| JOHN SCHELL > RESEARCH |
British Telecomms: Still British Telecom’s? The Historical and On-Going Business
Practices of the UK’s Former Telecommunications Monopoly
(Spring 2001)
| Abstract |
PDF | Word DOC | HTML
Integrating an Enterprise 802.11b Wireless Solution: Now is Not Too
Late, and Not Too Soon
(Autumn 2001) | Abstract |
PDF | Word
DOC | HTML
U l t r a W i d e
b a n d:
A Brief Description of the Wave of the Future
(Spring 2002) | Abstract |
PDF |
Word DOC | HTML
Integrating
Unstructured Data:
Defining the Path from the
Enterprise Data
Strategy to Integrated Content
(Spring 2002) | Abstract | PDF |
Word DOC |
HTML
Tying IT to the Business:
Using BTM (Business Technology Management) to Appropriately Manage IT
Outsourcing
(Autumn 2002) | Abstract |
PDF |
Word DOC |
HTML |
Powerpoint Presentation |
Online Presentation
ABSTRACTS
1.
British Telecomms: Still British Telecom’s? The
Historical and On-Going Business Practices of the
UK’s Former Telecommunications Monopoly
(Spring
2001) | PDF | Word DOC | HTML
BT is currently undergoing dramatic changes in an effort to rectify many of the problems addressed in this paper. The changes are happening literally as I finish writing this paper: as I return to BT web pages to retrieve URL’s for the Bibliography, I am re-directed to the same content on new pages in the BT Group web site. This paper describes the history, issues, and influences of BT up to April 28, 2001. Footnotes update pertinent information, including the re-organization of BT as BT Group, as of June 8, 2001 .
(Autumn 2001) |
PDF | Word DOC | HTML
Due to its increasing feasibility
for certain local area networking applications, network managers must consider
implementing 802.11b wireless technology as an alternative to wired LAN’s. Users
benefit from a multitude of applications, strong acceptance by manufacturers,
and explosive growth in the market. Its technical architecture has achieved
industry certification and is a global standard. Competing protocols are not
getting the same outpouring of support from manufacturers or acceptance by the
market. The potential pitfalls of an 802.11b network are easily avoided if the
network is properly designed and carefully implemented. Concerns voiced about
802.11b’s security measures are muted when proper network management is in
place. External solution providers, such as outsourced systems integration, can
help guarantee a robust and secure wireless network implementation. Falling
equipment prices and low implementation and operation costs make the
installation of an 802.11b network attractive today, and additional applications
will allow it to maintain value in the future. Though 802.11a promises more
bandwidth, the world may in many ways not be ready for that protocol yet.
3. U l t r a W i d e
b a n d:
A
Brief Description of the Wave of the Future
(Spring 2002) | PDF |
Word DOC | HTML
Of all the competing wireless
technologies currently available or under development, Ultra Wideband (UWB)
shows the most promise. It provides the highest data rates with the lowest
vulnerability to multipath interference. It uses a unique type of signal (RF
doublet) in a unique way (low power pulses over a very large bandwidth). To
date, there is little experience with the effects of multiple UWB transmitters
in the real world. The technology must overcome concerns about interference with
safety-of-life signals before achieving complete acceptance. Organizations
including IEEE, DARPA, and the FCC are examining UWB and its effects. Recent
investigations, investments, and regulatory rulings point to a big future for
Ultra Wideband applications.
(Spring 2002) | PDF | Word DOC
| HTML
To fully benefit from an enterprise’s unstructured data, a developmental sequence of informational components must be applied. This paper lists and describes the components top-down in a sequence paralleling their order of implementation. When faithfully applied, these components would create intuitive access and intelligent use of unstructured data within an adequately supportive environment. These benefits are not tied to specific technology, and would apply to an organization of any size or industry.
(Autumn 2002) |
PDF |
Word DOC |
HTML |
Powerpoint Presentation |
Online Presentation
Outsourcing information systems and technology is a business decision that is best planned, executed, and managed using Business Technology Management (BTM). Some or all information operations should be outsourced if (and only if) the organization has properly analyzed the effects of outsourcing upon the business, and is prepared to undertake their management. BTM is a management methodology that strives to align technology with the rest of management by highlighting communication, collaboration, and evaluation between business and technology managers. The methods and tools of Business Technology Management provide benefits for the entire outsourcing process.