Hardware & SoftwareUtility software is a kind of system software designed to help analyze, configure, optimize and maintain the computer. One type of utility software that would help extend the use of information systems into the mobile regime of work would be a cryptographic file system which encrypts all of the data that they contain since it is a file system that is specifically designed with security in mind.
[1] This type of utility software would allow organizations to feel more at ease with mobile business since all mobile files would be safeguarded with data and file encryption. Encryption is the process of securing the contents of a file or message by encoding it. An encrypted message looks like gibberish, unless you can decode it using a key to translate those random characters back into real text or data.
Enterprise Application Software is application software that performs business functions such as order processing, procurement, production scheduling, customer information management, and accounting. It is typically hosted on servers and provides simultaneous services to a large number of users, typically over a computer network. This is in contrast to a single-user application that is executed on a user's personal computer and serves only one user at a time.
[2] This software on a mobile device would allow a purchasing director for a hotel to place an order even if he/she were on vacation, at an off-site event or meeting, or while sitting in traffic.
Workgroup Application Software is designed to support teamwork regardless of the individual team member locations. The various products also share the ability to help change business processes. A company, for example, can design a workgroup application that automatically routes an expense form to the accounting department rather than relying on an internal mail system.
[3] This type of software could help businesses become mobile since it seems that more and more companies have employees that work remotely (from individual home offices and “travel offices”, not the traditional centralized office space) and this type of software would enable them to be connected to their peers without having to be in the same place.
Personal Information Managers help you keep track of people and appointments. These specialized databases often include other capabilities or are included in e-mail programs.
[4] These types of software or databases are already allowing businesses to become mobile by offering mobile email through Microsoft Outlook for example.
Pen Input Devices are hardware input devices that can be an input device and a pointing device that lays down ink.
[5] This type of hardware already allows UPS delivery drivers to accept electronic signatures for packages. It could also allow someone to be in a web meeting and draw on the screen to show others a diagram or circle an area on a graph that is important all from a remote mobile location.
[1] “Filesystem-level Encryption.” Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc. 17 March 2011. Web. 12 July 2011. <
http://en.wikipedia.org/wiki/Filesystem-level_encryption>.
[2] “Enterprise Software.” Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc. 4 July 2011. Web. 13 July 2011. <
http://en.wikipedia.org/wiki/Enterprise_software>.
[3] Korzeniowski, Paul. “ Workgroup software emerges for business applications - includes related article on getting the most from meetings - Client/Server Computing Edition.” The CBS Interactive Business Network. 15 July 1993. Web. 13 July 2011. <
http://findarticles.com/p/articles/mi_m0SMG/is_n11_v13/ai_14081627/>.
[4] "Personal Information Manager." Software eHow.com. Web. 13 July 2011. <
http://www.ehow.com/how_11483_choose-personal-information.html#ixzz1S2GqHuPD>.
[5] “The Pen as an Input Device.” MSDN. Web. 13 July 2011. <
http://msdn.microsoft.com/en-us/library/ms819509.aspx>.
Utility Software Example - Symantec’s encryption products, PGP and Symantec Endpoint Encryption, enable organizations to deliver comprehensive data protection with proven standards-based technology. Symantec’s easy-to-deploy solutions provide centralized policy management, accurate compliance-based reporting and true universal management of the encryption products.
Enterprise Application Software Example - Software as a Service (SaaS) is the on-demand model of enterprise software is made possible through the widespread distribution of broadband access to the Internet. SaaS vendors maintain enterprise software on servers within their own company data center and then provide access to the software to their enterprise customers via the Internet. Zoho Invoice allows the user to snap up customer orders in an instant and send them their invoice right from within Zoho Creator in seconds. All that is needed is a browser which most mobile devices have these days.
Workgroup Application Software Example – Lotus Notes is a type of workgroup application software that IBM describes as an "integrated desktop client option for accessing business e-mail, calendars and applications on [an] IBM Lotus Domino server." The chat function and email functions of this software would allow users to stay connected with peers on mobile devices when they are not in the same location.
Personal Information Managers Example - Microsoft Office Outlook is a personal information manager from Microsoft, available both as a separate application as well as a part of the Microsoft Office suite. Although often used mainly as an e-mail application, it also includes a calendar, task manager, contact manager, note taking, a journal and web browsing. Outlook is already available on mobile devices which allows users to access email and calendar features remotely.
Pen Input Device Example - Wacom CINTIQ 21UX Tablet Pen allows photographers, designers, animators and other creative professionals to work naturally and intuitively, while working directly on the surface of a input screen. The new Cintiq 21UX detects 2048 levels of pressure which is perfect for obtaining delivery signatures since not every receiving signer will use the same amount of pressure so this pen ensures that each signature will be captured on the first attempt. Being able to use this pen on the screen of a mobile device would allow package delivery personnel to obtain signatures electronically and these electronic signatures could then be sent to the delivery tracking database as proof of delivery.