Welcome!

Microservices Expo Authors: Elizabeth White, Derek Weeks, Mehdi Daoudi, Don MacVittie, John Katrick

Related Topics: Mobile IoT

Mobile IoT: Article

It's the Transaction, Stupid

It's the Transaction, Stupid

Red lights flash in my mirror. I can't believe it - another speeding ticket and I'm already late for my morning meeting. As I wait 45 minutes for the police officer to copy my license, registration, and insurance information, my mind begins to wander - isn't this what our customers complain about? Their field workers are in the dark ages, manually processing multiple data sources like licenses, insurance forms, and registrations while pressing hard on carbon forms latched to steel clipboards. And while there are plenty of esoteric reasons to adopt mobile technology, every businessperson knows that it's the irrefutable, tangible return on investment that drives corporate adoption. So in spite of receiving four points on my driver's license and a $55 fine, I appreciate the insight - automating transactions will drive corporate adoption of the mobile Internet.

Wherever I go, it's the same story: "Bob, our field reps record activity on a paper form and at the end of a shift they drop it off at headquarters. That's when the nightmare begins - illegible handwriting, incomplete forms, sold-out inventory, and bundling options that don't exist. The result? Dissatisfied customers, lost momentum, and an unproductive field. And the hard dollar cost - we're paying $10 to $100 to process every transaction."

Whether it's sales, service, inspection, workflow, or public safety, there are plenty of paper forms to eliminate. With a mobilized process, imagine a different scenario of the traffic ticket that took 45 minutes:

  1. Need to copy my license, registration, and insurance? How about scanning the bar codes on my car window and my driver's license and add a real-time query to see if my insurance is up to date? Better yet, with an automatic vehicle identifier (AVI), the police car could wirelessly read this information and indicate if I am a friendly citizen or a stressed-out salesperson on the verge of road rage.
  2. Need my location, speed, and the time of day? A Global Positioning System (GPS), Bluetoothlink from the radar gun, and a real-time clock could provide all of that information.
  3. Send in the ticket or appear in court? How about allowing me to provide you with my credit card on the spot to pay the fine and receive a reduction in points?
  4. First day on the job, officer, and you forgot to check if I have any outstanding warrants? No problem. Like every quality mobile application, exceptional conditions and alerts are part of the package. And no, you can't arrest me today.
This is a simple example, but based on other industries, the cost involved in processing a traffic ticket totals at least $30. This $30 includes the time it takes to write the ticket, enter the data, schedule a court date, enter the data again into the insurance system, process the fine, and record the points on the driver's license.

These same costs are present in many field forces, whether it's sales, service, inspection, or operations. By mobilizing your workforce, you can build a rock-solid return on investment with as few as five transactions per field worker per month while dramatically increasing the speed of doing business and creating a positive experience for your customers.

Isn't This a Technology Magazine?
Okay, I know what you're thinking - another "business" guy waving his hands over all the hard stuff. It's just a paper form, right? Wrong. It's actually multiple-legacy back-end information systems that don't talk to each other, communicating over a low-bandwidth, unsecured, intermittent network to a thin-client device operated by a nontechnical user. It's also business logic to generate alerts and support and maintain the solution while it's in the field. In fact, there are six major technical issues that need to be addressed:

  • Integration
  • Business logic
  • Security
  • Network and client device limitations
  • User experience
  • Total cost of ownership
Since it's impossible to cover all of these areas in one article, over the next several months we'll discuss each topic in detail. For now, let's look at the highlights of each area.

Integration
While the major focus is on handheld devices and wireless networks, the real mobility issue is the complexity of integration across multiple legacy information systems. For example, the system used to issue a traffic ticket will have multiple information-system "silos," including the home state's driver's license and vehicle registration system, similar systems for the other 49 states, insurance systems from multiple carriers, a court scheduling application, an arrest warrant database, and commercial credit authorization. Not only must data be extracted from these systems, but separate data models need to be integrated as well. For example, suppose one insurance system derives the state from the driver's zip code, the home state license and registration system has a dedicated field, and a neighboring state prepends the two-character state abbreviation to the license number and places it in one field. How do we integrate the data from these separate systems?

What we need to do is extract the data in real time and dynamically transform the data items into one common data or business model. The solution is best thought of as Dynamic Business Modeling, or DBM. The DBM is able to point to data in its original legacy location and transform it on demand to present a common model to the world.

This DBM approach also has the advantage of insulating mobile applications from underlying sources because the DBM acts as an abstraction layer between applications and data. For example, if a neighboring state switches to a new license and registration system, the DBM allows the modification of the business model to occur in minutes instead of months, which keeps the traffic ticket system operational.

Business Logic
In addition to extending corporate information systems, the mobile Internet enables business practices that were never before possible. For example, when a police patrol car pulls up behind a stopped vehicle, it makes sense to give the police officer a real-time alert of a dangerous situation. To do this, databases need to be queried for arrest warrants, stolen vehicles, and all-points bulletins. In most cases this business logic hasn't been written. Therefore, not only must any mobilization effort extract legacy data, it must also apply new business logic against the legacy data.

Security
Imagine the fun a teenager would have getting hold of a lost traffic-ticketing device. It wouldn't be surprising if an entire high-school teaching department lost its driver's licenses. Mobility solutions need to address four security considerations:

  • Authentication: Validating the identity of the user. Potential solutions range from simple password-based systems to smart cards and biometrics.
  • Encryption: Ensuring that nobody can eavesdrop on a data conversation. Potential solutions use the native encryption of each network segment or overlay an end-to-end solution.
  • Access control: Ensuring that users see only the information for which they are authorized. Access control needs to be built into every mobile application, and ideally should integrate with existing systems like LDAP or the Microsoft NT Security architecture to minimize administrative costs
  • Theft and employee termination: Both are major security issues. IT organizations must be able to centrally disable mobile devices, and in applications that are very security sensitive local file systems must be encrypted.
Network Limitations
To meet the needs of mobile workers, mobile applications have to work with or without network coverage - that is, online or offline. Offline application functionality may be restricted, but mobile workers still have to do their jobs inside buildings and outside major urban areas and traffic corridors. And limited bandwidth implies a different architectural approach in which the mobile device is best used for command and control of headquarters-based servers on high-speed networks that can carry out operations on behalf of the field worker. For example, a salesperson can use a handheld device to request that sales literature be e-mailed to a prospective client. There's no need for the handheld device to store the literature locally if it can "command and control" a central literature server.

User Experience
Small screens, limited keypads, hands-free operating environments, and end users with limited computer literacy can be barriers to the effectiveness of a mobile application. Applications that are designed, tested, and piloted with a deep understanding of the end-user environment will overcome these obstacles.

Total Cost of Ownership
Gartner estimates that the total cost of ownership (TCO) of a handheld device is three times the purchase price. This TCO estimate considers only call-center support and break-fix replacement. If mobile commerce is going to be widely adopted, the real driver behind TCO will be how well mobile applications integrate with existing systems.

For example, when providing secure access control, we have to ask whether we want to introduce a separate security environment or integrate with the existing LDAP infrastructure. It's critical that IT pays careful attention to such ongoing maintenance issues.

* * *

The bottom line is that where paper transactions exist, there are ROI and IT challenges. Companies that address these challenges by deploying mobile solutions within the next 12 to 18 months will have significant competitive advantages. Those companies that are late to market will cease to be competitive. The call to action for mobilizing the enterprise can be compared to the familiar story of evolution - businesses will either "mobilize or die."

M-Commerce
Transactions that make the cash register ring always get the most attention. So what are the business drivers behind mobilizing commerce transactions from the field?

  • Order entry: Most field commerce transactions are paper-based and cost anywhere from $5 to $50 each to process. Mobilization reduces the same transaction cost to pennies.
  • Rejected orders: Whether it's inventory that doesn't exist, misconfigured options, or incomplete information, the average business experiences a 20 to 30% order-rejection rate. This problem is expensive to rectify, and it kills customer satisfaction.
  • Inventory: When it takes one week to process an order, companies are forced to fulfill sales out of their local inventory. By mobilizing the "demand chain," inventory can be centralized, and inventory costs will be dramatically lowered.
  • Dynamic pricing: As was the case with e-commerce, the mobile Internet promises to fundamentally alter pricing. A mobility solution can dynamically adjust price based on inventory levels, test spot promotions, and set prices regionally.
  • Sales momentum: Conducting business in the twenty-first century means that customers expect immediate response and fulfillment. Customer satisfaction is difficult to quantify, but it's perhaps the most important long-term mobile commerce business driver.
Where Are the Transactions?
The greatest needs for mobility exist in four areas:
  • Field sales: Mobility needs include checking price and inventory, validating credit, and booking orders.
  • Field service: The process of issuing original work orders, authorizing return merchandise, and closing out work orders creates a great need for mobility.
  • Warehouse and delivery: Workflow can be mobilized to track the process, identify areas in need of improvement, and enable real-time customer status information.
  • Inspection: Buildings, elevators, safety systems, and other structures and systems are inspected on a regular basis. Mobilization can organize and track the inspection processes.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@MicroservicesExpo Stories
"I focus on what we are calling CAST Highlight, which is our SaaS application portfolio analysis tool. It is an extremely lightweight tool that can integrate with pretty much any build process right now," explained Andrew Siegmund, Application Migration Specialist for CAST, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Admiral Calcote - also known as Lee Calcote (@lcalcote) or the Ginger Geek to his friends - gave a presentation entitled Characterizing and Contrasting Container Orchestrators at the 2016 All Day DevOps conference. Okay, he isn't really an admiral - nor does anyone call him that - but he used the title admiral to describe what container orchestrators do, relating it to an admiral directing a fleet of container ships. You could also say that they are like the conductor of an orchestra, directing...
The past few years have seen a huge increase in the amount of critical IT services that companies outsource to SaaS/IaaS/PaaS providers, be it security, storage, monitoring, or operations. Of course, along with any outsourcing to a service provider comes a Service Level Agreement (SLA) to ensure that the vendor is held financially responsible for any lapses in their service which affect the customer’s end users, and ultimately, their bottom line. SLAs can be very tricky to manage for a number ...
Our work, both with clients and with tools, has lead us to wonder how it is that organizations are handling compliance issues in the cloud. The big cloud vendors offer compliance for their infrastructure, but the shared responsibility model requires that you take certain steps to meet compliance requirements. Which lead us to start poking around a little more. We wanted to get a picture of what was available, and how it was being used. There is a lot of fluidity in this space, as in all things c...
Gaining visibility in today’s sprawling cloud infrastructure is complex and laborious, involving drilling down into tools offered by various cloud services providers. Enterprise IT organizations need smarter and effective tools at their disposal in order to address this pertinent problem. Gaining a 360 - degree view of the cloud costs requires collection and analysis of the cost data across all cloud infrastructures used inside an enterprise.
Some people are directors, managers, and administrators. Others are disrupters. Eddie Webb (@edwardawebb) is an IT Disrupter for Software Development Platforms at Liberty Mutual and was a presenter at the 2016 All Day DevOps conference. His talk, Organically DevOps: Building Quality and Security into the Software Supply Chain at Liberty Mutual, looked at Liberty Mutual's transformation to Continuous Integration, Continuous Delivery, and DevOps. For a large, heavily regulated industry, this task...
DevOps promotes continuous improvement through a culture of collaboration. But in real terms, how do you: Integrate activities across diverse teams and services? Make objective decisions with system-wide visibility? Use feedback loops to enable learning and improvement? With technology insights and real-world examples, in his general session at @DevOpsSummit, at 21st Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, explored how leading organizations use data-driven DevOps to clos...
The goal of Microservices is to improve software delivery speed and increase system safety as scale increases. Microservices being modular these are faster to change and enables an evolutionary architecture where systems can change, as the business needs change. Microservices can scale elastically and by being service oriented can enable APIs natively. Microservices also reduce implementation and release cycle time and enables continuous delivery. This paper provides a logical overview of the Mi...
The notion of improving operational efficiency is conspicuously absent from the healthcare debate - neither Obamacare nor the newly proposed GOP plan discusses the impact that a step-function improvement in efficiency could have on access to healthcare (through more capacity), quality of healthcare services (through reduced wait times for patients) or cost (through better utilization of scarce, expensive assets).
Gone are the days when application development was the daunting task of the highly skilled developers backed with strong IT skills, low code application development has democratized app development and empowered a new generation of citizen developers. There was a time when app development was in the domain of people with complex coding and technical skills. We called these people by various names like programmers, coders, techies, and they usually worked in a world oblivious of the everyday pri...
The “Digital Era” is forcing us to engage with new methods to build, operate and maintain applications. This transformation also implies an evolution to more and more intelligent applications to better engage with the customers, while creating significant market differentiators. In both cases, the cloud has become a key enabler to embrace this digital revolution. So, moving to the cloud is no longer the question; the new questions are HOW and WHEN. To make this equation even more complex, most ...
Some journey to cloud on a mission, others, a deadline. Change management is useful when migrating to public, private or hybrid cloud environments in either case. For most, stakeholder engagement peaks during the planning and post migration phases of a project. Legacy engagements are fairly direct: projects follow a linear progression of activities (the “waterfall” approach) – change managers and application coders work from the same functional and technical requirements. Enablement and develo...
The past few years have brought a sea change in the way applications are architected, developed, and consumed—increasing both the complexity of testing and the business impact of software failures. How can software testing professionals keep pace with modern application delivery, given the trends that impact both architectures (cloud, microservices, and APIs) and processes (DevOps, agile, and continuous delivery)? This is where continuous testing comes in. D
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
The dynamic nature of the cloud means that change is a constant when it comes to modern cloud-based infrastructure. Delivering modern applications to end users, therefore, is a constantly shifting challenge. Delivery automation helps IT Ops teams ensure that apps are providing an optimal end user experience over hybrid-cloud and multi-cloud environments, no matter what the current state of the infrastructure is. To employ a delivery automation strategy that reflects your business rules, making r...
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone in...
Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Kubernetes was originally built by Google, leveraging years of experience with managing container workloads, and is now a Cloud Native Compute Foundation (CNCF) project. Kubernetes has been widely adopted by the community, supported on all major public and private cloud providers, and is gaining rapid adoption in enterprises. However, Kubernetes may seem intimidating and complex ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
For DevOps teams, the concepts behind service-oriented architecture (SOA) are nothing new. A style of software design initially made popular in the 1990s, SOA was an alternative to a monolithic application; essentially a collection of coarse-grained components that communicated with each other. Communication would involve either simple data passing or two or more services coordinating some activity. SOA served as a valid approach to solving many architectural problems faced by businesses, as app...
Many IT organizations have come to learn that leveraging cloud infrastructure is not just unavoidable, it’s one of the most effective paths for IT organizations to become more responsive to business needs. Yet with the cloud comes new challenges, including minimizing downtime, decreasing the cost of operations, and preventing employee burnout to name a few. As companies migrate their processes and procedures to their new reality of a cloud-based infrastructure, an incident management solution...