Smart Phone Conservation Agent Application
|
|
- Lawrence O’Brien’
- 8 years ago
- Views:
Transcription
1 Smart Phone Conservation Agent Application Information Communications Technology (ICT) Innovations State of Missouri - Department t of Conservation
2 B. Executive Summary In the state of Missouri, the Conservation Commission is charged with enforcement of Missouri s Wildlife Code. The Commission employs over 170 Conservation Agents within the Missouri Department of Conservation to cover the state of Missouri for this enforcement. Missouri regulates the harvest of fish and game through the use of permits. Deer and turkey harvests require hunters to check their game through an online system (TeleCheck). Agents do field checks where they approach anglers and hunters involved in hunting or fishing or in possession of harvested game to determine whether these individuals are following the Wildlife Code. Violators can be subjected to citations, fines and potentially even arrest. Historically, Conservation agents have worked with an information disadvantage when performing these field checks. Hunting and fishing often take place in remote areas of the state out of cell phone coverage and, at times, even out of portable radio coverage. Agents had limited access to a person s record of TeleChecks, permits, or arrests when conducting a field check. Violators could fabricate stories which the Agent would have to investigate by leaving the area of the field check, going home or to a location where they could radio or call in information to investigate a potential violator s story. This left potential violators with ample time to tamper with evidence or influence testimony. After evaluating several options, the Missouri Department of Conservation determined that it was possible to leverage both existing information systems and deployed agent smart phones to deliver up to date information on permits, TeleChecks, and arrest records to agents that they could access during a field check even when they were not in cell phone coverage. An application developed by Huber & Associates Inc. was downloaded to each agent s smart phone via micro SD storage card that allowed them to access past and present permits, violations and arrest records. The application was developed to be carrier agnostic. IT would synch data when in cell phone coverage and cache that data on the agent s smart phone to be accessible when out of cell phone coverage. The result is an easy to use application that reduces field checks from 40 minutes per check to 3 minutes a savings in time equal to one agent position per year. This savings in time alone means that the $118,775 investment in development of the application will be returned in a little over 1 year. The immediate intangible result is that now agents are able to investigate field checks on site in remote locations closing the gap in time for evidence tampering as well as protecting the safety of agents with vital information about violators in the first moments of a field check.
3 C. Description of the Business Problem and Solution The problem facing Conservation agents in Missouri was how to gain instant access to information regarding permits, TeleCheck and arrest records while performing field checks in remote areas of Missouri. These field checks often required agents to walk into a camp of armed hunters in forested valleys miles from cell phone or radio coverage. Agents required arrest information in order to quickly determine personal safety issues when engaging potential violators. Furthermore, they needed access to enough information to be able to perform an investigation on site so that violators would not be permitted time to tamper with or destroy evidence of illegal wildlife harvest. Information on permits, TeleChecks and arrest records was already available to agents. However, some of this data was accessed via legacy desktop applications and other data was accessible via web applications. While a smart phone was capable of accessing all of this information while in broadband cell phone coverage, the information was not located in one application or database and none of it could be accessed when the agent was in a remote location and out of coverage. Agents already were being issued smart phones to cover a growing need for technology in their work. Smart phones cover an agents need for cameras to capture evidence during an investigation, communication via phone, or instant message, and network connectivity for their work computer (because of their remote work, many agents work out of their homes in rural locations). However, agents are law enforcement officers and, as such, needed any use of their smart phone to be as intuitive and quick as possible. Forcing an agent to search through several applications, figure out how an application worked, or forcing them to walk to a new location with an armed potential violator to get cell phone coverage endangered an agent s safety and control of the situation. The remote nature of field checks ruled out the possibility of building a smart phone or web application that would access permit, TeleCheck and arrest records from a central location. The data and application would have to reside on the phone. Because the data could change by tens of thousands of records per day, the phone would have to have a method by which it could update the data when in cell phone coverage. In addition, this data would have to be secured so that personal information of Missouri permit holders was not endangered should an agent s phone be lost or stolen. The sheer size of the data the phone would have to hold provided its own challenge. Records for any permit, TeleCheck and arrest record in Missouri will not only be kept on the phone for the current year, but for three years or more. This results in a set of databases with over 8 million records weighing in at over five gigabytes.
4 A final challenge involves battery life and broadband billing of the smart phone. If the phone attempted to synch data too frequently, the attempts would seriously shorten battery life. In addition, if data were synched inefficiently, agent phones would overrun their allotted data transfer plan and the Department of Conservation could be charged significant overage fees. The need for a flexible method of deploying the application to select phones as well as the need to work with existing smart phones used for tethered network connection across several cell phone vendors ruled out the use of the ios (Apple OS) as a smart phone application platform. The need for a native SQL database with the capacity to manage large data sets on the handheld device further reduced application frameworks to the Windows 6.5 Mobile OS. The data required for this application already existed in legacy systems or central office web applications. However, it was not viewable in one location. The best solution to leverage this resource was to develop a set of secure web services that could access this data, determine what new records would need to be sent to individual phones and then develop a smart phone application that could securely access these services and store the data. With OS and limited set of devices selected, work was ready to begin on the application. Huber & Associates, Inc. was engaged to develop the smart phone application. The vendor demonstrated a history of working within the Windows 6.5 mobile environment and proposed an innovative solution for dealing with the large data set to be managed on the phone that solution being the management of the data over roughly 70 separate databases on the smart phone. The application was developed with key features designed to meet the challenges presented. Agents have an option to monitor data set total size and remove older records should the need arise in future years. Otherwise, the agent is free to keep as many years worth of data as needed. Individual agents also are able to personalize the synch behavior of the phone so that power consumption is maximized and tailored to the daily habits of the agent as their work changes throughout the year. The application and initial data is deployed to the agent s existing smart phone via a micro SD storage card. Data on this card is encrypted to the phone so that data on the card cannot be read on any computer or other phone that does not have the application installed. In addition, each phone s access is pass-coded by policy so that only the agent can access the phone and application via their unique code. Further, each phone and card can be wiped via Microsoft Exchange should the phone be lost or stolen. Lost and stolen phones also can be flagged in the central web services to be wiped should a rogue application attempt to synch data.
5 During the development of the application, a further refinement of the agency s smart phone replacement strategy reduced the current small number of smart phone devices to one Motorola model that all major cell phone carriers supported and which would support the Windows Mobile 6.5 framework for additional years as Microsoft moves to Windows 7 Mobile. This shift in the device strategy by the agency with the existing application development strategy resulted in an application/device solution that is carrier agnostic. Development of the application was contracted, but with one caveat. The contractor was required to develop using an agile process with development sprints of roughly two weeks. Agents and agency IT staff would be involved in a two week review of the features of the application that had been developed thus far. This agile process ensured that agents could provide input on the look and function of the application. IT staff could provide feedback on how the application performed both in terms of network function and utilization of the phone s capabilities. The result was a product that was intuitive to agents and which conformed to the agency s IT needs. Work began on the application in May of 2010 with an initial group of agents reviewing iterations of the application in June of The finalized application was deployed to all agents in October of 2010 just prior to the opening of fall hunting seasons. The application was installed via micro SD cards to smart phones that had been distributed from June 2009 to June The project continues to be in service (8 months in full production with a 4 month pilot and development phase). D. Significance of the Project The Missouri Department of Conservation was the first agency in the state of Missouri to produce a smart phone application that performed its tasks even when not in cell phone coverage. Our review of the industry indicates that this may potentially be the only application of its kind in terms of size of data and capacity to synch when in cell phone coverage. This project aligned with the agency s IT strategic area of focus to promote access of our information to our staff Anywhere/Anytime. It also aligned with state priorities to improve access to data for decision making. The significant improvement from this project is that the application reduced an agent s time spent performing a field check from an average of 40 minutes to an average of 3 minutes. In addition, an agent s ability to validate a hunter or angler s story against a permit, TeleCheck or arrest record database increased an agent s ability to quickly investigate and resolve an issue. The application leveraged existing data sets and existing smart phones. Further, as smart phone replacement strategy was refined, application development aligned for a better overall product.
6 The development of the application was done in an agile process. This meant that, within weeks of the application bid being awarded, agents could begin evaluating aspects of the application and providing feedback as the application developed. The end result is that by the time the application was complete, agents were already familiar with the product because they had been involved in the project. This agile process also produced a product that is intuitive a feature that helps preserve agent s safety as they use the product in field checks. E. Benefit of the Project Initial benefits were realized in the pilot phase as the application was being developed. As early as July, agents were able to perform investigations with the data they were provided. This is because the first goal of the application was to deliver actual data with additional query and synching capabilities being added throughout the summer and fall. Although the metric for this benefit was verbal feedback by the agents in the two week reviews, the benefit was pronounced. Agents reported field checks where an angler, for example, had initially stated that he was unaware he had to buy a particular type of annual stamp. When the agent was able to immediately pull up a permit purchase history, the agent found that the angler had regularly purchased annual stamps until the current year. When presented with this evidence, the angler admitted that he knew this and, was caught. The smart phone application dramatically improved information support to agents in the field. In the past, agents would either have to leave the field to investigate an issue at home or in a regional office, or, if they were in radio or cell phone coverage, call in to a regional office where they would verbally relay information to a clerk who would key the information into the existing systems and verbally relay the information back to the agent. This process was time consuming and often limited what questions an agent might ask due to this time constraint. In addition, this process could only be done during the regular workweek when a clerk was available to answer the radio or phone. The smart phone application could provide more timely information and provide it 24 hours a day, 7 days a week. The ready access to the information as well as the constant agent input during the development of the application resulted in agents being very supportive of the new application. Because they had been involved during the development, they understood the application and could even help other agents as the fall and winter seasons required increased used of the application. The intuitive interface means that agents in training will have an easier time learning to use this tool for field checks. This project provided an additional benefit in that data that the agency already managed was now made available to agents where and when they needed it most the remote
7 areas of Missouri where violations often occur. This benefit aligns with the NASCIO 2011 state CIO priority of, enhancing the role of data, information / intelligence, [and] knowledge management. Although this application did not replace existing applications, it did offer a new mechanism by which to access the data managed by these older applications. As such, it provided legacy application modernization (another NASCIO state CIO priority). The main metric of measure for benefit was time spent doing a field check. Agents were surveyed on their use of the smart phone application. The results found that, on average, agents used the application 25 times through the 2010 fall and winter season. With 172 agents, this amounted to 4250 uses in total for the season. With an average difference in a field check of approximately 36 minutes, time saved by the smart phone application in field checks alone totaled over 2500 hours essentially the FTE of an agent, and then some. With salary and benefits calculated to time (and when including a rough approximation of clerk time saved with no need to call or radio to obtain this information), the savings total a little over $111,000. The application thus almost paid for itself throughout the pilot and winter hunter seasons (approximately 9 months). With the replacement strategy for Windows 6.5 phones projecting a stable platform for the next 3 years, this application will easily provide a return on investment and will lay the groundwork for additional mobile applications for use in the management of fish, forest and wildlife. The agent smart phone application developed for the Missouri Department of Conservation demonstrates how mobile technology can deliver regulatory data into the field where law enforcement requires it. This development can be outsourced while still maintaining control and vision of the final product. Such development can be aligned with business and IT strategic goals to produce a product that is cost effective and which provides another tool for Missouri Conservation Agents. The primary emphasis of the application was to put additional information into the hands of Missouri s Conservation Agents to help reduce the number of wildlife code violations and to help prevent hunters and anglers from cheating the system. The end result is an enhanced enforcement of the state s wildlife code as well as an additional deterrent to keep folks honest. While it is safe to say that we will easily get a return on our investment very quickly, it is perhaps more important to say that through this technology and new application we are in an even better position to protect the priceless wildlife and fish resources of the State of Missouri.
A guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
More informationDEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment
More informationMI Building Intelligence System (MI-BIS) Information Communication Technology (ICT) Innovations
Title: Category: State: MI Building Intelligence System (MI-BIS) Information Communication Technology (ICT) Innovations Michigan Contact Information: Keith Paasch Director, Building Operations Michigan
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationRetail Industry Executive Summary
Mobile Business Intelligence: Better Decisions Anywhere You Do Business Retail Industry Executive Summary Business Intelligence (BI) and Mobility Applications are top priorities for today s retail business.
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More information2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky
2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative Improving State Operations: Kentucky Kevin Moore 6/1/2011 Executive Summary: Accounts Payable was a time consuming, inefficient
More informationMobile Application Management. www.wipro.com. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions
Mobile Application Management www.wipro.com Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions Table of contents 03... Mobile Application Management (MAM): Reduce
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationDell Wyse Cloud Connect discussion card
Dell Wyse Cloud Connect discussion card What is Cloud Connect? Cloud Connect is a portable enterprise IT-controlled HDMI/MHL (mobile high-definition link) cloud device that allows people to convert a capable
More informationIBM Cloud Services How IBM is shortening the gap between customers and development value. Written by: Allan Krans Senior Software and Cloud Analyst
IBM Cloud Services How IBM is shortening the gap between customers and development value Written by: Allan Krans Senior Software and Cloud Analyst Winter 2011 Development and test is optimally suited for
More informationAgile ETRM from Allegro
Agile ETRM from Allegro Allegro energy trading and risk management software delivers the fastest realization of business objectives and greatest flexibility with minimal risk and disruption to our customers
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationHuman Services Decision Support System Data and Knowledge Management
Title: Category: State: Human Services Decision Support System Data and Knowledge Management Michigan Contact Information: Jim Hogan Information Officer Michigan Department of Technology, Management and
More informationOPTIMIZE ENTERPRISE ASSET MANAGEMENT WITH MOBILE
OPTIMIZE ENTERPRISE ASSET MANAGEMENT WITH MOBILE Extend Innovation to the Edge of the Enterprise 919-835-0810 www.prometheusgroup.com OVERVIEW Mobility has already established its place in many workplaces
More informationThe Bring Your Own Device Era:
The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era
More informationGravel Company More Profitable with New Fleet Management Solution
Gravel Company More Profitable with New Fleet Management Solution Overview Country or Region: United States Industry: Construction Customer Profile West Coast Sand and Gravel is based in Los Angeles, California
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationBYOD Policy Implementation Guide. February 2016 March 2016
BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...
More informationGETS AIRWATCH MDM HANDBOOK
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
More informationMigrating to a Managed Service Model through Automation
Migrating to a Managed Service Model through Automation The IT landscape is constantly changing, impacted by many factors from innovations by technology vendors, to a more disparate and global workforce
More informationReach more users with business intelligence
Reach more users with business intelligence Highlights Deliver BI information to users in the context of their day-to-day processes and applications Provide actionable intelligence to users, no matter
More informationWithout the need to purchase hardware, software licenses, or implementation services, an organization can deploy cloud computing rapidly.
This paper seeks to help in that process. It provides a high-level overview of cloud computing models (discussed previously), outlines some of the important benefits it could deliver to higher education,
More informationHow to Choose and Deploy a Transformative BI Solution: The Irish Life Story
How to Choose and Deploy a Transformative BI Solution: The Irish Life Story Author: Ellie Fields Senior Director, Product Marketing, Tableau Software November 2012 p2 With 31 billion Euro under management,
More informationWhite Paper. Bridging the essential gap between Mobile Cloud and crowd based testing. 1. Introduction. 2. Testing Lifecycle
White Paper Bridging the essential gap between Mobile Cloud and crowd based testing 1. Introduction 2. Testing Lifecycle a. Testing typologies (Functional, Usability) b. Functional Testing: Manual
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationOntheGo (OtG) Mobile Payments
NASCIO 2014 State IT Recognition Awards Nomination OntheGo (OtG) Mobile Payments Category: Improving State Operations Contact: Bill Farnsworth Office of the CIO 650 W. State St., Room 100 / P.O. Box 83720
More informationA GIS manager s dialogue: Is your business semi-integrated or fully system integrated? Enterprise GIS System Integration
Enterprise GIS System Integration 1 We the GIS Manager: Statement - Enterprise GIS is required to integrate across the business needs of the organization and our clients. Questions: Why integrate Who integrates
More informationMobilizing Enterprise Data. By Alex Zaltsman, CEO InnoviMobile
Mobilizing Enterprise Data By Alex Zaltsman, CEO InnoviMobile Contents Mobile Integration Plan 2 Adoption Formula Plan for integrating Components and Stakeholders Identify Staffing Requirements Identify
More informationIntegrating the customer experience through unifying software - The Microsoft Vision
VAASAETT - RESPOND 2010 Integrating the customer experience through unifying software - The Microsoft Vision Principal Author Andreas Berthold- van der Molen, Microsoft EMEA Contents The New Energy Ecosystem
More informationBlackBerry Enterprise Server Application Push FAQ
BlackBerry Enterprise Server Application Push FAQ We have a custom BlackBerry application that is dependent on certain versions of the BlackBerry OS. Can we use an IT Policy to install the application
More informationTURN YOUR COMPANY S GOALS INTO AN ACTIONABLE PLAN
TURN YOUR COMPANY S GOALS INTO AN ACTIONABLE PLAN MOTOROLA PROFESSIONAL SERVICES FOR TRANSPORTATION AND LOGISTICS OPERATIONS THE CHALLENGE CONFLICTING NEEDS. CHANGING TECHNOLOGIES. COMPLEX SOLUTIONS. Whether
More informationBEST PRACTICES FOR A COLLECTION OF AN IOS MOBILE DEVICE
BEST PRACTICES FOR A COLLECTION OF AN IOS MOBILE DEVICE by Richard A. Rodney As the use of ios devices continues to proliferate in the business space, they present some unique challenges when data must
More informationUnicenter Asset Intelligence r11
Unicenter Asset Intelligence r11 Key Features at a Glance Comprehensive Out of the Box Business Relevant Answers Complete and Accurate IT Asset Information Real-Time Analysis Risk Alerting Compliance Utilization
More informationMobile Device Management
Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national
More informationMobility Advantage: Becoming an Unwired Enterprise
white paper Mobility Advantage: Becoming an Unwired Enterprise Business mobility means competitive advantage. Is your business ready to be a mobile enterprise? www.sybase.com TABLE OF Contents 1 What Is
More informationHow To Protect Your Network From Attack From A Cyber Threat
Targeting Improved Cyber Security Three Common Ways Electric Utilities Can Improve Their Cyber Security. By Power System Engineering, Inc. (PSE) Many managers understand the importance of strong cyber
More informationMobile Highway Construction App. Improving State Operations. Contact: Phil Tomassini, CIO. Pennsylvania Department of Transportation.
Mobile Highway Construction App Improving State Operations Contact: Phil Tomassini, CIO Pennsylvania Department of Transportation 400 North Street Harrisburg, PA 17105 717-783-2026 ptomassini@pa.gov Project
More informationCalculating ROI on your Colligo Investment
Calculating ROI on your Colligo Investment Calculating ROI on your Colligo Investment A guide to evaluating enterprise email management and secure mobile access for SharePoint The decision to purchase
More informationCloud Computing in Higher Education: A Guide to Evaluation and Adoption
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive
More informationTechnology Insight Series
HP s Information Supply Chain Optimizing Information, Data and Storage for Business Value John Webster August, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights
More informationToday s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.
Securing Business Mobility Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices Your Device Here. Good supports hundreds of
More informationProviding a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationRemote MasterMind 3.0. Mobile Device & Bar Code Scanner Management Solution
3.0 Mobile Device & Bar Code Scanner Management Solution is Honeywell s 3.0 You have mobility and bar code scanning devices in locations all across your enterprise. They are constantly on the move or situated
More informationSample Exam Foundation Level Syllabus. Mobile Tester
Sample Exam Foundation Level Syllabus Mobile Tester September 2015 American Software Testing Qualifications Board Sample Exam Foundation Level Syllabus Mobile Tester MOB-1.2.1 (K2) Explain the expectations
More informationAragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World
Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile
More informationApplication Outsourcing: The management challenge
White Paper Application Outsourcing: The management challenge Embedding software quality management for mutual benefit Many large organizations that rely on mainframe applications outsource the management
More informationTurn Your Business Vision into Reality with Microsoft Dynamics NAV
Turn Your Business Vision into Reality with Microsoft Dynamics NAV You have worked hard to build a vision for your business. With Microsoft Dynamics NAV, you can turn that vision into reality with a solution
More informationThe Shortest Path from Possibility to Production
MultiConnect OCG Open Communications Gateways The Shortest Path from Possibility to Production 40 years and 20 million devices, Multi-Tech is a world leader in providing complete M2M Solutions Developer
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationMobile Test Strategy. Shankar Garg. Senior Consultant - Testing
Mobile Test Strategy Shankar Garg Senior Consultant - Testing Scope of Mobile Testing Why Quality is important Challenges in Mobile Testing Best Practices for Mobile Test Strategy Mobile Testing Tools
More informationSOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term?
SOLUTION BRIEF June 2014 How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF While bring your own device (BYOD) and physician texting are hot
More informationHow To Understand The Power Of Cloud Computing
C O V E R S T O R Y THINKSTOCK www.financialexecutives.org december 2010 financial executive 1 By Mark A. Goodburn and Steve Hill The cloud has reached an important inflection point that is impacting corporate
More informationWindows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationSuccessful Implementation of Enterprise-Wide Information Governance
Successful Implementation of Enterprise-Wide Information Governance ARMA Austin Monthly Meeting November 13, 2014 TAD C. HOWINGTON, CRM, FAI Manager, E- Records and Information Governance Kinder- Morgan
More information2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy
2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality
More informationThe following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationTurn Your Business Vision into Reality with Microsoft Dynamics NAV
Turn Your Business Vision into Reality with Microsoft Dynamics NAV You have worked hard to build a vision for your business. With Microsoft Dynamics NAV, you can turn that vision into reality with a solution
More informationAGILE SOFTWARE TESTING
AGILE SOFTWARE TESTING Business environments continue to rapidly evolve, leaving many IT organizations struggling to keep up. This need for speed has led to an increased interest in the Agile software
More informationStrategic Procurement Services
Strategic Procurement Services Copyright 2013 by Levine, Blaszak, Block & Boothby, LLP and TechCaliber Consulting, LLC. All rights reserved. We have un-paralleled experience running strategic telecom procurements
More informationMANAGEMENT SUMMARY INTRODUCTION KEY MESSAGES. Written by: Michael Azoff. Published June 2015, Ovum
App user analytics and performance monitoring for the business, development, and operations teams CA Mobile App Analytics for endto-end visibility CA Mobile App Analytics WWW.OVUM.COM Written by: Michael
More informationIncrease visibility, control and performance of field resources in the Utilities Industry
Increase visibility, control and performance of field resources in the Utilities Industry Using low cost mobile phone technology to empower the utility workforce and enhance operational effectiveness.
More informationThe Cellular Development Platform: The Shortest Path from Possibility to Production
The Cellular Development Platform: The Shortest Path from Possibility to Production 40 years and 20 million devices, Multi-Tech is a world leader in providing complete M2M Solutions Developer Communities
More informationThe Basics of Scrum An introduction to the framework
The Basics of Scrum An introduction to the framework Introduction Scrum, the most widely practiced Agile process, has been successfully used in software development for the last 20 years. While Scrum has
More informationVodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationHTML5 : carrier grade
HTML5 : carrier grade Alex Rutgers / CTO@Momac / February 2013. Introduction Since HTML5 became mainstream media around April 2010 and I decided to create an overview article on HTML5 in the mobile space,
More informationMobile Device Management
Mobile Device Management Real World Lessons Jim Darrow Ilitch Holdings, Inc. Ilitch Holdings, Inc / Ilitch Companies Just you basic Mom and Pop Business Provide Shared services and consulting Technical
More informationAvanade Point of View. Getting it right with a project and portfolio management solution
Avanade Point of View Getting it right with a project and portfolio management solution Better control, higher value Orchestrating a portfolio of projects, and the resources for execution, challenges leaders
More informationState of Iowa. Iowa School Alerts Program. Nomination for Information Communications Technology (ICT) Innovations Category
State of Iowa Iowa School Alerts Program Nomination for Information Communications Technology (ICT) Innovations Category Iowa School Alerts Program Executive Summary Iowa School Alerts is a web based application
More informationCRM in the World of Buyer 2.0
CRM in the World of Buyer 2.0 CRM in the World of Buyer 2.0 Professional selling has never been more challenging. A confluence of factors has created a sales environment that is faster paced and more complex
More informationARE YOU READY FOR THESE TECHNOLOGY ENHANCEMENTS?
tech line / nov 2014 SMS VISUAL IVR MOBILE DEVICES VOICE BIOMETRICS VIDEO ARE YOU READY FOR THESE TECHNOLOGY ENHANCEMENTS? 5 cutting-edge contact center technologies that are moving beyond early adopters.
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationBusiness Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement
white paper Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement»» Summary For business intelligence analysts the era
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
More informationMobile Technique and Features
Smart evision International, Inc. Mobile Technique and Features Smart evision White Paper Prepared By: Martin Hu Last Update: Oct 16, 2013 2013 1 P a g e Overview Mobile Business intelligence extends and
More informationIs Your Mobile Application Ready For Business?
Is Your Mobile Application Ready For Business? It is clear that mobile technologies will transform the enterprise. The simple math is that if information and communications are available at any place and
More informationNational Association of State Foresters Forestry Performance Measures for the United States REQUEST FOR PROPOSALS (RFP)
National Association of State Foresters Forestry Performance Measures for the United States REQUEST FOR PROPOSALS (RFP) Request for Proposals Date: January 19, 2015 Proposal Submission Deadline: 5:00 pm
More informationj.b. NO. 2S1(~ A BILL FOR AN ACT
j.b. NO. 2S1(~ A BILL FOR AN ACT RELATING TO PREDATORS. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: 1 SECTION 1. Section 183D-l, Hawaii Revised Statutes, is 2 amended by amending the definition
More informationTHE STRATEGIC ROLE OF IT IS RISING
ABSTRACT As competitive pressures mount and technological advances accelerate, telecom operators increasing rely on IT for operational efficiency as well as strategic differentiation. Yet research by Oliver
More informationTechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security
Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring
More informationIMPLEMENTING YOUR BYOD MOBILITY STRATEGY
IMPLEMENTING YOUR BYOD MOBILITY STRATEGY An IT Checklist and Guide 1.0 Overview In early 2013 Dell Quest Software announced the results of a global survey of IT executives that was conducted to gauge the
More informationON Semiconductor identified the following critical needs for its solution:
Microsoft Business Intelligence Microsoft Office Business Scorecards Accelerator Case study Harnesses the Power of Business Intelligence to Drive Success Execution excellence is an imperative in order
More informationMobile Usability Testing your website in the real world
Best Practices Guide Mobile Usability Testing your website in the real world oho.com 617 499 4900 @ohointeractive With more and more people regularly accessing the Internet from hand-held devices, websites
More informationHow the Limited Entry Hunting (LEH) system works
How the Limited Entry Hunting (LEH) system works Except for submitting an application and receiving an authorization, most hunters are not aware of many aspects of the LEH system. Here s an overview of
More informationVirtualizing Small Cell Performance Monitoring Applying best practices for Carrier Ethernet/IP service assurance to microcell backhaul networks
White Paper - Virtualizing Small Cell Performance Monitoring Virtualizing Small Cell Performance Monitoring Applying best practices for Carrier Ethernet/IP service assurance to microcell backhaul networks
More informationImplementing Hybrid Cloud at Microsoft
Implementing Hybrid Cloud at Microsoft Published September 2013 The following content may no longer reflect Microsoft s current position or infrastructure. This content should be viewed as reference documentation
More informationDreamFactory Security Whitepaper Customer Information about Privacy and Security
DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory
More information"It's a Phone First! How to Test Your Five-star Mobile Apps"
BW4 Concurrent Session 11/7/2012 10:15 AM "It's a Phone First! How to Test Your Five-star Mobile Apps" Presented by: Will Hurley Quality and Security Services Brought to you by: 340 Corporate Way, Suite
More informationBig Data & the Cloud: The Sum Is Greater Than the Parts
E-PAPER March 2014 Big Data & the Cloud: The Sum Is Greater Than the Parts Learn how to accelerate your move to the cloud and use big data to discover new hidden value for your business and your users.
More informationEmpower the Workforce With BYOD and Collaboration 5 propose
Empower the Workforce with BYOD and Collaboration Cloud-Based Unified Communications Enhances BYOD Strategies January 2014 Prepared by: Zeus Kerravala Empower the Workforce with BYOD and Collaboration
More informationHow to Choose and Deploy a Transformative BI Solution: The Irish Life Story
How to Choose and Deploy a Transformative BI Solution: The Irish Life Story Author: Ellie Fields Senior Director, Product Marketing, Tableau Software November 2012 p2 With 31 billion Euro under management,
More informationWhen Enterprise Content Goes Mobile
When Enterprise Content Goes Mobile How OpenText Tempo Reinforces Information Governance in the Cloud Geoffrey E. Bock, Principal April 2012 How OpenText Tempo Reinforces Information Governance in the
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationThere are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.
There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand
More informationQUICK FACTS. Managing a Service Operations Team for a Leading Software Developer. TEKsystems Global Services Customer Success Stories.
Providing an IT Education Business Processing [ Information Technology, Applications Management ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Software Revenue: $74.3 billion
More informationExecutive Summary. MOBI PResents:
MOBI PResents: EXPERT TIPS TO UNDERSTAND AND REDUCE MOBILE DEVICE TOTAL COST OF OWNERSHIP Executive Summary As enterprise mobility continues to grow both in popularity as well as complexity, more organizations
More information