630 likes | 1.43k Views
Chapter Seven Overview. SECTION 7.1 - NETWORKS AND TELECOMMUNICATIONSNetwork BasicsVoice over IPNetworking BusinessesIncreasing the Speed of BusinessSecuring Business NetworksSECTION 7.2 - MOBILE TECHNOLOGYBusiness Drivers for a Mobile WorkforceUsing Cellular Technologies in BusinessUsing S
E N D
1. CHAPTER 7
NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY Networks and telecommunications are the transmission of signals over a distance for the purpose of communication. In modern times, this process almost always involves the sending of electromagnetic waves by electronic transmitters but in earlier years it may have involved the use of smoke signals, drums or semaphore. Today, network and telecommunication is widespread and devices that assist the process such as the television, radio and telephone are common in many parts of the world. There is also a vast array of networks that connect these devices, including computer networks, public telephone networks, radio networks and television networks. Computer communication across the Internet, such as email and instant messaging, is just one of many examples of telecommunication. Networks and telecommunications are the transmission of signals over a distance for the purpose of communication. In modern times, this process almost always involves the sending of electromagnetic waves by electronic transmitters but in earlier years it may have involved the use of smoke signals, drums or semaphore. Today, network and telecommunication is widespread and devices that assist the process such as the television, radio and telephone are common in many parts of the world. There is also a vast array of networks that connect these devices, including computer networks, public telephone networks, radio networks and television networks. Computer communication across the Internet, such as email and instant messaging, is just one of many examples of telecommunication.
2. Chapter Seven Overview SECTION 7.1 - NETWORKS AND TELECOMMUNICATIONS
Network Basics
Voice over IP
Networking Businesses
Increasing the Speed of Business
Securing Business Networks
SECTION 7.2 - MOBILE TECHNOLOGY
Business Drivers for a Mobile Workforce
Using Cellular Technologies in Business
Using Satellite Technologies in Business
Using Wireless Technologies in Business
Mobile Workforce Trends
3. NETWORKS AND TELECOMMUNICATIONS CLASSROOM OPENER
Start the class by asking students who understands how the Internet works? How does email go from the University of Denver to Boston University? Or how does a web page go from client to server back to client?
Go to http://computer.howstuffworks.com/internet-infrastructure.htm for an overview of how the Internet infrastructure works. There are some great diagrams and easy to understand explanations.
CLASSROOM OPENER
Start the class by asking students who understands how the Internet works? How does email go from the University of Denver to Boston University? Or how does a web page go from client to server back to client?
Go to http://computer.howstuffworks.com/internet-infrastructure.htm for an overview of how the Internet infrastructure works. There are some great diagrams and easy to understand explanations.
4. LEARNING OUTCOMES 7.1 Compare LANs, WANs, and MANs
7.2 Describe the business benefits associated with VoIP
7.3 Explain the difference between a VPN and a VAN 7.1. Compare LANs, WANs, and MANs.
A local area network (LAN) is designed to connect group of computers in close proximity to each other such as in an office building, a school, or a home. A wide area network (WAN) spans a large geographic area, such as a state, province or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metropolitan area networks (MANs). A metropolitan area network (MAN) is a large computer networks usually spanning a city.
7.2 Describe the business benefits associated with VoIP.
VoIP uses existing network and Internet infrastructure to route telephone calls more efficiently and inexpensively than traditional telephone service, VoIP offers businesses significant cost savings, productivity gains and service enhancements.
7.3 Explain the difference between a VPN and a VAN.
A virtual private network (VPN) is a way to use the public telecommunication infrastructure (e.g., Internet) to provide secure access to an organization’s network. A valued-added network (VAN) is a private network, provided by a third party, for exchanging information through a high-capacity connection.
7.1. Compare LANs, WANs, and MANs.
A local area network (LAN) is designed to connect group of computers in close proximity to each other such as in an office building, a school, or a home. A wide area network (WAN) spans a large geographic area, such as a state, province or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metropolitan area networks (MANs). A metropolitan area network (MAN) is a large computer networks usually spanning a city.
7.2 Describe the business benefits associated with VoIP.
VoIP uses existing network and Internet infrastructure to route telephone calls more efficiently and inexpensively than traditional telephone service, VoIP offers businesses significant cost savings, productivity gains and service enhancements.
7.3 Explain the difference between a VPN and a VAN.
A virtual private network (VPN) is a way to use the public telecommunication infrastructure (e.g., Internet) to provide secure access to an organization’s network. A valued-added network (VAN) is a private network, provided by a third party, for exchanging information through a high-capacity connection.
5. LEARNING OUTCOMES 7.4 Identify the advantages and disadvantages of broadband technology
7.5 List and describe many of the network security problems 7.4 Identify the advantages and disadvantages of broadband technology
Digital Subscriber Line (DSL) - Good upload rates, uses existing telephone lines, but speeds vary depending on distance from telephone company's central office and slower downloads than less expensive alternatives. Cable - uses existing cable infrastructure, low-cost equipment, but shared connections can overload system, slowing upload times. TI/T3 Dedicated Line - uses existing phone wiring, but performance drops significantly with range and susceptible to crosstalk. Fiber-to-the-Home (FTTH) - fast data speeds, infrastructure has long life expectancy, low maintenance, low power costs, but not widely available and significant deployment cost (for company). Fixed Wireless - typically inexpensive to install, no underground digging, but weather, topography, buildings, and electronics can cause interference. Satellite - nearly universal coverage, available in otherwise inaccessible area, but expensive service/equipment and upload/download delays.
7.5 List and describe many of the network security problems.
An organization has to be concerned about proper identification of users and authorization of network access, the control of access, and the protection of data integrity. Almost all networks require some kind of logon, including user name and password. Many people are casual with their passwords, making them easy to guess. A good password has both letters and numbers along with a few punctuation marks for added security. Most corporate security goes far beyond passwords such as using a "firewall," a computer that sits between an internal network and the Internet. The firewall allows access to internal data from specified incoming sites but tries to detect unauthorized access attempts and prevent them from occurring.
7.4 Identify the advantages and disadvantages of broadband technology
Digital Subscriber Line (DSL) - Good upload rates, uses existing telephone lines, but speeds vary depending on distance from telephone company's central office and slower downloads than less expensive alternatives. Cable - uses existing cable infrastructure, low-cost equipment, but shared connections can overload system, slowing upload times. TI/T3 Dedicated Line - uses existing phone wiring, but performance drops significantly with range and susceptible to crosstalk. Fiber-to-the-Home (FTTH) - fast data speeds, infrastructure has long life expectancy, low maintenance, low power costs, but not widely available and significant deployment cost (for company). Fixed Wireless - typically inexpensive to install, no underground digging, but weather, topography, buildings, and electronics can cause interference. Satellite - nearly universal coverage, available in otherwise inaccessible area, but expensive service/equipment and upload/download delays.
7.5 List and describe many of the network security problems.
An organization has to be concerned about proper identification of users and authorization of network access, the control of access, and the protection of data integrity. Almost all networks require some kind of logon, including user name and password. Many people are casual with their passwords, making them easy to guess. A good password has both letters and numbers along with a few punctuation marks for added security. Most corporate security goes far beyond passwords such as using a "firewall," a computer that sits between an internal network and the Internet. The firewall allows access to internal data from specified incoming sites but tries to detect unauthorized access attempts and prevent them from occurring.
6. INTRODUCTION Telecommunication system - enable the transmission of data over public or private networks
Network - a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together CLASSROOM OPENER
HowStuffWorks
Start the class by asking students who understands how the Internet works? How does email go from the University of Denver to Boston University? Or how does a web page go from client to server back to client?
Go to http://computer.howstuffworks.com/internet-infrastructure.htm for an overview of how the Internet infrastructure works. There are some great diagrams and easy to understand explanations.
CLASSROOM OPENER
HowStuffWorks
Start the class by asking students who understands how the Internet works? How does email go from the University of Denver to Boston University? Or how does a web page go from client to server back to client?
Go to http://computer.howstuffworks.com/internet-infrastructure.htm for an overview of how the Internet infrastructure works. There are some great diagrams and easy to understand explanations.
7. NETWORK BASICS Local area network (LAN) - is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home.
Wide area network (WAN) - spans a large geographic area, such as a state, province, or country
Metropolitan area network (MAN) - a large computer network usually spanning a city A local area network (LAN) is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games, or other applications. A LAN in turn often connects to other LANs, and to the Internet or wide area networks.
A wide area network (WAN) spans a large geographic area, such as a state, province, or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metropolitan area networks (MANs). The world’s most popular WAN is the Internet.
A metropolitan area network (MAN) is a large computer network usually spanning a city.A local area network (LAN) is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games, or other applications. A LAN in turn often connects to other LANs, and to the Internet or wide area networks.
A wide area network (WAN) spans a large geographic area, such as a state, province, or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metropolitan area networks (MANs). The world’s most popular WAN is the Internet.
A metropolitan area network (MAN) is a large computer network usually spanning a city.
8. Using Networks and Telecommunications For Business Advantages Network and telecommunication competitive advantages include:
Voice over IP
Networking businesses
Increasing the speed of business
Securing business networks
The SABRE airline reservation system is a classic example of a strategic information system that depends upon communication provided through a network. SABRE Airline Solutions pioneered technological advances for the industry in areas such as revenue management, pricing, flight scheduling, cargo, flight operations and crew scheduling. In addition, not only did SABRE help invent e-commerce (now referred to as ebusiness) for the travel industry, the company holds claim to progressive solutions that defined — and continue to revolutionize — the travel and transportation marketplace. The SABRE airline reservation system is a classic example of a strategic information system that depends upon communication provided through a network. SABRE Airline Solutions pioneered technological advances for the industry in areas such as revenue management, pricing, flight scheduling, cargo, flight operations and crew scheduling. In addition, not only did SABRE help invent e-commerce (now referred to as ebusiness) for the travel industry, the company holds claim to progressive solutions that defined — and continue to revolutionize — the travel and transportation marketplace.
9. VOICE OVER IP (VoIP) Voice over IP (VoIP) - uses TCP/IP technology to transmit voice calls over long-distance telephone lines
Numerous vendors offer VoIP services; however, the service works differently depending on the vendor’s IT infrastructure
The start-up Skype pairs P2P (peer-to-peer) technology with a PC’s sound card to create a voice service, which the user can use to call other Skype users
Vonage lets the user place calls to any person who has a mobile or landline (regular telephone) number
Vonage sends the call over a cable via a digital-to-analog converter
A few providers even offer an adapter for a traditional handset that plugs into a broadband modem
All of these vendors are providing VoIP, but the service and its features can vary significantly
Unfortunately, VoIP routes calls through the same paths used by network and Internet traffic, therefore it has the same vulnerabilities and is subject to the same Internet threats. Much like data, VoIP traffic can be intercepted, captured or modified. Any threat that slows down or degrades service even slightly will disrupt business. As a result, VoIP traffic must be secured.
Numerous vendors offer VoIP services; however, the service works differently depending on the vendor’s IT infrastructure
The start-up Skype pairs P2P (peer-to-peer) technology with a PC’s sound card to create a voice service, which the user can use to call other Skype users
Vonage lets the user place calls to any person who has a mobile or landline (regular telephone) number
Vonage sends the call over a cable via a digital-to-analog converter
A few providers even offer an adapter for a traditional handset that plugs into a broadband modem
All of these vendors are providing VoIP, but the service and its features can vary significantly
Unfortunately, VoIP routes calls through the same paths used by network and Internet traffic, therefore it has the same vulnerabilities and is subject to the same Internet threats. Much like data, VoIP traffic can be intercepted, captured or modified. Any threat that slows down or degrades service even slightly will disrupt business. As a result, VoIP traffic must be secured.
10. VOICE OVER IP (VoIP)
11. NETWORKING BUSINESSES Industry-leading companies have developed Internet-based products and services to handle many aspects of customer and supplier interactions
Customers now expect seamless retailing between online and in-store
Some companies, such as Best Buy, Circuit City, Office Depot, and Sears, already have their physical and online stores integrated. These companies have been the fast movers because they already had an area in their stores for merchandise pickup (usually for big, bulky items such as TVs and appliances), and because long before the web they had systems and processes in place that facilitated the transfer of a sale from one store to another. To take on the challenge of business integration, an organization needs a secure and reliable network for mission-critical systems.
Some companies, such as Best Buy, Circuit City, Office Depot, and Sears, already have their physical and online stores integrated. These companies have been the fast movers because they already had an area in their stores for merchandise pickup (usually for big, bulky items such as TVs and appliances), and because long before the web they had systems and processes in place that facilitated the transfer of a sale from one store to another. To take on the challenge of business integration, an organization needs a secure and reliable network for mission-critical systems.
12. NETWORKING BUSINESSES
13. NETWORKING BUSINESSES Virtual private network (VPN) - a way to use the public telecommunication infrastructure (e.g., Internet) to provide secure access to an organization’s network
Valued-added network (VAN) - a private network, provided by a third party, for exchanging information through a high capacity connection
Why would a VPN be important to a business?
With security on the rise, keeping electronic records safe is an area of concern for many businessesWhy would a VPN be important to a business?
With security on the rise, keeping electronic records safe is an area of concern for many businesses
14. NETWORKING BUSINESSES
15. INCREASING THE SPEED OF BUSINESS Bandwidth - is the difference between the highest and the lowest frequencies that can be transmitted on a single medium, and it is a measure of the medium's capacity
Broadband - refers to high-speed Internet connections transmitting data at speeds greater than 200 kilobytes per second (Kbps) To transmit one page of text over a 128,000 bps (128 kbps) DSL line would take only four-tenths of a second. Graphics require approximately one million bits for one page. This would require about 8 seconds over a 128 kbps DSL line. Full-motion video transmission requires the enormous bandwidth of 12 million bps, and thus data compression techniques must be employed to be able to send video over the existing telephone network. The bandwidth determines what types of communication — voice, data, graphics, full-motion video — can reasonably be transmitted over a particular medium. To transmit one page of text over a 128,000 bps (128 kbps) DSL line would take only four-tenths of a second. Graphics require approximately one million bits for one page. This would require about 8 seconds over a 128 kbps DSL line. Full-motion video transmission requires the enormous bandwidth of 12 million bps, and thus data compression techniques must be employed to be able to send video over the existing telephone network. The bandwidth determines what types of communication — voice, data, graphics, full-motion video — can reasonably be transmitted over a particular medium.
16. INCREASING THE SPEED OF BUSINESS
17. INCREASING THE SPEED OF BUSINESS
18. INCREASING THE SPEED OF BUSINESS
19. SECURING BUSINESS NETWORKS There have been many network security problems - networks are a tempting target for mischief and fraud
An organization has to be concerned about…
Proper identification of users and authorization of network access
The control of access, and the protection of data integrity An organization has to be concerned about proper identification of users and authorization of network access, the control of access, and the protection of data integrity. Almost all networks require some kind of logon, including user name and password. Many people are casual with their passwords, making them easy to guess. A good password has both letters and numbers along with a few punctuation marks for added security. Most corporate security goes far beyond passwords such as using a "firewall," a computer that sits between an internal network and the Internet. The firewall allows access to internal data from specified incoming sites but tries to detect unauthorized access attempts and prevent them from occurring.
An organization has to be concerned about proper identification of users and authorization of network access, the control of access, and the protection of data integrity. Almost all networks require some kind of logon, including user name and password. Many people are casual with their passwords, making them easy to guess. A good password has both letters and numbers along with a few punctuation marks for added security. Most corporate security goes far beyond passwords such as using a "firewall," a computer that sits between an internal network and the Internet. The firewall allows access to internal data from specified incoming sites but tries to detect unauthorized access attempts and prevent them from occurring.
20. Data Sharing Even more important than the sharing of technology resources is the sharing of data
Either a LAN or a WAN permits users on the network to get data (if they are authorized to do so) from other points on the network It is very important, for example, for managers to be able to retrieve overall corporate sales forecasts from corporate databases to use in developing spreadsheets (or any other program used for business analysis) to project future activity.
In order to satisfy customers, automobile dealers need to be able to locate particular vehicle models and colors with specific equipment installed.
Managers at various points in a supply chain need to have accurate, up-to-date data on inventory levels and locations.
Accountants at corporate headquarters need to be able to retrieve summary data on sales and expenses from each of the company's divisional computer centers.
The chief executive officer, using an executive information system, needs to be able to access up-to-the-minute data on business trends from the corporate network.
It is very important, for example, for managers to be able to retrieve overall corporate sales forecasts from corporate databases to use in developing spreadsheets (or any other program used for business analysis) to project future activity.
In order to satisfy customers, automobile dealers need to be able to locate particular vehicle models and colors with specific equipment installed.
Managers at various points in a supply chain need to have accurate, up-to-date data on inventory levels and locations.
Accountants at corporate headquarters need to be able to retrieve summary data on sales and expenses from each of the company's divisional computer centers.
The chief executive officer, using an executive information system, needs to be able to access up-to-the-minute data on business trends from the corporate network.
21. OPENING CASE QUESTIONSThe Ironman How is WTC using telecommunication and network technologies to improve its competitive advantage in the professional sports broadcasting industry?
Describe the different types of network architectures that WTC is using
Explain the role TCP/IP plays in the broadcast of the Ironman Triathlon World Championships 1. How is WTC using telecommunication and network technologies to improve its competitive advantage in the professional sports broadcasting industry?
WTC deployed a WiMAX wireless network across the course. The company used radio frequency identification
(RFID) technology to track each athlete’s progress, and used the WiMAX network’s high bandwidth and geographic reach to transmit high-quality video and stream it over the Internet in near real time. Home viewers and event spectators could view the video and monitor the athletes’ progress by logging on to Ironmanlive.com. Wi-Fi hotspots and an Internet cafe provided convenience access. Staff used wireless technologies to plan and manage the event, enhancing their productivity and the athletes’ well-being.
2. Describe the different types of network architectures the WTC is using.
WTC uses LAN, MAN and WAN architectures supported by wired and wireless technologies.
3. Explain the role TCP/IP plays in the broadcast of the Ironman Triathlon World Championship.
TCP (Transmission Control Protocol) consists of a set of rules, the protocol, that are used with the Internet Protocol, the IP, to send data “in a form of message units” between computers over the Internet. Therefore, TCP/IP makes sure that the information being broadcast is sent and received from the devices (or people) that request it.
1. How is WTC using telecommunication and network technologies to improve its competitive advantage in the professional sports broadcasting industry?
WTC deployed a WiMAX wireless network across the course. The company used radio frequency identification
(RFID) technology to track each athlete’s progress, and used the WiMAX network’s high bandwidth and geographic reach to transmit high-quality video and stream it over the Internet in near real time. Home viewers and event spectators could view the video and monitor the athletes’ progress by logging on to Ironmanlive.com. Wi-Fi hotspots and an Internet cafe provided convenience access. Staff used wireless technologies to plan and manage the event, enhancing their productivity and the athletes’ well-being.
2. Describe the different types of network architectures the WTC is using.
WTC uses LAN, MAN and WAN architectures supported by wired and wireless technologies.
3. Explain the role TCP/IP plays in the broadcast of the Ironman Triathlon World Championship.
TCP (Transmission Control Protocol) consists of a set of rules, the protocol, that are used with the Internet Protocol, the IP, to send data “in a form of message units” between computers over the Internet. Therefore, TCP/IP makes sure that the information being broadcast is sent and received from the devices (or people) that request it.
22. OPENING CASE QUESTIONSThe Ironman Identify a new telecommunication or network product that TWC could use to improve its operations
What security issues does WTC need to address?
4. Identify a new telecommunication or network product that TWC could use to improve its operations.
TWC could use VoIP for business application integration and mobility. Although not stated in the case, TWC should be using both a VPN and VAN for a secure and reliable IT infrastructure along with the use and protection of a firewall.
5. What security issues does WTC need to address?
WTC has to be concerned about proper identification of users and authorization of network access, the control of access, and the protection of data integrity. WTC must identify users before they are granted access to its network and that access should be appropriate for the given user. Since the majority of access to WTC systems is through wireless communications, WTC should use a VPN, VAN, and firewall to protect itself against unauthorized or malicious access.
4. Identify a new telecommunication or network product that TWC could use to improve its operations.
TWC could use VoIP for business application integration and mobility. Although not stated in the case, TWC should be using both a VPN and VAN for a secure and reliable IT infrastructure along with the use and protection of a firewall.
5. What security issues does WTC need to address?
WTC has to be concerned about proper identification of users and authorization of network access, the control of access, and the protection of data integrity. WTC must identify users before they are granted access to its network and that access should be appropriate for the given user. Since the majority of access to WTC systems is through wireless communications, WTC should use a VPN, VAN, and firewall to protect itself against unauthorized or malicious access.
23. MOBILE TECHNOLOGY
24. LEARNING OUTCOMES 7.6. Explain the business benefits of using wireless technology
7.7. Identify the advantages and disadvantage of deploying cellular technology
7.8. Describe how satellite technology works 7.6 Explain the business benefits of using wireless technology.
Business benefits to using wireless technology include:
Increase productivity
Speed delivery to market
Reduce operating costs
Have universal access to information and applications
Automate business processes
Create user convenience and timeliness
Ability to conduct business 24x7x365
7.7. Identify the advantages and disadvantage of deploying cellular technology
Analog voice service only. 2G - Digital voice service, 9.6 Kbps to 14.4 Kbps data service, enhanced calling features (such as caller ID), no always-on data connection. 3G - superior voice quality, always-on data connection up to 2 Mbps, broadband data services (such as streaming audio and video). 4G - Wi-Fi access networks, always-on data connection 20-100 Mbps, converged data and voice over IP.
7.8 Describe how satellite technology works.
A communications satellite is a big microwave repeater in the sky; it contains one or more transponders that listen to a particular portion of the electromagnetic spectrum, amplifying incoming signals, and retransmitting them back to Earth. A microwave transmitter uses the atmosphere (or outer space) as the transmission medium to send the signal to a microwave receiver. The microwave receiver then either relays the signal to another microwave transmitter or translates the signal to some other form, such as digital impulses.
7.6 Explain the business benefits of using wireless technology.
Business benefits to using wireless technology include:
Increase productivity
Speed delivery to market
Reduce operating costs
Have universal access to information and applications
Automate business processes
Create user convenience and timeliness
Ability to conduct business 24x7x365
7.7. Identify the advantages and disadvantage of deploying cellular technology
Analog voice service only. 2G - Digital voice service, 9.6 Kbps to 14.4 Kbps data service, enhanced calling features (such as caller ID), no always-on data connection. 3G - superior voice quality, always-on data connection up to 2 Mbps, broadband data services (such as streaming audio and video). 4G - Wi-Fi access networks, always-on data connection 20-100 Mbps, converged data and voice over IP.
7.8 Describe how satellite technology works.
A communications satellite is a big microwave repeater in the sky; it contains one or more transponders that listen to a particular portion of the electromagnetic spectrum, amplifying incoming signals, and retransmitting them back to Earth. A microwave transmitter uses the atmosphere (or outer space) as the transmission medium to send the signal to a microwave receiver. The microwave receiver then either relays the signal to another microwave transmitter or translates the signal to some other form, such as digital impulses.
25. LEARNING OUTCOMES 7.9 Explain how LBS, GPS, and GIS help to create business value
7.10 Describe RFID and how it can be used to help make a supply chain more effective
7.11 List and discuss the wireless trends that consumers and businesses can benefit from 7.9 Explain how LBS, GPS, and GIS help to create business value.
LBS, GPS, and GIS help to create business value by providing tools and techniques such as emergency services, navigation services, tracking services, location advertising, and security services.
7.10 Describe RFID and how it can be used to help make a supply chain more effective.
Radio frequency identification (RFID) technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers. Manufacturers improve supply-chain planning and execution by incorporating RFID technologies. By placing RFID tags on cases and pallets shipped from manufacturers to distribution centers, companies would be able to keep close tabs on their shipments. In turn, that would allow distribution centers and its suppliers to streamline their supply chains and ultimately ensure shelves were always fully stocked.
7.11 List and discuss the wireless trends that consumers and businesses can benefit from.
Social Networking Gets Mobilized. Mobility is added to existing Internet business models, services and behaviors, driving traffic for wireless operators. Social networking applications initially are preloaded on many mobile devices sold and later become downloadable.
Mobile TV. Per-view or per-minute pricing for “sneaking,” a consumer tendency to watch key minutes of a sports event or drama while engaged in another activity. Sneaking leads to more regular viewing, and within 3-5 years, mobile TV will become an indispensable service.
Multi-Function Devices Become Cheaper and More Versatile. Intense competition and margin pressure will continue in the handset market, forcing prices of third-generation (3G) handsets below $90 and making them affordable for a wide range of users.
Location-Based Services: GPS is the location technology of choice for the wireless industry. Handset manufacturers will continue to push GPS-enabled handsets as the technology evolves from popular in-car satellite navigation systems to a broadly accepted feature in wireless phones.
Mobile Advertising. Major brands are shifting from basic SMS marketing to more sophisticated multimedia advertising.
Wireless Providers Move into Home Entertainment. Mobile makes headway against fixed broadband operators, who have dominated Internet and cheaper voice service provision in the home. Wi-Fi will remains the primary wireless access technology.
Wireless Security. There is a monumental need to put strong security measures in place. This could be the year that hackers really start paying attention to millions of wireless devices, the growth in mobile data usage and vulnerable points between mobile and fixed networks.
Enterprise Mobility. Corporations switch from phones to mobile computers for transactions, data collection and messaging for a wide variety of employees. Many voice communications processes, such as order placement and delivery notifications, dispatch operations and remote asset monitoring, continue to shift to wireless data to increase information access and field transaction volume across organizations. Many corporations will completely replace their cellular handsets with a combined voice/data device or a data-only device.
7.9 Explain how LBS, GPS, and GIS help to create business value.
LBS, GPS, and GIS help to create business value by providing tools and techniques such as emergency services, navigation services, tracking services, location advertising, and security services.
7.10 Describe RFID and how it can be used to help make a supply chain more effective.
Radio frequency identification (RFID) technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers. Manufacturers improve supply-chain planning and execution by incorporating RFID technologies. By placing RFID tags on cases and pallets shipped from manufacturers to distribution centers, companies would be able to keep close tabs on their shipments. In turn, that would allow distribution centers and its suppliers to streamline their supply chains and ultimately ensure shelves were always fully stocked.
7.11 List and discuss the wireless trends that consumers and businesses can benefit from.
Social Networking Gets Mobilized. Mobility is added to existing Internet business models, services and behaviors, driving traffic for wireless operators. Social networking applications initially are preloaded on many mobile devices sold and later become downloadable.
Mobile TV. Per-view or per-minute pricing for “sneaking,” a consumer tendency to watch key minutes of a sports event or drama while engaged in another activity. Sneaking leads to more regular viewing, and within 3-5 years, mobile TV will become an indispensable service.
Multi-Function Devices Become Cheaper and More Versatile. Intense competition and margin pressure will continue in the handset market, forcing prices of third-generation (3G) handsets below $90 and making them affordable for a wide range of users.
Location-Based Services: GPS is the location technology of choice for the wireless industry. Handset manufacturers will continue to push GPS-enabled handsets as the technology evolves from popular in-car satellite navigation systems to a broadly accepted feature in wireless phones.
Mobile Advertising. Major brands are shifting from basic SMS marketing to more sophisticated multimedia advertising.
Wireless Providers Move into Home Entertainment. Mobile makes headway against fixed broadband operators, who have dominated Internet and cheaper voice service provision in the home. Wi-Fi will remains the primary wireless access technology.
Wireless Security. There is a monumental need to put strong security measures in place. This could be the year that hackers really start paying attention to millions of wireless devices, the growth in mobile data usage and vulnerable points between mobile and fixed networks.
Enterprise Mobility. Corporations switch from phones to mobile computers for transactions, data collection and messaging for a wide variety of employees. Many voice communications processes, such as order placement and delivery notifications, dispatch operations and remote asset monitoring, continue to shift to wireless data to increase information access and field transaction volume across organizations. Many corporations will completely replace their cellular handsets with a combined voice/data device or a data-only device.
26. BUSINESS DRIVERS FOR A MOBILE WORKFORCE Companies worldwide are going wireless to increase productivity, speed delivery to market, and reduce operating costs
Wireless transmissions rely on radio waves, microwaves, and satellites to send data across high frequency radio ranges that later connect to wired media
Untethered connectivity, anytime, anywhere, has fueled a major market and technology disruption, which has permeated almost every consumer market worldwide. The domino effect of the success of wireless technology has resulted in a unique opportunity for innovation and creativity in technology, marketing, and business strategy.
Untethered connectivity, anytime, anywhere, has fueled a major market and technology disruption, which has permeated almost every consumer market worldwide. The domino effect of the success of wireless technology has resulted in a unique opportunity for innovation and creativity in technology, marketing, and business strategy.
27. BUSINESS DRIVERS FOR A MOBILE WORKFORCE The terms mobile and wireless are often used synonymously, but actually denote two different technologies
Mobile means the technology can travel with the user, but it is not necessarily in real-time
Wireless gives users a live (Internet) connection via satellite or radio transmitters State government agencies, such as transportation departments, use wireless devices to collect field information, tracking inventory, reporting times, monitoring logistics, and completing forms — all from a mobile environment. The transportation industry is using wireless devices to help determine current locations and alternate driving routes.
State government agencies, such as transportation departments, use wireless devices to collect field information, tracking inventory, reporting times, monitoring logistics, and completing forms — all from a mobile environment. The transportation industry is using wireless devices to help determine current locations and alternate driving routes.
28. BUSINESS DRIVERS FOR WIRELESS TECHNOLOGY
29. BUSINESS DRIVERS FOR A MOBILE WORKFORCE
30. BUSINESS DRIVERS FOR A MOBILE WORKFORCE
31. USING CELLULAR TECHNOLOGIES IN BUSINESS Cellular telephones (cell phones) work by using radio waves to communicate with radio antennas (or towers) placed within adjacent geographic areas called cells
A telephone message is transmitted to the local cell by the cellular telephone and then is passed from antenna to antenna, or cell to cell In less than twenty years, the mobile telephone has gone from being rare, expensive equipment of the business elite to a pervasive, low-cost personal item. Several countries, including the UK, now have more mobile phones than people. There are over five hundred million active mobile phone accounts in China. Luxembourg has the highest mobile phone penetration rate in the world, at 164%. The total number of mobile phone subscribers in the world was estimated at 3.3 billion at the end of 2007, thus reaching an equivalent of over half the planet's population. At present, Africa has the largest growth rate of cellular subscribers in the world, its markets expanding nearly twice as fast as Asian markets. The availability of prepaid or 'pay-as-you-go' services, where the subscriber is not committed to a long-term contract, has helped fuel this growth in Africa as well as in other continents. In less than twenty years, the mobile telephone has gone from being rare, expensive equipment of the business elite to a pervasive, low-cost personal item. Several countries, including the UK, now have more mobile phones than people. There are over five hundred million active mobile phone accounts in China. Luxembourg has the highest mobile phone penetration rate in the world, at 164%. The total number of mobile phone subscribers in the world was estimated at 3.3 billion at the end of 2007, thus reaching an equivalent of over half the planet's population. At present, Africa has the largest growth rate of cellular subscribers in the world, its markets expanding nearly twice as fast as Asian markets. The availability of prepaid or 'pay-as-you-go' services, where the subscriber is not committed to a long-term contract, has helped fuel this growth in Africa as well as in other continents.
32. USING CELLULAR TECHNOLOGIES IN BUSINESS
33. USING CELLULAR TECHNOLOGIES IN BUSINESS
34. USING CELLULAR TECHNOLOGIES IN BUSINESS The latest trends in cell phones reflect a convergence of voice, video and data communications
By blending information with entertainment, cell phones are center-stage in the evolving trend of mobile infotainment CLASSROOM OPENER
VIDEOS: The Future of Cell Phones According to NTT
Ask your students "What will cell phones look like and be used for in the next 5 years?" You will get a variety of ideas... then show them this... http://www.mobilemag.com/content/100/340/C12251/CLASSROOM OPENER
VIDEOS: The Future of Cell Phones According to NTT
Ask your students "What will cell phones look like and be used for in the next 5 years?" You will get a variety of ideas... then show them this... http://www.mobilemag.com/content/100/340/C12251/
35. Personal Data Assistants Personal digital assistants (PDA) are small, handheld computers capable of entirely digital communications transmission
Smartphone - combines the functions of a cellular phone and a PDA in a single device The first generation of successful PDAs were Palm Pilots. They primarily functioned as electronic organizers with support for address books, calendars, email, notes, etc. The PDA only occasionally needs to connect to a companion PC for "synchronization." For instance, a PDA can be synchronized with a PC address book, calendar, and email inbox, via a USB cable. Newer PDA models can also connect to PCs wirelessly via Bluetooth (which we describe in the next section), or connect to the Internet via wireless.
The first generation of successful PDAs were Palm Pilots. They primarily functioned as electronic organizers with support for address books, calendars, email, notes, etc. The PDA only occasionally needs to connect to a companion PC for "synchronization." For instance, a PDA can be synchronized with a PC address book, calendar, and email inbox, via a USB cable. Newer PDA models can also connect to PCs wirelessly via Bluetooth (which we describe in the next section), or connect to the Internet via wireless.
36. Bluetooth Bluetooth – a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants (PDAs) can be easily interconnected using a short-range wireless connection Since Bluetooth’s development in 1994 by the Swedish telecommunications company Ericsson, more than 1,800 companies worldwide have signed on to build products to the wireless specifications
Bluetooth is named to honor a 10th century Viking Kind, Harold Bluetooth, who is credited with uniting Denmark and bringing order to the country
Since Bluetooth’s development in 1994 by the Swedish telecommunications company Ericsson, more than 1,800 companies worldwide have signed on to build products to the wireless specifications
Bluetooth is named to honor a 10th century Viking Kind, Harold Bluetooth, who is credited with uniting Denmark and bringing order to the country
37. USING SATELLITE TECHNOLOGIES IN BUSINESS Satellite - a big microwave repeater in the sky; it contains one or more transponders that listen to a particular portion of the electromagnetic spectrum, amplifying incoming signals, and retransmitting them back to Earth
Microware transmitter - commonly used to transmit network signals over great distances
General Motors is serious about satellite radio, and the amount of nameplates that offer standard XM is growing all the time. Previously, GM made XM standard on all Cadillac’s, and now the subscription radio service will also be available for all new Buick, HUMMER, and Saab models as well. The move enlarges XM's customer base while also giving new-car drivers a chance to test the technology for three months free of charge.General Motors is serious about satellite radio, and the amount of nameplates that offer standard XM is growing all the time. Previously, GM made XM standard on all Cadillac’s, and now the subscription radio service will also be available for all new Buick, HUMMER, and Saab models as well. The move enlarges XM's customer base while also giving new-car drivers a chance to test the technology for three months free of charge.
38. USING SATELLITE TECHNOLOGIES IN BUSINESS
39. USING SATELLITE TECHNOLOGIES IN BUSINESS Location-based services (LBS) - are wireless mobile content services which provide location-specific information to mobile users moving from location to location
MasterCard now provides cardholders with a mobile, location-based search and directory service, so they can request the location of the nearest ATM be sent to their mobile phone via SMS (Short Message Service, aka “text message”). The service, which works with all major mobile operators in the United States, is provided by MasterCard to cardholders free of charge (although operator text message rates may apply).
MasterCard now provides cardholders with a mobile, location-based search and directory service, so they can request the location of the nearest ATM be sent to their mobile phone via SMS (Short Message Service, aka “text message”). The service, which works with all major mobile operators in the United States, is provided by MasterCard to cardholders free of charge (although operator text message rates may apply).
40. USING SATELLITE TECHNOLOGIES IN BUSINESS
41. Global Positioning System (GPS) Global Positioning System (GPS) - is a "constellation" of 24 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location
The location accuracy is anywhere from 100 to 10 meters for most equipment The most popular location based service used today is Global Positioning System (GPS)
The GPS is owned and operated by the U.S. Department of Defense but is available for general use around the world. In 1993, the Defense Department made this global positioning technology available for commercial use to anyone who has a GPS device. GPS devices have special microprocessors that analyze satellite signals.
The most popular location based service used today is Global Positioning System (GPS)
The GPS is owned and operated by the U.S. Department of Defense but is available for general use around the world. In 1993, the Defense Department made this global positioning technology available for commercial use to anyone who has a GPS device. GPS devices have special microprocessors that analyze satellite signals.
42. Global Positioning System (GPS)
43. Global Positioning System (GPS) Geographic information system (GIS) - is designed to work with information that can be shown on a map
Some cell phone providers equip their phones with GPS chips that enable users to be located to within a geographical location about the size of a tennis court Automobiles have GPSs linked to maps that display in a screen on the dashboard driving directions and exact location of the vehicle. GM offers the OnStar system, which sends a continuous stream of information to the OnStar center about the car’s exact location. The OnStar Vehicle Diagnostics automatically performs hundreds of diagnostic checks on four key operating systems — the engine/transmission, antilock brakes, air bags, and OnStar systems — in GM vehicles. The vehicle is programmed to send the results via email to the owner each month. The unique email report also provides maintenance reminders based on the current odometer reading, remaining engine oil life, and other relevant ownership information. Automobiles have GPSs linked to maps that display in a screen on the dashboard driving directions and exact location of the vehicle. GM offers the OnStar system, which sends a continuous stream of information to the OnStar center about the car’s exact location. The OnStar Vehicle Diagnostics automatically performs hundreds of diagnostic checks on four key operating systems — the engine/transmission, antilock brakes, air bags, and OnStar systems — in GM vehicles. The vehicle is programmed to send the results via email to the owner each month. The unique email report also provides maintenance reminders based on the current odometer reading, remaining engine oil life, and other relevant ownership information.
44. Global Positioning System (GPS) Common GIS uses:
Finding what is nearby
Routing information
Information alerts
Mapping densities
Mapping quantities A GIS is useful for mobile applications, but it offers benefits that go well beyond what is required in a mobile environment. For example, using a GIS, users can decide what information is and is not relevant to them, and formulate their queries based on their personal criteria. Unlike a paper map, a GIS allows for in-depth analysis and problem solving that can make marketing, sales, and planning much more successful. A GIS is useful for mobile applications, but it offers benefits that go well beyond what is required in a mobile environment. For example, using a GIS, users can decide what information is and is not relevant to them, and formulate their queries based on their personal criteria. Unlike a paper map, a GIS allows for in-depth analysis and problem solving that can make marketing, sales, and planning much more successful.
45. USING WIRELESS TECHNOLOGIES IN BUSINESS Wireless fidelity (wi-fi) – a means of linking computers using infrared or radio signals
Common examples of wireless devices include:
Cellular phones and pagers
Global positioning systems (GPS)
Cordless computer peripherals
Home-entertainment-system control boxes
Two-way radios
Satellite television Wireless technologies are transforming how we live, work, and play
Handheld devices are continuing to offer additional functionality, and cellular networks are advancing rapidly in their increased speed and throughput abilities
These enabling technologies are fueling widespread adoption and creation of new and innovative ways to perform business
Ask your students how many of them are currently using these types of wireless devices
Ask your students to discuss additional types of wireless devices that they are currently using
Ask your students to define additional types of wireless devices that they are not currently usingWireless technologies are transforming how we live, work, and play
Handheld devices are continuing to offer additional functionality, and cellular networks are advancing rapidly in their increased speed and throughput abilities
These enabling technologies are fueling widespread adoption and creation of new and innovative ways to perform business
Ask your students how many of them are currently using these types of wireless devices
Ask your students to discuss additional types of wireless devices that they are currently using
Ask your students to define additional types of wireless devices that they are not currently using
46. USING SATELLITE TECHNOLOGIES IN BUSINESS
47. WiMAX The main problem with Wi-Fi access is that hot spots are very small, so coverage is sparse
WiMAX - is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access Ask your students how many wireless devices they use to perform their jobs
How many wireless devices do they think they will need in the future to perform their jobs?
Ans: Hopefully, just one
Can you name any additional technologies?
Online description and diagram on how WiMAX works
http://computer.howstuffworks.com/wimax1.htm Ask your students how many wireless devices they use to perform their jobs
How many wireless devices do they think they will need in the future to perform their jobs?
Ans: Hopefully, just one
Can you name any additional technologies?
Online description and diagram on how WiMAX works
http://computer.howstuffworks.com/wimax1.htm
48. WiMAX A WiMAX system consists of two parts:
A WiMAX tower - A single WiMAX tower can provide coverage to a very large area - as big as 3,000 square miles
A WiMAX receiver - The receiver and antenna could be built into a laptop the way Wi-Fi access is today A WiMAX tower station can connect directly to the Internet using a high-bandwidth, wired connection (for example, a T3 line). It can also connect to another WiMAX tower using a line-of-sight, microwave link. This connection to a second tower (often referred to as a backhaul), along with the ability of a single tower to cover up to 3,000 square miles, is what allows WiMAX to provide coverage to remote rural areas. A WiMAX tower station can connect directly to the Internet using a high-bandwidth, wired connection (for example, a T3 line). It can also connect to another WiMAX tower using a line-of-sight, microwave link. This connection to a second tower (often referred to as a backhaul), along with the ability of a single tower to cover up to 3,000 square miles, is what allows WiMAX to provide coverage to remote rural areas.
49. WiMAX
50. WiMAX
51. Radio Frequency Identification (RFID) Radio frequency identification (RFID) - use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers
RFID tag - contains a microchip and an antenna, and typically work by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag Describe RFID and how it can be used to help make a supply chain more effective?
Integrating RFID in the supply chain will change the way a companies operate from managing maintenance, combating theft, to augmenting Sarbanes-Oxley initiativesDescribe RFID and how it can be used to help make a supply chain more effective?
Integrating RFID in the supply chain will change the way a companies operate from managing maintenance, combating theft, to augmenting Sarbanes-Oxley initiatives
52. Radio Frequency Identification (RFID) Walk through each of the three components to an RFID system
CLASSROOM EXERCISE
RFID
Have your students find examples of RFID tags on the Internet
How big are the tags?
How are the tags being used?
What are the business ramifications of plastic RFID tags?
Washable
Weather resistant (can be used outside)
Walk through each of the three components to an RFID system
CLASSROOM EXERCISE
RFID
Have your students find examples of RFID tags on the Internet
How big are the tags?
How are the tags being used?
What are the business ramifications of plastic RFID tags?
Washable
Weather resistant (can be used outside)
53. Radio Frequency Identification (RFID) RFID tags will be added to every product and shipping box
At every step of an item’s journey, a reader scans one of the tags and updates the information on the server
Manufacturers and retailers can observe sales patterns in real-time and make swift decisions about production, ordering, and pricing
RFID tags will be added to every product and shipping box
At every step of an item’s journey, a reader scans one of the tags and updates the information on the server
Manufacturers and retailers can observe sales patterns in real-time and make swift decisions about production, ordering, and pricing
54. MOBILE WORKFORCE TRENDS Social networking gets mobilized
Mobile TV
Multi-function devices become cheaper and more versatile
Location-based services
Mobile advertising
Wireless providers move into home entertainment
Wireless security moves to the forefront
Enterprise mobility Social Networking Gets Mobilized. Mobility is added to existing Internet business models, services and behaviors, driving traffic for wireless operators. Teens and twenties accustomed to constant connectivity and habit-forming websites, such as MySpace and Facebook, lead a wave of membership in mobile social networks. Location social networking including friend and event finder services are gaining popularity, even in the professional and over-50 segments. Google, Yahoo!, and Skype are more compelling for users than wireless brands, which are hard-pressed to compete. Social networking applications initially are preloaded on many mobile devices sold and later become downloadable.
Mobile TV — Now Showing for Early Adopters. In the short term, wireless users are unlikely to plunk down $5.99-9.99 per month for mobile TV service. Instead, look for per-view or per-minute pricing for “sneaking,” a consumer tendency to watch key minutes of a sports event or drama while engaged in another activity. Sneaking leads to more regular viewing, and within 3-5 years, mobile TV will become an indispensable service. Broadcast TV is the primary driver of revenues and consumer adoption, but peer-to-peer video is gaining interest, too. Operators are squaring off with content providers over control of the subscriber relationship and user experience.
Multi-Function Devices Become Cheaper and More Versatile. Intense competition and margin pressure will continue in the handset market, forcing prices of third-generation (3G) handsets below $90 and making them affordable for a wide range of users. Seeking to replicate the success of camera phones, device manufacturers will produce more multi-function units with music-playing, location, video and other capabilities. Twenty percent of all handsets sold in North America are application specific — built for a usage proposition, such as music or video consumption or business productivity.
Location-Based Services: And the Winner Is ... GPS! Yes, GPS is the location technology of choice for the wireless industry. Handset manufacturers will continue to push GPS-enabled handsets as the technology evolves from popular in-car satellite navigation systems like TomTom to a broadly accepted feature in wireless phones. With Nokia having launched its first GPS-enabled handsets in early 2007 and bandwidth available to support new multimedia services, location-based service providers are building critical mass. Since there are 10 to 20 times more mobile phones sold than any other consumer electronics device, wireless is a huge driver for GPS adoption.
Mobile Advertising Breaks Loose. Major brands are shifting from basic SMS marketing to more sophisticated multimedia advertising. RBC Capital Markets expects mobile marketing revenues to balloon from $45 million in 2005 to $1.5 billion by 2010. With the technological ability to target and measure the effectiveness of mobile advertising, brands are more strategic in their approach. Rich 3G content and video services and accuracy advancements in GPS-based location services deliver further value to brands targeting existing and potential customers in innovative ways.
Wireless Providers Move into Home Entertainment. Mobile makes headway against fixed broadband operators, who have dominated Internet and cheaper voice service provision in the home. Wi-Fi will remains the primary wireless access technology. The fixed operators may be strengthened by Wi-Fi capabilities in consumer electronics devices (set-top boxes, game consoles and MP3 players) that enable cost-effective content downloads.
Wireless Security Moves to the Forefront. There is a monumental need to put strong security measures in place. This could be the year that hackers really start paying attention to millions of wireless devices, the growth in mobile data usage and vulnerable points between mobile and fixed networks. CIOs consistently cite security as their number one concern in extending network access to wireless devices. Attacks, viruses and data security now exceed device loss or theft as concerns. Emerging services, such as VoIP and mobile payments, provide additional challenges. Vulnerabilities directly affect the bottom line, corporate image, regulatory compliance and competitive advantage.
Enterprise Mobility — It’s for Real Now. Enterprises can’t resist the convenient, reliable, attractively priced, bundled mobile solutions entering the market. Corporations switch from phones to mobile computers for transactions, data collection and messaging for a wide variety of employees. Many voice communications processes, such as order placement and delivery notifications, dispatch operations and remote asset monitoring, continue to shift to wireless data to increase information access and field transaction volume across organizations. Many corporations will completely replace their cellular handsets with a combined voice/data device or a data-only device.Social Networking Gets Mobilized. Mobility is added to existing Internet business models, services and behaviors, driving traffic for wireless operators. Teens and twenties accustomed to constant connectivity and habit-forming websites, such as MySpace and Facebook, lead a wave of membership in mobile social networks. Location social networking including friend and event finder services are gaining popularity, even in the professional and over-50 segments. Google, Yahoo!, and Skype are more compelling for users than wireless brands, which are hard-pressed to compete. Social networking applications initially are preloaded on many mobile devices sold and later become downloadable.
Mobile TV — Now Showing for Early Adopters. In the short term, wireless users are unlikely to plunk down $5.99-9.99 per month for mobile TV service. Instead, look for per-view or per-minute pricing for “sneaking,” a consumer tendency to watch key minutes of a sports event or drama while engaged in another activity. Sneaking leads to more regular viewing, and within 3-5 years, mobile TV will become an indispensable service. Broadcast TV is the primary driver of revenues and consumer adoption, but peer-to-peer video is gaining interest, too. Operators are squaring off with content providers over control of the subscriber relationship and user experience.
Multi-Function Devices Become Cheaper and More Versatile. Intense competition and margin pressure will continue in the handset market, forcing prices of third-generation (3G) handsets below $90 and making them affordable for a wide range of users. Seeking to replicate the success of camera phones, device manufacturers will produce more multi-function units with music-playing, location, video and other capabilities. Twenty percent of all handsets sold in North America are application specific — built for a usage proposition, such as music or video consumption or business productivity.
Location-Based Services: And the Winner Is ... GPS! Yes, GPS is the location technology of choice for the wireless industry. Handset manufacturers will continue to push GPS-enabled handsets as the technology evolves from popular in-car satellite navigation systems like TomTom to a broadly accepted feature in wireless phones. With Nokia having launched its first GPS-enabled handsets in early 2007 and bandwidth available to support new multimedia services, location-based service providers are building critical mass. Since there are 10 to 20 times more mobile phones sold than any other consumer electronics device, wireless is a huge driver for GPS adoption.
Mobile Advertising Breaks Loose. Major brands are shifting from basic SMS marketing to more sophisticated multimedia advertising. RBC Capital Markets expects mobile marketing revenues to balloon from $45 million in 2005 to $1.5 billion by 2010. With the technological ability to target and measure the effectiveness of mobile advertising, brands are more strategic in their approach. Rich 3G content and video services and accuracy advancements in GPS-based location services deliver further value to brands targeting existing and potential customers in innovative ways.
Wireless Providers Move into Home Entertainment. Mobile makes headway against fixed broadband operators, who have dominated Internet and cheaper voice service provision in the home. Wi-Fi will remains the primary wireless access technology. The fixed operators may be strengthened by Wi-Fi capabilities in consumer electronics devices (set-top boxes, game consoles and MP3 players) that enable cost-effective content downloads.
Wireless Security Moves to the Forefront. There is a monumental need to put strong security measures in place. This could be the year that hackers really start paying attention to millions of wireless devices, the growth in mobile data usage and vulnerable points between mobile and fixed networks. CIOs consistently cite security as their number one concern in extending network access to wireless devices. Attacks, viruses and data security now exceed device loss or theft as concerns. Emerging services, such as VoIP and mobile payments, provide additional challenges. Vulnerabilities directly affect the bottom line, corporate image, regulatory compliance and competitive advantage.
Enterprise Mobility — It’s for Real Now. Enterprises can’t resist the convenient, reliable, attractively priced, bundled mobile solutions entering the market. Corporations switch from phones to mobile computers for transactions, data collection and messaging for a wide variety of employees. Many voice communications processes, such as order placement and delivery notifications, dispatch operations and remote asset monitoring, continue to shift to wireless data to increase information access and field transaction volume across organizations. Many corporations will completely replace their cellular handsets with a combined voice/data device or a data-only device.
55. OPENING CASE QUESTIONSThe Ironman Why is real-time information important to Ironman Championships?
How is WTC using wireless technology to improve its operations?
6. Why is real-time information important to Ironman Championships?
Real-time information means immediate, up-to-date information. Real-time systems provide real-time information in response to query requests. The sports industry needs to have up-to-date and accurate information possible. Outdated information could cause:
Damage to the Ironman reputation
Incur liabilities
Decrease productivity
7. How is the WTC using wireless technology to improve its operations?
WTC uses a variety of wireless technologies, namely RFID, Wi-Fi, and WiMAX. The company used radio frequency identification (RFID) technology to track each athlete’s progress, and used the WiMAX network’s high bandwidth and geographic reach to transmit high-quality video and stream it over the Internet in near real time. Home viewers and event spectators could view the video and monitor the athletes’ progress by logging on to Ironmanlive.com. Wi-Fi hotspots and an Internet cafe provided convenience access. Staff used wireless technologies to plan and manage the event, enhancing their productivity and the athletes’ well-being.
6. Why is real-time information important to Ironman Championships?
Real-time information means immediate, up-to-date information. Real-time systems provide real-time information in response to query requests. The sports industry needs to have up-to-date and accurate information possible. Outdated information could cause:
Damage to the Ironman reputation
Incur liabilities
Decrease productivity
7. How is the WTC using wireless technology to improve its operations?
WTC uses a variety of wireless technologies, namely RFID, Wi-Fi, and WiMAX. The company used radio frequency identification (RFID) technology to track each athlete’s progress, and used the WiMAX network’s high bandwidth and geographic reach to transmit high-quality video and stream it over the Internet in near real time. Home viewers and event spectators could view the video and monitor the athletes’ progress by logging on to Ironmanlive.com. Wi-Fi hotspots and an Internet cafe provided convenience access. Staff used wireless technologies to plan and manage the event, enhancing their productivity and the athletes’ well-being.
56. OPENING CASE QUESTIONSThe Ironman Identify three wireless technologies that are changing the way businesses operate and explain how the sports industry can use these technologies to improve their operations
List the ethical and security dilemmas that WTC faces in using the various forms of wireless technology 8. Identify three wireless technologies that are changing the way businesses operate and explain how the sports industry can use these technologies to improve their operations.
There are a number of different technologies changing the way businesses operate. Student answers to this question will vary depending on their three technology choices.
Wireless local area network (wLAN): uses radio waves rather than wires to transmit information across a local area network.
Cellular phones and pagers: provide connectivity for portable and mobile applications, both personal and business.
Cordless computer peripherals: connect wirelessly to a computer, such as a cordless mouse, keyboard, and printer.
Satellite television: allows viewers in almost any location to select from hundreds of channels.
WiMax wireless broadband: enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable. It is perfect for Internet service providers (ISPs) that want to expand into sparsely populated areas, where the cost of bringing in cable wiring or DSL is too high.
Security sensor: alerts customers to break-ins and errant pop flies. Its dual sensors record vibration and acoustic disturbances—a shattered window—to help avoid false alarms.
In many sporting events, being tethered to technology is not always accessible. Having access to wireless technologies allows diversity in venue and various event conditions.
9. List the ethical and security dilemmas that WTC faces in using the various forms of wireless technology.
The main ethical and security dilemmas WTC face are:
Encryption of data sent via wireless devices
Authorization and authentication to use data services
Privacy infringement with the use of RFID tags
8. Identify three wireless technologies that are changing the way businesses operate and explain how the sports industry can use these technologies to improve their operations.
There are a number of different technologies changing the way businesses operate. Student answers to this question will vary depending on their three technology choices.
Wireless local area network (wLAN): uses radio waves rather than wires to transmit information across a local area network.
Cellular phones and pagers: provide connectivity for portable and mobile applications, both personal and business.
Cordless computer peripherals: connect wirelessly to a computer, such as a cordless mouse, keyboard, and printer.
Satellite television: allows viewers in almost any location to select from hundreds of channels.
WiMax wireless broadband: enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable. It is perfect for Internet service providers (ISPs) that want to expand into sparsely populated areas, where the cost of bringing in cable wiring or DSL is too high.
Security sensor: alerts customers to break-ins and errant pop flies. Its dual sensors record vibration and acoustic disturbances—a shattered window—to help avoid false alarms.
In many sporting events, being tethered to technology is not always accessible. Having access to wireless technologies allows diversity in venue and various event conditions.
9. List the ethical and security dilemmas that WTC faces in using the various forms of wireless technology.
The main ethical and security dilemmas WTC face are:
Encryption of data sent via wireless devices
Authorization and authentication to use data services
Privacy infringement with the use of RFID tags
57. CLOSING CASE ONEPublic Safety What business value does the city receive from deploying a wireless network for its police department?
Identify and describe the principal telecommunication and network technologies the police department is using 1. What business value does the city receive from deploying a wireless network for its police department?
By implementing wireless network, the City of Logan is able to realize the benefits of new wireless technology without compromising their network security. By providing its officers with better access to information: real-time field reporting, database queries, and bi-directional communication, officers can spend more time protecting the public. In addition to time savings, there was a significant improvement in the flow of information. With real-time communication across any available wireless network connection, reports can be filed immediately after an incident, instead of hours later when an officer returns from patrol. Police officers are more productive and accurate in their work, which in turn creates a safer community.
2. Identify and describe the principal telecommunication and network technologies the police department is using.
The department implemented a number of 802.11 WLAN/Hotspots throughout the city. They also use a mobile VPN that provides its users with stable always-on, secure connectivity to network applications and resources over any IP-based network.
1. What business value does the city receive from deploying a wireless network for its police department?
By implementing wireless network, the City of Logan is able to realize the benefits of new wireless technology without compromising their network security. By providing its officers with better access to information: real-time field reporting, database queries, and bi-directional communication, officers can spend more time protecting the public. In addition to time savings, there was a significant improvement in the flow of information. With real-time communication across any available wireless network connection, reports can be filed immediately after an incident, instead of hours later when an officer returns from patrol. Police officers are more productive and accurate in their work, which in turn creates a safer community.
2. Identify and describe the principal telecommunication and network technologies the police department is using.
The department implemented a number of 802.11 WLAN/Hotspots throughout the city. They also use a mobile VPN that provides its users with stable always-on, secure connectivity to network applications and resources over any IP-based network.
58. CLOSING CASE ONEPublic Safety What security risks must the police department be aware of in using wireless technology and what precautions should they be taking to ensure electronic protection?
How could the police department use RFID, WiMAX and some of the other technologies discussed in this chapter to create efficiencies? 3. What security risks must the police department be aware of in using wireless technology and what precautions should they be taking to ensure electronic protection?
The main risks the police department should be aware of is someone intercepting their data transmissions. A few precautions the police department can take include:
Encryption of data sent via wireless devices
Authorization and authentication to use data services
Enable, use, and routinely test the inherent security features, such as authentication and encryption methods that are available in wireless technologies.
Firewalls and other appropriate protection mechanisms should also be employed.
4. How could the police department use RFID, WiMAX and some of the other technologies discussed in this chapter to create efficiencies?
RFID could be used to tag all police department equipment.
RFID could be used to tag people who are incarcerated.
RFID could be used for tracking evidence - at the crime scene, during a criminal investigation and presentation in court, and while in storage.
A WiMAX network could function as a backhaul connecting all of the fiber-ready towers to one another.
WiMAX, which can produce a wireless cloud connectivity to the entire city using just a few base stations.
Deploy WiMAX network citywide and run all communications applications over it.
Using LBS applications with an integrated web and mobile based solution, will enable its police officers to quickly and easily access emergency data and graphics from wireless computers in their vehicles, and via handheld devices.
3. What security risks must the police department be aware of in using wireless technology and what precautions should they be taking to ensure electronic protection?
The main risks the police department should be aware of is someone intercepting their data transmissions. A few precautions the police department can take include:
Encryption of data sent via wireless devices
Authorization and authentication to use data services
Enable, use, and routinely test the inherent security features, such as authentication and encryption methods that are available in wireless technologies.
Firewalls and other appropriate protection mechanisms should also be employed.
4. How could the police department use RFID, WiMAX and some of the other technologies discussed in this chapter to create efficiencies?
RFID could be used to tag all police department equipment.
RFID could be used to tag people who are incarcerated.
RFID could be used for tracking evidence - at the crime scene, during a criminal investigation and presentation in court, and while in storage.
A WiMAX network could function as a backhaul connecting all of the fiber-ready towers to one another.
WiMAX, which can produce a wireless cloud connectivity to the entire city using just a few base stations.
Deploy WiMAX network citywide and run all communications applications over it.
Using LBS applications with an integrated web and mobile based solution, will enable its police officers to quickly and easily access emergency data and graphics from wireless computers in their vehicles, and via handheld devices.
59. CLOSING CASE TWOUPS versus FedEx Explain the fundamentals of wireless fidelity
Describe the differences between UPS and FedEx’s use of wi-fi
Identify two types of wireless business opportunities the companies could use to gain a competitive advantage 1. Explain the fundamentals of wireless fidelity
Wireless fidelity (wi-fi) is a means of linking computers using infrared or radio signals. Wi-fi is a type of Ethernet, which makes the wireless network a straightforward extension of the wired network. A wireless device provides users with a live (Internet) connection via satellite or radio transmitters. If an organization uses wireless technologies, its employees, customers, and suppliers will have a live connection to organizational information and applications anytime, anywhere, and anyplace.
2. Describe the differences between UPS and FedEx’s use of wi-fi
FedEx deploys new technologies as soon as it can justify the cost and demonstrate improved efficiencies and customer benefit. UPS refreshes its technology base roughly every five to seven years, when it rolls out a unified system in stages that it synchronizes with the life span of the older system. The two companies are exploiting new wireless technologies in their differing attempts at aiding the two main components of their operations: pickup/deliver and packaging/sorting.
3. Identify two types of wireless business opportunities the companies could use to gain a competitive advantage
The companies can use Bluetooth, RFID, satellite, and GPS to gain competitive advantages. GPS can help with ensuring drivers are using the most direct route, or avoiding traffic, to reach customers. Satellites could be used to gain access to company intranets from anywhere at anytime. 1. Explain the fundamentals of wireless fidelity
Wireless fidelity (wi-fi) is a means of linking computers using infrared or radio signals. Wi-fi is a type of Ethernet, which makes the wireless network a straightforward extension of the wired network. A wireless device provides users with a live (Internet) connection via satellite or radio transmitters. If an organization uses wireless technologies, its employees, customers, and suppliers will have a live connection to organizational information and applications anytime, anywhere, and anyplace.
2. Describe the differences between UPS and FedEx’s use of wi-fi
FedEx deploys new technologies as soon as it can justify the cost and demonstrate improved efficiencies and customer benefit. UPS refreshes its technology base roughly every five to seven years, when it rolls out a unified system in stages that it synchronizes with the life span of the older system. The two companies are exploiting new wireless technologies in their differing attempts at aiding the two main components of their operations: pickup/deliver and packaging/sorting.
3. Identify two types of wireless business opportunities the companies could use to gain a competitive advantage
The companies can use Bluetooth, RFID, satellite, and GPS to gain competitive advantages. GPS can help with ensuring drivers are using the most direct route, or avoiding traffic, to reach customers. Satellites could be used to gain access to company intranets from anywhere at anytime.
60. CLOSING CASE TWOUPS versus FedEx How could RFID could help the companies deal with potential security issues?
Develop a Bluetooth, GPS, or satellite product that the parcel delivery business could use to improve efficiencies 4. How could RFID could help the companies deal with potential security issues?
With an RFID tag attached to each package the company could monitor, in real time, every products exact location
It could also monitor such things as humidity, temperature, shifts, and other factors that cause issues in its supply chain by damaging goods during shipping
5. Develop a Bluetooth, GPS, or satellite product that the parcel delivery business could use to improve efficiencies
Student answers to this question will vary4. How could RFID could help the companies deal with potential security issues?
With an RFID tag attached to each package the company could monitor, in real time, every products exact location
It could also monitor such things as humidity, temperature, shifts, and other factors that cause issues in its supply chain by damaging goods during shipping
5. Develop a Bluetooth, GPS, or satellite product that the parcel delivery business could use to improve efficiencies
Student answers to this question will vary
61. CLOSING CASE THREEImproving IT’s Bedside Manner at Florida Hospital Explain how hospitals are using telecommunication and network technologies to improve their operations
Identify a new telecommunication or network product that Florida Hospital could use to improve its operations
Why is real-time information important to hospitals? 1. Explain how hospitals are using telecommunication and network technologies to improve their operations.
Hospitals are using everything from digital doctors to prescription fulfillment. There are so many new and exciting uses of technology to make hospitals more efficient and effective which saves lives. The most important piece of Hackensack’s digital initiatives is the networked software that acts as the hospital’s central nervous system. Using wireless laptops, nurses log in to the system to record patient information and progress. Doctors tap into the network via wireless devices to order prescriptions and lab tests. Everything is linked, from the automated pharmacy to the X-ray lab, eliminating the need for faxes, phone calls, and other administrative hassles.
2. Identify a new telecommunication or network product that Florida Hospital could use to improve its operations.
Student answers to this question will vary. This is a good opportunity for students to get creative and develop some interesting products such as PDA devices to send notes and prescriptions.
3. Why is real-time information important to hospitals?
Real-time information is critical for hospitals to respond to patient needs and care. Real-time information gived health-care professionals access to the most accurate and current medical information at a patient's bedside via their personal digital assistants (PDAs) or other portable devices. Using real-time information is designed to help health care professionals provide better patient care by increasing their ability to securely access patient records, lab results and pharmacy data, and view diagnostic images such as X-rays or CT scans from anywhere in the hospital.
1. Explain how hospitals are using telecommunication and network technologies to improve their operations.
Hospitals are using everything from digital doctors to prescription fulfillment. There are so many new and exciting uses of technology to make hospitals more efficient and effective which saves lives. The most important piece of Hackensack’s digital initiatives is the networked software that acts as the hospital’s central nervous system. Using wireless laptops, nurses log in to the system to record patient information and progress. Doctors tap into the network via wireless devices to order prescriptions and lab tests. Everything is linked, from the automated pharmacy to the X-ray lab, eliminating the need for faxes, phone calls, and other administrative hassles.
2. Identify a new telecommunication or network product that Florida Hospital could use to improve its operations.
Student answers to this question will vary. This is a good opportunity for students to get creative and develop some interesting products such as PDA devices to send notes and prescriptions.
3. Why is real-time information important to hospitals?
Real-time information is critical for hospitals to respond to patient needs and care. Real-time information gived health-care professionals access to the most accurate and current medical information at a patient's bedside via their personal digital assistants (PDAs) or other portable devices. Using real-time information is designed to help health care professionals provide better patient care by increasing their ability to securely access patient records, lab results and pharmacy data, and view diagnostic images such as X-rays or CT scans from anywhere in the hospital.
62. CLOSING CASE THREEImproving IT’s Bedside Manner at Florida Hospital How is Florida Hospital using wireless technology to improve its operations?
Identify several wireless technologies that are changing the way businesses operate and explain how hospitals can use these technologies to improve their operations 4. How is Florida Hospital using wireless technology to improve its operations?
The wireless technology increases efficiencies and productivity with better, real-time access to information. The technology is designed to help health care professionals provide better patient care by increasing their ability to securely access patient records, lab results and pharmacy data, and view diagnostic images such as X-rays or CT scans from anywhere in the hospital.
5. Identify several wireless technologies that are changing the way businesses operate and explain how hospitals can use these technologies to improve their operations.
The possibilities for wireless technology are endless. As computers are combined with various forms of hospital devices such patient monitoring systems and X-rays, it won’t be long before wireless networks are as ubiquitous as refrigerators and dishwashers. Hospitals will use wireless networks to connect handheld devices with data storage devices and allow patient-care workers to roam untethered through hospitals. In the long run, wireless networks will be cheaper for hospitals since no structural changes will need to be made to the building’s walls, ceilings, or floors. If they want to add equipment, hospitals simply add another node to the network. Hospitals won’t have to cut holes, run wires, or alter the physical structure at all.
Hospitals should use RFID to:
Continuously track each patient's location
Track the location of doctors and nurses in the hospital
Track the location of expensive and critical instruments and equipment
Restrict access to drugs, pediatrics, and other high-threat areas to authorized staff
Monitor and track unauthorized persons who are loitering around high-threat areas
Facilitate triage processes by restricting access to authorized staff and "approved" patients during medical emergencies, epidemics, terrorist threats, and other times when demands could threaten the hospital's ability to effectively deliver services
Use the patient's RFID tag to access patient information for review and update through a hand-held computer
4. How is Florida Hospital using wireless technology to improve its operations?
The wireless technology increases efficiencies and productivity with better, real-time access to information. The technology is designed to help health care professionals provide better patient care by increasing their ability to securely access patient records, lab results and pharmacy data, and view diagnostic images such as X-rays or CT scans from anywhere in the hospital.
5. Identify several wireless technologies that are changing the way businesses operate and explain how hospitals can use these technologies to improve their operations.
The possibilities for wireless technology are endless. As computers are combined with various forms of hospital devices such patient monitoring systems and X-rays, it won’t be long before wireless networks are as ubiquitous as refrigerators and dishwashers. Hospitals will use wireless networks to connect handheld devices with data storage devices and allow patient-care workers to roam untethered through hospitals. In the long run, wireless networks will be cheaper for hospitals since no structural changes will need to be made to the building’s walls, ceilings, or floors. If they want to add equipment, hospitals simply add another node to the network. Hospitals won’t have to cut holes, run wires, or alter the physical structure at all.
Hospitals should use RFID to:
Continuously track each patient's location
Track the location of doctors and nurses in the hospital
Track the location of expensive and critical instruments and equipment
Restrict access to drugs, pediatrics, and other high-threat areas to authorized staff
Monitor and track unauthorized persons who are loitering around high-threat areas
Facilitate triage processes by restricting access to authorized staff and "approved" patients during medical emergencies, epidemics, terrorist threats, and other times when demands could threaten the hospital's ability to effectively deliver services
Use the patient's RFID tag to access patient information for review and update through a hand-held computer
63. BUSINESS DRIVEN BEST SELLERS THE POWER OF MOBILITY, by Russell McGuire
Over eighty percent of Americans above the age of five own a cell phone, most with digital cameras built in, and bundled with an e-mail service specifically designed for sending those captured moments to friends and family. These consumer applications are just simple examples of mobility being built into everyday products to create tremendous new value. From a business perspective, a new technology can introduce radical changes—changes so dramatic that they fundamentally change the nature of the business, the nature of the product, and the reasons why customers buy the product. When this happens, the rules of competition change. It is happening now: the Age of Mobility is upon us. How will it impact you and your business in the months and years to come?
The Power of Mobility shows you how to look forward, envision the Power of Mobility in your business, and implement the steps required to turn vision into reality.?Russell McGuire, one of the telecom industry's leading strategists, details the specific actions you must take to deliver the tremendous value that mobility adds—and win customers' hearts and wallets. He presents a powerful framework for capturing the Power of Mobility: the Seven Steps. If you can Digitize, Connect, Evaluate, Limit, Position, Protect, and Learn, you will capture the Power of Mobility in your products, your services, and your processes. He further clarifies the power of the Seven Steps with illustrative case studies of seven companies that have successfully implemented this framework and redefined the rules of competition in their industries.
The Mobility Age represents a great opportunity for businesses large and small to capture the Power of Mobility in order to create competitive differentiation and to take market share. Stories of businesses that have been crushed by the competition because they have denied the changes brought by technologies in the past will likely be repeated. You have a choice. You can wait for a competitor to lead and define the rules to his benefit and your demise. Or you can lead and set the rules — if you capture The Power of Mobility now. Over eighty percent of Americans above the age of five own a cell phone, most with digital cameras built in, and bundled with an e-mail service specifically designed for sending those captured moments to friends and family. These consumer applications are just simple examples of mobility being built into everyday products to create tremendous new value. From a business perspective, a new technology can introduce radical changes—changes so dramatic that they fundamentally change the nature of the business, the nature of the product, and the reasons why customers buy the product. When this happens, the rules of competition change. It is happening now: the Age of Mobility is upon us. How will it impact you and your business in the months and years to come?
The Power of Mobility shows you how to look forward, envision the Power of Mobility in your business, and implement the steps required to turn vision into reality.?Russell McGuire, one of the telecom industry's leading strategists, details the specific actions you must take to deliver the tremendous value that mobility adds—and win customers' hearts and wallets. He presents a powerful framework for capturing the Power of Mobility: the Seven Steps. If you can Digitize, Connect, Evaluate, Limit, Position, Protect, and Learn, you will capture the Power of Mobility in your products, your services, and your processes. He further clarifies the power of the Seven Steps with illustrative case studies of seven companies that have successfully implemented this framework and redefined the rules of competition in their industries.
The Mobility Age represents a great opportunity for businesses large and small to capture the Power of Mobility in order to create competitive differentiation and to take market share. Stories of businesses that have been crushed by the competition because they have denied the changes brought by technologies in the past will likely be repeated. You have a choice. You can wait for a competitor to lead and define the rules to his benefit and your demise. Or you can lead and set the rules — if you capture The Power of Mobility now.
64. BUSINESS DRIVEN BEST SELLERS INTO THE UNKNOWN, by Jack Uldrich
Latching onto the idea that everything old is new again, Uldrich, a former naval officer and author of The Next Big Thing Is Really Small, puts forth Lewis and Clark as two shining examples of all that is right with leadership and management. Spotlighting the pair's many strong points, from people skills and future-thinking capabilities to optimism and an ability to see the forest as well as the trees, Uldrich (drawing on what has obviously been years of extensive research) points to modern-day companies like Coca-Cola, General Electric and DaimlerChrysler as entities that could all learn something from Lewis and Clark.
Whether the "project" is a westward expedition or a hostile corporate takeover, Uldrich makes the case that the past is not so different from the present—or from the future – especially when concerning new technologies. The parallels between these men and today's leaders are intriguing and well thought out. For corporate types looking for tips, there is certainly plenty to digest. The overriding messages are clear: mentor and be mentored; find a way to balance the task at hand with the overall future vision; maintain a confident and optimistic approach from the beginning. Latching onto the idea that everything old is new again, Uldrich, a former naval officer and author of The Next Big Thing Is Really Small, puts forth Lewis and Clark as two shining examples of all that is right with leadership and management. Spotlighting the pair's many strong points, from people skills and future-thinking capabilities to optimism and an ability to see the forest as well as the trees, Uldrich (drawing on what has obviously been years of extensive research) points to modern-day companies like Coca-Cola, General Electric and DaimlerChrysler as entities that could all learn something from Lewis and Clark.
Whether the "project" is a westward expedition or a hostile corporate takeover, Uldrich makes the case that the past is not so different from the present—or from the future – especially when concerning new technologies. The parallels between these men and today's leaders are intriguing and well thought out. For corporate types looking for tips, there is certainly plenty to digest. The overriding messages are clear: mentor and be mentored; find a way to balance the task at hand with the overall future vision; maintain a confident and optimistic approach from the beginning.