OPEN SESSION: MOBILE MANAGEMENT
FORUM
Thursday 11th April 2002
Boston 1, Newport Beach Club,
Disneyland Paris
Chaired by Mike Lambert, CTO, The
Open Group
The meeting began with personal introductions being provided
by all present including expressions of the topics they are seeking to address
within the Mobile Management Forum.
Chandra Olson, Lockheed Martin Corporation
Chandra’s role is an Infrastructure Architect. Right now
Lockheed have only 2 approved mobility products; the RIM Blackberry and
cellular data card. The company has an objective to pursue device approvals and
certification in readiness for a managed deployment of mobile & wireless
technologies.
Richard Paine, The Boeing Company
Richard has been serving as chair and chief customer
contributor of the MMF Sessions Management Working Group which published a
requirements document for Sessions Management. Using this document Boeing is
pursuing an RFI for Session Management.
Richard is also working on the
Mobile and Directory activity. A current problem facing Boeing is they
are unable to make decisions on QoS since there is insufficient infrastructure
integration to establish and audit mobile communications QoS.
Boeing also have a part of the company called “Connexions by
Boeing” which is delivering an internet connection service in aircraft. This
effort surfaced lots of issues around mobile and moving subnets. They break the
rules of how IP is designed to work. This issue is further complicated by the
many military customers who have need for robust ad-hoc networks. What kinds of
technologies can be applied.
Security is a big stumbling block at the moment. Boeing have
had a wireless architecture since 1994 but twice now the deployment and money
has been cut back owing to security not being adequate.
Richard also serves on the 802.11i committee of IEEE.
Ikuo Shinozaki, Sony
Corporation
Ikuo works within the software division of Sony Corporation.
This division provides the Operating System and Middleware for consumer
products. Main interest are content conversion and Session Management. Sony is
wanting to stay appraised of the current trend in these areas. The personal
mobility products industry are a little behind the enterprise at the moment and
so there is value to Sony in monitoring Enterprise product and service
development and use thinking here to inform their personal/consumer product
developments. Key to successful personal products is usability and transparency
of infrastructure.
David Diskin, The US Dept of Defence (DISA)
Prime inhibitor for the deployment of Mobility in Defence is
Security. MMF Focus in this area would be highly beneficial.
Susan Stanton, Partners Healthcare System
Partners are a first time visitor to the Open Group. They
are about to conduct a mobility study. Going into this study they have already
recognised the need to address concerns of harmful interference and device
security. The study will comprise two pilots. The first will be in a health
centre with wireless notebooks being used as staff access and update patient
records. The second project is for inpatient treatment using Symbol devices for
medication administration. Susan is here to learn of experiences to date and
understand which issues are being addressed for the future, especially
concerning types of devices, wireless LANs and the wireless internet.
Chris Gervais, Partners Healthcare System
Chris works with Susan and his specific interest is in
Identity Management. This is needed to securely manage the large and varied healthcare
worker population. He is also interested in how to bring applications to
devices and how to service the needs of peripatetic workers spread across
a distributed healthcare service and
handling their changes of working location.
Michael Krasner, Krasner Consulting
Another first time attendee, Michael’s main interest is very
large scale mobile applications and how to build and roll out to millions of
users. The ability of standards to scale to meet these needs is of particular
interest.
William Estrem, University of St. Thomas
Bill is Director of the Information Management Program in
the University’s Business School and originally became involved to learn. Bill
wanted to use mobility for distance learning and they have built an
architecture that has global scope. Currently internet based it will become
more “disconnected” in future. The University campus is ripe for 802.11
deployment. Currently using a single access point, the students are planning a
WLAN deployment and are designing a network layout. Bill is very interested in
Security (AAA). This is a significant concern for research.
Stephan Wappler, Lynx-ctr GmbH
Stephan’s previous focus was as part of the AAA group and
remains his main concern - Security and Authenticatio, Authorisation nad Accoutning.
Renee Barnow, McKinley Marketing Partners
Renee provides communications services for the Messaging
Forum and was attending to hear more about the work and direction of the MMF.
Martin Kendrick, Brand Communications
Martin is the Managing Director of Brand, a vendor
specialising in communications products, particularly in the area of Session
Management. Martin is Co-Chair of the Session Management Working group with
Richard Paine.
Lee Hunter, CC and C Solutions
Lee is currently working at the University of Sydney and is
here to learn. He wants to persuade the University to invest in Wireless LAN coverage as a service and partially to
attract students but also to enhance the service provided to the faculty.
Colin Seward, Cisco Systems
Colin works for Internal IT Management and has been the
project lead on a pilot looking at extending Corporate services and information
to mobile devices. Colin expressed that it is good to be at a meeting with
other end users and not just with vendors. He is interested to share
experiences.
James (Jim) Debalina, Motorola
Jim’s interest covers the full breadth of mobility and has
expertise in both public and enterprise mobility infrastructure issues.
Introduction
to the MMF.
The Chairman provided an introduction to the MMF, and
explained the appointment of Peter George and Stef Coetzee as Co-Directors of
the MMF following the resignation of Gregory Gorman. The Chairman reported that
Gregory is currently founding a new company to deliver services in the Wireless
LAN industry.
Mike reviewed that when the MMF was formed we were at the
peak of the wireless hype, so we need to test the original premise on which we
started work. For example 3G should be broadly available now but it isn’t and
will be impacted by WLAN coverage by as much as 50%.
Discussion developed agreeing that what has been over hyped
is 2.5G and 3G – what has been under hyped is WLAN. We are all connected at
high speed at this conference hotel and struggling to get a signal on cellular.
The focus of today’s meeting is to review our progress to
date, assess the development of the industry, and consider how our efforts can
be focussed to help achieve the Integrated Information Infrastructure (In3)
The definition of Mobile and Wireless became a topic for
discussion. Mobile is not just devices and handsets but the connectivity models
as well. Mobile does not assume
Wireless, Wireless does not assume Mobile. However Mobile and Wireless is a
winning combination. It is important that we separate the two topics and
identify the issues. That is why we are called the MOBILE Management Forum.
The Open Group’s involvement in mobility is as a heavy user
holding four conferences a year and bringing together 200 people who all want
to do email remote from their offices. The number one mobile application today
is email. The Open Group was the first organisers of a conference with a
wireless LAN in Europe and tested to destruction the Wayport Public LAN
installation at the hotel in Austin.
In summary MMF members are talking about mobility, not
wireless. They also talk about problems, not products.
The
Chairman proceeded to deliver a presentation on the Integrated Information
Infrastructure. The following notes should be read in conjunction with the
published slides.
When xOpen was formed it did interfaces to UNIX. Then
attention turned to application portability. Latterly it has been hard to say
in once sentence what the Open Group does. In essence the organisation had no elevator pitch. The In3 approach has given
the Open Group back a focus and a vision. In summary we are trying to enable an
enterprise to get at the information locked in its systems.
In3 came about from a process. Interviews with many CIOs
surfaced a requirement for access to information. We asked them to put a
monetary figure on how much this was worth. Our members collectively suggested
100s of millions lost. But more significant is that people have died because of
this issue. – Aeroplanes have crashed with faults the FAA knew about but had
not been able to communicate. Patients have died because elements their records
were locked in systems not available to the physicians providing treatment.
Some CIOs estimated they spend 30% of IT budget coping with
the problem. The message is that the problem is universal. The basic challenge
is therefore that IT needs to cope with business mangers changing policies. And
this integration needs to be both inside and outside the company.
An explanation of the In3 message is to get the right info
to the right person at the right time in the right place.
Linking info together with XML and SOAP may achieve this,
but it may also get the info to the wrong person so we need to be able to set
policy and provide control. To achieve this we integrate existing systems in a
controlled manner, rather than gather all information into a single tidy place.
An In3 is a desired state for an Enterprise Infrastructure
specific to the needs of that Enterprise.
One of the challenges is being able to understand and
express business policy.
By defining a technical architecture we can get people
talking a common language and using words to mean the same thing.
The Open Group cannot develop an architecture. It can
develop a framework from which an enterprise can develop it’s own.
Some of the concepts of real time computing need to be
brought into the In3 Architecture. Examples include the 4 second rule on the
internet (a response time of longer than this and a user worries and begins
clicking buttons) and the One Working Day rule on Wall Street for deal
recording and closure. (Global Straight Through processing). This does not
negate the Swivel Chair or Sneaker-net route.
The role of the MMF is to look at the ability of an
organisation to set and implement a mobility policy. This can only be achieved
in small steps. However the mark of success is every-time we do something which
helps an organisation achieve an In3 we have advanced the cause. The Open Group
is an Enterprise led organisation.
The presentation finished with a proposal that the MMF
modify it’s focus to addressing how existing Standards efforts fit into the
overall architecture framework and work on filling the gaps and resolving
overlaps.
How are we differentiating or defining “the Enterprise”? Is
it organisations that establish their own, or those that rely on public,
infrastructure? How do we ensure those public infrastructure companies and
service providers also meet the needs of the 90% of businesses which is made up
of SME’s? We must make sure we include Public Infrastructure and Web Service
providers in our Enterprise involvement efforts.
How do we take the basic standards being developed and
deployed and persuade the owners and authors to enhance it? Example is security
added to 802.11 protocols.
We could approach this in two ways.
1
Add to the work of the Standards organisation by suggesting
changes to the existing standards.
2
Education of enterprises seeking to implement products using
the standard as to the issues and recommendations for ways of overcoming themin
ways that do not break the standard but adds a level of tighter definition.
In either case, the objective of the Open Group efforts is
not to change the behaviour of the underlying Standard. So for example we can
recommend the implementation of VPNs on Wireless LANs.
It was agreed that to succeed (in the example used) we must
be bearer agnostic. Therefore all the policies must be consistent and above the
carrier layer.
We must also be sure not to work only with a standards
organisation, but also with the consortia that exist around them (WiFi and WECA
around IEEE 802.11). We help the supply side get their market acceleration by
showing how the integration can take place. This means the large guys who can
afford to go in first (and get the biggest benefit) and hone the requirement
and solutions to the point were the solution becomes a commodity and this is
when the SME can afford to buy with confidence.
Colin presented on a Business Mobilisation Project. He works
for the internal IT Department. Please
see published slides for full details. Highlights are recorded below.
Pilot started in May 2001 to ensure they had a complete
architecture in miniature. The original
scope was 20 users, this grew to 60. Every time they saw a team doing their own
thing they were encouraged to join the pilot so there was a little scope creep.
Security
The solution implemented used a One Time Password approach.
Technically it is very strong but users don’t like it. Since users must log on
every time using a pin code data entry of this pin code is challenging on a PDA
or phone because of the keyboard or handwriting mechanism used to enter the
code on the devices. Users eventually boycotted use of these devices for
connection.
The WAP gateway didn’t come with a authentication server so
they had to add their own home grown product discontinued by Cisco because of
lack of interest in the market.
Content
Peramon technology provided the access to Eudora and Meeting
Maker. Proof of concept with Content re-purposing tool. Tried with Cisco.com
page to IPAQ and other clients. The page has a metadata framework so they can
rely on that to build a hierarchy. Important when building dynamic personalised
content. There is still a lot of work to be done though. They use a customer
profiling register to personalise the information for the person/device. VoxML
was also implemented. It has been a lot
of work to break down pages into 800,000 objects necessary to ensure the trans-coding
engine can work effectively.
Phase 2 is to push the profile back to the authoring process
so what is produced is for an intended end device type. Then the templates can
be built and let a content transformation engine to the final tweaking for the
specific device. This phase will run from summer 2002 until end of year.
Identity Management
The need for Identity Management in vital to any project
where users have multiple devices and can choose to have information delivered to
them on their device of choice. Web service definitions need to be influenced
by the receiving device – example was a news feed from OneSource. ELearning is also implemented using Backweb
to deliver Video on Demand (VoD). Through this mechanism Cisco can give the
user the choice of device on which to consume the VoD.
The conclusion is that the easiest route to deploying mobile
apps still remains the use of a laptop PCs with a data card (WLAN or GPRS as
appropriate). Since the average email
load of a Cisco executive is 35-40 Meg per day WLAN is favourite and a PC is
the correct form factor to process this volume of work.
Cisco wrote up their pilot findings in November. The future
plan is to take the models developed in US and Europe and flip them into roll
out in the other theatre.
Lessons were also learned about the success of the pilot
according to the profile of the user against the technology adoption life
cycle. In post pilot analysis they recognised they had a fair mix of users
across the spectrum from Technology Enthusiasts to Sceptics. In future they
will make more use of the users profile to target devices and services
appropriately across this mix.
Cisco has established a Mobile Centre of Excellence in IT to
co-ordinate and drive activities going forward.
The MMF and Directory working group has spent 9 months
developing on the Mobile Executive Use Case Scenario originally produced by the
MMF in 2000/2001. This new document now
highlights the Directory requirements to support the demands of the mobile
executive.
The group needs to define the next steps to finish the
document and have it adopted. This will involve review by both the Mobile
Management Forum and Directory Groups.
As a result of the document work the Working Group has come
up with an architectural model which requires some enhancement as to what
directories can do. Mobile environments require information which is real-time
or close to it (location services etc). Directories do not typically support
rapid update scenarios such as this, they are designed and optimised for read
only. To be effective in the mobile space they came up with a need for a method
to capture the static and transient information.
It was noted that more involvement is required in the Joint
Working Group from MMF members.
ACTION: Call for
more active participants in the MaD work from the Mobile Management Forum to
ensure mobility assumptions are correct. MMF members are requested to advise
Peter George or Stef Coetzee of their wish to participate in this work.
The DMTF and DEN presentation showed there is clear
convergence between technology, standards and the requirements. The proposed
next step is to conduct an official analysis to see how close we are together.
We should also investigate co-operation with the TMF as
regards SLA managament as both DMTF and Open Group have relationships with TMF.
It was agreed by the meeting that the Open Group, and in
this case the MMF, should focus on Standards Integration.
In summary the proposed next steps outlined by Ed Harrington
are:
1
Review/Evaluate DMTF CIM Schema and Model
2
Review/Evaluate work of ITU and BQM
3
Review the Business Scenario
4
Publish the Business Scenario
5
Prove that Directories can help solve the issues – to do
this we create a challenge and launch it in October.
Review Process
This is a publication of findings and so we don’t need
Membership comment on anything other than it be an accurate reflection of
findings. The possible outcomes still need some discussion. DIF work might be
until late May. We might possibly convene a joint telephone call to approve. We
should aim to achieve sign off by mid-May at the latest.
ACTION on the
MMF to approve and provide feedback on the Business Scenario by the end of
April 2002.
ACTION:
Suggestions for Next Steps to be sent to Ed Harrington ASAP for inclusion by 19th
April @ ed.harrington@nexor.com
Mobile Directory Challenge
Discussion proceeded as to the practicality of launching a
challenge and the desired time frame. It is considered possible by October but
there is still a lot to work to do. January would be safer.
Ed Harrington – we have been invited to present in June at
San Jose in June. Will we get a response from the DMTF in time for
October? It was also suggested that
Cisco’s experience (and the benefit they could gain from participation)
positions them ideally to participate in the challenge.
The MMF meeting questioned what activities were ongoing as regards
Identity Management in the DIF as this had already been highlighted as a
significant area of interest within the MMF.
Chris Harding responded by showing a video of the Identity Management
discussions by the Directory Group
The MMF leadership asked fro the DIF’s opinion on how this
issue spans Directory and Security? There is another Business Scenario being
developed by the DIF to explore this issue.
They will take any input that there needs to be as regards mobility
considerations and include in the joint SaD document on Identity Management.
Standards prioritisation will be suggested by MaD, and the DIF was encouraged
by MMF to consider how best to include
the MMF in this initiative so that we do not forge independent, uncoordinated
relationships with the Security Forum.
New technologies are easier to force/encourage
interoperability. As we move forward to realise the In3 Vision, the Open Group
needs to work its own In3 Project to ensure its Forum workings interoperate.
There was also some discussion on
how the MMF could work with the QoS
Forum. There is an opportunity to work
with the TeleManagement Forum and QoS as joint activity .
Mobile Management in the context
of In3
The Open Group embarked on some work with the CIO’s of some major corporates
to develop the In3 concepts. What was discovered with the business scenario
work? First it was discovered that we needed a general yet useful working
definition for interoperability. There were many definitions, all of which were
fairly specific to technologies or areas of specialization, for examples object
interoperability was defined to discuss a technical issue, or library
interoperability described a subject area issue. When it came down to it the
definition that was most useful was one that again was general enough, but
provided the fundamental characteristics.
This definition is fairly general, but it is very useful.
On the road to getting to the customer problem statement on the last
chart there were many questions and responses around how the issues are
manifesting themselves. These “pain points” are indicators, some of which you
may identify with and some you may not. But let’s look at these indicators. The
first one is lack of perceived effectiveness of business operations. Whereas
there is continued increase in costs of running the business, there isn’t an
perceived increased in time to market, or time to deliver. There is also a
perception that there is still an inability to provide effective services to
customers.
The next pain point is the perception of lost opportunities to add value
to the business. The belief is that non-discretionary spending continues to
rise while spending on adding business value is decreasing because we’re
spending just to keep things operational. The result is that new features are
sacrificed just to “keep things running”
Increasing IT costs is always something that is scrutinized. When some organizations
look at their environment they are seeing redundancy and duplication in IT
assets, which cause unnecessary increases in maintenance costs and an increased
reliance on (expensive) IT service providers to integrate things. Here there is
an imbalance that needs to be addressed.
Of course related to all the above is the perception of an overall lack
of effectiveness of the IT organization. Poor service provision to users , IT
changes not implemented when the business needs, and IT is seen as a restraint,
not an enabler.
Another area where the pain is exposed is in the perception that there is
little management control of the IT environment. The IT and business
environment are just too complex to manage, IT is not driven from strategic
architecture and it is difficult to balance short and long term choices. These
pains feed on each other.
Finally many point out that as we
continue down this path there is increased operational risk. Increased security
risk, dependence of safety criticality, and IT becoming a "choke
point" all are risk factors that need be addressed.
As mentioned
previously In3 deals with extending the reach to break down barriers. This can be
viewed through the following notional levels:
Level 1 is where barriers are broken down within the traditional
enterprise. In this extent one can assume a certain level of shared corporate
language. Though departmental languages do exist and must be accommodated when
providing information integration.
At level 2 one looks to break down barriers between the enterprise and
its immediate partners. These partners are those organizations that are in the
same industry and therefore share a common industry language. Here sometimes
the customers are in the industry, sometimes there not - again this is merely
an example.
At level 3 one looks to break down barriers with other organizations that
are involved in the business but outside
Within the enterprise and extended to business partners:
Suppliers and the like that are part of the industry. Within the
enterprise and extended to business partners, and other organizations such as
banks that are in another industry.
Back to the big example. In order to understand how broad the problem
applies let’s just ask what the business environment looks like at a 40,000
foot level. Again this picture is illustrative and not intended to represent
each and every organization. For example some companies have their own
distribution centers, and some others don’t. But let me make the main points.
The first point is that there are numerous facilities of different kinds and in different locations within
the business environment. The environment is and forever will be distributed
and there is now and forever will be different domains crossed. As an
implication there is usually a set of users who are mobile within the
environment and this mobility must be supported. Mobility is another of those
incontrovertible characteristics of the majority of today’s organizations.
Another major point than needs to be made is that the business
relationships are with these other
organizations many of which are not in the domain of your organization,
e.g. the banks and legal institutions may not be in the domain of the retail
business. The shape of the organization and its business relationships is dynamic. One partner may become part
of the company through acquisition, and then become a risk sharing partner,
then a competitor. All of this could happen fairly quickly.
The scenario includes a possibility of interfacing with the general public,
which presents some challenges as the general public does not necessarily share
the same language as that of the business. Finally the distinction between
those “inside” and those “outside” the organization is situational and
blurring.
From the feedback received prior to the meeting a range of areas of
indicated interest were shared with the meeting for discussion and
consideration.
These included:
Strong support was
forthcoming for the topics of device management, access control and physical
security.
Desired state management was seen
as critical from a usability point of view. To date the MMF had seen that in
the scope of the Synchronisation effort. The Synchronisation working group Open
Synchronisation Framework Document is a useful point of reference in this
context. It is not complete, but offers
an opportunity as input to any ongoing efforts in this regard from the MMF.
Cisco mentioned that they see the need for guidelines to turn synchronisation
into a utility/commodity as a means to improve the end user experience. Motorola saw synchronisation as primarily a
data base and data management issue. The meeting discussed how complexity for
the end user increased once a user has a dependency on more than two devices.
As the number of devices increases the issue gets overly complicated. Spanning the phone, PDA, laptop and desktop
becomes too complicated.
Rich debate followed on what
behaviours from end users would the MMF consider in scope as it zeroes in on
what is useful to focus on. One view
was segmenting the population between those who have accepted wireless and those
that are still wire-line intermittently connected. This gained some support - further discussion brought forward the
importance of QoS definitions. This would help ensure that both wireless and
wire-line behaviours can be accommodated with appropriate class of services
defined for both. A sector of the MMF
still disputes that synchronisation is of value. There was a strong view that certain sectors of industry would
not be able to assume wireless connectivity for a number of years yet. A good
example offered for the need to have synchronisation was for home health care
workers and other field personnel in remote geographic locations where there
was no wireless coverage.
Firewalls were seen as an issue by
the meeting. SOAP tunnelling was
flagged as a concern. The Security Forum does not appear to focus on this area
yet. This led the meeting to reinforce that this may need a joint activity with
the Security Forum.
The meeting discussed the need for
a project to produce an architectural model for mobility. This activity is seen
as a good base for any mobility oriented conformance testing and certification
activity. Broad support was expressed for developing architectural models for
mobile coupled with appropriate business scenarios that went beyond the executive
scenario and embraced field workers.
The problem of providing
enterprise buyers with confidence in evaluating solutions before deploying was
discussed. The meeting saw end-user device certification and conformance in an
enterprise context as valuable; this was discussed in the context of certifying
the device in the context of the service to be used. The meeting supported the
need for a certification and conformance testing of the device/service
combination. A possible way to progress
this is to go to the carriers and gain support for a conformance activity in
The Open Group as a trusted objective broker.
Desired state management is seen
as critical this needs to be transparent to the end user and should not require
recall of devices to upgrade firmware or software on the device. The meeting felt that adequate
standardisation does not exist to provide this.
Location awareness was raised as a
critical issue in various industry sectors – in the meeting we had strong
representation from the medical, transport and military requirements where
presence and location are critical
The meeting went on to discuss the
relationship between applications and roaming attributes, and the need to be
sensitive to the content delivery network. The conclusion was that this could
be provided by policy based networks.
Data encryption on the device was
discussed. There are different levels
required for different applications. It
was recognised that some apps could be satisfied by encryption in the transport
but for others end to end encryption was critical.
The meeting also discussed the
benefits of a use case scenario for embedded system as remote sensors. These
are communicating devices that could be installed across a broad range of
devices and equipment that needs to communicate to central control points.
Boeing expressed the need for a
single point of billing for cellular and wireless LAN billing. They went on to
share that 802.11i will not be a standard for another year or more; and as such
is there anything that needs to be done for the next year or two. Should we assume that you will always have
VPN on top of WLAN. One also needs to
think that denial of service, authentication etc etc is (or should be) of great
concern. The meeting concluded that the MMF need to be specific to make sure
that we speak of security in its component parts – encryption,
authentication/identification, etc. rather than broad generalisations to ensure
understanding.
A discussion on whether bearer
security had any relevance if one was going to have end to end security anyway
to overlay it. There is still a need
for certain classes of service where full end to end security might not be
provided
During the device discussion,
authentication on device when it wakes up after standby was surfaced as a
usability issue. If cumbersome
authentication schemes had to be entered every time, the users would get fed-up
and the application would suffer user boycott. Various solutions were discussed
to ease the burden on the user whilst still satisfying the security need. These
included discussion on how many factors were required? Two levels were
considered typically adequate in today’s implementations – pin-code, some form
of biometric security (finger print, voice recognition) or a smart-card
Sony voiced concerns on hacking
and virus exposure as PDAs and notebooks become more permanently connected to
the internet.
Cisco mentioned usability
obstacles given the conflict where encryption mechanisms on storage cards
generated on one device would not necessarily be portable across different
devices.
The Device discussion also
surfaced a concern, common among many enterprise users, that mobile devices are
subjected to networks compatibility and efficiency testing and introduced and
withdrawn by carriers and service providers based on these test results which
are not made public. The enterprises are therefore not able to make an informed
decision as to the suitability of a device for adoption. Cisco particularly
would like for there to be an independent authority which normalises the tests
and collects the results making them available for Enterprise use.
There was also significant interest in ergonomics and device
usability. The meeting did not surface any specific suggestions on relevant
actions from the MMF other than the points raised by members in response to the
survey, as noted below and shared with the meeting.
Sony Corp
Boeing
NetMotion Wireless
The MMF Mission Statement was
presented to the meeting at the close of this section of the agenda.
Accelerate the integration of mobile applications into any information
infrastructure by bringing together supply and demand side organisations to ensure delivered
solutions meet customer requirements.
About the Survey·
Sent to
·
All MMF members via the OGMMF Mailing list.
·
All MMF supporters
·
All delegates registered for the Managing the
Mobile Workforce Plenary
·
Only 5 responses by “soft” deadline (15th March)
·
Many more responses received since 1st April.
·
Incomplete responses lead to slight statistical
anomalies.
|
The
final session of the meeting was to review where the MMF had been, summarise
what we had covered this week and to propose actions for the quarter ahead. The
mechanism used was to capture an order of priorities form all attendees and
then cluster the output to arrive at an understanding of agreed next steps.
Priorities are to be reviewed with
members unable to attend this meeting by end of April
and further input sought.
The discussion concluded that
there are a couple of points the MMF must pick up.
1
How do we engage more people to
get involved. (We have a whole load of members who cant be here for economic
reasons.)
The membership asked us to
investigate video conferencing or some other interactive method for getting
people involved. Webcast technology could work well and will be investigated
for the meeting in Boston.
ACTION: Forum Directors to investigate interest in, and capability to
provide, Webcast facility for MMF meeting in Boston.
2
We need to establish formal
Reporteur roles into Alliance organisations and Standards Bodies
ACTION: MMF members to propose
organisations for productive alliance, and nominate/volunteer individuals to
fulfil the role of Reporter.
3
It is important to Re-establish
Governance of the group.
The existing steering committee
has not been visibly active for 9 months. It was agreed that the MMF leadership
would re-structure the MMF Steering
committee once the project teams have
been structured as nearly all of it’s members have either left, or changed
company. The meeting agreed that it is time to restructure the MMF into new
project focuses to reflect the revised needs of members, as determined by this
meeting.
The MMF
leadership will establish a new steering committee to reflect the renewed
focus.
The Open
Group and the Mobile Management Forum expressed their appreciation and would
like to recognise the efforts of our outgoing steering committee over the last
couple of years.
ACTION: MMF members not in the
meeting are invited to specify a project working area you are prepared to
participate in (either as defined by the meeting or a new area of focus you
would like to champion). Peter and Stef
to follow up with all members not able to attend the Paris meeting.
Members are advised that the next
quarterly meeting will be in Boston, MA, USA on July 24th & 25th.
It is proposed that the Wednesday will be an all day meeting. To accommodate
all the US organisations that were unable to attend our meeting in Paris, the
first day of this meeting will be an open meeting for all interested parties.
On Thursday 25th July the MMF will progress activities in the
project teams including arranging joint sessions with the other forums, but
particularly Enterprise Management, Directory, Security and QoS.