Your session has expired.

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or log in again before proceeding.

NEXT GENERATION COMMUNICATIONS


    Specified user is not valid
    Publish
     
      • We CAN Measure the Business Impact of Learning

        Published Dec 09 2016, 9:04 PM by Motorola Solutions

        For learning professionals, it has never been easy to measure the business impact of our work. We know learning is critical in any organization. If we don’t learn, we can’t grow our knowledge and skills, and we can’t sustain or expand our business. It’s intuitive, yet difficult to isolate the exact contribution learning adds to business.

        I have been on the board of Center of Talent Reporting (CTR) for over a year now – CTR is a grassroots effort in the learning industry with the goal of developing an industry-accepted and adopted set of measurement standards, much like the Generally Accepted Accounting Principles (GAAP) in the accounting industry. Learning leaders across industries all want – and need – a methodical, reliable, repeatable and scalable way to measure the business impact of learning.

        In the various learning industry events I have participated recently or will be joining, including Talent Management Alliance’s Human Capital Analytics Summit and the Knowledge Advisors Annual Analytics Symposium, the buzz is all about measurement.

        Within Motorola Solutions, we have created our own Learning Measurement Maturity Model (M3) and in the last few years, we have evolved from the “Initial” stage to the “Managed” stage. (For more details on the concept of the M3 model and how it can guide learning professionals to set not just measurement strategies but business strategies, please see our white paper.) 

        M3.png

        Starting with internal learning measurement, we have spent a significant amount of resources setting up a consolidated data mart comprised of relevant business, people, and learning data from multiple systems. With a single view of learning activities and business data, we now have measurement dashboards that call out operational metrics so we can become a more efficient and effective learning organization.

        SAMPLE DASHBOARDS (MOCK-UP DATA)

        Dashboard.png

        More importantly, we have begun diving into the business results: based on the company’s business goals, we have set learning strategies and developed learning solutions that will help learners acquire specific knowledge and skills and achieve those business goals. We are now in the process of evaluating the actual results accomplished by the learners, i.e. business outcome dashboards. With that data, we can fine-tune our learning strategies and maximize their impact.

        As we link learning to the company’s business goals and results, we demonstrate the value of learning in tangible business terms, get management’s buy-in, and build our own credibility. Going forward, we will also start developing methods to measure the impact of learning as partners and customers engage in Motorola Solutions’ product and solution training.

        Claudia Rodriguez is vice president of learning for Motorola Solutions, responsible for maximizing the performance of customers, partners and employees through innovative and results-driven learning programs. She also leads the Motorola Solutions Certification Program that recognizes learners for their technical or sales competencies with Motorola products and solutions.

        Claudia will be a panelist at the Knowledge Advisors Annual Analytics Symposium, Tuesday, March 4, 2014 in San Francisco, California.

        Motorola_Solutions offers online learning, instructor-led training classes or customized training delivered at on-site locations. Visit Americas Learning online here.

      • You’ve Chosen a Real-time Inventory Management Solution — Now What?

        Published Dec 09 2016, 9:04 PM by Motorola Solutions

        In part three of this three-part series, Randy Briley, director of Healthcare for Motorola Solutions, highlights the implementation factors to consider once you have selected the best real-time inventory management solution for your environment.

        Healthcare_MC40-HC_Inventory).jpg

        When considering your choice of healthcare device, key factors can include: the device’s security, whether it’s disinfectant-ready, its battery life, available accessories, scanning capability, durability, lifecycle and more. Read this white paper to get a point-by-point analysis.

        Once you have selected the best real-time inventory management solution for your hospital, clinic or other healthcare environment, the next steps are to:

        1. Dedicate time to train your staff.
        2. Set goals on how you anticipate the inventory management solution will increase productivity.
        3. Establish policies on how to handle the equipment, where to report lost or missing inventory, and how to best use the new real-time information.
        4. Most importantly, make sure your staff understands why real-time inventory management is a must in your environment, and help them see how their role is crucial to the process.
        5. Overall, creating a continual learning environment of no blame is essential to ensure that everyone is focused on the solution and the goals and not the minutia of who, what, where and when.

        Make sure your new inventory management solution fits into your existing mobility strategy. If you don’t have a mobility strategy, now is a good time to develop one. Consider things such as wireless network connectivity, a bring your own device (BYOD) policy, and how your new inventory management solution will fit in with these and your existing business-critical wireless data demands.

        Healthcare requires real-time data in an easy-to-access format. By assessing your particular environment, identifying your technology needs and planning for implementation, your supply chain management team can select the best real-time inventory management for your environment’s needs.

        Check out this white paper to learn more about how to select the right mobile device for your healthcare environment.

        Randy Briley is Director of Healthcare Solutions at Motorola Solutions.

        Read Part One of the healthcare series: How to Achieve Real-Time Inventory Management
        Read Part Two of the series: Finding the Tech You Need for Real-time Inventory Management

        Learn more about Motorola’s healthcare solutions at www.motorolasolutions.com/healthcare.

      • The 5th C of Land Mobile Radio: Capabilities

        Published Dec 09 2016, 9:04 PM by Motorola Solutions

        Last month I posted a blog about the 4 Cs that drive the use of private land mobile radio systems. For a quick review of the 4 Cs, they are:

        • Coverage - designed to meet specific requirements, whether it is a single-site warehouse or a multi-site manufacturing operation
        • Capacity - engineered to address peak usage, using dedicated licensed spectrum and right-sized to each organization’s specific needs, so calls always get through
        • Cost - predictable costs, with no additional airtime fees like those associated with cell phones
        • Control - high degree of control over system requirements, design, priorities, features, and operation – allowing a system to be configured for a specific use case

        As a follow up to that blog, I wanted to spend some time on the 5th C: Capabilities. The 4 Cs are the basics of what makes Land Mobile Radio such a widely used tool, with more than 40 million analog radios in use globally.

        Shipments.png

        Illustration Credit: DMR Association, August 2010

        The 5th C is the game changer. What are some of the capabilities that further drive the usage of Land Mobile Radio in the enterprise?

        • Purpose-built devices and networks
        • Data applications to increase efficiency and productivity
        • Secure communications
        • Safety and reliability features

        Purpose built devices and radio networks

        Organizations have different communications requirements based on the environments they work in. Employees may work in high noise environments, on extended shifts, outdoors in the hot and cold, or in dangerous environments that require intrinsically safe devices. Different use cases may require devices that can be used with gloves, include displays or operate hands free. Supervisors may not carry a radio but need to interoperate with radio users from a smartphone. Purpose- built radios designed for specific use cases can meet all of these needs from extra loud speakers, noise-canceling microphones, glove friendly ergonomics, extreme temperature ratings, purpose built accessories, s intrinsically safe models plus integrated smartphone PTT applications such as MOTOTRBO Anywhere.

        Data applications to drive efficiency and productivity

        Modern, IP-enabled digital radio systems offer data capabilities. Sure radio systems do not offer broadband data speeds, but with the power of the 4 Cs you can deliver your data within your custom designed coverage area, with the capacity you need, without facing additional data airtime cost and exactly the control you need. So with data capabilities, what more can you do?

        • Query databases, identify (price, inventory, licensing), stock codes, (price, inventory, licensing)
        • Monitor biometric data such as the heart rate of a firefighter
        • Send text messages (freeform and one-touch canned messaging)
        • Link to email gateways so you can send an email directly to the radio
        • Coordinate work order tickets for example sending room service or cleaning services in a hotel
        • Locate staff and assets (GPS -outdoor, Bluetooth -indoor)
        • Customize your system to your operation via Application Program Interfaces
        • Set up telemetry to let your machines talk to each other
        • Manage your fleet over-the-air

        Check out a utility company using Bluetooth™ barcode scanners to capture and send a work-order ticket using their MOTOTRBO radios.

        Secure Communications

        Security is a big topic these days, from consumer data breaches to cyberattacks. With Land Mobile Radio you control who can listen to your voice and data traffic. In addition there are many security features to secure your voice and data traffic, from business level secure voice encryption to government certified end-to-end encryption with features such as over-the-air encryption key management in P25 and Tetra systems. From communications on the battlefield to government agencies, land mobile radio secures the most sensitive data.

        Safety and Reliability Features

        In terms of safety, land mobile radio really shines with its heritage in public safety communications and features like: prioritization to clear communications channels during emergencies, dedicated emergency buttons on radios to call for help and man-down and lone-worker features to keep your workforce safe.

        To be safe, your communications must be reliable. Your calls need to always get through so there are features built in to make sure calls are prioritized and radio traffic is load balanced. Systems can be designed to be resilient from redundant backhaul links at remote radio sites to redundant system controllers and back-up power. Plus radio always has the fall-back of direct mode/simplex/talkaround operation so communications can occur directly between radios in a peer to peer fashion without the need for infrastructure.

        Capabilities – the 5th C is the game changer

        So when considering wireless communications remember Capabilities can be the real game changer providing a device that is built to your specific needs, with additional data functionality to augment your voice communications and a reliable system that provides always available communications at the push of a button. So let’s add capability to the other 4 C’s - coverage, capacity, cost, and control -to really differentiates land mobile radios as a one of a kind operational tool to make your enterprise operate as efficiently as possible and keep your employees safe.

        Which “C” do you think is most critical? I would like to hear from you how the 5Cs of radio communications make a difference in your organization – please leave your comments below.

        John Kedzierski is Motorola Solutions Director of Government Product and Solutions Marketing and previously the Motorola Solutions Area Sales Manager for the states of Illinois and Indiana.

        Read additional blogs by John Kedzierski:
        Crime Technology of the Future, Here Today
        The 4 C's and Why Two-way Radios are Everywhere
        How LMR and LTE Work Together for Public Safety
        How to Easily Connect Over LMR, LTE and Smartphones: Interoperability from Radio to Smartphone and Beyond

      • Finding the Tech You Need for Real-Time Inventory Management

        Published Dec 09 2016, 9:04 PM by Motorola Solutions

        In part two of this three-part series, Randy Briley, director of Healthcare for Motorola Solutions discusses how when it comes to real-time inventory technology, it’s important to think about what the solution can do along with what the solution looks like and how it is used.

        Enterprise_NA_Healthcare_MC40-HC_Scanning_Wrist_Band_D3X2794_Jim_Lennon.jpg

        Nurses can use the Motorola MC40 to scan bar codes on patient wristbands to capture data and validate plans for their care. Learn more about the MC40 here.

        Do you value battery life and the convenience of carrying a device around all day without having to worry about connecting it to its charging station? If so, passive radio-frequency identification (RFID) solutions may be the best option. Passive RFID involves a dormant tag that is not activated until it is triggered by a specific radio frequency. This saves battery life and provides a more cost-effective RFID solution when compared to active Real-Time Location System (RTLS) tracking solutions.

        Active RTLS provide the most detailed visibility of assets for real-time monitoring. This solution involves a signal that is always on, allowing items to be located on-demand. Active RTLS also is great for staff as well as patient tracking, in the case of the healthcare industry, as it helps keep a constant eye on where people are within your environment. While more pricey than passive RFID, active RTLS is a strong solution for costly equipment that requires constant tracking.

        When it comes to people-tracking activities such as administering medication to patients, bar code scanning is a solid solution. Bar code scanning is available in linear bar code (1D) or a complex matrix bar code (2D). 2D bar code scanning allows for more information on a single bar code and also provides the ability to capture both 2D and 1D bar codes while a linear bar code scanner can scan only 1D bar codes.

        With the quick scan of a bar code, doctors and nurses can be assured that they are giving the correct care to their patients. With a scanner in hand, workers in a variety of industries can capture the data that matters most — as fast and as accurately as possible. Whether at a patient bedside, retail point of sale, on the manufacturing production line or in the aisles of a warehouse, bar code scanners can be the right technology for your environment and your application.

        Check out this website to learn more about Asset Management and Tracking solutions for Healthcare.

        Randy Briley is Director of Healthcare Solutions at Motorola Solutions.

        Read part one of the series here: How to Achieve Real-Time Inventory Management

        Learn more about Motorola’s healthcare solutions at www.motorolasolutions.com/healthcare.

      • Ruggedized Handheld Devices and the Road to a Productive Day

        Published Dec 09 2016, 9:04 PM by Motorola Solutions

        For some, the life of a home-worker can be a lonely existence, and a constant struggle to maintain productivity. I’m fortunate because my lovely wife ensures every working day is micro-managed to within an inch of its life. From the outset I want to challenge the notion that men can’t multi-task. I don’t mean to appear big headed, but I’ve always considered myself to be a multi-tasking black belt.

        Since we moved to our “forever home” a year or so ago – my wife has rediscovered ebay and Trade-It. I salute her desire to raise some extra cash. But I question the maths, when each sale seems to be swiftly followed by a purchase. I know there’s no real harm in this, but the deliveries are starting to punctuate my working day.

        Take the other day for instance. After returning from dropping kids off at school, I received a call from the service engineer who was coming to fix our washing machine – saying he’d be with me at 3pm. This meant I didn’t need to be a prisoner in my own home and could go for a run at lunchtime. Or so I thought…

        Moments later, I received another call from a company saying they’d be delivering a piece of furniture any time between 9-5. Don’t you just love it when you get those phone calls?

        To my amazement, the doorbell rang at just after 1pm. When I opened the door, a soggy piece of paper was thrust my way with a large “X” marking where I had to sign. The driver apologised for not having a pen. As he referred to his tatty old clipboard, I checked the piece of furniture only to notice that it was scratched. I made the executive decision to cancel the order. There wasn’t a section on the soggy form for cancelled orders. But by this stage, neither of us cared. The driver said he’d add it to the list of admin at the end of his shift. I did feel sorry for him, clearly none of this was his fault.

        At 2.30pm the phone rang. The service engineer for the washing machine was on his way – there’d been an accident on the motorway but apparently his handheld computer had re-routed him. It was still pouring with rain when he arrived, but his ruggedized handheld computer happily bleeped away as he scanned the spare parts that he’d need for the job. Apparently, this helped make sure that he always had the right stock available to fix the job first time. Fingers crossed.

        After a quick chat about the abuse a family of four can inflict on a washing machine, and two cups of tea later, the machine was fixed. I happened to mention that our tumble dryer had been making a strange noise recently. In a matter of moments, the engineer referred to our maintenance history on his handheld computer, spoke to his manager, announced that he’d write off our tumble dryer, ordered a replacement under warranty, and said he’d back next Thursday to install it.

        Wow! I was beginning to think this guy was some sort of super hero when he suddenly dropped his handheld computer on the stone floor. I had an immediate flashback to when my son dropped my iPad on the very same floor – and I watched helplessly as it shattered into a thousand pieces. But amazingly this ruggedized device just bounced, and lay on the floor, completely unscathed.

        The engineer said that he just had a quick trip to make to their warehouse – to collect replacement parts for tomorrow, then he’d be off home to put his feet up as he’d already sent in his report on his handheld computer. Alright for some. I was left with the stark reality that it was 4.30pm already. Even multi-tasking black belts have an off day occasionally.

        “On the road to a productive day” is a 2 minute video (with a very funky soundtrack) that illustrates how the Motorola Solutions TC55 Touch Computer brings a personal touch to business. The video also shares some compelling evidence from companies who use enterprise-grade handheld devices:

        • Aberdeen council keeps 97% of maintenance appointments.

        • AVC, a Sky installer, sees a 66% increase in reliability with enterprise-grade devices.

        • Heateam achieves a 96-98% first-time fix rate.

        • TUV Nederland cuts admin by 40%.

        Learn more about the new TC55 Touch Computer from Motorola Solutions.

        Stephen Northcott is Senior Marketing Manager for EA at Motorola Solutions

      • 6 Lessons Learned from the Holiday Data Breaches

        Published Dec 09 2016, 9:04 PM by Lesley Carhart

        Have you been watching your credit card statements this month? The high-profile data breaches of several major retailers over the holiday shopping season caused inconvenience, disruptions and concern to millions of consumers in the U.S. and abroad. There will be speculation and debate for months about exactly how Target Corporation and Neiman Marcus’ point of sale systems were compromised, and what could have been done to prevent it. Instead, as we look to the security of our own business systems, there are a few basic lessons we should learn from these incidents:

        1. It can happen to anyone. In Q4 2013, we saw a broad spectrum of very public security incidents, from the massive breach of the retail powerhouse Target, to the successful ransom of many small organizations, including a police department, using the cutthroat Cryptolocker malware to hold their files hostage. The bottom line is that cybercriminals are smart, and they want to make money using the most effective means possible. That may be the meticulously planned breach of a large and well-secured organization, or a few hundred dollars stolen from many thousands of small businesses.
        2. PCI DSS standards should not be followed merely to pass audits. Payment system security should always be taken seriously, without exceptions, and planned thoroughly in advance of system implementation. Payment Card Industry Data Security Standard controls constitute a minimum security baseline that exists for a reason, and too many organizations comply only with bare minimum requirements. A recent Fortinet study revealed that one in five small retailers is not even PCI compliant.
        3. Security budgeting and staffing should not be reactive. Hindsight is 20/20. After a security incident, if outside forensics or security consultants must be brought in to assist, it is not unlikely they will find evidence of further compromise or previous breaches. Security monitoring, policy, and auditing should occur routinely, with the support of upper management.
        4. Attackers will find the weakest link. You may have built top-notch security into your stores’ wired networks, but those measures may be irrelevant if you have failed to secure the link from each store to your payment processor, segregate your corporate network, or secure your wireless network. Security must be considered end-to-end. In the case of point-of-sale system breaches, we often see malware installed that can snag credit card numbers while they are briefly unencrypted in the devices’ memory. However, this requires an attacker gain adequate access to the terminals.
        5. Disaster Recovery Plans are critical. In the age of social media, the rumor of a security breach can rapidly spread and cause financial damage. Along with plans for natural disasters, fires, and equipment failures, every organization should be prepared for a major security incident with a data breach recovery plan. How will impacted customers and shareholders be notified in a timely manner? Can you have adequate resources available to deal with customer concerns? Who will perform forensic analysis of compromised systems in a manner which is admissible in court? If your critical business files are tampered with or deleted, do you have backups that can be promptly restored?
        6. Offer Payment Flexibility. This most recent string of data breaches has hurt consumer confidence in traditional credit card transactions. It’s courteous (and even advantageous) for retailers to offer customers the option to use third-party payment services which securely bypass their own payment processor.

        Read more about how Motorola Solutions offers several solutions for securing and monitoring in-store wireless networks.

        Lesley Carhart is the Incident Response Team Lead for the Motorola Solutions Security Operations Center. She has 13 years of experience in information technology, including computer networking and tactical communications. For the past five years, she has focused on security, specializing in digital forensics.

        Read past blogs by Lesley Carhart here: