Beruflich Dokumente
Kultur Dokumente
David Gautschi
Director of Research
CCG Group LLC
University of Maine
Computer Science Seminar
16 September 2004
Asset valuation…
Technology Examples:
• Firewall • ISP account • Network • ISP account • WiFi Access • Laptop • Coffee shop
• Authentication • CLEC access backbone • CLEC access Point • PDA • Hotel
• VPN (X.25, frame • Authentication • Bluetooth • Wireless Card • Airport
• WLAN access relay, ATM) • Cell tower • Cellular Phone • Home
points • Modem (T-1, • Operating
• Ethernet cable DSL, Cable, System
PSTN) • Application
Methods for accessing data and the technology chains they involve:
Wireless Campus:
WLAN private hotspots,
Point solutions
150000
100000
50000
0
2002 2003 2004 2005 2006 2007
IDC Gartner Group
60
50
40
30
20
10
0
0 2000 4000 6000 8000 10000
Users
Outside Campus Beyond the physical boundaries of the enterprise facility and IT infrastructure
stationary Home Activity conducted at an access point exclusive to the user
(Telecommuter)
locally, Coffee shop, Bookstore Activity conducted at designated access points within a
portable office (Nomad) delimited and defined locale
locally, Delivery truck, Gas stations Activity conducted presuming ubiquitous access within a
actively mobile (Windshield Warrior) delimited and defined locale
extensively, Hotel, Airport, Business center Activity conducted at designated access points beyond
portable office (Road Warrior) the defined locale
(3) Rich data and Portable office, Forms SFA Customized GPRS
Specialized medium to actively mobile Knowledge CRM versions of 1xRtt
User Process heavy transfer ERP SFA, CRM, Wi-Fi
or Activity Forms ERP, forms, WLAN
industry- campus
specific apps RF
Bluetooth
Seattle WA 10
Washington DC 3
Total 86
U.S. Europe
Venue Type
Coffee shop/café 33 14
Restaurant/pub 5 4
Bookstore 9 2
Library 2
Hotel 10 7
Airport 7 1
Copy Shop 8
Train Station 2 5
Public Park 2
College/University 3 1
Municipal Office 1 2
Shopping center 2
Truck stop 1
Office building 1
After installing the equipment and services, she accomplishes her work
with no significant problems for about two weeks. On a late Sunday
afternoon, she experiences a problem reading a file from the Internet.
She cannot determine for herself if the issue is one of the connection
(hence the DSL service), the computer, its operating system, or the
application program she is using.
What should she do? Which technology vendor will solve the problem
with her system?
Enterprise
Economic pressures technologies are
retard decision-making RISKY
Fixation on ROI
TELE
Virtual Generates Reference Case Evidence from
prospective technology users in a
Enterprise realistic enterprise context
Environment
1. Participants run businesses
2. Technologies introduced as treatments
3. Scenarios challenge the performance of
the virtual businesses
4. Virtual + realistic mean Î SAFE!
Behavioral simulation
Return on Technology
1. Faster and better than conventional
needs analysis
Experimental Method 2. Faster and better than a pilot
3. Faster and better than a conventional
systems integration plan
www.ccggroup.net