Beruflich Dokumente
Kultur Dokumente
Enterprise Enablement – Email and Messaging – Field Force Automation (Insurance, Real Estate,
Maintenance, Healthcare) – Field Sales Support (Content Access, Inventory) – Asset Tracking and
Maintenance/Management – Remote IT Support – Customer Retention (B2C Services, Financial,
Special Deals) – Warehouse Automation – Security.
Enterprise Enablement
Enterprise Enablement is a Capacity on Demand Advanced Function technology that enables the
system for 5250 online transaction processing (OLTP).
Enterprise Enablement (EE) can be sold and set up for one or more processors or it can be sold and
set up for all processors on your entire Power system (Full System Enterprise enablement). With a
Full System Enterprise Enablement license, 100% of the processors are enabled for OLTP.
Where Enterprise Enablement licenses get tricky is when you’re upgrading a system you own or
lease.
Since EE licenses can be expensive, many customers wonder if you can transfer your Enterprise
Enablement licenses to new hardware when you upgrade. Here’s what I understand about owning
and transferring EE licenses.
The EE license is a hardware feature that belongs to the Power systems machine not the owner of
the machine, and it runs on a specific serial number.
Given that, here are the possible scenarios you can run into when you upgrade or replace your
machine.
If you replace your machine or upgrade to a different serial number, you have to buy new
Enterprise Enablement licenses, because you have changed your hardware
If you upgrade your machine with the same serial number, you can use the existing EE licenses
because you’ll be running on the same serial #
Both of these situations would be true regardless of whether you lease or own the machine.
The Enterprise Enablement (E2) organization is comprised of multiple teams – from technology to
operations to enterprise productivity and more. The combination of these teams into a single
organization allows for better alignment with the needs of the businesses, and positions priorities to
help the businesses become more efficient, more nimble and more profitable. E2’s mission is to
enable the businesses to drive profitable growth. E2 is focused on near-term delivery to accelerate
growth, while staying focused on what needs to be delivered to clients on a daily basis – including
onboarding, processing, production, reporting, stability and capability. Long-term, E2 is focused on
profitable growth through a sustainable future operating model. E2’s mission aligns with Northern
Trust’s corporate vision, as well as the goals of its business unit partners to concentrate on
enhancing the client and partner experience.
The enterprise customer
Some network providers are focusing on enabling applications in the enterprise space. In this model, the network
provider establishes a platform for their large enterprise customers who want to blend custom software with
enhanced abilities, and will provide standardized processes around mobilizing enterprise applications, and exposing
core back-office abilities to allow for dynamic customer interaction. Examples of this model include:
When it comes to messaging, email is the killer application. This is definitely true for PC users and
more and more so for mobile and wireless users. Every day, billions of email messages are sent;
some users send and receive more than a hundred each day as a matter of course. Email has
become the preferred means of communication for many companies, providing a quick and easy
way to move information between users, often in the form of standard text or business documents
such as Microsoft Word or Excel.
For mobile users, email is also a top priority. Many organizations implement email as their first
mobile application, allowing users to get a feel for the mobile device and wireless connectivity
before they implement other, more focused business applications. Companies such as Research In
Motion (RIM) have built a strong following for their devices due to their capability to retrieve and
send email messages. Many other companies have developed technology that enables mobile users
to access their enterprise email accounts while away from the office. They provide server software
that can integrate with common groupware infrastructure, such as Lotus Domino or Microsoft
Exchange, as well as client software that can be used to access the messages. This client software is
often available in both smart client and thin client formats.
Email systems employ store-and-forward messaging. That is, messages are stored in a repository
until they are accessed by a client application, at which time they are forwarded to the user. The
email client can be either a stand-alone client, such as Microsoft Outlook, Lotus Notes, Eudora, or
Pegasus, or it can be browser-based, such as Microsoft Hotmail, Yahoo! email, or any of the other
Web email offerings. Each of these client applications has to communicate with an email server to
receive messages, and another to send messages. The two most widely used servers are the Simple
Mail Transfer Protocol (SMTP) server, used to send messages, and the Post Office Protocol (POP)
server, which stores incoming mail. The most recent version of POP is 3, which is commonly referred
to as POP3. An alternative to using POP is the Internet Message Access Protocol (IMAP). IMAP is
similar to POP in that it stores messages, but it accomplishes this in a more effective manner for
users who want to access their email messages from multiple machines.
The process for accessing email from a mobile device is very similar. The only differences are the
client application used to interact with the email servers and the type of attachments that are
supported. For obvious reasons, some types of email attachments may not be supported from your
mobile device, due to either size or format restrictions.
SMTP Server
When you send an email message from your client application, the email client will communicate
with the SMTP from your email provider. This SMTP server will then look at the address to which this
message is being sent and communicate with the SMTP server at the destination address domain
(the part following the @ symbol). When the SMTP server at the destination receives the message, it
communicates with the POP3 server at the same domain and puts the message into the recipient's
account (the part preceding the @ symbol). From this point on, the POP3 server is used by the
recipient to access this message. If, for some reason, the SMTP server at the destination domain
cannot be reached, the email message will go into a queue, often called the sendmail queue. This
queue will periodically try to resend the message to the destination SMTP server. If the message
cannot be sent after a defined period of time, very often set at four hours, the sender may get a
return message stating that it was not yet delivered. After a longer period of time, very often five
days, the SMTP server will stop trying to send the message and will return it to the user marked as
undelivered.
POP3 Server
The POP3 server is used to store received email messages. When users check their email, the client
application connects to their POP3 server, providing an account name and a password. Once users
are authenticated, the POP3 server allows them to access their stored email messages. The POP3
server essentially acts as an interface between your email clients and the data store containing your
email messages. [For more detailed information on the mobile aspects of personal information
management (PIM), including email, calendars, and to-do lists, see Chapter 16, "Mobile Information
Management."
SMS:
The Short Message Service (SMS) was first introduced in Europe in 1991 as part of the GSM Phase 1
standard. Since that time it has had tremendous success, with more than 1 billion messages sent
around the world daily. Though it continues to be more popular in European countries, SMS is
catching on in North America as well, as more of the major wireless carriers add support for SMS and
as SMS-capable devices start to proliferate in the marketplace. SMS is supported on digital wireless
networks such as GSM, CDMA, and TDMA.
SMS makes it possible to send and receive short text messages to and from mobile telephones. The
message can contain alphanumeric characters to a maximum length of 160 characters for Latin
alphabets, including English, and 70 characters for non-Latin alphabets, such as Chinese. It provides
an easy way for individuals to communicate with one another and with external systems. In this way,
SMS can be used to turn a cellular phone into a pager. By adding the capability to receive short
messages, users can receive the same kind of information that is typically received on pagers. This
eliminates the need to carry both a pager and a cell phone, as SMS messages can even be received
during a voice call.
Note Even though the standard maximum length of an SMS message is 160 characters, many carriers
have set their own limitations, which range from 100 to 280 characters.
New technologies such as SMS have gained widespread adoption because they offer compelling
benefits to both the user and the network provider, such as:
Guaranteed message delivery using a store-and-forward approach. Even when the
recipient is out of the coverage area or does not have his or her device turned on, that
person will still receive the message, though at a later time. Note, however, when a user
does not retrieve the SMS message for an abnormally long period of time, the message may
be removed from the system.
Ease of use, without additional software or hardware. Sending or receiving SMS messages
does not require a WAP browser. The ability to communicate using SMS comes pre-installed
on the mobile device.
Low-cost method for information delivery. SMS provides an alternative to making voice
calls to deliver information.
Revenue source for service providers. Network operators can deliver value-added services
using SMS to generate revenue. SMS also helps drive the adoption of mobile phones to
younger audiences.
It is estimated that close to 80 percent of SMS messages sent are consumer-oriented. The most
common use is peer-to-peer communication, often replacing the need to make voice calls. Other
uses include information services, such as stock and weather information, simple email access, and
advertising. For corporate applications, SMS can be used for vehicle-positioning applications, job-
dispatch services, and remote monitoring.
Unfortunately, when it comes to sending SMS messages from places other than another cellular
phone, the process becomes more difficult. This is mainly due to the proprietary interfaces to each
operator's short message service centers (SMSCs). In Figure 5.1, you can see the route that a
message takes as it moves from its origin to the destination mobile phone. Once the message is
constructed, it is sent either over a wired connection or a wireless connection to the SMSC for that
particular carrier. If the message originates from another mobile phone, the carrier takes care of the
message delivery through the SMSC to the destination device. If however, the message originates
from another source, such as an enterprise server, it is the enterprise's responsibility to
communicate with the SMSC to have the message delivered. This is not a simple task, as most
carriers do not expose their SMSC's APIs. In order to communicate directly with a carrier's SMSC, you
either have to establish a relationship with that particular carrier and write to their proprietary
interface, or use an aggregator that has established connections to the carrier or carriers you are
interested in. The standard protocols used to communicate with SMSCs include Telocator
Alphanumeric Protocol (TAP) and Short Message Point to Point (SMPP). (For more information about
messaging aggregators, see the section entitled "Messaging Value Chain,"
There is one other possible method to send SMS messages. Many carriers have made SMTP access
available to their systems, allowing users to send SMS messages using an email interface. This
usually involves sending an email message to an address containing the destination user's telephone
number and carrier domain. For example, a message sent to an AT&T phone may have the address
<8005551234@mobile.att.net>. When this message is sent, it is routed through the SMTP server to
the SMSC, where it is then delivered to the mobile recipient over a wireless network.
Communicating directly with the SMSC does make it possible to retrieve the status of a message,
which SMTP cannot. This comes at a cost, however, as there is usually a per-message fee for sending
messages via the SMSC via a system aggregator.
The many benefits of SMS messages are easy to identify, but there are also some major limitations.
The most serious of these is the 160-character maximum message length and the lack of support for
more advanced data types such as audio and graphics. Another limitation is the lack of
interoperability between network operators. The ability to send a message from one carrier to
another has only recently been enabled by T-Mobile (formerly VoiceStream), AT&T Wireless, Verizon
Wireless, and Cingular, thereby removing a major obstacle for SMS adoption in North America. Even
with the cooperation between North American carriers, there are still limitations that need be
overcome, including roaming outside of North America and the ability to encrypt the message
content.
Field force automation (FFA): Field force automation (FFA) is the capture of field sales or service
information in real time using communications technology, typically handheld PDAs, wireless
devices, tablet PCs or mobile phones. The captured data is transferred immediately to back-end
systems (ERP, CRM or accounting systems) through wireless connectivity (Wi-Fi, 3G, satellite or
GPRS). This instant capture of information reduces time delays, avoids manual double entry data
errors and enhances field force productivity.
Exceed expectations: With Sales force, insurance reps and agents have the tools to deliver more
personalized communications across any device, collaborate in online social feeds, streamline
service requests, track new opportunities, and more.
Work smarter : Get a complete view of all service requests submitted through the web, social media
channels, emails, and call centers. Prioritize inquiries based on urgency. Ensure the right person is on
the case. And do it all on the Sales force platform.
Personalize interactions: Engage in more rewarding customer conversations with smart alert
reminders of important life events. With Sales force Communities, have more meaningful
interactions with customers, and seamlessly collaborate with colleagues.
Empower policy holders: Be there for customers at a moment’s notice with SOS video chat and real-
time interactions from any device. And provide additional peace of mind when they need it most
with self-service capabilities for tracking claims.
The client is one of the largest providers of supplemental insurance, operating a large and
diverse field force in the US. The company wanted to mobile-enable an existing Web-based field
force management application over a diverse range of devices with low total cost of ownership
(TCO) and faster time to market.
Business need :
The company has a large field force of over 7,500 agents spread across the US. The field
force team members were given a “trip sheet” every morning, which contained information of
customers they were required to contact and service. The trip sheets remained “static” as it was
impossible to enable dynamic changes in case the customer was unavailable or any other high
priority visit had to be scheduled. This led to challenges in terms of agent productivity and client
satisfaction.
The client was keen to mobile-enable services such as agent search, account and
policyholder details and reminder lookup for field force operations.
Challenges
The Infosys mConnect platform helped mobile-enable the field force management application in
record time, and ensured that its look and feel was similar to a Web application to boost adoption.
Infosys adopted the mConnect platform and hence the solution was made available on all
smartphone devices such as iPhone, Blackberry, and Android, which support GPS capability. As part
of the solution, a new feature was added to provide driving directions to an account or policyholder
location using GPS technology. Associates were also able to request the three nearest accounts to a
specified location, and secure driving directions to one of the accounts.
Benefits
Field force automation, in essence, is the practice of using technology to streamline administrative
and logistical aspects of field service, so your workforce can focus more of their energy on problem-
solving and job success.
FFA relegates all of the menial tasks of field service (the ones that would require countless hours for
a human to complete) to a central management system. This system typically consists of a server
component (installed onsite at the company office or hosted through a cloud server) and a mobile
component (accessed by technicians in the field, through tablets, smart phones, PDAs, etc.) — a
structure that provides constant synchronization between field workers, jobs, office administrators,
and back-end programs.
Field force automation is not synonymous with field service management (FSM), since many
organizations still practice field service management without proper automation tools or modern
technology. Instead, think of FFA as a leading best practice for field service management.
Field force automation (FFA) is the capture of field sales or service information in real time using
communications technology, typically handheld PDAs, wireless devices, tablet PCs or mobile phones.
The captured data is transferred immediately to back-end systems (ERP, CRM or accounting systems)
through wireless connectivity (Wi-Fi, 3G, satellite or GPRS). This instant capture of information
reduces time delays, avoids manual double entry data errors and enhances field force productivity.
The biggest challenge in field force automation is in developing a simple, but usable, user interface
for the hand held device or mobile, and connectivity at the location of information capture.
Connectivity can be overcome by having a system which can retain the information captured in the
device cache and later synchronize with back-end systems ("thick client").
From an operations perspective, availability of field information in near real time allows a business
to plan delivery schedules, reduce inventory and monitor and control the field workers. Field force
automation is seen as beneficial to businesses in regard of customer relations, maintaining skills
among the field workforce, and limiting the size of this workforce
As more organizations embrace the servitization model and try to leverage their field service teams
for profit, field force automation will likely become the focal point for new growth strategies.
Companies will adopt FSM solutions that get their workers onsite faster, give them tools to deliver a
first-time fix
Data entry: Instead of scribbling notes on a clipboard and re-keying customer account data back at
the office, technicians can complete job information forms on a field service mobile app that
automatically syncs data across all systems. That means less careless mistakes and a clean audit trail
for billing/invoicing
Routing/scheduling: Many FSM solutions offer “dynamic scheduling” tools which auto-assign jobs to
specific technicians based on job priority, technician availability, skillset, and proximity. Technicians
can use the same software to plan the optimal route between jobs, factoring in job order, traffic,
and road conditions.
Preventative maintenance: The right automation can help your team transition from being a
reactionary workforce to a more surgical, preventative one. To start out, you can set up preventative
maintenance schedules for customer equipment based on item specifications, warranty, part
lifecycles, etc. More advanced preventative tactics might involve remote monitoring — i.e., using
embedded telematics sensors to track early warning signs like pressure, voltage, flow, and heat.
One of the biggest (and most obvious benefits) of field force automation is that it improves work
efficiency. Removing laborious, administrative tasks from your technicians’ and dispatchers’
workloads will yield significant time and cost savings for the whole company and greater overall
productivity. A 2013 FieldAware study revealed that efficiency and productivity are the top two
areas of concern for service companies, yet 22 percent still use paper-based workflows, and 27
percent use a homemade FSM application.
Additionally, field service is currently in a hand-off state between the generation of older technicians
who are retiring and the younger millennials just stretching their legs in the field. That hand-off
inevitably creates a skills gap, since new technicians have little to no experience completing service
calls. According to a recent survey by Manpower, “technician” was one of last year’s top three most
difficult roles to fill. This makes sense, given the technical nature of the work. Field force automation
can reduce the new talent learning curve by replacing training curriculum for basic, functional tasks
like data entry, time tracking, and route planning.
Efficiency and productivity are probably the biggest enablers of field service success, but they aren’t
the end-result. More than two-thirds of field service executives say that customer satisfaction (not
cost reduction or operational efficiency) is their number one goal. That shouldn’t be a surprise, since
the whole point of showing up on time, working efficiently, having the right tools — i.e. the practice
of field force automation — is to serve the maximum number of customers in a way that improves
their loyalty to your company.
Field force automation in real estate( Relevant matter not found)
field force automation in health care
Healthcare is a very critical industry where timelines are priorities. Finest care is provided to
customers with utmost priority, integrity and compassion. The importance of customer relationships
and communication with field force personnel is of utmost importance for effective decision
making.The Healthcare organizations confront problems such as increase in the cost of logistics,
hazards in transporting samples and timely response to samples or patients. Incorporating field force
helps Healthcare organizations inimprovising the pathology logistics to prevent damage & delays of
specimens and provide steady client / caregiver planning to increase client relationship making lives
stress-free while enhancing high productivity and revenue. Tracking consultants was a tough job.
Transprting care takers and samples was another challenge.
Challenges
Healthcare industry faces a lot of challenges using their legacy system. Following are the problems
faced by healthcare companies:
Benefits
Content has always been a key to sales productivity – imagine the world of the sales person without
the right materials to present and share with their customers – its not a pretty thing to contemplate.
But creating lots of content alone isn’t enough to achieve the results we really want from the sales
team – more sales cycles, improved win rates, better customer interaction, and peer learning from
successful colleagues only comes from ensuring that the sales team can easily access compelling,
customizable content addressing every phase of the sales process.
Achieving those goals requires a new way of thinking. This article lays out the top 5 ways that you
can improve how your field sales team works with content to achieve improved win rates, and you
can drive the real world productivity of sales people, no matter what industry or market they serve.
Most any enterprise software designed for product-centric companies will offer strong inventory
management functionality. Microsoft Dynamics® GP for instance allows you to manage inventory
throughout the value chain.
From within your four walls, this functionality can be brought to bear in a cohesive fashion to ensure
that inventory transactions are recorded in the inventory module where the data can then be
accessed as needed throughout the organization. Inventory consumed can be recorded and
replenished as needed. Returns are logged and taken back into inventory or dealt with accordingly.
Services delivered are recorded and billed. Business that takes place outside of your four walls
becomes more challenging to manage, however. Even if you have a modern barcode scanning
solution for inventory control, that solution may or may not do an adequate job in a remote
situation like route sales, and the underlying system must be configured to treat each truck as its
own site with appropriate replenishment triggers. Those replenishment triggers are only as effective
as systems in place to record inventory consumption, so barcode scanning for inventory
management, optimized for field use, is a key success factor.
What are some of the barriers to overcome to achieve true inventory optimization in the field? One
barrier may be a siloed approach to enterprise computing, where software used in the field is
separate and distinct from the rest of the enterprise. Oftentimes, a business will run a centralized
enterprise resource planning (ERP) product with its own very sophisticated inventory functionality.
And then they may run a separate software product for field sales with its own functionality for
inventory management. How well these systems are integrated may vary from one situation to the
next. But we contend that extending the inventory functionality of the underlying ERP or accounting
system to mobile handhelds designed for field sales will be a more cost-effective and elegant way to
manage inventory in the field.
One other common barrier is that many barcode inventory management systems fail to perform
without a reliable connection to the servers where the underlying enterprise software is run. But
while you can generally control the quality of your network at your own site, all bets are off once
you leave the building. So it is obvious that you'll need to plan for spotty network coverage. Any
number of barriers can prevent wireless communication between a handheld barcode scanner and
your instance of ERP. Structures, gaps in cell service and other barriers can leave your staff cut off
from your servers. At Panatrack, our inventory management offering for Dynamics GP will tolerate
interruptions in service. But we know that for field sales, you need a solution that will perform well
in a fully offline environment, recording inventory transactions to the handheld and re-sync with
Dynamics GP when the opportunity presents itself.
There are plenty of things you can't control in a field sales environment. Ensuring your route sales
drivers or technicians have the correct inventory on hand–you can control that. Using the right
technology you can also improve customer interaction and communication and take advantage of
cross-selling opportunities. But you can't control whether or not your technician can get good
connectivity at a customer site surrounded by heavy equipment, or delivering materials to a rural
customer between cell towers. But you can anticipate that difficulty and overcome it!
CMMS is a type of software that helps businesses keep track of their assets and manage assets
service and maintenance. Assets in this case can be anything from equipment to facilities to vehicles.
As other business productivity software, CMMS is evolving from locally hosted to web based and to
CMMS mobile apps. In fact, maintenance management is an area that benefits most from the mobile
software: after all, maintenance work is always done outside of the office, away from the office
computers. Ability to look up information quickly, as well as record service or maintenance work on
your mobile device is far superior to filling out paper forms and then retyping information into the
computer.
In order to look up or record relevant information an employee who conducts maintenance work in
the field needs to have a mobile device which is capable of:
1. Displaying information
2. Accepting user input and transmitting it to the computer where CMMS is installed
3. Scanning barcodes to identify the asset
Until recently, the only devices that could be used were mobile computers with proprietary software
- something that only large companies could afford. QR codes and mobile technology are changing
this, allowing companies of any size to increase productivity of their maintenance operations by
using mobile devices in the field. Instead of mobile computers, employees can use smartphones that
they already have in their pockets while performing more of the useful operations than before, such
as recording location and taking photos.
What Exactly Can Be Done With QR Codes And A Smartphone For Asset Maintenance
By tagging your assets and employing connected web based software and mobile application, you
can completely eliminate all paperwork in the field, make sure that your records are in order and
that field employees always have real-time access to information they need. Specifically, field
employees can scan QR code on the asset tag and:
1. Review recent service and maintenance history of the asset, including description of
problems and performed repairs
2. Review asset information, such as instructions, emergency procedures, documentation,
location map, etc.
3. Record performed services
4. Conduct inspection
5. Record maintenance event
6. Use forms for recording events. Forms can be created using GUI web interface
7. Record GPS location of inspection / maintenance
8. Take photos and attach them to the record
9. Submit inspection / service / maintenance record to the server
10. If no data connection is availale, save data on the phone and submit to the server when
connection becomes available
11. Record asset relocation
What About Parts Inventory And Supplies
Parts and supplies inventory can be managed with QR codes and a smartphone as well - after all
barcode scanning was used in inventory management for a while. Now smartphones can be used as
scanners to perform inventory transactions, and can do more than regular barcode scanners. Using a
smartphone, technician in the field can track what parts and supplies are used to service / repair an
asset, and check current inventory and locations of the needed items. Administrator can review a
statistics of what was used for a specific asset or specific work order.
Often when people think about using smartphones and scanning, they automatically link this process
to QR codes. This is not entirely correct - UPC barcodes can also be scanned with the smartphones,
so you can use either type of code. The word of warning though: there are many different formats
for 2D barcodes, not all of them can be read by a smartphone. If in doubt - scan your barcode with
any free barcode scanning application. If you can scan it - no need to produce additional QR code
tag.
Initial setup is the most time consuming operation, but it is not as bad as you might think. Consider
how much time you will save by automating your asset managing tasks, and do not let it turn you
off! Here is what you will need to do to start tracking your assets and managing asset maintenance
using QR codes / barcodes and a smartphone:
1. A smartphone client application that can scan barcode or QR code and send recorded
information back to the server. Notice, this is not a generic barcode scanning application!
Generic app will simply show you what is encoded in a QR code. These applications can also
recognize encoded url and redirect you to a website, or recognize a contact information and
add it to your list of contacts. However, to handle asset tracking and maintenance, you need
an application specifically designed for this purpose. This application should have web-based
backend, and/or be integrated directly into your current CMMS.
2. Enter or import your current assets into the application. If you have list of your assets in any
form, this part is fast and painless. If you had never managed your assets before, you will
need to manually enter them into the application. Luckily, you can do it using your
smartphone as well, instead of writing data on the paper and then re-typing them in the
office.
3. Tag your assets. If your assets do not have UPC barcode, you will need to put on QR code
labels or tags. Usually web part of the application will allow you to generate and print QR
codes by yourself, or you can order pre-printed QR codes. As a rule, you should be able to use
pre-printed QR code labels or tags with sequential numbers, and be able to associate asset
with a QR code by scanning it.
After these three steps are completed, you are ready to start using smartphones for asset tracking
and maintenance. Now you can be sure that you always have accurate records of assets location and
maintenance.
Perhaps the most obvious method for inventory management is to establish good training for
employees. Teaching those who will be in charge of inventory the methods and processes already in
place is the best way to ensure that everyone is "on the same page" as far as how your inventory is
kept track of. A good idea is to test your employees from time to time to be sure that they know the
correct procedures for managing the inventory. If they make mistakes, meet with them individually
to go over corrective measures to ensure accuracy in the future. Decide which computer program or
style you want to use to manage the inventory. You can choose from something as simple as a
spreadsheet, to as complex as an entire software package that tracks everything almost
automatically. When shopping for software, look for products that offer barcode reading, tracking
counts, returns processing, cycling, and more all in one package. This will help you avoid any
confusion and prevent you from needing to add another program into the mix later.
With the combination of proper tools like barcodes and scanners, thorough employee training, and
an accurate, comprehensive database, you should be able to ensure that your inventory remains in
stock when needed and that you will have a good handle on what is available and what is needed.
Putting good methods in place is a surefire way to manage inventory effectively and with little to no
errors, which can help your business run smoothly and protect the bottom line. Be sure to plan your
strategy ahead of time, and your inventory control will run easily and smoothly.
Remote IT support
In information technology (IT), remote support tools are IT tools and software that enable an IT
technician or a support representative to connect to a remote computer from their consoles via the
Internet and work directly on the remote system. Although its main focus is the access to computers
located anywhere in the world, the remote support applications also provide features like file
transfer, desktop sharing, file synchronization, command line or guest accessibility.
Privacy
Privacy is also a major concern for all users. One of the most used tools in remote support sessions
are the ones that allow desktop sharing. It is also possible to provide what is commonly called
Unattended Support (the technician is granted total remote access to the client’s computer, even
when he is not physically close to it). The need for an absolute trust in these services and providers is
considered to be the biggest obstacle for this technology to achieve mass-marketing status – even
when many studies indicate that for every 5 technical occurrences, 4 of them could be remotely
solved.
Benefits
Remote Support technology tries to reduce helpdesk centers cost-issues – all transport-related
expenses are immediately trimmed down, for instance. Modern day technology enables that any
technician using Remote Support is able to assist a customer just like it was physically side-by-side.
Technologies and tools like live chat, VoIP and desktop sharing enable a direct intervention in the
remote system.
Desktop sharing
Desktop sharing is a common name for technologies and products that allow remote access and
remote collaboration on a person's computer desktop through a graphical Terminal emulator.
Remote login
Real-time collaboration
Remote log-in allows users to connect to their own desktop while being physically away from their
computer. Systems that support the X Window System, typically Unix-based ones, have this ability
"built in". Windows versions starting from Windows 2000 have a built-in solution for remote access
as well in the form of Remote Desktop Protocol and prior to that in the form of Microsoft’s
NetMeeting.
The open source product VNC provides cross-platform solution for remote log-in. Virtual Network
Computing (VNC): Making Remote Desktop Sharing Possible Remote desktop sharing is
accomplished through a common client/server model. The client, or VNC viewer, is installed on a
local computer and then connects to the network via a server component, which is installed on a
remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the
client were actually performing tasks on the end-user machine.
he shortcoming of the above solutions are their inability to work outside of a single NAT
environment. A number of commercial products overcome this restriction by tunneling the traffic
through rendezvous servers. Apple users require Apple Remote Desktop (ARD)
Real-time collaboration is much a bigger area of desktop sharing use, and it has gained recent
momentum as an important component of rich multimedia communications. Desktop sharing, when
used in conjunction with other components of multimedia communications such as audio and video,
creates the notion of virtual space where people can meet, socialize and work together. On the
larger scale, this area is also referred as web conferencing.
File transfer
File transfer is the transmission of a computer file through a communication channel from one
computer system to another. Typically, file transfer is mediated by a communications protocol. In
the history of computing, a large number of file transfer protocols have been designed for different
contexts.
Explicit file transfers from dedicated file transfer services like FTP or HTTP
In IBM Systems Network Architecture, LU 6.2 peer-to-peer file transfer programs such as
IBM's Connect:Direct and CA Technologies' XCOM Data Transport
File transfers over direct modem or serial (null modem) links, such as XMODEM, YMODEM
and ZMODEM.
File synchronization
File synchronization (or syncing) in computing is the process of ensuring that computer files in
two or more locations are updated via certain rules.
In one-way file synchronization, also called mirroring, updated files are copied from a 'source'
location to one or more 'target' locations, but no files are copied back to the source location. In
two-way file synchronization, updated files are copied in both directions, usually with the
purpose of keeping the two locations identical to each other. In this article, the term
synchronization refers exclusively to two-way file synchronization.
File synchronization is commonly used for home backups on external hard drives or updating for
transport on USB flash drives. BitTorrent Sync, Dropbox and SKYSITE are prominent products.
Some backup software, like AOMEI Backupper also support real-time file sync. The automatic
process prevents copying already identical files and thus can be faster and save much time
versus a manual copy, and is less error prone.
However this suffers from the limit that the synchronized files must physically fit in the portable
storage device. Synchronization software that only keeps a list of files and the changed files
eliminates this problem (e.g. the "snapshot" feature in Beyond Compare or the "package"
feature in Synchronize It!). It is especially useful for mobile workers, or others that work on
multiple computers.
It is possible to synchronize multiple locations by synchronizing them one pair at a time. The
Unison Manual describes how to do this:
If you need to do this, the most reliable way to set things up is to organize the machines into a
“star topology,” with one machine designated as the “hub” and the rest as “spokes,” and with
each spoke machine synchronizing only with the hub. The big advantage of the star topology is
that it eliminates the possibility of confusing “spurious conflicts” arising from the fact that a
separate archive is maintained by Unison for every pair of hosts that it synchronizes.
Customer Retention
Maintaining good relation with customers:-
1. Build your network--it's your sales lifeline. Your network includes business colleagues,
professional acquaintances, prospective and existing customers, partners, suppliers, contractors and
association members, as well as family, friends and people you meet at school, church and in your
community.
Contacts are potential customers waiting for you to connect with their needs. How do you turn
networks of contacts into customers? Not by hoping they'll remember meeting you six months ago
at that networking event. Networking is a long-term investment. Do it right by adding value to the
relationship, and that contact you just made can really pay off. Communicate like your business's life
depends on it. (Hint: And it does! Read on.)
2. Communication is a contact sport, so do it early and often. Relationships have a short shelf life.
No matter how charming, enthusiastic or persuasive you are, no one will likely remember you from a
business card or a one-time meeting. One of the biggest mistakes people make is that they come
home from networking events and fail to follow up. Make the connection immediately. Send a "nice
to meet you" e-mail or let these new contacts know you've added them to your newsletter list and
then send them the latest copy. Immediately reinforce who you are, what you do and the
connection you've made.
You rarely meet people at the exact moment when they need what you offer. When they're ready,
will they think of you? Only if you stay on their minds. It's easier to keep a connection warm than to
warm it up again once the trail goes cold. So take the time to turn your network of connections into
educated customers.
3. E-mail marketing keeps relationships strong on a shoestring budget. Build your reputation as an
expert by giving away some free insight. You have interesting things to say! An easy way to
communicate is with a brief e-mail newsletter that shows prospects why they should buy from you.
For just pennies per customer, you can distribute an e-mail newsletter that includes tips, advice and
short items that entice consumers and leave them wanting more. E-mail marketing is a cost-effective
and easy way to stay on customers' minds, build their confidence in your expertise, and retain them.
And it's viral: Contacts and customers who find what you do interesting or valuable will forward your
e-mail message or newsletter to other people, just like word of mouth marketing.
4. Reward loyal customers, and they'll reward you. According to global management consulting
firm Bain and Co., a 5 percent increase in retention yields profit increases of 25 to 100 percent. And
on average, repeat customers spend 67 percent more than new customers. So your most profitable
customers are repeat customers. Are you doing enough to encourage them to work with you again?
Stay in touch, and give them something of value in exchange for their time, attention and business.
It doesn't need to be too much; a coupon, notice of a special event, helpful insights and advice, or
news they can use are all effective. Just remember: If you don't keep in touch with your customers,
your competitors will.
5. Loyal customers are your best salespeople. So spend the time to build your network and do the
follow-up. Today there are cost effective tools, like e-mail marketing, that make this easy. You can e-
mail a simple newsletter, an offer or an update message of interest to your network (make sure it's
of interest to them, not just to you). Then they'll remember you and what you do and deliver value
back to you with referrals. They'll hear about opportunities you'll never hear about. The only way
they can say, "Wow, I met somebody who's really good at XYZ. You should give her a call," is if they
remember you. Then your customers become your sales force.
If real estate is all about location, location, location, then small business is all about relationships,
relationships, relationships. Find them, nurture them, and watch your sales soar.
Retaining customers for longer and increasing the average dollars of each sale can increase
your customer lifetime Value to new heights. Keep reading for five practical strategies you can use to
improve your CLV:
There was a time when hiring salespeople who’d do anything short of holding customers at gunpoint
to get a sale was a good idea. However, when your aim is to boost CLV, you want to bury that sort of
short-term thinking in the ground and find stellar salespeople who can build long-lasting customer
relationships, which are your company’s foundation.
Be honest – This means always having your customer’s best interests at heart, regardless of
whether you get a smaller sale, or lose a sale to a competitor. You and your customer are
both aware your agenda for building a relationship is to generate business. Shifting your
agenda to something altruistic will show the customer you see them as more than just a pay
cheque.
Share – You have a plethora of skills and knowledge beyond the breadth of what you’ve
been tasked to provide. Share it for free to boost your client’s confidence in your abilities,
while also exposing them to a range of other products and services.
Be a partner – Create a strategic partnership or alliance with your customer’s business. A
mutually beneficial relationship is the best and easiest way to build trust. Create a lifetime
customer by referring their business, acquiring their products or using their services.
Building long term relationships is a simple, effective method for increasing your CLV. While it may
take a little extra time, care and consideration, it’s a great way to increase revenues from existing
customers without simultaneously increasing your expenses.
It goes without saying customers will keep returning if you’re offering consistently high quality
products or service, with exceptional customer service. For example, Clickfox’s study revealed poor
customer service (48%) and low brand quality (35%) are the biggest deterrents when it comes to
brand loyalty.
In other research, 64% of participants said shared values were the primary reason for maintaining a
relationship with their brand. ‘Clearly communicating your brand’s philosophy or higher purpose’, or
in layman’s terms, showing your heart is in the right place has become very important to today’s
consumers. So choose a philosophy, which reflects your consumers beliefs and demonstrate them
through sponsorship, events or anything you can think of. Be sure to brand all marketing efforts
consistently, so consumers keep returning to what’s comfortable and familiar.
Keep your product quality high, provide exceptional customer service and repeatedly demonstrate
your company’s mission statement to build brand loyalty and elevate your company’s CLV.
The difference between me walking out of McDonalds with a cheeseburger and me walking out with
a cheeseburger combo and an apple pie is sadly not self-control. Rather, my purchase decision rests
upon the words, ‘Would you like a combo with that?’ McDonalds has it all figured out. When you
increase the average dollars of each sale, you make more over the customer’s lifetime.
Upsell and cross-sell to give your CLV a quick boost. To avoid confusion, I’ll establish the difference
between upselling and cross-selling. When you upsell, you increase the value of the same product or
service, for example upgrading a cheeseburger to a combo. You sell a more expensive model or
additional features, which add value to the product, whereas when you cross-sell, you’re selling
additional products to the customer, i.e. apple pie.
One critical thing to remember when upselling and cross-selling is to always provide honest,
targeted information. Unrelated recommendations damage the credibility of relevant ones, so resist
the urge to cross-sell a bunch of products at the same time. Relay the benefits tailored to the
customer, and don’t over promise what your service or product can deliver.
The concept of upselling and cross selling to increase the revenues is not a new one, it’s just most
businesses don’t do it well. Upsell and cross-sell with honest, targeted delivery, and you’ll find your
average sale increasing without having to bump up any expenses.
Companies spout all kinds of offers to get attention, but you need an incentive scheme, which not
only grabs your customers’ attention, but holds it too. Your rewards system can increase your CLV by
promoting customer loyalty and increasing profitability in the long-term.
Therefore, stay away from discounts, and instead offer exclusive products or value-added services. A
study by Chubbies found the lifetime value of customers acquired through discounts was lower than
customers who weren’t acquired this way. As if that wasn’t enough to turn you off, studies have
shown discounts decrease the perceived quality of items, while free gifts maintain quality
perceptions and increase deal value.
Thus, when you’re choosing your incentive scheme, always remember to:
Communicate – Raise awareness and educate your customers on potential rewards. Many
customers aren’t aware they even exist.
Make your rewards attainable – Achievable rewards are engaging for high-value customers,
provided they are equitable and competitive with others in the industry.
Make them complimentary – Choose rewards, which compliment your brand. i.e. don’t give
away chocolate if you’re a health and fitness brand.
Use free gifts – Use products as rewards to encourage trials and increase successful cross-
selling.
Choosing the right incentive structure means your customers won’t be the only ones reaping the
rewards. Steer clear of heavy discounts and use your rewards system to increase customer
retention, and boost your CLV without compromising your bottom line.
According to a study by Harris Interactive, 56 per cent of participants would switch to another
company if an alternative offered more options to connect with them. If you’re looking to increase
customer loyalty and subsequently your CLV, manage and organise all available communication
channels well.
Having multiple points of contact, whether it’s via face-to-face, telephone, web or social media
allows customers to choose how they’d like to be contacted. Sixty per cent of consumers don’t want
to be contacted over the phone about special offers, information and upgrades, while 75 per cent
prefer contact via email or text message.
Social network tools give you the opportunity to connect and engage with your customers at any
time of day, whenever it’s convenient to them. Not only this, moving traffic to other channels
minimises costs and increases purchase paths, although the downside is lost opportunities for cross-
selling.
That being said, having multiple touch points prevents potentially loyal customers from leaving due
to unwanted contact by phone, email or face-to-face interaction, and raises your company’s
Customer Lifetime Value when executed well.
When you increase your company’s customer lifetime value, you’re increasing customer loyalty,
general profitability and marketing allowance in one fell swoop. While you don’t need to stop
pursuing potential customers altogether, remember to focus on building up the customers who
already like you. Apply these five tips to your business strategy to boost your Customer Lifetime
Value and feel the positive effects ripple throughout your company.
WAREHOUSE AUTOMATION
Some warehouses are completely automated, and require only operators to work and handle all the
task. Pallets and product move on a system of automated conveyors, cranes and automated storage
and retrieval systems coordinated by programmable logic
controllers and computers running logistics automation software.[citation needed] These systems are
often installed in refrigerated warehouses where temperatures are kept very cold to keep product
from spoiling, especially in electronics warehouse where they require specific temperature to avoid
damaging the parts, and also where land is expensive, as automated storage systems can use vertical
space efficiently. These high-bay storage areas are often more than 10 meters (33 feet) high, with
some over 20 meters (65 feet) high. Automated storage systems can be built up to 40m high.
For a warehouse to function efficiently, the facility must be properly slotted. Slotting addresses
which storage medium a product is picked from (pallet rack or carton flow), and how they are picked
(pick-to-light, pick-to-voice, or pick-to-paper). With a proper slotting plan, a warehouse can improve
its inventory rotation requirements—such as first in, first out (FIFO) and last in, first out (LIFO)—
control labor costs and increase productivity.[18]
Pallet racks are commonly used to organize a warehouse. It is important to know the dimensions of
racking and the number of bays needed as well as the dimensions of the product to be
stored.[19] Clearance should be accounted for if using a forklift or pallet mover to move inventory.
Data warehouse automation or DWA refers to the process of accelerating and automating the data
warehouse development cycles, while assuring quality and consistency. DWA is believed to provide
automation of the entire lifecycle of a data warehouse, from source system
analysis to testing to documentation. It helps improve productivity, reduce cost, and improve overall
quality.
Data warehouse automation primarily focuses on automation of each and every step involved in the
lifecycle of a data warehouse, thus reducing the efforts required in managing it.[2] Data warehouse
automation works on the principles of design patterns. It comprises a central repository of design
patterns, which encapsulate architectural standards as well as best practices for data design, data
management, data integration, and data usage.[3] In November 2015, an analyst firm has published a
guide Which Data Warehouse Automation Tool is Right for You? covering four of the leading
products in the DWA space.[4] In November 2015, an international software and technology services
company engaged in developing ‘agile tools’ for the data integration industry, was named by CIO
Review as one of the 20 most promising productivity tools solution providers 2015 [5]
Data warehouse automation can provide advantages like source data exploration, warehouse data
models, ETL generation, test automation, metadata management, managed deployment, scheduling,
change impact analysis and easier maintenance and modification of the data warehouse.[6] More
important than the technical features of DWA tools, however, is the ability to deliver projects faster
and with less resources.
Warehouse Challenges
1. Inventory accuracy. When manufacturers don't have full visibility to their inventory, they face the
problems of either running out of stock at the wrong time or carrying too much stock and thus
decreasing cash flow while increasing expenses to warehouse extra materials. Of the two challenges,
Garcia says the greater problem is inventory shortage, which can lead to unfulfilled orders and
unhappy customers.
2. Inventory location. "Lack of inventory oversight can cause a buildup of inefficiencies within the
warehouse that slows operations and increases costs," Garcia says. "Without adequate insight into
location, pickers take longer to find the items to ship, which slows the loading process and creates a
backup in labor allocation and dock-door scheduling."
3. Space utilization/warehouse layout. It's not about how much space you have; it's about
optimizing that space to avoid unnecessary labor. Keep fast-moving and high-selling inventory near
the front of the facility so lift truck drivers aren't constantly traveling to the farthest reaches of the
warehouse.
4. Redundant processes. Barcode technology, Garcia suggests, can reduce or eliminate the problem
of a pick ticket or other documentation having to pass through multiple hands -- e.g., a picker, a
checker, a stager, a loader, etc.
5. Picking optimization. "For warehouses that still have manual processes in place, there tends to be
no common route taken to pick items for shipment, which adds unnecessary time to the process,"
Garcia says. With system-directed pick/putaway, the routing can be automated, which will reduce
wear and tear on equipment and the workforce.
SECURITY
Security Measures in Mobile Commerce: Problems and Solutions
Mobile commerce, commonly known as M-Commerce, ‘is concerned with the use, application
and integration of wireless telecommunication technologies and wireless devices’, such as
Internet-enabled mobile phones, personal digital assistants (PDA), palmtops, laptops, and
pagers, commonly know as handheld wireless devices (HWD).
M-Commerce creates more security concerns than traditional E-Commerce. In this paper,
security measures in M-Commerce, wireless security, and the application of cryptography for
key generation, authentication, digital signature and digital certificate are discussed.
Device Security:
The SIM card and the mobile device are always stored together and the device is an every day
utility object that is easily lost or stolen. Time-out and key-locks are often not used on phones.
All WAP data, in some popular handsets, is stored in the phone’s memory, not in the SIM; this
will include login and password information. These features certainly diminish the security of
the mobile phone.
The SIM card used in mobile devices are de facto microprocessor and they can be used to
facilitate mobile commerce. Gemplus SIM cards features a digital signature and public key
encryption and the technology is embedded in the card.
Language Security:
If special purpose M-Commerce software, such as a stock trading application, is to be deployed
on mobile devices, then Java is the recommended language to be used as the deployment
language on the HWDs.
By using Java, the amount of software that needs to be changed in order to adopt the
application to various mobile platforms is minimized.
Feasible Java execution environments are available for PDAs, Smart phones, Communicators
(such as Symbian), laptops, and other platforms.
This allows for shorter time-to-market and avoids vendor lock-in.
Wireless Security
Wireless Application Protocol (WAP)
WAP is “an open, global specification that empowers mobile users with wireless devices to easily
access and interact with information and services instantly.”
WAP is currently the only publicly available solution for wireless communication and enables M-
Commerce where Internet data moves to and from wireless devices. WAP-enabled phones can
access interactive services such as information, location-based services, corporate information and
interactive entertainment.
WAP Security
WAP 1.x security uses the Wireless Transport Layer Security (WTLS) protocol. This protocol is
the WAP equivalent of Secure Socket Layer (SSL) and it provides authentication, encryption and
integrity services.
WTLS has three levels, all have privacy and integrity: (i) Class-1 has no authentication
(anonymous), (ii) Class-II has server authentication only, and (iii) Class-III has both client and
server authentication.
WTLS supports some familiar algorithms like Diffe-Hellman, RC5, SHA-1, IDEA. It also supports
some trusted methods like DES and 3DES, but it does not support Blowfish and PGP.
Public key cryptography (PKC) is used to exchange a symmetric or private key using certificate
and then all transmission is encrypted.
PKI/WPKI:
A PKI is a set of policies, processors, software, hardware, and technologies that use PKC and
certificate management to secure communication.
PKI must ensure the following:
(i) confidentiality, achieved by cryptography,
(ii) authentication, achieved by digital certificates,
(iii) integrity, achieved by digital signatures, and
(iv) non-repudiation, achieved by digital signatures and certificates.
WPKI is an optimized extension of traditional PKI for the wireless environment.
“WPKI encompasses the necessary cryptographic technology and a set of security management
standards that are widely recognized and accepted for meeting the security needs of M-
Commerce”.
Cryptography:
The two types of cryptography currently available are (a) symmetric or secret-key and (b)
asymmetric or public key cryptography (PKC).
In secret-key cryptography, two devices must share their secret key in order to communicate
securely.
Thus two concerns arise: How to exchange the secret key securely; and if n HWDs must
communicate with each other, a total number of O(n2 ) secret keys must be exchanged. The
management of such a number of secret keys should consider the scalability issues.
The de facto cryptographic algorithm for digital signatures and for encryption of secret keys is
the RSA PKC. For electronic commerce, it is a highly secure technique.
Although RSA is highly secure and widely used, there are some potential problems with its use
in M-Commerce.
Elliptic Curve Cryptography (ECC):
What is really needed is a public key algorithm that achieves a high level of security using short
keys.
Algorithms based on mathematical objects known as elliptic curves offer interesting
possibilities.
Elliptic curve discrete logarithm problems (ECDLP) is defined as “give a base point P and the kP
lying on the curve, find the value of k”.
Diffie-Hellman key exchange can be easily implemented in an elliptic curve system.
Certificates confirm that the public key given in the certificate belongs to a private key held by
the legitimate person, not by an imposter.
To trust a certificate means to trust the party who issued the certificate, not the person for
whom the certificate is issued.
To protect a certificate from being modified one uses digital signatures. The message can only
be created from the ciphertext by the private key holder. This provides authorization and non-
repudiation.That is the basis for digital signature.
How to protect private keys? The private key is stored in a Smart card, where all crypto
operations with it are performed. The Smart card access gets restricted by the use of a PIN. The
place where a user’s private credentials are stored is called Personal Security Environment
(PSE).
IEEE 802.11b
The WLAN standard IEEE 802.11b provides a mechanism for authentication and encryption.
It provides a maximum of 11 Mbps wireless Ethernet connections using the band at 2.4 GHz.
802.11b security features consists of security framework called Wired Equivalent Privacy (WEP).
WEP is based on RC4, a symmetric stream cipher.
Bluetooth:
Bluetooth technology, developed by Ericsson in 1998, is used to connect different HWDs and
provides a method for authenticating devices. Device authentication is provided using a shared
secret between the two devices.
The common shared secret is called a link key, generated from PIN. This link key is established in
a special communication session called pairing.All paired devices share a common link key.
There are two types of link keys: (i) unit keys and (ii) combination keys [17]. The link key is a
128- bit random number.
In every Bluetooth device, there are four entities used for maintaining the security at the link
level: (i) the Bluetooth device has an IEEE defined 48-bit unique address, (ii) a private
authentication key which is a 128-bit random number, (iii) a 8-128 bit long private encryption
key, and (iv) a random number, which is frequently a changing 128-bit number that is made by
the Bluetooth device itself [12]. The security algorithms of Bluetooth are considered strong.
Bluetooth standard does not use the RC4 cipher; rather it uses the E1, a modified block cipher
SAFER+. No practical direct attack has been reported.