SlideShare a Scribd company logo
A study of Engineering and Management Issues:
The Case of Manufacturing Mobile Electronics Systems



                      Ph.D. Thesis
                   Thomas K. Roslak
              Leeds Metropolitan University


                   15 December 2010


                                                 1
Problem statement

To propose tools, techniques and approaches may be
successfully employed to:
                • Design

                • Develop

                • Manage

                • Deploy



… mobile computing systems where the users do not own or
have a stake in the equipment?




                                                           2
Considerations

How do public users view mobile technology and usage?
    - (hereafter referred to as: public interests)

What specific design issues arise with public use of mobile
 devices versus captive enterprise users?
    - (hereafter referred to as: design challenges)

What manufacturing methods, geographical sourcing and
 production issues can be addressed?
    - (hereafter referred to as: manufacturing)




                                                              3
Methodologies employed
Public interests (collection and analysis of data)
  - Blind surveys through guided focus groups in the UK and US
  - Analysis of computer collected system data (anonymous)
  - Informal interview process

Design Challenges (to innovate and create new product design,
  patent, prototype and field employability of products)
  - Limited power and capability of mobile devices
  - Autonomous dispensing of mobile devices
  - Using sensor data to improve the user experience

Multi-national manufacturing (implementation and case studies)
  - Prototype development and design
  - Multi-sourcing: US, Netherlands and Spain
  - Non Zero Sum partnerships, knowledge sharing, supply chain
                                                                 4
Results: Findings and contributions
Public interests: proposed and developed user interfaces and
  ergonomics
  - Developed unique user device and interfaces
  - Live, wireless data capture in production environment
  - Collection of consumer accuracy in scanning
Design Challenges: designed physical management of devices
  - Autonomous dispensing of mobile devices
  - Device readiness as part of device location
Multi-national manufacturing and design:
  - Conducted case studies of the implemented projects
  - Design, development and leader follower implementation
Using device capabilities as sensors: publications and patents
   - Patents related to phone bar code use
                                                                 5
User interfaces and ergonomics




                            www.technologyreview.com/computing/23715/

                                                                        www.re-vision.nl/Case%2BStudies/Dirk+van+den+Broek




  www.microassociates.net/symbol/cst-2040.html



                                                                                                                        6
      Advanced mass acceptance and use of personal scanning
System Management




                                                                                                                                                       Step 2: Server chooses
                            Functional Diagram                                                                                                        device to exercise; sends
                          Closed Loop Readiness                                                                                                      wireless query for readiness
                                                                     Local Network
                                                                                                                                                                Step 4: Server
                                                                                                                                                              receives readiness
                                                                                                                                                                   response

                                                                                                     Step 5: Server sends
                                                                                                      release command


                                                                                                                                 Control Server




                                                                                             Charging and Locking
                                                                                                    Rack                        Step 3: Device is activated
                                                    IEEE 802.11b/g
                                                                                                                               through wireless link; scans
                                                                                                                                 bar code, checks memory
                                                                                                                                and reports back to server




                                     Closed Feedback Checks
                                                          :
                                     2-way radio function                                                                    Step 6: Mobile computer receives
                                     Barcode scanner                                                                        release command; activates release
                                                                                                                                 solenoid in dispenser rack
                                     CPU function
                                     Memory integrity
                                                                                               Contains n x 8 units
                                                                                               96 Devices - typical



                                                                                     Step 1: User
                                                                                      requests a
                                                                                     mobile device



                                                                                                                                                                                    7
Created unique control mechanisms for mobile computers in the enterprise
Context Augmented Systems




Capability demonstrations of environmental sensing
as context triggers
            Cited by                                   Patent number and title

   Microsoft           7,831,679   -   Guiding sensing and preferences for context-sensitive services
   (sampling):         7,827,281   -   Dynamically determining a computer user's context
                       7,823,073   -   Presence-based location and/or proximity awareness
                       7,623,643   -   Augmenting a call with context

   NEC:                7,264,157 – Area Based Content Delivery Method and System
                                                                                                        8
   Indynm              7,263,500 - System, method, and device for graphically locating merchandise
Multinational Management



                                                                      http://www.avba.co.il/?CategoryID=226
                                                                                                                http://blog.syracuse.com/storefront/2009/04/handheld
                                                                                                                _scanners_at_supermark.html



 www.microassociates.net/symbol/cst-2040.html




                                                                                             www.celestica.com/Careers/Careers.aspx?id=1012
  http://calradio.calit2.net/participants.htm
                                                  www.bized.co.uk/current/mind/2003_4/131003.htm




                                                www.tno.nl/index.cfm?Taal=2
www.renelaan.nl/Indexboodschappen.htm

                                                                                                                                                          9
  Created decision methodologies for parallel leader follower development
Patents
7,725,326   Method and system for presenting item information using a portable data terminal
7,471,243   Location determination utilizing environmental factors
7,195,157   Consumer interactive shopping system
7,171,378   Portable electronic terminal and data processing system
7,107,221   Method and system for presenting item information using a portable data terminal
7,063,263   Consumer interactive shopping system
7,040,541   Portable shopping and order fulfillment system
7,010,501   Personal shopping system
6,837,436   Consumer interactive shopping system
6,796,505   Terminal locking system
6,745,943   Hand-held data acquisition device
6,687,346   Cellular telephone for acquiring data encoded in bar code indicia
6,687,345   Wireless telephone for acquiring data encoded in bar code indicia
6,640,214   Portable electronic terminal and data processing system
6,550,672   Method and system for presenting item information using a portable data terminal
6,464,144   Hand held terminal with an odor sensor
6,409,086   Terminal locking system
6,394,355   Hand-held acquisition device
6,367,694   Device and method for secure data updates in a self-checkout system
6,354,496   Method for self service checkout
6,243,447   Self-service checkout system utilizing portable communications terminal
6,199,753   Method and system for presenting item information using a portable data terminal
6,101,483   Personal shopping system portable terminal
6,084,528   Intranet scanning terminal system
5,979,757   Method and system for presenting item information using a portable data terminal
5,979,753   Device and method for secure data updates in a self-checkout system
5,923,735   Self-service checkout system utilizing portable self-checkout communications terminal
5,825,002   Device and method for secure data updates in a self-checkout system
                                                                                                    10
D391,555    Personal shopping terminal
Publications & Presentations
 Management of specialized mobile computers in the enterprise with special consideration to
 thin clients, abstraction and the physical security of the system
 Roslak, T.K.; Raju, V.
 Systems, Applications and Technology Conference, 2008 IEEE Long Island
 Volume , Issue , 2-2 May 2008 Page(s):1 – 1 (formal paper)

 Location based Man-Down service solutions ( Motorola Internal Paper, proprietary) May 9,
 2008
 “Organizations seek an improved system that will track personnel throughout their facilities and provide on-
 body sensing to help preserve worker health and safety by providing alerts when risks are detected. The
 capability to monitor environmental risks such as toxic gases, and to provide an indication of biological
 function such as prolonged worker inactivity are considered valuable and an important consideration.”
 Authors: Babin, T., Candelaria, J., Levenson, S., Lewis, J., May, P., Mastroianni, S., Tungare, A. – Motorola
 Labs Eriksen, L., Kanagala, S., Roslak, T., Slavin, J., Yamanishi, G. – Enterprise Mobility Business

 Things-to-Things Communications Technical Panel
 Engineering Week – Motorola Worldwide Conference (live and via conference links)
 February 19, 2007 (panel discussion)

 Navigation for visually impaired - leveraging ad hoc RF environmental sensing
 Consumer Communications and Networking Conference, 2006. CCNC 2006. 2006 3rd IEEE
 Volume 2, 8-10 Jan. 2006 Page(s):1316 - 1317 (formal paper and demonstration)

 Locating RF Constellations to Improve Usability of Mobile Devices
 CEWIT 2005 Conference, Stony Brook University, NY
 December 7, 2005 (poster session)

 Using basic pattern matching of RF constellations to improve mobile device interfaces
 2nd IEEE Upstate NY Workshop on Communications and Networking
 November 18, 2005 (formal paper and poster session)                                                    11
Thank you.




             12

More Related Content

Similar to Roslak Viva Dec 12

Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011
IndicThreads
 
Network processing by pid
Network processing by pidNetwork processing by pid
Network processing by pid
Nuno Martins
 
Arch stylesandpatternsmi
Arch stylesandpatternsmiArch stylesandpatternsmi
Arch stylesandpatternsmi
lord14383
 
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsSAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
Qin Liu
 
CV - Snehal Parate
CV - Snehal ParateCV - Snehal Parate
CV - Snehal Parate
Snehal Parate
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
Electric Cloud
Electric CloudElectric Cloud
Technology radar-october-2012
Technology radar-october-2012Technology radar-october-2012
Technology radar-october-2012
Ganeshram Ramamurthy
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
Liming Zhu
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network Devices
Tal Lavian Ph.D.
 
Seminar
SeminarSeminar
Seminar
Kevin ITian
 
Venus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceVenus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScience
OW2
 
Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...
Biagio Botticelli
 
Making Runtime Data Useful for Incident Diagnosis: An Experience Report
Making Runtime Data Useful for Incident Diagnosis: An Experience ReportMaking Runtime Data Useful for Incident Diagnosis: An Experience Report
Making Runtime Data Useful for Incident Diagnosis: An Experience Report
QAware GmbH
 
CV_RishabhDixit
CV_RishabhDixitCV_RishabhDixit
CV_RishabhDixit
Rishabh Dixit
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Prasad_Meduri
Prasad_MeduriPrasad_Meduri
Prasad_Meduri
Prasad Meduri
 
Cloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New Reality
Carlos Andrés García
 
Cloud-Native Security
Cloud-Native SecurityCloud-Native Security
Cloud-Native Security
VMware Tanzu
 
NSA Capstone Project III final pp
NSA Capstone Project III final ppNSA Capstone Project III final pp
NSA Capstone Project III final pp
Alfonso Zamorano
 

Similar to Roslak Viva Dec 12 (20)

Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011
 
Network processing by pid
Network processing by pidNetwork processing by pid
Network processing by pid
 
Arch stylesandpatternsmi
Arch stylesandpatternsmiArch stylesandpatternsmi
Arch stylesandpatternsmi
 
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsSAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
 
CV - Snehal Parate
CV - Snehal ParateCV - Snehal Parate
CV - Snehal Parate
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Electric Cloud
Electric CloudElectric Cloud
Electric Cloud
 
Technology radar-october-2012
Technology radar-october-2012Technology radar-october-2012
Technology radar-october-2012
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network Devices
 
Seminar
SeminarSeminar
Seminar
 
Venus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceVenus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScience
 
Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...
 
Making Runtime Data Useful for Incident Diagnosis: An Experience Report
Making Runtime Data Useful for Incident Diagnosis: An Experience ReportMaking Runtime Data Useful for Incident Diagnosis: An Experience Report
Making Runtime Data Useful for Incident Diagnosis: An Experience Report
 
CV_RishabhDixit
CV_RishabhDixitCV_RishabhDixit
CV_RishabhDixit
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Prasad_Meduri
Prasad_MeduriPrasad_Meduri
Prasad_Meduri
 
Cloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New Reality
 
Cloud-Native Security
Cloud-Native SecurityCloud-Native Security
Cloud-Native Security
 
NSA Capstone Project III final pp
NSA Capstone Project III final ppNSA Capstone Project III final pp
NSA Capstone Project III final pp
 

Roslak Viva Dec 12

  • 1. A study of Engineering and Management Issues: The Case of Manufacturing Mobile Electronics Systems Ph.D. Thesis Thomas K. Roslak Leeds Metropolitan University 15 December 2010 1
  • 2. Problem statement To propose tools, techniques and approaches may be successfully employed to: • Design • Develop • Manage • Deploy … mobile computing systems where the users do not own or have a stake in the equipment? 2
  • 3. Considerations How do public users view mobile technology and usage? - (hereafter referred to as: public interests) What specific design issues arise with public use of mobile devices versus captive enterprise users? - (hereafter referred to as: design challenges) What manufacturing methods, geographical sourcing and production issues can be addressed? - (hereafter referred to as: manufacturing) 3
  • 4. Methodologies employed Public interests (collection and analysis of data) - Blind surveys through guided focus groups in the UK and US - Analysis of computer collected system data (anonymous) - Informal interview process Design Challenges (to innovate and create new product design, patent, prototype and field employability of products) - Limited power and capability of mobile devices - Autonomous dispensing of mobile devices - Using sensor data to improve the user experience Multi-national manufacturing (implementation and case studies) - Prototype development and design - Multi-sourcing: US, Netherlands and Spain - Non Zero Sum partnerships, knowledge sharing, supply chain 4
  • 5. Results: Findings and contributions Public interests: proposed and developed user interfaces and ergonomics - Developed unique user device and interfaces - Live, wireless data capture in production environment - Collection of consumer accuracy in scanning Design Challenges: designed physical management of devices - Autonomous dispensing of mobile devices - Device readiness as part of device location Multi-national manufacturing and design: - Conducted case studies of the implemented projects - Design, development and leader follower implementation Using device capabilities as sensors: publications and patents - Patents related to phone bar code use 5
  • 6. User interfaces and ergonomics www.technologyreview.com/computing/23715/ www.re-vision.nl/Case%2BStudies/Dirk+van+den+Broek www.microassociates.net/symbol/cst-2040.html 6 Advanced mass acceptance and use of personal scanning
  • 7. System Management Step 2: Server chooses Functional Diagram device to exercise; sends Closed Loop Readiness wireless query for readiness Local Network Step 4: Server receives readiness response Step 5: Server sends release command Control Server Charging and Locking Rack Step 3: Device is activated IEEE 802.11b/g through wireless link; scans bar code, checks memory and reports back to server Closed Feedback Checks : 2-way radio function Step 6: Mobile computer receives Barcode scanner release command; activates release solenoid in dispenser rack CPU function Memory integrity Contains n x 8 units 96 Devices - typical Step 1: User requests a mobile device 7 Created unique control mechanisms for mobile computers in the enterprise
  • 8. Context Augmented Systems Capability demonstrations of environmental sensing as context triggers Cited by Patent number and title Microsoft 7,831,679 - Guiding sensing and preferences for context-sensitive services (sampling): 7,827,281 - Dynamically determining a computer user's context 7,823,073 - Presence-based location and/or proximity awareness 7,623,643 - Augmenting a call with context NEC: 7,264,157 – Area Based Content Delivery Method and System 8 Indynm 7,263,500 - System, method, and device for graphically locating merchandise
  • 9. Multinational Management http://www.avba.co.il/?CategoryID=226 http://blog.syracuse.com/storefront/2009/04/handheld _scanners_at_supermark.html www.microassociates.net/symbol/cst-2040.html www.celestica.com/Careers/Careers.aspx?id=1012 http://calradio.calit2.net/participants.htm www.bized.co.uk/current/mind/2003_4/131003.htm www.tno.nl/index.cfm?Taal=2 www.renelaan.nl/Indexboodschappen.htm 9 Created decision methodologies for parallel leader follower development
  • 10. Patents 7,725,326 Method and system for presenting item information using a portable data terminal 7,471,243 Location determination utilizing environmental factors 7,195,157 Consumer interactive shopping system 7,171,378 Portable electronic terminal and data processing system 7,107,221 Method and system for presenting item information using a portable data terminal 7,063,263 Consumer interactive shopping system 7,040,541 Portable shopping and order fulfillment system 7,010,501 Personal shopping system 6,837,436 Consumer interactive shopping system 6,796,505 Terminal locking system 6,745,943 Hand-held data acquisition device 6,687,346 Cellular telephone for acquiring data encoded in bar code indicia 6,687,345 Wireless telephone for acquiring data encoded in bar code indicia 6,640,214 Portable electronic terminal and data processing system 6,550,672 Method and system for presenting item information using a portable data terminal 6,464,144 Hand held terminal with an odor sensor 6,409,086 Terminal locking system 6,394,355 Hand-held acquisition device 6,367,694 Device and method for secure data updates in a self-checkout system 6,354,496 Method for self service checkout 6,243,447 Self-service checkout system utilizing portable communications terminal 6,199,753 Method and system for presenting item information using a portable data terminal 6,101,483 Personal shopping system portable terminal 6,084,528 Intranet scanning terminal system 5,979,757 Method and system for presenting item information using a portable data terminal 5,979,753 Device and method for secure data updates in a self-checkout system 5,923,735 Self-service checkout system utilizing portable self-checkout communications terminal 5,825,002 Device and method for secure data updates in a self-checkout system 10 D391,555 Personal shopping terminal
  • 11. Publications & Presentations Management of specialized mobile computers in the enterprise with special consideration to thin clients, abstraction and the physical security of the system Roslak, T.K.; Raju, V. Systems, Applications and Technology Conference, 2008 IEEE Long Island Volume , Issue , 2-2 May 2008 Page(s):1 – 1 (formal paper) Location based Man-Down service solutions ( Motorola Internal Paper, proprietary) May 9, 2008 “Organizations seek an improved system that will track personnel throughout their facilities and provide on- body sensing to help preserve worker health and safety by providing alerts when risks are detected. The capability to monitor environmental risks such as toxic gases, and to provide an indication of biological function such as prolonged worker inactivity are considered valuable and an important consideration.” Authors: Babin, T., Candelaria, J., Levenson, S., Lewis, J., May, P., Mastroianni, S., Tungare, A. – Motorola Labs Eriksen, L., Kanagala, S., Roslak, T., Slavin, J., Yamanishi, G. – Enterprise Mobility Business Things-to-Things Communications Technical Panel Engineering Week – Motorola Worldwide Conference (live and via conference links) February 19, 2007 (panel discussion) Navigation for visually impaired - leveraging ad hoc RF environmental sensing Consumer Communications and Networking Conference, 2006. CCNC 2006. 2006 3rd IEEE Volume 2, 8-10 Jan. 2006 Page(s):1316 - 1317 (formal paper and demonstration) Locating RF Constellations to Improve Usability of Mobile Devices CEWIT 2005 Conference, Stony Brook University, NY December 7, 2005 (poster session) Using basic pattern matching of RF constellations to improve mobile device interfaces 2nd IEEE Upstate NY Workshop on Communications and Networking November 18, 2005 (formal paper and poster session) 11