategic insights at each stage of the lifecycle. Additional concepts discussed include Consumer Adoption Curve, Bass Diffusion Model, Lifecycle-Performance Factor Matrix, Strategic Positioning, and Substitution Analysis.
The whitepapaer includes the following:
1. Understand mobile computing business
patterns and associated security risks.
2. Secure and monitor mobile device, data,
enterprise access, and applications.
3. Realize mobile enterprise security
strategy using IBM Security Solutions
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
BYOD is the concept that employees (or students) will bring and use their own mobile devices (such as laptops, tablets, and smart phones) to their workplace (or college). These devices are used to access privileged company information and applications on the company's (or academic institute's) IT infrastructure; there is a challenge to balance the demand to be connected to everything with proper accountability or oversight to protect the company's (academic institute's) IT assets.
This webinar will analyse the demand for BYOD, driven by factors such as:
• Pervasive connectivity
• Globalisation
• Workforce Age profile and expectations
• Employee work life integration
• The growth in personal devices connected to web [consumerisation of IT]
• Change in our relationships with the outside world
• Impact on the porosity of the border between private life and work.
And how the balance can be struck between this demand for BYOD, and the need to protect IT assets.
This webinar was first hosted with the Warwick Technology Professional Network of the Warwick Business School wbs.ac.uk
Part of the University of Warwick, we have an international reputation for top quality education and research in management and business.
Yamana is our mobile device management service by which it gets easy to ensure that the Company’s employees use their mobile devices within the bounds of corporate policies.
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
We offer complete satisfaction to our customers by following standardized SDLC processes, hiring the best of breed developers and mastering most of our requirements gathering, wireframing, designing, developing, testing, delivering, deploying and maintenance tasks.
Ours is an off-shore model, but we ensure that both customer and Mobiloitte are always in touch by keeping communications open, providing regular updates and iterative releases so that the customer is always well informed.
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
As businesses continue to leverage their existing investments in IAM, it's becoming increasingly critical that organizations future proof their security and IAM services. Doing this while establishing the utmost agility and delivering to the business is going to be most critical.
This paper analyzes the challenges involved with BYOD, the ways to leverage the benefits and also brings out the best practices in order to effectively utilize the BYOD trend.
Internet of Things with Wearable Devices at Enterprise Radariosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
Data science is blending with emerging technology to create the ultimate customer experience. While these innovations are turning the fantastic into reality, there are hidden risks that lurk behind such new technologies. Booz Allen's commercial retail experts provide cybersecurity guidance for retailers in this new digital world.
This report solely belongs to Symantec. Credit is due to all original authors and no financial gain was made from the report, Simply sharing for educational purposes,
The FBI is the lead federal agency for investigating malicious cyber activity by criminals, nation-state adversaries, and terrorists. To fulfill this mission, the FBI often develops resources to enhance operations and collaboration. One such resource is the FBI’s Internet Crime Complaint Center (IC3) which provides the public with a trustworthy and convenient mechanism for reporting information concerning suspected Internet-facilitated criminal activity. At the end of every year, the IC3 collates information collected into an annual report.
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
This guide aims to help journalists understand their rights at protests and avoid arrest when reporting on these events. It summarizes the legal landscape and provides strategies and tools to help journalists avoid incidents with police and navigate them successfully should they arise. Credit RCFP.Org
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
Verizon Publishes 2020 Data Breach Investigation Report (DBIR) With Insights From Thousands of Confirmed Breaches. Verizon's 2020 Data Breach Investigations Report (DBIR) is the most extensive yet, with 81 contributing organizations, and more than 32,000 incidents analyzed (of which 3,950 were confirmed breaches). Credit:Verizon
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
A Resource Guide to theU.S. Foreign Corrupt Practices Act
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
The FTC takes in reports from consumers about problems they experience in the marketplace. The reportsare stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to lawenforcement. While the FTC does not intervene in individual consumer disputes, its law enforcementpartners – whether they are down the street, across the nation, or around the world – can use informationin the database to spot trends, identify questionable business practices and targets, and enforce the law.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
Below is a list of consumer reporting companies updated for 2019.1 Consumer reporting companies collect information and provide reports to other companies about you. These companies use these reports to inform decisions about providing you with credit, employment, residential rental housing, insurance, and in other decision making situations. The list below includes the three nationwide consumer reporting companies and several other reporting companies that focus on certain market areas and consumer segments. The list gives you tips so you can determine which of these companies may be important to you. It also makes it easier for you to take advantage of your legal rights to (1) obtain the information in your consumer reports, and (2) dispute suspected inaccuracies in your reports with companies as needed.
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
Transnational criminal organizations (TCOs), foreign fentanyl suppliers, and Internet purchasers located in the United States engage in the trafficking of fentanyl, fentanyl analogues, and other synthetic opioids and the subsequent laundering of the proceeds from such illegal sales.
The mission of the IC3 is to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity, and to develop effective alliances with industry partners. Information is analyzed and disseminated for investigative and intelligence purposes, for law enforcement, and for public awareness.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
This report is built upon analysis of 41,686 security incidents, of which 2,013 were confirmed data breaches. We will take a look at how results are changing (or not) over the years as well as digging into the overall threat landscape and the actors, actions, and assets that are present in breaches. Windows into the most common pairs of threat actions and affected assets also are provided.
The Federal Trade Commission (FTC or Commission) is an independent U.S. law enforcement agency charged with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s primary legal authority comes from Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive practices in the marketplace. The FTC also has authority to enforce a variety of sector specific laws, including the Truth in Lending Act, the CAN-SPAM Act, the Children’s Online Privacy Protection Act, the Equal Credit Opportunity Act, the Fair Credit Reporting Act, the Fair Debt Collection Practices Act, and the Telemarketing and Consumer Fraud and Abuse Prevention Act. This broad authority allows the Commission
to address a wide array of practices affecting consumers, including those that emerge with the development of new technologies and business models.
Sentinel sorts consumer reports into 29 top categories. Appendices B1 – B3 describe the categories,providing details, and three year figures. To reflect marketplace changes, new categories or subcategories are created or deleted over time.The Consumer Sentinel Network Data Book excludes the National Do Not Call Registry. A separate report about these complaint statistics is available at: https://www.ftc.gov/reports/national-do-not-call-registry-data-book-fiscal-year-2018. The Sentinel Data Book also excludes reports about unsolicited commercial email.Consumers can report as much or as little detail as they wish when they file a report. For the Sentinel Data Book graphics, percentages are based on the total number of Sentinel fraud, identity theft, and other report types in 2018 in which consumers provided the information displayed on each chart.Reports to Sentinel sometimes indicate money was lost, and sometimes indicate no money was lost.Often, people make these reports after they experience something problematic in the marketplace,avoid losing any money, and wish to alert others. Except where otherwise stated, numbers are based on reports both from people who indicated a loss and people who did not.Calculations of dollar amounts lost are based on reports in which consumers indicated they lost between $1 and $999,999. Prior to 2017, reported “amount paid” included values of $0 to $999,999.States and Metropolitan Areas are ranked based on the number of reports per 100,000 population.State rankings are based on 2017 U.S. Census population estimates (Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2017). Metropolitan Area rankings are based on 2016 U.S. Census population estimates (Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2016).This Sentinel Data Book identifies Metropolitan Areas (Metropolitan and Micropolitan Statistical Areas)with a population of 100,000 or more except where otherwise noted. Metropolitan areas are defined by Office of Management and Budget Bulletin No. 15-01, “Revised Delineations of Metropolitan Statistical Areas, Micropolitan Statistical Areas, and Combined Statistical Areas, and Guidance on Uses of the Delineations of These Areas” (July 15, 2015). Numbers change over time. The Sentinel Data Book sorts consumer reports by year, based on the date of the consumer’s report. Some data contributors transfer their complaints to Sentinel after the end of the calendar year, and new data providers often contribute reports from prior years. As a result, the total number of reports for 2018 will likely change during the next few months, and totals from previous years may differ from prior Consumer Sentinel Network Data Books. The most up to date information can be found online at ftc.gov/data
A credit score is a three -digit number that predicts how likely you are to pay back a loan on time, based on information from your credit reports.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. - Medical identity theft has existed in various forms for decades, but it was in 2006 that World Privacy Forum published the first major report about the crime. The report called for medical data breach notification laws and more research about medical identity theft and its impacts. Since that time, medical data breach notification laws have been enacted, and other progress has been made, particularly in the quality of consumer complaint datasets gathered around identity theft, including medical forms of the crime. This report uses new data arising from consumer medical identity theft complaint reporting and medical data breach reporting to analyze and document the geography of medical identity theft and its growth patterns. The report also discusses new aspects of consumer harm resulting from the crime that the data has brought to light
The FTC takes in reports from consumers about problems they experience in the marketplace. The reports are stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to law enforcement. While the FTC does not intervene in individual consumer disputes, its law enforcement partners – whether they are down the street, across the nation, or around the world – can use information in the database to spot trends, identify questionable business practices and targets, and enforce the law.
Since 1997, Sentinel has collected tens of millions of reports from consumers about fraud, identity theft, and other consumer protection topics. During 2017, Sentinel received nearly 2.7 million consumer reports, which the FTC has sorted into 30 top categories. The 2017 Consumer Sentinel Network Data Book (Sentinel Data Book) has a vibrant new look, and a lot more information about what consumers told us last year. You'll know more about how much money people lost in the aggregate, the median amount they paid, and what frauds were most costly. And you'll know much more about complaints of identity theft, fraud, and other types of problems in each state, too. The Sentinel Data Book is based on unverified reports filed by consumers. The data is not based on a consumer survey. Sentinel has a five-year data retention policy, with reports older than five years purged biannually.
This guide addresses the steps to take once a
breach has occured. For advice on implementing a
plan to protect consumers’ personal information, to
prevent breaches and unauthorized access, check
out the FTC’s Protecting Personal Information: A
Guide for Business and Start with Security: A Guide
for Business.
*Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
FTC Consumer Sentinel Network Law enforcement's source for consumer complaints.
All information, data, and material contained, presented, or provided on is for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
It is not to be construed or intended as providing legal advice.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
2. PAGE 2
Even though today’s shoppers can access virtually every online
retailer that sells the items they seek to buy with a few keystrokes,
the majority of today’s consumers still prefer to purchase items in the
brick-and-mortar store.1
But just because a customer walks into your
store doesn’t mean you have the sale. Today’s customers comparison
shop and check your competitors for pricing and availability, right in
the aisles of your store on their smartphones. Winning the sale is
heavily dependent upon one thing: the level of customer service your
associates can provide. Service is so important that two thirds of
today’s shoppers are even willing to pay as much as 20 percent more
at retailers that provide truly excellent service.2
In order to deliver that level of service, retailers are turning to mobile
devices — outfitting associates with mobile devices is the number one
initiative in retail stores.3
The trend is further fueled by shopper opinion:
the majority of today’s shoppers feel that handheld mobile computers
help associates take service in the store to a new level — the kind of
service that results in more sales, more satisfied customers and more
repeat visits.4
The most important factor that will contribute to the
success of associate mobility is the selection of the mobile device.
The wrong device can frustrate users, decrease productivity, increase
costs and potentially introduce safety risks. The right device will help
maximize the success of your retail mobility deployment by maximizing
workforce productivity, task accuracy and return on investment (ROI).
The success of your
retail mobility
solution is tightly
tied to the mobile
device you select.
the clear winner: enterprise
devices. At first glance, choosing
consumer devices appears to be a
viable low-cost solution, with BYOD
further reducing costs by eliminating
the need to purchase and support
devices altogether. The enterprise
class device appears to be the most
expensive solution. However, it is the
enterprise class device that delivers
the best value — it costs much less
over the lifetime of the device, and is
able to better meet retail requirements.
This white paper will reveal why by
examining all three device options,
their differences and how those
differences impact performance,
productivity and cost.
3
device
paths
When it comes to
mobile device selection,
there are three choices:
1 Enterprise
devices
You can choose
enterprise handheld
mobile computers that
are purpose built for
retail environments.
2 Consumer
devices
You can choose less
expensive consumer
devices, such as
smartphones.
3 “Bring Your Own
Device” (BYOD)
You can allow your
associates to simply
use their own consumer
smartphones and other
mobile devices.
The MathThe mathCritical criteriaCritical criteriaIntroduction
3. PAGE 3
Selecting the right mobile device
Critical Criteria for the retailer
In order to select the right device, you need to make sure you have the right criteria. You need to meet a wide variety
of needs for different types of workers — from associates in the front of the store responsible for the direct delivery
of customer service to managers who need to stay on top of everything happening in the store, regardless of where
they may be. Following is a discussion of the criteria that can help you choose the right device for your workers, as
well as an evaluation of how enterprise, consumer and “BYOD” devices meet each criteria.
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories WLAN Scanning MPOS Durability Manageability Voice Lifecycle Services
4. The issue
Security is a top concern for retail organizations,
which must comply with PCI regulations that protect
shoppers’ personal and payment card information.
With so many recent breaches at top-name brand
retailers, payment card security is a major concern
for retailers and shoppers. But if your associates are
carrying consumer-grade mobile devices, consumer-
grade operating systems do not have the security
features required to comply with PCI standards,
increasing the risk of a security breach, brand damage
and lost shoppers.
The solution
Enterprise class devices are designed to provide
the required levels of security, where the typical
consumer class device falls short. In fact, more than
half of the companies surveyed reported a security
breach as a result of the use of a consumer device in
the business.5
And in BYOD programs, the majority of
companies report that responsibility for security falls
to the end-user — not acceptable for organizations
that must comply with government regulations or
face stiff penalties.6
Motorola Solutions enterprise class retail mobile
computers address device security several ways:
by providing all the necessary security protocols on
the mobile devices themselves, as well as offering
features that help prevent the theft of retail mobile
devices that can be utilized to access the sensitive
payment card data stored in your systems.
Comprehensive security features
ensure PCI compliance
When you choose Motorola Solutions retail mobile
devices, you choose a full complement of security
features that protects your shoppers’ payment card
data around the clock, including:
• FIPS 140-2 government grade security.
• AES256 encryption for data in motion and data
at rest — data is protected whether it is stored
on the device, on a media card in the device or
traveling over the wireless LAN.
• Remote lock and wipe for lost or stolen devices.
• Automatic locking of idle devices.
• Application permissions, which prevent users from
downloading unauthorized applications that could
present security weaknesses or enable uploading
of sensitive data to unauthorized servers.
• Multi-user log-on, which enables a single pool of
devices to serve multiple workers, yet fully control
what each worker can access via log-on credentials.
• The ability to prevent the installation of automatic
OS updates from the cloud, ensuring that IT has full
control over determining whether an OS upgrade
meets requirements for security and application
compatibility — as well as if and when the upgrade
should be executed.
• The ability to restrict user and application access to
hardware (such as the integrated camera, GPS and
Bluetooth) as well as the built-in web browser or
an email client.
• The ability to remove OS features which access
servers outside of the retail network, such as maps
and email applications built into the consumer
version of Android that communicate with the cloud.
These connections pose a high security breach risk,
since sensitive payment card data — including PIN
numbers —contained in retail backend applications
is exposed outside of the retail store.
PAGE 4
Security Page 1 Page 2
The MathThe mathIntroductionIntroduction Critical criteria
Training Battery Accessories WLAN Scanning MPOS Durability Manageability Voice Lifecycle ServicesSecurity
5. PAGE 5
The use of consumer devices
in the enterprise has caused a
security breach in 55 percent of
enterprises around the world.
The result? Survey respondents
in every industry, every country
and every size enterprise cite
security is the number one risk
associated with consumer
device use in the enterprise.”
Source: Avanade survey of 600+ IT decision makers, 2012
True enterprise class Android
for more freedom of device choice
Motorola Solutions goes a step beyond the typical
enterprise class device security to bring retailers
the unparalleled security they require in a portfolio
that provides an industry first — enterprise class
devices running the Android operating system as
well as typical enterprise class operating systems,
such as Windows Embedded Handheld. Android is
being touted as the operating system (OS) that will
reign in mobility solutions — and given that over
1.5 million Android phones are activated every day,
it seems that the consumer grade operating system
is well on its way to holding that position.7
Retailers
find Android’s open architecture very desirable for its
elegant applications that take intuitiveness and ease
of use to a new level — however, consumer Android
does not provide the security that retailers require.
The good news is that it is only the off-the-shelf
standard Android operating system that falls short of
delivering the security required in the retail store. To
enable retailers to utilize this powerful and flexible
operating system, Motorola Solutions developed
Motorola Extensions (Mx), which adds the security
Security Page 2
features Android needs to allow retailers to leverage
this desirable platform — yet still meet the extremely
stringent security requirements in the store. With Mx,
Motorola’s Android-based devices can offer the
same level of security as our Windows Mobile/
Windows CE devices, allowing you to confidently
deploy Android in your environment.
Protection against device theft
One of the major issues with deploying consumer-style
mobile devices, such as smartphones and tablets,
is that they are extremely desirable. Employees
are tempted to take them — and a device left on a
shelf for a few moments tempts your shoppers. Our
enterprise class retail mobile devices help eliminate
theft with centralized management and locationing
technologies that allow IT to monitor the location of
all of your mobile computers in the store. You can
even set up a geofence to alert you immediately to
any devices that are leaving the store premises. The
result? Your devices are safer — and there is no
need to purchase a separate layer of theft deterrent
equipment or spend time developing practices and
processes to help prevent device theft.
Page 1
The MathThe mathIntroductionIntroduction Critical criteria
Training Battery Accessories WLAN Scanning MPOS Durability Manageability Voice Lifecycle ServicesSecurity
6. The issue
In retail, workforce turnover is typically high. In addition,
there are seasonal peaks that require the hiring of a
temporary workforce, as well as students who leave your
workforce at the end of the summer, creating the need to
hire replacements every fall. If you choose consumer-style
mobile devices, a specific model is typically updated within
six to twelve months. This constant churn means your
device pool will contain different versions of different
models that may be running different operating system
versions as well. And if you choose to implement BYOD,
you will likely be faced with a device pool so diverse
it could include practically every smartphone that is
available. As a result, in either scenario, the cost and
time involved in training workers to use your mobility
applications can skyrocket. There is the time spent
creating training, the time it takes workers to complete a
training course, as well as all the hours on the job during
the training period where productivity will likely be lower.
The solution
When you choose Motorola Solutions enterprise class
retail mobile device portfolio, you get a guarantee
that the exact device you purchase today will be
available for a minimum of three years from the date
the device arrived on the market. The result is a
consistent device pool that substantially reduces the
cost of training. You only need to develop one training
course instead of multiple versions of the course for
multiple versions of a device — one video, one Q&A,
one training procedure. The device consistency also
enables your existing workforce to help train new
workers. Since all employees have the exact same
device and the app can behave exactly the same
way on all devices, co-workers can easily assist new
associates with application questions and procedures.
PAGE 6
With a three-year guarantee of
device availability, you get the
device consistency required to
drive training costs down —
instead of an app that behaves
differently on different versions
of the same device. And less time
spent training on-the-job means
more time available to help your
shoppers, improving customer
service and satisfaction.
training
The MathThe mathIntroductionIntroduction Critical criteria
Security Battery Accessories WLAN Scanning MPOS Durability Manageability Voice Lifecycle ServicesTraining
7. The issue
The mobile device you choose must offer ample
battery power, all shift long. You don’t want the mobile
devices that are providing your associates with the
capabilities they need to deliver excellent service to
run out of power at an inopportune time, nor do you
want your associates and managers to spend time
managing power and changing batteries instead of
taking care of customers.
In order to provide full-shift battery power, two
things are required that consumer devices typically
do not offer: a battery with the capacity to last
a full shift and the ability to replace the battery.
The typical consumer device battery will not last
a full shift, especially since the device will be in
constant use during a shift. When the battery runs
low, if the batteries are not removable, the entire
device must be charged. As a result:
• Productivity is reduced since workers are forced
to spend time swapping devices mid-shift.
• Costs increase as retailers are forced to either:
a) purchase two devices per worker to ensure
that a second charged device is always on hand
if required or b) purchase sleds that contain
batteries that can power the mobile device.
• Return on investment (ROI) is reduced, since
devices must remain out of service for charging.
The solution
By contrast, enterprise mobile device manufacturers
recognize that continual operation is crucial in retail.
That’s why enterprise class mobile devices not only
have high-capacity batteries capable of powering all
the device features for a full shift, but also removable
batteries — a fresh fully-charged battery can be
inserted into a device at the start of every shift. The
result? The enterprise class mobile device remains
in service all shift, every shift, providing the retail
workforce with dependable access to the information
and capabilities they need to deliver the very best
in service, while substantially reducing the cost of
mobility and maximizing the value of your mobile
device investment.
PAGE 7
In order for mobile devices to remain in service for a full shift, you need two things:
a battery with the capacity to last a full shift and a removable battery than can be swapped —
instead of taking the device out of service for charging.
Full-Shift Battery Power
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Accessories WLAN Scanning MPOS Durability Manageability Voice Lifecycle ServicesBattery
8. The issue
Consumer grade mobile devices are created for the
individual and are generally single-user oriented.
As such, they typically do not offer the type of
accessories that will be required in the enterprise, nor
do the accessories offer enterprise class durability.
The solution
Enterprise class devices offer purpose built
accessories that simplify and reduce the cost of
backroom management. For example, consumer class
devices generally require one charger per device, and
each charger requires its own outlet. By contrast,
enterprise class devices offer multi-slot chargers
that allow you to use one outlet to typically charge at
least four devices or four batteries simultaneously.
As a result, the enterprise class device requires
only a quarter of the outlets that consumer devices
will require. And since a four slot multi-slot charger
commonly takes up less space than four individual
chargers, you’ll need less space to support each shift.
In addition, unlike consumer accessories, enterprise
accessories are built to business grade specifications,
such as the number of insertions a cradle can handle
before contacts wear out. By contrast, consumer
charging accessories — including sleds — typically
do not offer an insertion rating.
Without business-class accessories, if you choose
company-owned consumer class mobile devices,
backroom infrastructure costs can soar. Without
industrial design, all day around-the-clock use may wear
out the accessories before the device. In addition, you
may need to purchase new cradles and chargers every
year as consumer device models change, which may also
trigger the need to modify the back room design.
And when you choose Motorola Solutions retail portfolio
of enterprise class mobile devices, you get device
diversity. You can choose the best device for different
types of workers — handheld mobile computers,
smartphone-style devices, tablets and badges — all
complete with enterprise class accessories.
PAGE 8
Business Class Power Management Accessories
Mobile device power
management accessories
should be built to business
grade specifications, such as
insertion ratings, as well as
for space and cost efficiency
in the back room.
MC40 Payment Card Reader ET1 Payment Card ReaderMC40 4-Slot “Toaster” Battery Charger MC40 5-Slot Device Charger
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery WLAN Scanning MPOS Durability Manageability Voice Lifecycle ServicesAccessories
9. PAGE 9
The issue
The value of the mobile device in the hands of your
mobile retail workers is heavily dependent upon the
quality of the wireless connection. The wireless
device in the hands of your associates and managers
needs to offer rock solid wireless connectivity —
period. Wireless data keeps your workforce connected
to inventory and product information, and enables
on-the-spot processing of a payment or return. And
with your Voice-over-WLAN services, associates can
take calls from customers and reach co-workers and
managers in the store with the press of a button.
But consumer class Wi-Fi radios lack the power to
maintain a strong wireless connection, as well as the
features required to enable seamless roaming. The
result? Slow screen re-fresh rates, poor application
performance and the need to constantly re-connect to
the network — situations that impact the quality of
the customer service your associates can deliver, the
productivity of your associates and the effectiveness
of your managers.
The solution
Enterprise class Wi-Fi radios are purpose built to
provide on-the-move workers with a constant high-
quality connection. Typical features include:
• Enterprise class higher-powered radios that
provide stronger, more robust wireless connections.
• Seamless roaming that ensures devices roam
to the next access point — before the connection
drops or performance erodes.
• Support for 802.11a, which supports 5 GHz
devices and helps improve Wi-Fi network capacity,
speed and quality of service by offering more
channels, more bandwidth and less interference.
• Enterprise class 5 GHz Wi-Fi. All 5 GHz
technology is not created equally. A consumer class
smartphone may support 5 GHz, but in order for your
workers and associates alike to utilize those devices
on your WLAN, you may need more access points.
In fact, Gartner reports that 5 GHz tablets from
one of today’s leading manufacturers will require
300 percent more access points — adding cost,
complexity and management time to your WLAN.
The quality of your associates’
wireless connections are tied
directly to shopper satisfaction
and worker productivity.
But all Wi-Fi radios are not
created equally. Wi-Fi radios
in enterprise class devices
are designed to maintain
connectivity and application
performance for workers who
are constantly moving —
something the typical consumer
class radio doesn’t offer.
Wireless Network Connectivity
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories Scanning MPOS Durability Manageability Voice Lifecycle ServicesWLAN
10. The issue
In the retail store, one of the most important features
of any mobile device is bar code scanning. It is bar
code scanning that will allow associates to check
price, stock, related items and more in seconds, as well
as scan shopper loyalty cards and items to complete
a purchase anywhere in the store. But the bar code
scanners in consumer class devices are not designed
for the intensive scanning inside a retail store — nor
are they equipped to scan damaged or poorly printed
bar codes or bar codes under shrinkwrap.
The solution
Enterprise mobile devices offer integrated high
performance bar code scanning that is in a completely
separate class from the scanning capabilities of
consumer class devices. For example, Motorola’s retail
mobile devices offer dedicated scan engines that can
capture virtually any bar code in any condition — 1D
or 2D, regardless of whether it is damaged, scratched,
dirty or poorly printed. Tests performed by Scandit*
reveal that Motorola’s SE4500 scan engine captures
bar codes 20 to 50 times faster than consumer mobile
devices. And where consumer devices returned an
erroneous bar code read as much as 10 percent of the
time, the Motorola scan engine mis-decode rate was
negligible, at just 0.005 percent.
A lack of industrial class bar code scanning can have
a major impact on the productivity of your retail
workforce — and an even greater impact on customer
satisfaction — though this drain is often well-hidden
and unaccounted for in TCO analyses. For example,
slow read times can turn into hours of wasted time
and frustrated workers. Let’s take a look at the math.
The numbers
If an associate scans just 50 bar codes per hour
over an 8 hour shift, that translates into 400 bar
codes/shift. At a conservative two seconds a
scan, those 400 bar codes will take a total of 800
seconds/13.3 minutes per shift. While that seems like
an inconsequential number, for associates that work
five eight-hour shifts each week, that translates into
an additional 55 hours per year per associate — the
equivalent to 7 additional shifts per associate.
For associates that works five eight-hour shifts per week,
enterprise scanning performance can recoup about 55 hours
a year per associate — nearly seven additional shifts per year
per employee.
PAGE 10
Enterprise Scanning Performance
ENTERPRISE VS. CONSUMER GRADE SCANNING TECHNOLOGY
Scan Time 100ms 2 seconds
Scans per 8 hour shift (50 scans
per hour)
400 400
Total scan time per shift
40 seconds
(0.66 minutes)
800 seconds
(13.3 minutes)
Total scan time per associate
per year (scan time per shift
x 260 shifts per year per
associate)
171.60 minutes
(2.86 hours)
3,458 minutes
(57.6 hours)
Impact on associate Productivity
Feature
Scanning
Application on
Consumer Device
Motorola
mobile
computer
with SE4500
scanner
Omni-directional Often < 30 degrees1
360 degrees2
Decode Time 2-5 seconds3
Typical < 100ms2
No Read 2%-30%3
Typical < 1%2
Mis-decode rate on UPC A 0.5%-10%3
Typical < 0.005%2
Scanning Throughput: Consumer vs. Enterprise
1 – Motorola Solutions test 2– Motorola Solutions specification 3 – Scandit
* Source: Scandit Scanning Performance: http://www.scandit.com/barcode-scanner-sdk/features/performance/
If the mobile device you
choose lacks industrial class
bar code scanning, the result
can be a major impact on the
productivity of your associates and the quality of service they
can provide your customers — though this drain is often
well-hidden and unaccounted for in TCO analyses.
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories WLAN MPOS Durability Manageability Voice Lifecycle ServicesScanning
11. The issue
The Mobile Point of Sale (MPOS) is here to stay,
with 55 percent of all retailers predicted to have
deployed mobile POS by the end of 2015.3
What is
driving the movement toward MPOS? In the retail
store, last impressions are just as important as first
impressions — and the POS is the last touchpoint
with your customer. With MPOS in your store,
shoppers never need to wait in line to make a
purchase — your associates can complete a purchase
anywhere in the store with their mobile device. The
result? Stronger sales — associates can ring up
purchases before a customer changes their mind or
walks out due to long lines at the checkout stand.
While you can easily add a payment card sled to a
consumer mobile device to process payment, consumer
class payment processing sleds can have a major impact
on overall solution cost, ergonomics and durability. In
order to make the best buying decision, you’ll need to
examine the numerous potential pitfalls related to sleds
and other types of payment card accessories:
• A payment sled dramatically changes the ergonomics
of the mobile device — size and balance are
impacted, along with user comfort.
• Sleds can significantly increase device acquisition
costs because:
–– The sled typically costs two to three times
the cost of the consumer mobile device,
bringing the acquisition cost on par with
that of an enterprise device.
–– When you need to purchase a replacement
mobile device, you will most likely need to also
purchase a new sled — sleds are typically
designed for a specific model and are often not
compatible with the next generation device.
• Our own internal testing on one of the most-used
third party sleds revealed a lack of durability and
sealing, which will increase the failure rate, likely
translating into the purchase of multiple sleds over
the course of the lifespan of a mobile device. Our
research found:
–– Lack of sealing. The low sealing rating did not
provide any protection against liquids entering
the device.
–– Lack of durability. While the sled did have a
drop specification, the consumer mobile device
it was attached to did not. We attempted to
perform a minimal drop test by dropping the
device with the sled attached six times on each
of the six sides but were unable to complete the
test due to catastrophic damage to the mobile
device — on the third four-foot drop to concrete,
the display on the mobile device shattered and
the sled dislodged from the device.
• Impaired Wi-Fi performance. Antennas in
consumer devices are not designed to handle the
interference created by the sled. The electronics
in the sled can interfere with the antenna, and the
sled itself might block the area where the antenna
is located. As a result, the Wi-Fi antenna will likely
be impaired, degrading wireless performance.
The solution
All the issues associated with adding a third party
sled for scanning can be eliminated by choosing an
enterprise class device that offers either integrated
payment card processing or industrial payment card
processing accessories that are purpose built for a
specific device. Motorola offers snap-on payment
card readers that offer:
• The enterprise security protects shopper payment
card information
• The rugged design that delivers an enterprise class
lifecycle and total cost of ownership — including
enterprise durability specifications for impact (drop
and tumble) as well as the number of insertions
• A design that maintains the host device ergonomics
when the snap-on payment card reader is attached,
ensuring all day comfort for your workers.
PAGE 11
mobile point of sale (MPOS)
Payment card sleds can impact
mobile device ergonomics and
economics — sleds often cost
two to three times that of the
consumer mobile device, making
total acquisition cost on par with the
typical enterprise class device.
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories WLAN Scanning Durability Manageability Voice Lifecycle ServicesMPOS
12. The issue
Inevitably, the mobile device your retail workers
use will be subjected to drops and spills, possibly
on every shift. As a result, durability should be a key
criteria — without it, devices will require frequent
repair and replacement.
The solution
The device you choose should offer specifications
that ensure the level of durability required in the
demanding environment of retail, such as:
• A drop specification: The drop test ensures
that the device can handle a free-fall from a
specific height to a specific type of floor (such
as tile or concrete).
• A tumble specification: Where the drop test
ensures that a device can handle the impact of
a single hit, the tumble specification ensures
that the device can endure the multiple hits
that occur when a dropped device tumbles
before coming to a rest.
• Ingress Protection (IP) sealing: A worldwide
standard, IP sealing ratings ensure reliable
operation, even when exposed to a liquid spill
and dust. Ratings vary from the ability to handle
water drops, splashing and even complete
immersion in water, as well as dust-resistant
to completely dust-proof.
Consumer devices rarely offer these specifications —
as a result, they are much more fragile than their
enterprise counterparts, which typically offer
these specifications to ensure that the device can
provide the lifecycle and the enterprise TCO your
organization requires.
PAGE 12
Durability
The numbers are in —
the cost of the high failure
rate of consumer class
devices easily justifies the
cost of a rugged device.
The Proof
A recent study by VDC Research Group8
validates
the value of choosing an enterprise class device
over a consumer device. Consumer devices are
three times more likely to fail in the first year. The
average first year failure rate for rugged devices
is 7 percent, compared with the 23 percent for
consumer devices — and consumer device failure
rates in excess of 50 percent are not uncommon.
The cause of 77 percent of those failures is a
dropped device, which resulted most commonly in
a cracked display. The cost of all those failures is
high — not only does the device require repair or
replacement, but every failure can result in 180 to
260 minutes in lost mobile worker productivity and
additional internal support. The cost of just one or
two instances of device failure can easily justify
the additional cost of a rugged device.
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories WLAN Scanning MPOS Manageability Voice Lifecycle ServicesDurability
13. The issue
Centralized management is a must-have for mobile
devices. Without it, IT must physically touch a
device for everything from preparation for use to
troubleshooting and resolving device issues.
Consumer grade devices generally do not support
industry-standard enterprise class mobile device
management (MDM) solutions, translating into
phenomenal support costs. And those costs can
rise substantially with BYOD initiatives — especially
when you factor in the number of applications in use
in the retail store and the need to keep all of those
applications up to date on every single mobile device.
If your IT department is unable to monitor and
troubleshoot BYODs from an MDM application,
you have two choices.
1. Your employees can bring devices to your
IT help desk, which means help desk
personnel will be responsible for learning
about potentially hundreds of models —
models that change regularly.
2. More likely is the alternative scenario — your
employees become responsible for figuring
out where to get support, resulting in a loss in
productivity, a loss in time available to assist
customers, as well as the fact that you have
lost control of the support process.
The solution
Alternatively, today’s enterprise class mobile devices
do support centralized Mobile Device Management
(MDM) solutions, which can enable IT to remotely
stage, update, monitor, troubleshoot, lock and wipe
devices, no matter where they may be. In addition,
IT can receive alerts and alarms that signal the start
of a device issue before the user is impacted, enabling
the proactive response that can eliminate device
downtime and the resulting hit on user productivity.
IT can better manage your mobile devices, with
very little dedicated time required.
Motorola Solutions takes mobile device management
a step further to include our enterprise class Mx
Android-based devices. While the standard version
of Android does not support MDM, our Mx Android
supports enterprise class management. As a result,
your IT department can manage all Motorola Solutions
retail mobile devices from a single pane of glass,
bringing enterprise class management to a consumer
grade operating system.
According to VDC Research, the result can be a
staggering reduction in support costs:
“Effective use of device management solutions —
for remote diagnostics, software upgrades, etc. —
can reduce the average annual support costs per
mobile worker by as much as 85%.”9
PAGE 13
Manageability
If the mobile device you choose
can’t support your mobile
device remote management
solution, support costs per
mobile worker can increase
by as much as 85 percent.9
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories WLAN Scanning MPOS Durability Voice Lifecycle ServicesManageability
14. The issue
When it comes to enabling your workers, mobile voice is
just as important as data. There are calls from shoppers
that are outside of your store, phoning for information.
There may be calls from shoppers inside your store at a
kiosk that need assistance. And associates need to speak
to each other and their managers throughout the day. If the
mobile device you choose can’t connect to your store PBX
system, calls from outside the store cannot be forwarded
to the mobile device — instead, workers will need to
search for a store handset to pick up customer calls. And if
the mobile device you choose isn’t capable of peer-to-peer
push-to-talk, associates and managers will either have to
physically search the store to locate each other or utilize
the overhead paging system — which reduces the quality
of the in-store experience for your shoppers.
The solution
To maximize customer service quality, workforce
productivity and the cost of your mobility solution,
you need a single device capable of providing not
only access to needed data, but support for the many
types of voice calls that will be required throughout
the day. Motorola’s Enterprise Voice Solution allows
you to turn our mobile devices into powerful all-in-one
voice and data devices that can enable whatever
voice features a specific workgroup requires — so
there is never a need for your workers to hunt for
a store handset, never a need for you to purchase
an additional device for workers to carry, such as
a walkie-talkie. Instead, your workers get pure
simplicity, one device that can do it all.
Key voice features. With our complimentary
Push-to-Talk Express client software (pre-installed
on most Motorola devices), you can enable push-to-talk
(PTT) between different types of Motorola devices,
right out of the box. In addition, you can turn our
mobile computers into deskphones, complete with an
extension number and PBX time-saving features such
as call forwarding and 3-way calling. The result? You
can eliminate the cost of separate desk phones and
simplify life for your workers, who no longer need two
separate devices for voice and data. You can get more
value out of your existing PBX. Since all services are
delivered over the Wi-Fi network, there are never any
monthly fees. And with our Validated Voice Solution,
you can be assured that the voice services you deploy
will work on the technologies you have — including
mobile devices, wireless LAN infrastructure and PBXs.
PAGE 14
Voice Communications Flexibility
57 percent of shoppers will wait
just 1.5 minutes or less for their
call to be answered — and 43
percent report that when they
abandon a call, they go to another
store to make a purchase.4
In order
to prevent lost sales due to long
wait times for callers, make sure
the mobile devices you choose can
integrate with your PBX, allowing
you to route any call to any
associate in the store instantly.
No more long wait times, no more
disgruntled customers and no
more lost sales.
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories WLAN Scanning MPOS Durability Manageability Lifecycle ServicesVoice
15. The issue
The rate of device churn — when new devices are
released and their older versions are retired — is
another item that should be high on the criteria list,
yet is often overlooked. The reason this criteria is
crucial is the hidden costs of fast churn.
In the world of consumer mobile devices, one year
is typically the maximum time a specific model is
available, with no guarantees that the next model
provides backwards compatibility for accessories
and applications.
The solution
In contrast, for enterprise mobile device
manufacturers, device churn is measured in years
instead of months. For example, Motorola’s retail
mobile devices are not only built to last for a minimum
of three years, they are also guaranteed to be
available for purchase for a minimum of three years,
with an additional three years of support once the
device has been discontinued. Since enterprise mobile
device manufacturers are focused on business instead
of consumer needs, when a next generation device
is released, you can typically count on backward
compatibility with everything from applications to
accessories — such as charging cradles, batteries
and cables. This strategy allows you to upgrade to
next generation mobile computing technology, while
preserving as many of your existing investments as
PAGE 15
Lifecycle management
Consumer mobile devices are typically available for purchase for only one year.
As a result, when you add new workers or need to replace broken devices,
you can end up with many different models to support, each with their own
unique accessories — driving capital and operational costs up.
possible. When you choose an enterprise class mobile
device, unlike consumer grade mobile devices, there is
typically no need to purchase new accessories, further
reducing capital costs and TCO. And if the device
you choose has a platform strategy, like Motorola
Solutions entire portfolio of retail mobile computers,
applications can typically be ported to the new
devices with little or no development effort, reducing
operational costs.
1yr.
2yrs
.
3
yrs.
1yr.
2yrs
.
3
yrs.
4mo.
8mo
.
12
mo.
4mo.
8mo
.
12
mo.
Enterprise class device lifecycle is measured in years...and consumer class device lifecycle is measured in months.
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories WLAN Scanning MPOS Durability Manageability Voice ServicesLifecycle
16. PAGE 16
The issue
What happens when a device needs repair? Can
you get the same level of service for enterprise
and consumer mobile devices?
With consumer grade mobile device support services,
workers may be without a device for days. And when
the device is returned, the worker will need to restore
all the data. The result is a level of device downtime
that degrades TCO and worker productivity. Yet
there is no real alternative: since there are so many
different types of consumer models and they change
regularly, keeping a spares pool on hand isn’t feasible.
The solution
Enterprise mobile device manufacturers understand
that device downtime is not an option — and that
fact is reflected in their support programs. For
example, Motorola Solutions offers cost-effective
business-grade support programs that include
everything from normal wear and tear to accidental
breakage — including a broken screen on a device
that was dropped. No matter what the problem is or
what caused it, it’s covered — no questions asked.
Additional options include overnight replacement with
a mobile device that has already been provisioned
with your software applications and device settings,
so workers are back up and running the moment the
device is removed from the box.
Support Services
In retail, your workers will
depend on their mobile devices
to provide your shoppers with
the best service possible. You
need to keep your devices up, running and in the hands of your
workforce to protect customer satisfaction. That requires a
support plan that will cover every service need, with overnight
replacement of broken devices — a level of service you won’t
find for the typical consumer smartphone.
Let us take care of everything with Mobility
Lifecycle Management services
Our Mobility Lifecycle Management services allow you
to offload management to those who best know your
devices — the manufacturer. Motorola Solutions can
handle every phase of deployment: Plan, Implement and
Run. We can architect your solution, ensuring integration
with your environment and the design that will
maximize mobile device performance. Once the design
is complete, we can implement your solution, from
configuring and preparing devices for use to integrating
your applications. And once your solution is up and
running, we can manage and monitor your devices and
guarantee uptime.
The MathThe mathIntroductionIntroduction Critical criteria
Security Training Battery Accessories WLAN Scanning MPOS Durability Manageability Voice Lifecycle Services
17. PAGE 17
The math
the truth is in the numbers —
consumer class devices come at a premium
The numbers are in. They reveal that while, at first glance, it may appear that lower cost consumer grade mobile devices and BYOD programs
that allow workers to use their own consumer grade mobile devices are the way to the most cost effective and most successful retail mobility
solution, the numbers show otherwise — and numbers never lie. Consider the following facts:
Consumer class device TCO
is substantially higher.
Consumer grade devices cost an average of 50% more
over a five-year period: The annual five-year TCO for a
small consumer grade device is more than 50% higher
than its enterprise grade counterparts. The annual five-
year TCO of an enterprise grade device is $2,140, while
the consumer grade device costs $3,236 over the
same time period.10
Consumer class device acquisition
costs are the same — or higher.
In order to develop an “apples-to-apples” comparison of
consumer vs. enterprise class hardware costs, you’ll need to
factor in lifecycles: enterprise class devices are built to last
three to five years, while consumer device life expectancy is
just one to two years. So while that consumer grade mobile
device appears to be less expensive, be sure to factor in
that over the course of the lifecycle of one enterprise class
mobile computer, you’ll likely need to purchase two to three
consumer mobile devices and two to three sleds. The result?
Hardware acquisition costs over a three to five year period
for enterprise class are ultimately less than consumer grade
mobile devices.
Based on list pricing of some of today’s most popular
products, a sled is approximately $600 and a consumer-
style data mobile device roughly $250. The cost for one
enterprise class device is approximately $1,500, which
can serve your store for an average of three years+. In
the best use-case scenario, you would need to replace a
consumer-style device and sled twice over a three-year
period for a total hardware cost of $1,700 — 13 percent
more than the cost of an enterprise class device. The
more common scenario due to lack of rugged design is
annual replacement of consumer devices and sleds, for
a total of $2,550 over three years, — 70 percent more
than the cost of a rugged device.
The amount that
consumer class BYOD
can increase your support costs
Aberdeen Group reported that a company with 1,000 mobile
devices can expect to spend an average of an extra $170,000
per year to support BYOD. The following five well-hidden
costs can result in a 33% increase in operational costs for
BYOD initiatives:
1. Carrier billing is no longer aggregated, which can result
in missed discount opportunities and larger monthly fees
2. Increase in IT time to manage and secure corporate data
on employee devices
3. Increase in support costs due to the increase in types of
mobile devices and their durability levels
4. Increase in the workload for other operational groups that
are not normally impacted by mobility support
5. Increase in the number of expense reports filed by
employees for reimbursement of device-related expenses
33%
IntroductionIntroduction Critical criteriaCritical criteria The Math