JOHN SCHELL > RESEARCH

SCHELLS.NET

British Telecomms: Still British Telecom’s? The Historical and On-Going Business Practices of the UK’s Former Telecommunications Monopoly
(Spring 2001) | Abstract | PDF | Word DOC | HTML

Integrating an Enterprise 802.11b Wireless Solution: Now is Not Too Late, and Not Too Soon
(Autumn 2001) | Abstract | PDF | Word DOC | HTML

U l t r a W i d e b a n d: A Brief Description of the Wave of the Future
(Spring 2002) | Abstract | PDF | Word DOC | HTML

Integrating Unstructured Data: Defining the Path from the Enterprise Data Strategy to Integrated Content
(Spring 2002) | Abstract | PDF | Word DOC | HTML

Tying IT to the Business: Using BTM (Business Technology Management) to Appropriately Manage IT Outsourcing
(Autumn 2002) | Abstract |
PDF | Word DOC | HTML | Powerpoint Presentation | Online Presentation


ABSTRACTS

1. British Telecomms: Still British Telecom’s? The Historical and On-Going Business Practices of the UK’s Former Telecommunications Monopoly
(Spring 2001) | PDF | Word DOC | HTML

BT is currently undergoing dramatic changes in an effort to rectify many of the problems addressed in this paper. The changes are happening literally as I finish writing this paper: as I return to BT web pages to retrieve URL’s for the Bibliography, I am re-directed to the same content on new pages in the BT Group web site. This paper describes the history, issues, and influences of BT up to April 28, 2001. Footnotes update pertinent information, including the re-organization of BT as BT Group, as of June 8, 2001 .

Top of this page


2. Integrating an Enterprise 802.11b Wireless Solution: Now is Not Too Late, and Not Too Soon
(Autumn 2001) | PDF | Word DOC | HTML

Due to its increasing feasibility for certain local area networking applications, network managers must consider implementing 802.11b wireless technology as an alternative to wired LAN’s. Users benefit from a multitude of applications, strong acceptance by manufacturers, and explosive growth in the market. Its technical architecture has achieved industry certification and is a global standard. Competing protocols are not getting the same outpouring of support from manufacturers or acceptance by the market. The potential pitfalls of an 802.11b network are easily avoided if the network is properly designed and carefully implemented. Concerns voiced about 802.11b’s security measures are muted when proper network management is in place. External solution providers, such as outsourced systems integration, can help guarantee a robust and secure wireless network implementation. Falling equipment prices and low implementation and operation costs make the installation of an 802.11b network attractive today, and additional applications will allow it to maintain value in the future. Though 802.11a promises more bandwidth, the world may in many ways not be ready for that protocol yet.  

Top of this page


3. U l t r a W i d e b a n d: A Brief Description of the Wave of the Future
(Spring 2002) | PDF | Word DOC | HTML

Of all the competing wireless technologies currently available or under development, Ultra Wideband (UWB) shows the most promise. It provides the highest data rates with the lowest vulnerability to multipath interference. It uses a unique type of signal (RF doublet) in a unique way (low power pulses over a very large bandwidth). To date, there is little experience with the effects of multiple UWB transmitters in the real world. The technology must overcome concerns about interference with safety-of-life signals before achieving complete acceptance. Organizations including IEEE, DARPA, and the FCC are examining UWB and its effects. Recent investigations, investments, and regulatory rulings point to a big future for Ultra Wideband applications.

Top of this page


4. Integrating Unstructured Data: Defining the Path from the Enterprise Data Strategy to Integrated Content
(Spring 2002) | PDF | Word DOC | HTML

To fully benefit from an enterprise’s unstructured data, a developmental sequence of informational components must be applied. This paper lists and describes the components top-down in a sequence paralleling their order of implementation. When faithfully applied, these components would create intuitive access and intelligent use of unstructured data within an adequately supportive environment. These benefits are not tied to specific technology, and would apply to an organization of any size or industry.

Top of this page


5. Tying IT to the Business: Using BTM (Business Technology Management) to Appropriately Manage IT Outsourcing
(Autumn 2002) | PDF | Word DOC | HTML | Powerpoint Presentation | Online Presentation

Outsourcing information systems and technology is a business decision that is best planned, executed, and managed using Business Technology Management (BTM). Some or all information operations should be outsourced if (and only if) the organization has properly analyzed the effects of outsourcing upon the business, and is prepared to undertake their management. BTM is a management methodology that strives to align technology with the rest of management by highlighting communication, collaboration, and evaluation between business and technology managers. The methods and tools of Business Technology Management provide benefits for the entire outsourcing process.

Top of this page