Monday 26 November 2007

2008 The year of the mobile customer !

In my role as Vice Chairman of the Mobile Data Association, I recently organised an industry event to look at at the short term future of mobile data technologies. Below is the resulting press release.

More sociable, cheaper and easier to use – The Mobile Data Association (MDA) studies the mobile landscape for 2008


2008 will be a year where mobile customers benefit from a range of key service and technology developments. Social networks, flat rate charging, and products which are far easier to use will be the major themes in the mobile market, according to the Mobile Data Association. At its annual ‘Future of Mobile’ Conference in London, the MDA and independent industry experts gave their predictions on the defining trends for next year.

“2008 is likely to bring the flat rate tariffs that consumers and businesses have been seeking for some considerable time,” commented Rob Bamforth, principal analyst with Quocirca. “In addition, devices that work at a level of ‘adequate ease’ are likely to be a major area of focus – it’s not just about adding ever more features, it’s about giving users what they truly want, and that’s ease of usefulness.”

The Mobile Data Association has also forecast key mobile industry data for 2008, and expects a series of key market and technology trends to be visible during the year.

Market Milestones:

Among the market trends to watch in 2008, the MDA forecasts:

The worldwide cellular subscriber base will reach 3.75 billion by year end 2008.
The UK will account for 75 million of the global figure, but more significantly voice users will go increasingly mobile.
Text messaging volumes in the UK will reach 60 billion for the whole of 2008.

Technology trends:

The MDA believes the key technology developments for 2008 will include:

5GB storage wil become more standard in devices.
Bluetooth adoption will head towards 2 Billion worldwide - opening up new Application channels for 2008 Particularly Health / Social Care and wirefree headsets.
Mobile TV based on dual mode cellular / DVB-H will be launched throughout Europe, but not in the UK, due to regulatory delays.
There will be major activity surrounding the Olympics as UK observers seek to learn lessons from Beijing 2008, including, ticketing, Mobile TV, use of User Generated Content.
3G coverage will grow, with HSDPA/ HSUPA / Wifi additions offering more choice of Mobile Digital Access and downloadable content.

Paul Lee, Director, Deloitte Research: Technology, Media and Telecommunications commented, "Designing mobile devices from the ground up to be easier to use should pay handsome dividends for the mobile industry. The challenge isn't to have the most technology in each phones. What's more important is to incorporate functionality that's relevant to each category of user."

Friday 9 November 2007

The mobile data dimension considerations

1) The mobile data dimension has existed for a decade or more, with laptops, but now we have a plethora of devices with capacity to hold a lot of data and cause problems, but how should enterprises reign all this in without compromising productivity or de-powering users?

IT departments today consider the acquisition and deployment of desktop and laptop technology as strategic. Processes are put in place to ensure devices are corporately configured, have the appropriate connectivity, security and management tools. Any business which does not have processes to manage the deployment of desktop and laptop technology is asking for trouble.

The same should apply mobile phones, PDA’s, smart phones etc, these must be managed in the same way as a desktop deployment. Mobile devices such a PDA's and Smartphone’s etc are becoming common place; they are functionally very rich and can deliver a lot more than personal information management to a business. Senior managers are of course attracted by these shiny devices also have a tendency to buy them on their expenses at airports etc, then ask the IT department to “give me push email like is says on the box”. This can result in the IT department supporting a whole plethora of devices and operating systems with all the problems associated with an unstructured approach. If you do not have a mobility policy then you should be writing one to ensure control is maintained and taking advantage of the business benefits mobile computing brings.


2) What are the essential ingredients of a coherent mobile data strategy?

Successful mobilisation the enterprise relies heavily on centralising of IT systems, having disparate IT will add to the complexity, cost, delivery and ultimately the success of the final solution.

A coherent mobile data strategy must include the following elements, applications or data that is to be mobilised, mobile device management, mobile device security, approved mobile devices, appropriate training, usage policy, data protection act compliance and that all important user support via a help desk.


3) What are the challenges posed by proliferating data and IT mobility?

Mobile IT by its nature is geographically dispersed and therefore creates its own unique challenges devices can be subject to, loss, theft or damage, this can be challenging if not dealt with by;

Deploying an appropriate perimeter security to protect the data on the mobile device. This could also include data encryption for sensitive data

Regular data synchronisation with the central server to ensure that no data that is created on the mobile device is lost. Alternatively Web based applications could be considered where appropriate to minimise data loss. However Web based solutions only work when a connection is possible to the server with wireless technology this is not always possible.

One other consideration ensuring mobile device management is considered; the cost of bringing field workers in to upgrade software and fix application issues can be prohibitive.

4) Assuming there is a trend back to centralized IT, how do organisations address the need for redundancy and disaster recovery ?

The dependency on IT systems whether mobile or desk based for the majority of businesses means that when these systems fail the impact can be crippling. High availability IT infrastructure is the key to ensure continuity of service, whether this is achieved by having an infrastructure with a high level of built in redundancy or using a grid or virtual machine approach will ultimately be a financial decision. One other alternative that is becoming more popular is outsource the server infrastructure to a hosting company who have the specialist environments to ensure the necessary high availability of your systems.

5) What impact is mobile data having on the IT support function?

Providing support of mobile users is a challenge as they are not confined to the office. When a mobile worker has an issue wherever possible this will need to be dealt with remotely. This means an investment remote device management software which will allow the IT support desk to access the mobile device remotely to diagnose and fix the problem, without this will result in field worker stopping work to bring their device into the office. The cost of device support and management needs to be factored into the total cost of ownership of your mobile solution. Alternatively to minimise the internal impact, the support function could be outsourced to a third party organisation.


6) Should all data on mobile devices be instantly replicated over the network, or just held centrally in some cases?

Because mobile devices are vulnerable to being dropped, stolen or lost any data created locally must be synchronised back to a central location as soon as possible to avoid potential loss, however ultimately this will rely on either the fieldworker manually synching the data or a simple application that manages the synchronisation process. However both methods rely on having wireless connectivity to do so. Therefore there could be a possibility of data loss if the device fails after data has been entered and before a synchronisation. With mobile data applications it is possible ensure that any data entered whist the device has no wireless connectivity automatically synchronises once the device picks up a wireless connection, thus taking out the manual process and minimising the risk of data loss.

Thin client or web based interfaces to centrally located data work well provided the field worker only requires access to the data when a wireless connection can be established thus providing a suitable solution to data continuity and control.

7) How greatly does mobility increase an enterprise’s exposure to security vulnerabilities or breach confidentiality?

Having company data on mobile devices scattered around the country does mean that there is a risk to malicious acts, this requires policies to be put in place to ensure that any risk from potential malicious acts is minimised. These could include only allowing any sensitive data need by an field worker to be requested, used once then removed from the device. Using mobile device management software, if an employee leaves the organisation but fails to return their mobile device, then the device could be remotely wiped removing all company data.

8) Are compliance issues enforcing data centralization and replication of mobile data?

It is proven that the correct use of mobile devices can make a huge difference to businesses and their customers; they bring efficiency, productivity and increase customer satisfaction, whilst reducing businesses fixed costs. These devices are normally deployed to replace an existing paper process that is prone to error, loss, accidental and malicious breaches in privacy and company process! Mobile brings to a large degree and element of compliance and security not possible with use of paper!

Friday 12 October 2007

Corporate manslaughter and the mobile workforce

On April 6th 2008 the Corporate Manslaughter and Corporate Homicide act 2007 introduces a new offence of corporate manslaughter. This applies to corporate bodies in both the public and private sectors. However, it only applies in circumstances where an organisation owed a duty of care to the victim (employees, sub-contractors, certain customers etc) under the law of negligence. The offence can be punishable by an unlimited fine and orders for remedial action.

This new law will make it easier for an organisation to be found guilty of manslaughter through the result of gross failings of senior management. The definition senior management is not limited to the board of Directors and now includes those who have a significant role in the management of the whole or part of an organisation.

The proposed new corporate manslaughter law will not affect the provisions of the Health and Safety at Work Act or its associated health and safety regulations in any way. All employers must still comply with their duties under existing health and safety legislation.

The HSWA imposes a duty on employers to "ensure so far as is reasonably practicable, the health and safety and welfare at work of all its employees" and to ensure that persons not in their employment are "not exposed to risks to their health and safety so far as is reasonably practicable".
In addition, there are hundreds of health and safety regulations which set out more specific health and safety duties. For example, under the Management of Health and Safety at Work Regulations 1999, employers must carry out a 'suitable and sufficient' risk assessment of their activities.
As a result of this new law, duty of care and traceability must become a priority to senior managers in any organisation.

Using Mobile to manage risk


There are two areas in which enterprise mobility solutions assist in meeting with organisations duty of care obligations these are;
Risk assessment
Lone worker protection

Risk Assessment
Risk assessment has become a key process in the protection of the mobile workforce. A risk assessment is an important step in protecting the workforce, as well as complying with the law. A risk assessment is a careful examination of what, whilst undertaking job functions, could cause harm. This allows the decision to be made as to whether or not enough precautions are being taken or should more be taken. Workers and others have a right to be protected from harm caused by a failure to take reasonable control measures.

A correctly deployed enterprise mobility solution will provide any mobile workforce with an effective tool to undertake risk assessments at key stages of job work flow. Not only this, the enterprise mobility solution will provide a traceable record for each risk assessment undertaken as proof of compliance.


So how does this work ?


Below are a few practical examples of risk assessment workflows that are currently being used by organisations to protect their mobile workforce;

Enterprise mobility (‘EM’) in transport and logistics is being used to undertake a ‘Start of Day’ HGV vehicle risk assessment. This works by forcing the driver, at the start of day to enter vital risk assessment data on the condition of the HGV vehicle and trailer unit prior to the driver recieving his days work. This ensures that the all important vehicle risk assessment is completed and the recorded information is stored safely in the organisations databases. Other risk assessments can be built into the EM system to ensure that if a particular delivery is over a certain weight, then the appropriate manual handling process is followed etc.

In the case of mobile workforces undertaking anything from asset management to vehicle servicing the use of EM to provide job specific risk assessments is set to become the duty of care tool of choice. As with the case of the HGV driver the field worker can use his PDA to undertake a vehicle safety check at the start of each day prior to receiving his jobs for the day. Throughout the working day, further check can be incorporated into the EM solution to cover job specific safety checks etc

The whole risk assessment process an easily be built into any enterprise mobility solution and will work for every known field worker discipline.


Lone Worker protection


Senior managers face significant challenges in their responsibilities for lone workers and as a minimum, they must;


Undertake appropriate health and safety risk assessments


Make provision for lone workers who may be faced with a risk of violence


Put contact procedures in place for emergencies so that the alarm can be raised and prompt medical attention provided if there is an accident


Ensure lone workers are medically fit and suitable for the lone-working role they have been assigned


Enterprise mobility can assist in providing the solution, in the previous section risk assessment was dealt with. Using PDA’s with built in GPS and software that can provide real time status updates workflows can be built to provide a good level of protection for lone workers;

Panic button and safety alert functionality
Using the GPS in the PDA we can accurately track the fieldworkers so at any time during the working day the exact location of all mobile staff is known.

A simple panic button function on the PDA can send a message for help to a central location giving the location of the fieldworker and also make a voice call to a call centre so that any abusive conversations can be recorded as evidence.

This feature can be further automated to protect the field worker is undertaking work on site as follows;

When the field worker arrives on site, he triggers a status message containing the date and time of arrival, the GPS coordinates and the postal address of the location. This information is sent from the PDA to the call centre. On activation of the on site status message, the PDA software starts an inactivity timer, which monitors the field workers usage of the PDA. For instance, if the device is used as expected to enter job information whilst on site the PDA alarm mechanism remains inactive. However, after a predetermined period of inactivity a message will appear on the PDA screen asking if the field worker is ok? If the field worker answers no or fails to respond to the message, the PDA will raise an alarm back at the call centre. Under normal fieldworker activity the PDA will not alarm and on completion of the job the safety alert mechanism will turn off until the field worker arrives at the next job.


Conclusion
The Corporate manslaughter bill amplifies the need for senior management to provide duty of care on their employee’s whether mobile or otherwise, the new bill makes it easier for organisations in breach to be prosecuted.

More emphasis will be placed on senior managers to prove duty of care policies and procedures are working and are being used by their employee’s. Paper systems could prove to be problematic as mistakes can be made and paper proof can easily be lost. Therefore use of enterprise mobility solutions in providing duty of care compliance will become more prevalent over the next 12 months.

If you have already deployed an enterprise mobility solution or if you are planning to do so, ensure that you build in duty of care into your mobility workflows.

Sunday 16 September 2007

Mobile and Flexibile working in local Government

Recently I was involved in a detailed report into the uptake of mobile and flexible working in local governement.

I have detailed below the executive summary from the the report.

If you would like a full copry of the report it can be found at: http://www.themda.org/mlc/default.asp

Introduction

Throughout history change has been fundamental to the evolution of both society and business. Change represents a new direction, a departure and often heralds a new way, a new approach and even a new beginning.

The survey and resulting report represents the first phase of the Mobile Data Association’s commitment to helping mobilise Local Government departments and services for the benefit of the authorities and their citizens. It is based on responses from more than 1,200 staff from 392 local authorities in England, Scotland, Wales and Northern Ireland, 83.8% of the total.
The most significant finding is, that local authorities are in the early stages of making fundamental changes in the way they run public services by adopting mobile technology which will result in new efficient working practices.

A small number of Local Authorities (15%) are equipping there staff with laptop computers, personal digital assistants and smart phones, for example, benefits officers are processing claims and social care workers assessing needs in people’s homes, building and health inspectors are completing inspections on the spot rather than having to return to headquarters. Meanwhile, office workers are carrying out a wide range of roles from their homes, contributing to productivity, environmental benefits as well as more family-friendly employment.

The future is mobile

Nearly all respondents agree that both mobile and flexible working will help to improve services and operate more efficiently.

Significantly, local authorities with some experience of flexible or mobile working are more optimistic about efficiency gains than those that have yet to begin.
The majority of respondents with experience also feel that flexible and mobile working will lead to more responsive and better services for the citizen. However, there are still significant steps that must be taken to help mobile-based projects move from concept phase to established, deployed solutions with significant business and citizen benefits. This is confirmed by about 5% of respondents say they are struggling to overcome problems with changing to new ways of working, such as staff cultures and the up-front cost of new systems.

Presenting a new way forward

The reality is, that considered deployment of mobile technology brings significant benefit to all adopters; as referenced by a small number of key success stories in local authorities but widely across the private sector.

There are, however, significant concerns raised about the ability of Local Authorities to transform using mobile and flexible working when so many responses focus on technology driven pilots.

This requires local authority decision makers to reappraise the way mobile projects are approached. However the appetite amongst local authorities to adopt mobile technology is most encouraging and this is confirmed by the large number of pilots that are currently taking place.

Nearly everyone is planning it, some are doing it

In 2007, the vast majority of UK local authorities are piloting or implementing flexible and mobile working. With flexible working, most (45.9%) are still at the pilot stage, with 9.9% having moved already to roll out or live/implementation. Nearly three in ten (27.7%) are at the planning stage and only 16.5% have no plans (or know of no plans).

Mobile working is at a similar state of play, with 85% of respondents saying that their authority had some project under way at - 24.8% at the planning stage, 46.6% piloting and 15.3% implementing. Just 13.4% had no plans (or knew of no plans).
Most of the deployments to date of mobile working are revenues and benefits (including home visits), social services, environmental services and building control.

Flexible working appears more likely to be piloted or applied on a corporate basis rather than department specific; over half (53%) of those with live projects reported implementations across more than one service at the point of survey. Some of these are on a very large scale - 10% of live projects involve more than 500 people and 4% more than 1,000 people. The two largest projects cited by survey respondents cover 6,000 people and 12,500 people.
Regionally, the south east of England leads the way in rolling out both flexible and mobile working.

The number of pilots being undertaken is around 45%. This figure is very encouraging. However, the report identifies significant challenges that could prevent the success of these pilots

Mobile and flexible working support transformation and efficiency

Managers and front-line staff agree that both mobile and flexible working can help local authorities meet the government’s agenda of transforming local government, with its moves towards citizen-centric government run through shared IT services. This key finding shows near-unanimous agreement in local government for the positive potential of both flexible and mobile working.

Almost all respondents with experience of projects found that efficiency gains through improved productivity are there to be obtained (90%). Interestingly, this is a higher level of savings than expected by those local authorities who have yet to undertake flexible or mobile working projects; only just over 80% of those expected improved productivity.

The majority of respondents with current experience (around three-quarters) also feel that flexible and mobile working will lead to more responsive and better services for the citizen. On the other hand only just over half of respondents agree that mobile and flexible working will help them design services around the citizen – suggesting that efficiency alone is not enough to reshape processes with more citizen focus.

Respondents cite a wide range of other potential benefits from flexible working. These include environmental benefits, better working conditions for staff and better potential partnership working a key part of the transformational government policy.

Benefits found in both flexible and mobile working that were not expected include freeing up assets, improved emergency planning, reduced staff absence and increased productivity.

Among the 5% of respondents who said that flexible working would not help meet the transformational government agenda, staff contracts emerged as one barrier. Another respondent cited lack of trust as a reason for an authority rejecting home working outright. Lack of resources emerged as a potential obstacle.

Around half of all respondents felt that flexible working practices could lead to more efficient use of land and buildings; 40% felt that the same would be true for mobile working.
Among the 5% who said mobile working would not help with transformational government, concerns covered ambiguities in transformational government itself, technical limitations of mobile equipment.

As with the transformational government agenda, the vast majority of respondents with current experience with flexible and mobile working - 77% and 81% respectively - say that mobile and flexible working will help their authority comply with the Gershon efficiency agenda.
However only around a fifth of respondents believe that either flexible or mobile working will ultimately result in a reduction of the number of staff employed by their local authority.

Only 8% say that flexible working will not help meet the Gershon efficiency agenda; reasons include it bring too early to tell, new ways of working are too different for direct judgments to be made, and existing contractual arrangements constrain the council’s ability to make property savings. Another concern is that systems used at home break down more frequently than the systems in the office, and people home-working make far more mistakes.

A similar percentage, 7%, say that mobile working will not help meet the Gershon efficiency agenda. Reasons include the extra cost of mobile technology not leading to reductions in establishment costs. Respondents cite the need for more evidence from pilots and wider implementations of technology.

Mobile Technology is proving a challenge

The majority of the negative responses indicate that the technology is not reliable or suitable for mobile and flexible working; this indicates a severe lack of understanding on how to apply the technology appropriately, which suggests that these pilots are technology based rather than process based. The fact is mobile technology does work and there are some success stories in local authorities and numerous in the private sector that support this.
Most Local Authorities are not seeking expert assistance

When questioned about advice and guidance on the deployment of mobile and flexible working solutions very little is taken from industry experts and considerable faith is put in internal resources to provide this. In fact the findings show that only 1% of Local Authorities will seek assistance from commercial expert organisations (virtually all private sector businesses seek assistance). We believe this approach is fundamentally flawed and could result in a trial and error approach and a high risk of failure.


Mobile projects are still high risk

Respondee's state that there are considerable challenges in the deployment of flexible and mobile solutions. This is compounded with the lack of involvement of the end users when planning mobile working projects (less than 50%). This figure should be 100% to ensure buy-in from the users and, ultimately, successful deployment.

The result of both lack of engagement with expert organisations and the end users could result in a majority of pilots underway failing for lack of proper planning and understanding. This is a major concern which could result in the failure of 50% of the pilots and projects that are in the process of being deployed.

Knowing what to ask for

The majority of Local Authorities undertake an ITT process to select a suitable vendor and solution. The MDA suggests that all Local Authorities as part of their business case
development, undertake a formal information gathering exercise -. A structured Request for

Information (RFI) should be produced that defines how mobile users currently undertake their day to day work (field force workflow). Information should include details of how the vendors solution could meet the strategic aims of the authority; ie accommodation strategy, work/life balance aims, improvements in service delivery.. The RFI should be sent out to industry experts in enterprise mobility, with the brief: “This is what we do, tell us how mobile solutions will revolutionise this process and what the approximate costs are.” The resulting responses will provide valuable expert information which can then be used to create the business case, the ITT and the vendor selection process.

The MDA believes this additional process coupled with a keep it simple approach to ITT’s will make a fundamental difference to the quality of pilots and projects. This will ensure that ITT’s are neither too prescriptive nor making unrealistic demands and will provide a platform for vendors to suggest innovative technologies and processes matching an authority’s particular requirement.

Impact on the environment

Some of the most exciting potential benefits from flexible and mobile working are environmental. The survey finds evidence that they are starting to appear, but that the picture is complex. Only around one respondent in five says that flexible and mobile working would have no significant positive environmental impact.

The key environmental benefits flowing from both flexible and mobile working are reduced need for office space and unnecessary journeys. On the other hand, there is a discrepancy between environmental benefits predicted by people before projects are implemented and by those responding after pilots or projects are in place. In places, this gap is huge: for example 60% of people expect flexible working to ease transport congestion before programmes are in place; compared with 12% afterwards. (As local authorities generate only a tiny proportion of congestion, both figures may be optimistic.)

Percentages of those reporting environmental benefits from actual projects is still significant, however. More than a third or respondents say that office space is reduced, for example, which is impressive despite the fact that predictions beforehand were even more hopeful.

The deployment of mobile solutions will have a positive impact on any organisation’s carbon footprint. However the survey suggests that mobile projects are not having significant impact. Further research needs to be undertaken to understand why the impact is considered insignificant. This is an important but unexplored area. It is our intention to provide guidance on how mobile solutions can have a positive impact in reducing carbon emissions.

Barriers remain to be overcome

The survey identifies a range of technological, operational and cultural barriers that must be tackled before flexible and mobile working are implemented widely. Although many of these barriers are only reported by small numbers of local authorities, together they show that there is still plenty of work to be done to ensure the greatest levels of success are achieved by the greatest numbers of authorities.

Respondents who identified significant barriers to corporate adoption of mobile and flexible working say that managing people at a distance is more difficult than expected. Culture change and loss of personal contact or team spirit can also pose problems. On the other hand, technology and cost turn out to be less significant barriers than expected.

Mobile working attracts more concern than flexible working, with a range of issues raised. Many of these are technical barriers, such as a lack of wireless coverage; difficulties of integrating new mobile systems with existing IT systems; IT security; and issues such as battery life and the weight of a laptop to carry around.

Some responses indicate that significant barriers have been encountered among staff. The most significant barrier was the difficulty of introducing a major change in working culture. For flexible working, the other major concerns are a lack of staff technology skills, ranked equal second alongside loss of personal and peer group contact, fear of technology, and feelings of isolation.

For mobile working, lack of technology skills is an even greater concern, ranked at 50% alongside culture change; followed by fear of technology and a loss of personal and peer group contact. With mobile working, however, loss of personal and peer group contact turned out to be far less of a barrier than predicted, with 72% of respondents predicting problems before implementation and just 31% afterwards.
Feelings of isolation, a related barrier, also turn out to be less of a problem than feared, as did problems with self-motivation; a loss of guidance from senior staff; and general issues with introducing change.

Conclusion

The MDA believes Local Authorities are moving in the right direction and have demonstrated the benefits of mobile and flexible working. However, there are lessons to be learnt from industry that can further enhance both the speed of deployment and the satisfaction of the users and thus further enhance the Authorities’ efficiency and response to their citizen stakeholders.

Wednesday 29 August 2007

The Enterprise Mobility Business Case

Practical Return on Investment

Over the years a considerable number of Enterprise Mobility projects failed to get off the ground because of failure to secure project funding due to weak business cases. This article will explore the specifics of practical Return on Investment, including and avoid falling at the first hurdle through a lack of understanding of the expected ROI. It will include suggested methods of calculating this and incorporating it into the ROI calculation.

This guide will explore tangible benefits that can be proved after deployment and how they are achieved. It will then walk through an example, which is based on a real company, and draw conclusions on the benefits that can be confidently used in a business case.

In a process based environment, it is possible to map out your current workflows and create a model of how the implementation of a mobility solution will impact upon these.


Let’s consider some of the features of mobile solutions. Listed below are some of these:

· Remote dynamic data capture
· Vehicle tracking
· Workforce visibility
· Real time status updates
· Workforce reporting
· Spare parts ordering
· Work planning
· Signature capture
· Same day invoicing
· Process compliance
· Dynamic database updates
· Event costing
· Technical data distribution
· Intranet access
· Best practice
· Automatic job closure
· Work audit trail
· Work order/job dispatch
· Health & safety procedures
· Time sheet reporting

These mobility features offer a wide range of benefits, and yes they’re all real. They all offer business improvement; many of them offer cost improvement by reducing fixed overhead or increasing revenue. Many of these benefits are indisputable as contributing to business improvement, but few of them can be absolutely relied upon as part of your business case. Why? Proving their realisation after the project deployment is very difficult. Firstly we must separate these features into those that would benefit your business the most and those that can be measured and therefore provide a tangible return on investment.

So what could be determined as a measurable benefit?

Improved Customer Service
Customers retained equals revenue protected

Better KPIs / performance
Event cost reduced and revenues protected

Efficiency improvements
Fixed overhead reduced

Increase competitive advantage
Increase revenues

Improved data integrity
Administration and re-work costs reduced

Improved workforce moral
Empowered workforce; reduction in training and recruitment costs

Improved management data
Strategic decision making

Above are generic examples of where organisations have recorded tangible benefit, post implementation. There are two factors common to all these examples: Firstly, they’re all incontrovertibly real and make a difference in terms of profitability; but secondly, they are all more or less impossible to put a value against prior to deploying the solution! Having said this, it is my experience that many supporters have tried to implement and met with some severe resistance following boardroom scrutiny. Not that I am suggesting you should ignore any positive change that mobility solutions can bring, however, if measurement is difficult then by all means include these in the business case, but not in your return on investment calculation.

Most businesses target productivity improvement and headcount reduction/refocus through saving minutes-per-case of the remote workforce time. This is a good approach provided that appropriate due diligence is undertaken, see the example below which has in the past caught out many managers.

Example

“So if we remove the necessity for our Inspector to hand write a 15-minute report by providing him with a PDA on which he can collect the same data in 7 minutes, we can create sufficient excess capacity for each Inspector to do one extra job per day!”

Well…maybe, but are you sure you can turn that extra capacity into extra productivity?

Or will your Inspector just go home earlier?

What we need to do for a solid business case is to focus on real, tangible, easily measurable benefit:

Here are some fundamental examples:

Elimination of manual process
Reduction in staff time to complete
Reduction in material overhead (stationary)
Reduction in fuel costs

Reduction in voice telephony (replaced with data)
Reduction in communications costs

Reduced billing cycle
Cash flow improvement

These examples are areas where we can demonstrate a realistic quantitative approach by the production of sufficient incontrovertible evidence to justify the investment – obviously this needs to be a bigger number than the solution’s Total Cost of Ownership! It also needs to give the board confidence that this really is a major step forward in improving the business.

Using this simple but practical process to calculate your own return on investment should assist in securing board funding for your project. So why not start the process today ? However, be aware that once your enterprise mobility project is deployed you will probably be asked to prove you have realised your business case, so make sure you follow through by instigating all your proposed actions of your business plan.

Tuesday 28 August 2007

Mobile Security a more detailed view

The subject of mobile device security has a controversial past; stories of computers being stolen complete with MOD intelligence data and drive-by hacking into corporate wireless networks using Pringle tubes as antennas, make it into the press on a regular basis. These stories paint a picture that shows mobile devices and wireless technology as inherently insecure, when in the majority of cases the victims of hackers and mobile device thieves, have not shown due diligence over the impact of wireless technologies and mobile devices on their security policy.

Corporate wireless local area network “LAN” has had its fair share of horror stories. The most popular being ”For speed we used the default settings pre-programmed into the access point”, well guess what? These can be found on the manufacturers support site! This results, in the majority of cases, in stolen bandwidth from unprotected access points.


If you consider the following points when looking at security, you will not go far wrong!


Radio based technologies do not respect the physical parameters of a building.

Portable devices are not contained within the physical parameters of a building and should be treated as an extension of your enterprise.

What would the impact be on your business if a mobile device was stolen or lost?

Are your employees using their own mobile computers or smart phones to access email or synchronise data with the desk top computers?

Accessing the corporate enterprise remotely will ultimately require changes to existing security policies.

Background
Most mobile devices connect from outside the security perimeter of corporate networks, exposing them to varying levels of risk. In addition, today’s mobile devices offer many of the same features and applications that employees use on their laptop or desktop computers, including access to the Internet, business applications, calendar and contact information, e-mail etc. As a result, many of the security threats that exist for desktops will exist for mobile devices.

The challenging task for your IT security officer is to find methods and technologies that can prevent malicious attacks on your systems from sources located not only outside but inside corporate firewalls. Securing servers and mobile devices becomes even more important as field workers connect from wireless networks, as individual security requirements for these do vary. However, with the right technology and network architecture in place, network administrators can dramatically improve security for mobile device connections. Careful planning of how to handle permissions and security rights for these mobile users is the key to a successful deployment.

This article deals with the individual risk elements and attempts to suggest an approach to risk mitigation, however security risk is very subjective with some organisations adopting mobile security policies that others would find unacceptable.

First let us consider the impact of wireless bearer services on security risk.

Wireless Local Area Network “WLAN
Wireless LAN over the last two to three years has proven to be very successful. The uptake has resulted in wireless LAN hardware becoming very cost effective and it is now deployed in many corporate companies. Numerous mobile devices now support WLAN and as a result of this will be exposed to the same threats as a notebook computer. Consideration must be given to the initial connection to the wireless infrastructure. It is essential to establish a documented wireless LAN policy, which should cover the following elements:

WLAN usage
Network configuration
Security


Organisations must first define the procedures for the proper use of wireless LANs. This typically includes the applications that run across the wireless LAN and the exact locations where wireless LANs should and should not be deployed within the enterprise.

WLANs in Uncontrolled Environments
The widespread growth of wireless LAN technology into all new laptop computers and a significant number of mobile computing devices, such as the Pocket PC, ultimately forces organisations to decide exactly where and what types of networks employees are allowed to connect with. The growth of public wireless LANs (Hot spots) opens the door for convenient connectivity outside the office. However, these public networks offer little security and can potentially attract unscrupulous hackers who can take advantage of unsuspecting users. Consideration should be given to the usage of Hot spots and appropriate security measures, such as the use of VPN and strong authentication, must be examined.

Encryption & Authentication
Wireless LAN’s do not respect the physical boundaries of a building, therefore encryption and authentication are essential. The vulnerability of Wired Equivalent Privacy “WEP”, the first encryption standard for wireless LANs, has been well documented. However, all wireless LANs should as a minimum, activate this basic encryption to protect their data from the general public who can passively “sniff” the traffic in the air to get open access to all unencrypted data. Enterprises should establish a policy that mandates all traffic be encrypted with WEP, as the lowest level of security. Stronger encryption and authentication is available and should be considered. Recently the Wi-Fi Alliance in conjunction with the IEEE have worked together to launch a more secure protocol Wireless Protected Access “WPA” providing enhanced data encryption as yet this new protocol is not supported by the majority of mobile devices, but if at all possible WPA should be used in future deployments of wireless LAN infrastructure.


Security Policies
Many security issues of wireless LANs can be addressed with a correctly configured network. However, enterprises should also implement additional security polices for their wireless LANs to address the deployment of unauthorised wireless LAN hardware and unauthorised activity on the network. An employee, vendor, or on-site consultant can unknowingly put all information assets at risk with a £55.00 consumer-grade access point, purchased from a local “PC’s R Us” store. This unauthorised access point will circumvent all existing network security by broadcasting an open connection to the corporate network.

Mobile Devices with Wireless LAN Connectivity
Virtial Private Network “VPN” for wireless connections enables Windows based Mobile devices to use WLAN based connections to communicate with a corporate network by using the same VPN technologies that are available to wired clients. With VPN security for wireless connections, employees have user authentication and a strongly encrypted connection.

Devices such as Microsoft’s Windows Mobile have very capable WLAN connectivity and should not be considered any different to a laptop that is capable of holding large amounts of corporate data. These mobile devices are subject to loss or theft, even more than laptops. This susceptibility makes the security of locally stored data on mobile devices a high priority. Windows Mobile-based Pocket PCs allow network administrators to implement strong password policies, such as power-on passwords and Smartcard authentication, to help secure access to mobile devices and the data they store.

It is imperative that the devices deployed support WEP wireless security, which uses a pre-shared wireless key to encrypt wireless connections. WEP provides the least amount of wireless security for mobile devices and the technology’s security flaws have been well documented. WEP-based wireless connections can be used in combination with a more secure authentication method, such as a VPN connection.

General Packet Radio System “GPRS” and third generation networks “3G”
When using GPRS/3G similar precautions should be taken as with the deployment of WLAN. Your policy should include:

GPRS usage
Network configuration
Security


The use of GPRS data within the corporate space is growing at a rapid rate, with expenditure on Field Mobility solutions increasing year after year, making GPRS the current bearer service of choice for the corporate. From a security perspective the radio interface of the GSM network is relatively secure as it is controlled by the GSM network's security via a 64-bit encryption algorithm. Security issues arise when data needs to leave the GPRS network to be delivered to either the Internet or a company LAN.

There are two basic ways to implement reliable and somewhat secure remote connections for accessing corporate intranets over GPRS. Some of these solutions focus only on providing safe passage over the public Internet, others provide security via ‘closed’ user groups.

Internet connection
Your company probably already has an Internet connection (though you may need more capacity if you add large numbers of GPRS users) and this provides a quick and easy and cost effective way of connection to GPRS. The key problem is to deliver data securely to users, using strong encryption such as Secure Socket Layer “SSL” (128 bit) or VPN (162 bit). If it is allowed by the chosen GPRS network supplier, it is possible to set up encrypted VPN connections in to corporate networks, although there will be some degradation in performance caused by the processing required to encrypt the data, although this is typically negligible. Data sizes will also be increased due to the overhead of the VPN protocol. . GPRS Connections should be treated as a standard dial-up Internet connection to an ISP and similar security precautions should be taken.

Leased Line connection
Leased lines provide the most secure method of connecting into the GPRS network but are traditionally expensive and tie subscribers in to a specific network. The protocol over the leased line would normally be frame relay terminated, via a router. The leased line provides a closed connection from the mobile device via the carrier into the corporate enterprise, providing a high level of security. For additional protection use strong encryption (such as SSL or VPN) and of course strong authentication.

Mobile Devices and GPRS/3G
Currently there are many integrated Mobile devices with GPRS, which makes the connection back into the corporate enterprise comparatively straightforward. The usability of the mobile device needs to be taken into consideration when planning a security policy. Allow for the possibility of losing or having the device stolen and ensure that data is stored centrally. Potentially these mobile devices will be out of the office for the majority of the working day, which increases their vulnerability, so thought should be given to the use of power-on passwords, Smartcard authentication and the safety of data. If possible, data should be held on mobile devices on a temporary basis and removed when the user has completed the work, thus minimising the risk.
Virus protection must also be considered. At present the risk of virus attack on mobile devices is low, however a small number of Pocket PC viruses have already been discovered. The first was written as a proof of concept by a virus writing group and sent to anti-virus experts. Having reviewed this virus an anti-virus consultant from Sophos was quoted as saying “You're more likely to have a meteorite strike your house than be hit by this virus”. Only a month later the second virus struck, with more serious impact. This allowed an attacker to bi-directionally transfer files and execute commands on an infected device. Whilst the numbers of viruses and impact so far have been minimal, it would be foolish to ignore the possibility and potential consequences, as increased numbers of users store potentially sensitive data on their devices. “Blue Jacking” (using the mobile device’s Bluetooth connection to access the Internet) is another potential source of problems. One precaution is to protect the mobile device by turning off the Bluetooth connectivity or setting it to non-discoverable mode when not in use.

Conclusion
The security of mobile devices could be seen as a major challenge, yet taking a common sense approach reduces the effort. Treat the mobile devices and wireless connectivity as part of your IT landscape and take appropriate steps to mitigate any security risk. Creating a mobile device security policy will pay dividends in securely mobilising your workforce.

Wednesday 8 August 2007

Facilities Management taking the plunge

Currently, the majority of the facilities management field worker community uses some form of wireless voice communication to maintain contact with either their company or their customers. The most favoured device for this is the ever-popular GSM mobile telephone. However, voice communication comes at what most businesses feel is a prohibitive on-going cost. Most company accountants consider the issuing of this technology as an uncontrolled expense, as voice calls tend to be randomly made and always take too long. Whilst all the current GSM network providers charge according to talk-time, this will always be a problem. Despite this reluctance, most individuals have either a company sponsored GSM telephone or their own GSM phone, which invariably ends up as indirectly company sponsored, through creative expense claims.

However, this could provide an opportunity to maximise the investment in mobile phone technology by expanding its use by using the wireless data services (GPRS) coupled with some sort of portable computing device. This technology coupled with some suitable field mobility software application will eradicate the need for paper and its associated process in what is considered a paper-centric industry, thus facilitating the reduction of operating costs whilst improving customer satisfaction.

Most businesses, up until quite recently, have been either sceptical or unaware of what the wireless technology of today is capable of. More importantly they are still unaware of how to harness this technology to their best advantage and improve their businesses efficiency.
So what are the first steps we need to take to mobilise our workforce?

The first thing to remember when planning your move into mobility, is that it won’t
happen overnight!

The challenge today, given that the facilities management industry is a very mobile centric industry is how to use the wide range of opportunities now available in mobile technology, to keep in touch and provide the important information to our fieldworkers to enable them to complete their work efficiently in the most cost-effective manner.


These are three phases you need to go through, to get there successfully.

1. Understand the technologies

Anyone who has used a mobile phone will know that they do not always have signal to make a call, and certainly some buildings will bock signal making calls from inside them difficult, this compounded with that in certain places the use of mobile phones is not allowed makes the use of mobile phones sometimes a challenge. The same applies to mobile data; therefore when choosing a mobile solution it is imperative that it works equally well without signal as with signal, also ensure that the solution can manage all communication sessions without any intervention from the field worker.

There are several choices to be made. You’ll need good information and advice to consider the technological choices,

· Which voice handsets or portable computing devices you need,
· Which wireless connectivity is the most appropriate (GSM, WiFi),
· Which application software you need.


Once you have deployed your solution, change will be inevitable, as a result of this you need to choose a suitable solution that will easily allow future changes to be made. Your chosen solution should be sophisticated enough to allow you to make changes and these changes should be over the air updated to the field workers , this will allow your business to be in control of your field mobility solution and minimise ongoing costs and allow for you to react quickly to your customers changing requirements on your business

Its a well know fact that when businesses deploy field mobility solutions its only the beginning of the experience, initially you may only need the field mobility solution to interface with a single element of your enterprise, such as your CRM system, however there will probably be future requirement for your field mobility solution to integrate into a ERP, Payroll, Intranet, GPS Tracking etc. Therefore it’s important to ensure that you pick a field mobility solution with the flexibility to work with all your enterprise systems and the flexibility to grow and change as your business grows and changes.

The key is, you shouldn’t try to become the technology expert. Get a partner who is, and who can provide upfront advice and continuing support you can trust.



2. Develop a business plan

Look closely at your business and identify the areas you think would benefit from mobilisation. Then, create model workflows to identify which parts of these processes can be mobilised, use a ‘before and after scenario to calculate the impact upon the workflows. This difference can then be utilised to calculate the return on investment (ROI) you’re likely to achieve. When evaluating the ROI, start with the paperwork being completed by your fieldworkers. In almost all cases, removing the cost of processing paper-based forms should give you a tangible ROI to prove your business case. It’s easier to do that, than to try and measure the return on intangible benefits such as productivity. Make sure in your business case you include the total cost of ownership, this should include costs for the support of your field workers as they come to terms with the technology and on going help should they have any problems with the technology, device management and support will also be a consideration.


3. Take the plunge

This is a good time to get your mobility strategy underway, because;

The necessary mobile technologies exist, and have been proven to work and are relatively low cost.

The wireless networks now offer stable, corporate data services with tariffs that are affordable and attractive


There are an increasing number of proven mobility applications that can be rapidly deployed and easily implemented

Those businesses that have deployed mobility solutions already have seen a significant return on investment

Tuesday 7 August 2007

Public sector interview

Recently I was interviewed by GBTV on enterprise mobility and the Public Sector, here is the resulting video footage.

Monday 6 August 2007

Mobile device support and management


Mobile Devices are getting increasingly sophisticated and as such should be treated no different to a laptop computer when it comes to mobile device management. Just like their laptop big brothers mobile devices and smart phones can access the internet/intranet, carry large amounts of corporate data, send and receive email and run sophisticated applications. Add this to the fact that most mobile devices under normal working conditions will do this remotely and wirelessly and are subject to loss or theft, even more so than laptops. The result is you should have a device management policy and supporting infrastructure.

As a minimum organisations should be looking at policy and procedures to encompass the following;

User handover documentation
Software and hardware configuration management
Backup policy
Settings management
Training and support material
Password policy management
Swap out procedure
Device addition/removal procedure
In life support



The above requirements can either be handled manually or by device management software. Device management software enables IT administrators to capture the asset characteristics, configure settings and security policies of mobile devices, and update or deploy new applications with minimal interruption to the user, dramatically reducing the cost of deploying and managing devices.

Let’s take look at each of the above elements;

User Handover documentation

It is important that the users of any company issued mobile device take care of these in a diligent manner. Therefore when handing over a device to an employee, it ‘s important to ensure that they agree to a set of usage terms and conditions. This could include when and how the device is to be used and any limitations as to it use (e.g. internet policy) and any liability the employee faces if these terms are broken. Certain companies have insisted that if the unit is maliciously destroyed then the employee is liable for the cost of replacement. Careful consideration must also be given to any health and safety aspects of using mobile devices especially in moving vehicles.

Software/Hardware configuration management

The mobile device will invariably be configured for groups of users, the software and settings need to be set up on each device, therefore a documented record needs to be kept as to how to set up the device and what applications are active on the device and what applications are to be disabled. This process can also be automated with mobile deployment software as described in an earlier paragraph.

Backup policy
Mobile devices are capable of holding large amounts of corporate data therefore if information is to reside on these devices then a backup policy should be considered.


Settings Management
Once the mobile device is ‘in life’ should the device require additional applications loaded or the device looses its settings a methodology needs to be in place to quickly restore them.


Training and support material
If mobile devices are being provided to field workers then careful consideration should be given on training the users to use the applications properly and, if necessary provide supporting documentation as reference material.


Password Policy Management
Mobile devices due to their size and proliferation are potentially more prone to theft than laptops as a result of this a password policy is extremely important. Third party applications are available which will wipe the mobile device ‘clean’ should the power on password be entered incorrectly after a certain number of times, these should be considered for confidential information applications. Consideration should also be given to the impact certain password policies may have on the usability and overall user experience of the mobile device (there is nothing more frustrating than having to enter a user id and password every few minutes because the device has gone into sleep mode).


Swap out procedure
Mobile devices are always deployed for compelling business reasons, once deployed the user becomes dependent on the device functioning properly. Therefore should the device fail, clear and effective procedures need to be in place to enable the user to continue working through either emergency paper backup or hot swap devices geographically located.


Device addition /removal procedure.
Should a new user need to be added to the enterprise as a mobile device user, then a simple process is required to ensure that this is undertaken efficiently. Equally if an employee leaves or their device is stolen a procedure is required to remove their unit from the enterprise and to remove any company specific data remotely, if this is not possible, then using power on passwords will provide and element of protection.


In life support
Mobile devices must be considered as extensions to your corporate enterprise and as a result of this your new mobile clients will need a user- friendly support desk to talk to should they have any issues with their devices or mobile software applications.




Conclusion
In my experience mobile device management is typically only considered as an after thought, this normally results in projects invariably going over budget. Device management is a key requirement in any field mobility project and provided the overhead is facilitated in your field mobility business case as part if the total cost of ownership there will be no project surprises.

Information on the move – Mobile Geographic browsers


The web browser on our desktop PC is becoming a key part of our working and social life, recently both Google and Microsoft have added a new dimension to the web browser by introducing geographic information to aid with location and directions to a specific place.
Our friends at Google and Microsoft have now made this available on our mobile phones. I must admit I find this new way of searching on the move incredibly useful.


This new style of mobile geographic web browsers allows the swift location of hotels, restaurants, places of interest. They give you directions and quick dial phone numbers and even allow you to text the information to a friend.


I recently used this new technology on my phone to find the nearest Apple Store whilst in the states so I could have a play with the new IPhone, it worked brilliantly.


I have provided links to both Microsoft and Google’s web sites so that you can try this out for yourselves.




The uses for an evolved version of this technology in the enterprise space will be varied. It will not be long before the technician that comes to repair your washing machine uses his mobile phone to find a local supplier who has the part needed in stock, orders the part, then uses his phone to navigate to the supplier to collect it.


Or using your mobile phone you can look on a map to find out exactly where your technician is and his ETA at your home.


My verdict is “One of the most useful mobile applications to date, with many potential uses in the medium term future of enterprise mobility innovation”

Transport and Mobile Solutions - The outlook

Over the last 18 months we have witnessed significant change in the application of mobile technology in the transport sector. Prior to this recent change, the most prevalent use of technology has been in vehicle tracking. Tracking solutions have been used to assist businesses in making better use of their fleets and as a security measure. These two benefits alone justified the cost of deployment in most cases.

So what is this driving this change?

There are five main reasons for the transport sector demanding more from their mobile technology partners, these are;

· Road Transport working time directive came into effect March 2005
· Employers duty of care responsibilities “Driving at Work”
· Rising cost of fuel.
· Increased road congestion
· Customers becoming more demanding.

As a result of the above, the transport sector is demanding the creative deployment of mobile technology to solve this raft of issues.

So how can technology play its part?

Well, its no longer just about tracking; Its about time usage reporting to assist in compliance with the Road Transport working time directive. Its about process compliance and ensuring that risk assessments are undertaken to meet with the Driving at Work responsibilities. Its about route optimisation to reduce the amount of mileage and avoid congested routes. Its about providing customers with real time accurate data directly back into their IT systems.

This may look like a huge challenge, but the fact of the matter is, this can all be achieved with mobile technology today. However the problem is, to deploy a solution that deals with the five imperatives of the Transport Sector will require several technology partners.

So Tracking, Navigation and Field Mobility vendors need to partner to differentiate their offerings and the wireless networks need to get involved in the passing of real time information to and from the vehicles and mobile devices.

We are starting to see the emergence of such partnerships, but as with all partnerships these will take a while to materialise with fully integrated rich transportation solutions. I believe by Q4 2007 we will start to see the fruits of these partnerships and the step innovation in technology required to deliver complex solutions.


So what about the consumer space?

In the consumer space the demand for Satellite Navigation is growing rapidly and there is currently around 4 million Britons are using personal Satellite Navigation devices to navigate our roads.

As a result of partnerships driving the Transport Sector, the resulting technologies will inevitably find their way into the consumer space. Today’s generation of navigation devices are the first to be connected to real-time information, but the services they offer provide little more than road incidents to be avoided.

Motorists can expect to see a wide variety of useful data flowing into their cars in what is being termed Connected Navigation. This demand will open up a multitude of opportunities for service providers and data aggregators to exploit travellers’ desires for contextual information about local services and points of interest.

This new ‘connected navigation will provide more “intelligent” route planning, using real-time and historical road congestion data to provide dynamic route optimisation rather than the current quickest, shortest route planning.

The adoption of in vehicle mobile technology is set to grow rapidly in both the corporate and consumer space, to such an extent that buy 2010 it is possible that every vehicle manufactured will have “Mobile Inside”

Sunday 5 August 2007

Mobile Security an overview

Most mobile devices connect from outside the security perimeter of corporate networks, exposing them to varying levels of risk. In addition, today’s mobile devices offer many of the same features and applications that employees use on their laptop or desktop computers, including access to the Internet, business applications, calendar and contact information, e-mail etc. As a result, many of the security threats that exist for desktops will exist for mobile devices however the smaller devices are much more easily lost or even stolen!

The number of Mobile devices with wireless connectivity is on the increase. These devices make the connection back into the corporate enterprise comparatively straightforward. Therefore consideration must be given to measures that will allow for the possibility of losing or having the device stolen by ensuring that the data stored on the mobile device is also stored centrally. Be aware that these mobile devices will be out of the office for the majority of the working day, which increases their vulnerability, so thought should be given to the use of power-on passwords, Smartcard authentication and the protection of data by the use of encryption. If possible, ensure that data is held on mobile devices on a temporary basis and removed when the user has completed the work, thus minimising the risk. At present the risk of virus attack on mobile devices is low, however a number of mobile viruses have been discovered, as a result of this, virus protection must also be considered.

The security of mobile devices could be seen as a major challenge, yet taking a common sense approach reduces the effort. Treat the mobile devices and wireless connectivity as part of your IT landscape and take appropriate steps to mitigate any security risk.

If you consider the following points when looking at security, you will not go far wrong!

Radio based technologies do not respect the physical parameters of a building.

Portable devices are not contained within the physical parameters of a building and should be treated as an extension of your enterprise.

What would the impact be on your business if a mobile device was stolen or lost?

Are your employees using their own mobile computers or smart phones to access email or synchronise data with the desk top computers?

Creating a mobile device security policy will pay dividends in securely mobilising your workforce
.

Mobile Offset = Carbon Offset

Since the recent release of the Stern report there has been considerable focus on how technology generates CO2 however could be used to reduce the amount of CO2 pumped into the atmosphere in the support of commerce and industry.

One such area under the microscope is that of mobile field workers, who have a larger than normal carbon footprint due to daily vehicle usage and large amounts of paperwork they need to complete.

While the use of mobile phones is practically ubiquitous among field workers, effective and efficient use of mobile technology is another matter altogether. Yet the environmental and business impact using mobile technology to make improvements can be considerable, and are by no means mutually exclusive objectives.

One recent example offers an exact illustration of what can be achieved. By deploying a field mobility solution with fully integrated satellite navigation, one organisation was able to make more efficient use of their workforce and considerably reduce the average miles covered per job, resulting in a staggering saving of 3.6 million miles per annum. This equates to a carbon reduction of 1,159 metric tonnes of carbon per annum, or the equivalent of 26,953 light bulbs being left on for a year.

The company was also able to remove 1.5 million pieces of paper from their business annually, equating to a saving of 17.5 trees’ (60 feet high) every year. Previously, the paper was shredded then incinerated resulting in the production of 7.2 metric tonnes of carbon, or the equivalent of 171 light bulbs being left on for a year.

The smarter use of mobile technology repeated across the entire spectrum of organisations with a mobile workforce, we’ll be able to see at least one group making a meaningful contribution to the reduction of emissions for which they are responsible.

10 Essential Considerations for successful deployment

Ten essential considerations for successful Enterprise Mobility

1) The business case; Look closely at your business and identify the areas you think would benefit from mobilisation. Then, create model workflows to identify which parts of these processes can be mobilised, use a ‘before and after scenario to calculate the impact upon the workflows. This difference can then be utilised to calculate the return on investment (ROI) you’re likely to achieve. When evaluating the ROI, start with the paperwork. In almost all cases, removing the cost of processing paper-based forms should give you a tangible ROI to prove your business case. It’s easier to do that, than to try and measure the return on intangible benefits such as productivity.

2) Total cost of ownership; Make sure in your business case includes all the costs associated with your mobilisation project, this should include costs for the support of your field staff as they come to terms with the technology and on going help should they have any problems with the technology, the management of the devices and swap out of devices and updating the applications on the devices from time to time and of course that all important communications cost.

3) Mobile communications; Anyone who has used a mobile phone will know that they do not always have signal to make a call, and certainly some buildings will bock signal making calls from inside them difficult, this compounded with that in certain places the use of mobile phones is not allowed makes the use of mobile phones sometimes a challenge. The same applies to mobile devices and wireless data; therefore when choosing a mobile solution it is imperative that it works equally well without signal as with signal, not only this also ensures that the solution can manage all communication sessions without any intervention from the user.

4) IT Enterprise connectivity; It is a well know fact that when businesses deploy field mobility solutions its only the beginning of the experience, initially you may only need the field mobility solution to interface with a single element of your enterprise, such as your CRM system, however there will probably be future requirement for your field mobility solution to integrate into a ERP, Payroll, Intranet, GPS Tracking etc. Therefore it’s important to ensure that you pick a field mobility solution that uses industry standard interface technology such as XML and has the flexibility to work with all your enterprise systems and the flexibility to grow and change as your business grows and changes.

5) Change management; Introducing field mobility into your business will improve existing ways of working, not only this field mobility will allow for new ways of working. It’s a fact that once you have deployed your solution change will be inevitable, as a result of this you need to choose a solution that will easily allow changes to be made. Your chosen solution should be sophisticated enough to allow you to make changes and these changes can be over the air updated to the field workers, this will allow your business to be in control of your field mobility solution, thus minimising the impact on your business and your field workers and will allow you to react quickly to your customers changing requirements on your business. The over the air updating will minimise the impact change as on your field workers.

6) Diversity; if you have of staff who spend more than 20% of their working week out of the office can benefit from field mobility. Therefore once you have made the decision to deploy field mobility to part of your work force, doubtless you want to look at other area’s of the business that could benefit from field mobility, however the cost of deploying multiple field mobility solutions could prove expensive. Therefore ensure you choose a solution that if flexible enough to work over a variety of field activities and a variety of enterprise systems, through a single mobile gateway. Language support is also essential for either Global or European roll-outs.

7) Security; Security is a very subjective topic, since what one organisation would consider secure another organisation would see as very insecure! Therefore ensure that your chosen field mobility solution is flexible enough to work with your existing security policy. If you do not have a mobile device security strategy, ask your field mobility solution provider to provide a suggested strategy based on extending your current security policy.

8) Scope creep; It is very easy to extend the functionality of your field mobility project, this normally results in the project timescales being elongated and solution costs start to spiral out of control. Start with the examination of your field worker processes, identify the area’s that would benefit from mobilisation, produce a detailed set of functional requirements. This will become phase 1 of your field mobility strategy. Provide these functional requirements to your potential suppliers and get a fixed price quotation for undertaking the work. Also ensure that any potential supplier can support your wish list of functionality moving forward.

9) Pilot; One of the most important stages of mobilising your workforce is ‘testing the theory’. The live environment in which your staff work is vastly different to the office in which your mobile solution has been designed, therefore it is extremely important you test the final solution in a live environment before rolling it out to all the workforce. The pilot will enable you to test the then fine tune your mobile application ensuring best fit with the field workers environment. Not only this, it will be as valuable test of your training of the field workers to use their new tool.

10) Future proofing; It’s a well known fact that mobile technology such as PDA’s has an average life of 6 to 8 months before being upgraded or superseded. This means that during the implementation phase of your project, your target mobile device could no longer be available for your project. Therefore ensure your project caters for this by leaving the mobile device selection until you are ready to go live. As the mobile devices change so do their operating systems, so make sure your mobile application is also future proofed and that your supplier as a product road map which includes the support of future devices.

The Begining


Hello and welcome to my new blog I hope you find it interesting a more importantly useful. Over the coming months I will attempt to provide practical guidance on the deployment of Enterprise Mobility solutions, examining the opportunities and challenges faced and hopefully dispel some of the rumours!