Executive summary3
Introduction3
Problem statement.1
Method4
Findings .4
Analysis5
Conclusion.5
Agenda6
References..7
Appendices.8
Justification Report
Executive Summary
The current implementation plan relates introducing new mobile solution offered by T-Mobile USA. This plan contains the detailed information regarding the development of the new product with phased structure of its implementation outlined. The innovation proposition concerns mobile safety networks. The new mobile technology can be implemented either on defense enterprises or for the development of public safety. It is supposed to help T-Mobile USA develop significant competitive advantage and save costs.
Introduction
The current report provides implementation plan that promotes the development and use of mobile applications within T-Mobile USA. The application of mobile technology is supposed to increase the number of people aiming to share information quickly. The technology is supposed to be globally integrated into non-secure and secure communication processes. It will contribute to the development of portable control capability based on cloud-enabled command. Implementation of secure commercial mobile technology is seen as a prospective innovation that is suggested to increase the effectiveness of the company activity.
T-Mobile USA aims to satisfy the demand for secure mobile solutions and provide services infrastructure for wireless network. Also, T-Mobile USA can provide security of mobile information ecosystem and effective applications management (T-Mobile USA, 2013).
The plan of implementation of T-Mobile USA solutions establishes the process of equipping of managers and non-commercial users with mobile solutions and leveraging commercial products. The new solutions will help improve functionality, increase personal productivity, and decrease costs. Mobile applications are critical for delivery of services provided by T-Mobile USA. The plan is to establish a mobile application store capability operating with MDM system. The mobile application store (MAS) can help update, deliver, and delete various mobile devices applications without returning the devices for service. The main aim of MAS is optimization of distribution and functionality of applications of mobile devices at a minimum cost and time (Kahn, 2011).
Problem Statement
The current competitive environment in the mobile application devices field requires quick implementation of innovative mobile technologies and satisfaction of customers’ needs at low cost. T-Mobile USA faced the problem of cost management when using existing mobile technology. The current implementation plan concerns the issue of providing effective cost management process that would permit using mobile solutions across the number of companies not implementing new mobile technology. Time management is another point of concern since it directly relates cost management improvement (T-Mobile USA, 2013).
The current implementation plan represents the objectives of the mobile device strategy within the framework of T-Mobile USA information infrastructure. The establishment of the infrastructure is to promote the use of mobile applications for mobile devices, set the policies for the use of the mobile devices, and support the development of the mobile devices.
The T-Mobile USA implementation approach is supposed to help provide the mobile device management (MDM) leverage for commercial mobile device (CMD) capability by protecting internal organizational information. The implementation plan will be divided into two parts: the first part relates MDM capability for unclassified information domains; in the second part a centralized approach will be implemented for classified networks (Department of Defense, 2013).
Commercial mobile technologies help users to meet their requirements regarding mobile applications by fining, purchasing, and installing appropriate mobile applications. At the same time, the organizational processes must be regulated accordingly to the rapid development of mobile technology.
Method
The implementation method is to provide operation of CMD with the help of specific components, and administration of general services. The process of the plan implementation will be guided by requirements evaluation and analysis of business cases in order to determine cost effectiveness when implementing mobile solutions for the needs of an enterprise. The main goal for T-Mobile USA is to establish a program for procurement of MDM capabilities and provide effective operating within the company by April, 2014 (T-Mobile USA, 2013).
A combination of multiple approaches that were described is required for satisfying the number of various applications, deploying solutions quickly, accelerating of new technologies, enabling interactions between mobility services, and providing competitive environment for acquisition purposes (Department of Defense, 2013).
T-Mobile USA is supposed to establish a governing process through development of policies and standards that is needed for efficient management of mobile applications in the organization. The process of management includes internal and external control of application development. Mobile applications can be either acquired by components or provided by GSA. Also, the services can be managed by T-Mobile USA at the enterprise level.
Findings
Implementation of the new mobile solution based on existing capabilities will help provide a secure platform for both classified and unclassified mobile communications in the defense industry. The capabilities can be provided through implementation of the mobility solution either on the managing level of defense enterprises or at component level. For the purposes of implementation of the proposed mobility solution the requirements for security, services, interoperability, and access to the information should be met (Department of Defense, 2013).
Using evolutionary method of acquisition will be needed to deliver mobility capabilities to the defense enterprises. This approach will help eliminate duplication, use the advantages of the economies of scale, and significantly reduce costs. The implementation process consists of fourteen stages. It starts in July, 2013 and finishes in April, 2014. The stages can be grouped to three general phases that include design, security, and evaluation (Appendix 1).
For processing the information for classified and non-classified capabilities MDM system can be used. The MDM system should be combined with mobile application store used at the enterprise. For the components of the defense enterprises the MDM system can be accessed through administrative profiles at web portals. It will help perform appropriate management of policies and technical provisioning for mobile device subscribers (Columbus, 2011).
Cost reduction can be achieved through provision of application library, making tests, and mobile applications maintenance. The application library will allow using code hosting, software development tools, testing of applications, support of mobile applications, and management control over versions. Mobile applications that were completed and approved could be downloaded according to the demand. The design of the process will ensure availability of commercial and public applications for the purposes of defense enterprises.
Analysis
Mobility solutions can leverage the capabilities of commercial enterprises. Special attention should be paid to the defense enterprises because the information can be codified according to solution architectures used on defense enterprises.
Currently, there is a tendency in the mobile devices industry to move toward production of commercial mobile devices (CMD) that are capable to support both personal and enterprise needs. Thus, appropriate security policies can be generated to implement these devices in the defense industry. However, mobile devices used in this sphere of human activity must meet security requirements for the mobility environment. For this purpose, using existing mobile devices must be evaluated according to the digital government strategy (Kahn, 2011).
Also, these mobile devices can be used for responding emergencies on local, regional, and national level. The technology is available to the emergency enterprises through radio network helping assist the standards of security and interoperability. Using CMDs of this type will leverage existing capabilities of communication used by defense enterprises, federal, and civil services thus empowering digital collaboration technologies of the new generation. The idea of developing defense and public safety networks will help T-Mobile USA widen the circle of potential customers and allow the contribution of diversity of the stakeholders to the process of development of multi-purposes CMDs. In the defense industry, collaboration between senior management and subordinates will help develop an approach based on initiative, feedback, adaptation, and effectiveness (Department of Defense, 2013).
Additional security features can be improved through strengthening overall information assurance of the networks of defense enterprises (Columbus, 2011). Technologies that can be used may include biometric techniques, voice encryption with the help of secure internet protocols, and using 1024-bit encryption.
Conclusion
The current paper provided the phased commercial mobile solution implementation plan developed for the T-Mobile USA Company. The current product implementation plan is supposed to be used by defense enterprises. However, safety implications of proposed mobile solution can be used for the purposes of public enterprises as well. The implementation plan mainly promotes non-tactical applications within defense enterprises. The product implementation plan aims at updating the strategy of using mobile devices at the defense enterprises. The mobility solution can be also used to leverage commercial products with the help of implementation of classified and unclassified mobile solutions. The plan was developed within the existing annual budget and does not require any additional funding. The use of wireless capabilities will be guided according to the requirements set by defense enterprises. The solution is supposed to support mobility requirements set by the policies of defense enterprises related control of unclassified information leveraging commercial infrastructure and providing points of entry for classified information. The implementation of the proposed mobile solution will help ensure interoperability, refine the requirements of mobile device management at defense enterprises, make an impact on commercial standards, and increase efficiency of operations at defense enterprises.
Agenda
The mobility solutions used at defense enterprises should meet mission requirements. T-Mobile USA will cooperate with the working group created at each defense enterprise to review the standards, processes, and policies related management of mobility solutions.
The main emphasis of the implementation plan will be made on cost management. The following approaches could help improve cost management from defense enterprises’ side:
- CMD and MDM solutions should be developed according to the requirements set by defense enterprises and other associates;
- Conduct analysis of business cases with regard to the standards, processes, and policies in order to develop and manage mobility solutions (Kahn, 2011);
- conduct annual and semiannual audits in order to compare approaches to mobility services and develop appropriate recommendations regarding metrics that could help decision making process, such as annual evaluation of inventory, identification of cost per megabyte, identification of relative cost compared to the previous year, or identification of zero usage devices (Columbus, 2011);
- Development CMD applications according to the requirements of defense enterprises based on components approach;
- Establishment of certification requirements for mobile applications to ensure reciprocity across the components of defense enterprises processes;
- Establishment of the approval processes of mobile applications by authorities;
- Development of licensing procedures for mobile applications;
- Identification of data format that would match the requirements of mobile applications, such as geo-location, data aggregation, and machine policies.
The timetable for the implementation of the new product is outlined in the Appendix 1.
References
Columbus, L. (2011). Best practices in new product introductions: ten ideas for making new product launches succeed. New York: Louis Columbus.
Kahn, K.B. (2011). Product planning essentials. 2nd ed. New York: M.E. Sharpe, Inc.
T-Mobile USA. (2013). T-Mobile USA. Retrieved from http://www.t-mobile.com/
Appendices