SlideShare a Scribd company logo
MOBILIZING THE WORKFORCE
A Management Discussion of Considerations
Chet Johnson
EAM Lead Strategic Business Consultant
THE 5 W’S TO CONSIDER
 Who is performing the work
 Skill sets, age, physical size, etc.
 Develop a ‘persona’
 What work is to be performed
 Focus on specific tasks (user stories)
 Avoid the ‘what if’ scenarios
 What information is needed
 Performer’s needs
 System’s needs
 What mobile equipment will be used
 Mounted in/on vehicle
 Carried on person
 Worn
 Where work will be performed
 Outside, Inside
 Wet conditions, Hot conditions
 Construction, Warehousing, Operations
 On site, Off site (Connectivity options)
THE HOW'S: SOFTWARE
 Full ‘core system’ solutions
 Limited ‘core system’ solutions
 Third party integrated solutions
 Custom code solutions
THE HOW'S: HARDWARE
 Laptops
 Tablets
 Handheld Computers, Warehouse Scanners
 Smart Phones
 Wearables
THE HOW'S: OPERATING SYSTEMS
 IOS
 Android
 Windows
THE HOW'S: INFRASTRUCTURE
 Connected Methodology (Real-Time updates needed)
 Wi-Fi
 Cellular
 Mi-Fi
 Company Firewalls and Security to consider
 Disconnected (Real-Time updates not needed)
 Validation needed (Data native to device)
 Amount of data to download to device and keep updated
 Data contention errors when reconnected
THE HOW’S: DESIGN METHODOLOGY
Design Build Release
Risk
Risk Risk Risk
Design
Build
Release
Design
Build
Release
Waterfall
Agile

More Related Content

Similar to Mobilizing the Workforce

Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experience
ITProceed
 
Ngn ngi windows 10 beheer
Ngn ngi windows 10 beheerNgn ngi windows 10 beheer
Ngn ngi windows 10 beheer
Ngi-NGN Online
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
Jerod Brennen
 
Core Code Introduction
Core Code IntroductionCore Code Introduction
Core Code Introduction
joohwannoh
 
Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...
Melina Black
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
Aptera Inc
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
Jorge Orchilles
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
Dean Iacovelli
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
Kris Wagner
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
Something Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton ChuvakinSomething Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
Mike Chang
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
Deirdre Curran
 
CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)
Michael King
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
Mark Stokes
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
Patrick Angel - MBA, CISSP(c) CISM(c) CRISC(c) CISA(c)
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
NCCOMMS
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
MVP Dagen
 
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsyPrezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Azim191210
 

Similar to Mobilizing the Workforce (20)

Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experience
 
Ngn ngi windows 10 beheer
Ngn ngi windows 10 beheerNgn ngi windows 10 beheer
Ngn ngi windows 10 beheer
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 
Core Code Introduction
Core Code IntroductionCore Code Introduction
Core Code Introduction
 
Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Something Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton ChuvakinSomething Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton Chuvakin
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
 
CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsyPrezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
 

Mobilizing the Workforce

  • 1. MOBILIZING THE WORKFORCE A Management Discussion of Considerations Chet Johnson EAM Lead Strategic Business Consultant
  • 2. THE 5 W’S TO CONSIDER  Who is performing the work  Skill sets, age, physical size, etc.  Develop a ‘persona’  What work is to be performed  Focus on specific tasks (user stories)  Avoid the ‘what if’ scenarios  What information is needed  Performer’s needs  System’s needs  What mobile equipment will be used  Mounted in/on vehicle  Carried on person  Worn  Where work will be performed  Outside, Inside  Wet conditions, Hot conditions  Construction, Warehousing, Operations  On site, Off site (Connectivity options)
  • 3. THE HOW'S: SOFTWARE  Full ‘core system’ solutions  Limited ‘core system’ solutions  Third party integrated solutions  Custom code solutions
  • 4. THE HOW'S: HARDWARE  Laptops  Tablets  Handheld Computers, Warehouse Scanners  Smart Phones  Wearables
  • 5. THE HOW'S: OPERATING SYSTEMS  IOS  Android  Windows
  • 6. THE HOW'S: INFRASTRUCTURE  Connected Methodology (Real-Time updates needed)  Wi-Fi  Cellular  Mi-Fi  Company Firewalls and Security to consider  Disconnected (Real-Time updates not needed)  Validation needed (Data native to device)  Amount of data to download to device and keep updated  Data contention errors when reconnected
  • 7. THE HOW’S: DESIGN METHODOLOGY Design Build Release Risk Risk Risk Risk Design Build Release Design Build Release Waterfall Agile