Welcome to my blog

Welcome and thank you for visiting my blog....

This is where I will pen my thoughts on Enterprise Mobility and other wireless technologies based on my learning’s/ experience over the course of my IT career.

The wireless world has been a very exciting place to be over the last few years. We have seen the introduction of ground breaking products and technologies have reached a never-before-seen level of maturity. The rate of enterprise adaptation to wireless technology is only accelerating day by day.

This is a personal blog and will focus on my thoughts and perspectives on wireless technology. Please feel free to share your opinions and viewpoints so that it can be discussed and debated. Though I would like to, I won't be able to post to this blog each day. Will try my best to write whenever I get time.

I hope that you will return often to this blog. Thanks again.

Tuesday, September 16, 2008

Device Selection for Enterprise Mobility solution

How to zero in on target device for your enterprise mobility solution ?

by Purushottam Darshankar

One of the most critical part of enterprise mobility solution is the selection of appropriate commercial or ruggedized mobile device. Inevitably the environment in which the devices would be used should drive this decision; however, there is trend of deploying commercial grade devices in traditional rugged markets. Leading factors driving the selection of commercial over ruggedized device include, among others, the lower upfront investment, access to more current technology and short replacement requirements.


Though the TCO (Total Cost of ownership) is low with commercial grade devices, the ruggedized devices provide superior cost profile to commercial grade solution in select environments. For example, in harsh field environments such as accident sites, property damage sites, supply chain/transportation and public safety, the annual TCO of a mobile rugged device is as much as 35 percent lower than for non-rugged devices.


On average, 4 percent of rugged mobile computers installed to support enterprise mobility applications in “harsh” environments fail per year. Conversely, the annual failure rate for commercial grade devices in similar harsh environments rockets to 36 percent. End users need to anticipate device failure rates into their deployment plan. The critical issue is effectively managing failure rate and downtime to minimize impact on the operation.



Handheld Mobile or Tablet PC?

The key to choose between the two is whether or not the user has to work while standing or walking around. A mobile has a significant advantage over a tablet PC by being able to be used while the user is truly mobile. When a pen tablet is used at a desk in a mini-dock, its capability is essentially identical to that of an ultra-portable notebook.


There are two types of Tablet PCs: slates and convertibles. A slate-style device is in essence an LCD with a built-in PC motherboard and hard drive. This type of Tablet PC is most frequently used by health-care workers and others in specialized fields. A convertible device can be used like a slate or, when the screen is swiveled and raised, like a traditional notebook with a keyboard. The display lays on top of the keyboard when it is used in slate mode.


Being able to write on the Tablet PC's screen with a stylus--which works like the Graffiti handwriting recognition on a Palm OS device--makes "all the difference”. While at a home site, user uses the Tablet PC's pen-based input to fill in forms and add drawings to digital photographs that he takes during inspections. At the office, he plugs the Tablet PC into its docking station, which connects it to an external monitor and keyboard that lets him use the computer as he would a desktop PC.


However, with mobile devices becoming more and more sophisticated, they certainly bring advantages when it comes to harsh field environment such as accident sites, property damage sites. They are much handier and are always connected. Few of the points where mobile can score over table PC are


- Cost of Mobile device based on its capability can be lower than tablet PC cost and may be important factor if it has to be rolled out on massive scale.
- Besides Data, use of Voice or SMS services used from mobile device may become user friendly & time saving.
- Inbuilt camera feature of Mobile which will enable field force person to capture various field details in seconds for select applications.
- SFA/FFA Mobile Applications supported by GPS & Navigation will increase the Field employee’s performance by assisting him for better route optimization.

Device Platform

The next important consideration is device platform. Microsoft's Windows Mobile platform and Research in Motion's (RIM) Blackberry have emerged to dominate the landscape of enterprise mobility. While Blackberry devices are generally used more prevalently for mobile messaging, Windows mobile devices are better positioned for an expanded suite of mobilized enterprise applications.


From a device selection perspective, it might be considered beneficial to have the bundled applications, such as web-browsing and email, Pocket word, excel etc. The Windows Mobile platform offers a more consistent experience between devices.



Wireless Connectivity options

Connectivity options play an important role in device selection. Some of the enterprise application provides offline functionalities and need to synchronies large data once the connectivity is made available. Choices range from very limited connectivity in the base models to highly connectable devices at the top end. Within each class of device already outlined, i.e. rugged, commercial, Pocket PC, RIM etc, the full range of connectivity options are available.


Connectivity options include Infra-red, Serial Connection, Bluetooth, WiFi, GPRS etc.


Practically all models will have an infra-red and serial connection available. The serial connection may be via cable or via cradle. Bluetooth may be useful for connecting with a mobile phone, headset, or some other personal devices. When used with a mobile phone, Bluetooth can be used for remote data synchronization.


WiFi connectivity is useful in a controlled environment, such as a warehouse, that can be fully covered by wireless access points. This method offers cheap, reliable, and fast synchronization.


A packet-switched network such as GPRS, that offers “always-on” functionality may connect to a static IP address at the synchronisation gateway, or again through a VPN, thus offering better security. It is important to note that it is possible for synchronisation to occur without the need for any wireless connectivity. Users may simply connect via a cable or a cradle hosted by a computer that has a connection to the synchronisation gateway.



Peripheral Device support

The selected device may require built in functionality to support the peripheral devices such as Barcode scanners, Printers, GPS receivers, Cameras, Magnetic stripe readers, RFID readers etc. The SDIO slot, Compact Flash slots, or other expansion slots may be used either for memory expansion or for connecting the peripheral device.



QWERTY Keyboard or Stylus input

Device may feature the keyboard and/or stylus for entering data. Keyboards may be numeric or complete QWERTY. Some devices offer handwriting recognition and transcription as an alternative.


The choice between an actual keyboard and stylus input depends a lot on the design of the user interface for the enterprise mobile application. Application user interfaces should tend towards using drop-down lists or numeric-only fields, in place for simple text-entry fields. If there are a great number of text-entry fields appearing in the application, then an actual keyboard might be preferable.



Battery life

Battery life depends on the battery technology and on the quality of the battery itself. How long device would function between battery recharges will depend on the typical usage patterns of the device. Heavy consumers of battery power are the device backlight, and radio circuitry. Any device running Bluetooth, WLAN, or a mobile phone will require a radio to be operating in the device. Of these, Bluetooth is the lightest consumer of power, due to its short range. It is important to consider what will happen to a device, should the battery become fully exhausted.


Some devices offer a back-up battery. In this case, when the main battery has been completely drained, a message is displayed to the user, telling them that the back-up battery is now being used. In this way, no data is lost, and the user is advised to recharge the main battery as soon as possible.


If all battery power for the device fails, then normally the data and even the applications in the device memory would be lost. However, some vendors offer non-volatile memory. This type of memory retains its data when power is lost, and remains intact during even a hard reset. Some devices will feature this type of memory internally.


Another way of keeping data beyond power loss is to save it on SD memory cards. Applications may access the card just like another folder.


The other considerations for device selection include size, weight, accessories, and even button placement on the device. This area is often underestimated in how important it can be in the overall success of a mobile solution.


By taking into consideration all of the factors discussed here, it should be possible to arrive at a shortlist of devices that are suited to a particular mobile solution. Lastly, Don’t forget to lab test the short listed device using a prototype of the enterprise mobile application.

Wednesday, August 13, 2008

Evolving security needs for Enterprise Mobility

Enterprise Mobility Solution– How secure are they?

by Purushottam Darshankar

In today’s marketplace, enterprise mobile solutions have become necessary for businesses as competitive advantage and as a productivity improvement tool. With traditional low end monochrome devices giving way to sleeker high resolution handset packed with high processing power and high memory, the enterprises have started using these devices beyond voice calls and SMS and focus on delivering the critical front-end application for mobile workers.


Safety and security are of paramount concern for any enterprise in an increasingly uncertain and unsafe world, and have both a financial return in terms of cost of avoidance towards lost time, litigation and compensation, regulatory compliance, repair cost etc. as safety improves and intangible benefits related to improved working conditions for the workforce.


The wireless medium through cellular network has certain limitation over the wired medium such as open access, limited bandwidth and system complexity. These limitations make it difficult although possible to provide security features such as authentication, encryption, integrity and confidentiality. Since the communication is on the wireless channel, there is no physical barrier that can separate the attacker from the network. The principal sources of attack could be either end terminals or operator’s own backbone network. Issues may arise in mobile device OS which might open security holes that can be exploited. If a device is stolen or lost, it needs to be protected from unauthorized access to confidential and sensitive information such as enterprise data, e-mails, contacts etc.


Due to open access to cellular network and in turn to enterprise IT system, there are variety of attacks the infrastructure is open to. Denial of Service (DOS) is most potent attack that can bring down the infrastructure network, caused by sending excessive data to network, more than the network can handle, resulting in users being unable to access the network resources. Unauthorized access, if proper method of authentication is not implemented, provides free access to attacker to enterprise IT system and can use it for services that he might not be authorized for.


If data communication between handheld device and backend server is not encrypted then the attacker can eavesdrop and intercept sensitive communication such as e-mails, documents, other critical enterprise data etc. The attacker can sit in between the handheld device and access station of cellular network to intercept the message in between and change them. Going further, the attacker can hijack an already established session, and can act as legitimate user to gain the access to enterprise IT system.


While there are several security mechanisms available in Wireless network, continued research is going on to provide new and even more secure mechanism for cellular security as we look forward to 4G next generation services.


Enterprise Security Strategies

Every enterprise should have a security strategy to protect the availability, integrity and confidentiality of data in an enterprise’s IT system. Organization needs to decide on how much time, money and efforts need to be spent in order to develop appropriate security policies and control. Listing the threats helps the security team to identify the various methods, tools, and techniques that are used in an attack and can then develop proactive as well as reactive strategy.


The proactive or pre-attack strategy is a set of steps taken to minimize existing security policy vulnerabilities and develop contingency plans. Determining the amount of damage that an attack will cause on an IT system and the weaknesses and vulnerabilities exploited during this attack helps in developing the proactive strategy.


The reactive strategy or post-attack strategy helps security team to assess the damage caused by the attack, repair the damage or implement the contingency plan developed in the proactive strategy, document and learn from the experience, and get business functions running as soon as possible.


Enterprise Security Goals

The enterprise mobile solutions that run on the handheld devices are developed by independent software vendors that distribute these as freeware or license ware. The IP address of the servers which hosts these applications, for user download, are advertised so that they can be accessed by the intended users. However, it can be downloaded by any consumer over-the-air on the device without any control by operator. This may become a launching pad for attack on operator network as well as enterprise’s IT system.


Every enterprise mobile solution must provide a bundle of security functions that assure the security of system and can be referred as the goals of security system.


  • Authentication - Before the data is being exchanged between the receiver and sender, their identity must be verified.
  • Secrecy or Confidentiality-Only authenticated users based on their privileges should be able to access and interpret the data.
  • Integrity - Data being communicated is assured to be free from any type of modification between the end points (sender and receiver).
  • Non-repudiation- will ensure that neither the sender nor the receiver can falsely deny that they have sent certain data.
  • Service Reliability- Since the systems usually get attacked by intruder, which may affect it availability. The IT system should be robust enough to provide a way to grant their users the quality of service they expect.

Most of the mobile middleware’s available in the market provides the secure connectivity between handheld and backend server that supports HTTPS connection. The OMA device management specification suggests the use of client credentials (ID, Password and nonce) and server credential to confirm the authenticity and integrity of data being exchanged. Additional encryption algorithms (DES, AES or RC4) could be used to secure the data between sender and receiver by using either symmetric or asymmetric encryption. However these techniques slow down the enterprise application performance and balance has to be struck between security and usability.


The enterprise should ensure the proper end user registration and enrollment procedure to allow access to enterprise services. The end-users need to initially authenticate through a self-service registration web portal using their username and password credentials. Once authenticated, users are provisioned for enterprise application and are provided with a pin code that is used during the download of the enterprise application from the device browser. In addition, the firewall and IDP (intrusion detection and prevention) system can be used to tackle the security threats.


Enterprises must develop a security strategy and build policy that reflects this strategy. Security must be the responsibility of the entire user community and appropriate communication needs to be put in place to emphasize its importance. The expansion of mobile devices such as PDA’s, phones, and converged devices into the enterprise present several challenges to IT managers regarding security and manageability. A balance of security and usability must be reached considering the limited processing power of handheld devices.

Wednesday, July 2, 2008

Mobile Web Next Big Thing- Are you ready for it?

Making your web site ready for Mobile web
by Purushottam Darshankar

Market researchers have already speculated that mobile web will become next dominant internet platform and is referred to as next wave of fueling m-business.
The Google, AOL, Yahoo and Microsoft have already realized potential and have come up with mobile portal featuring content designed specifically for mobile devices.


Peoples have started to regard their mobile phone as gateway to the web – a means of accessing the information they previously only got through desktop browser. With an estimated 250 million US mobile subscriber, Juniper Research reports at least 10 % of them browsing internet through their mobile phones. The web based social networks such as Facebook and Flickr offers pervasive use of mobile phones by young consumers.


Though the mobile web is going to be next big thing, it has its own challenges when it comes to user adaptability. The W3C, the leading consortium also has realized this, Tim Berner says while announcing the launch of MWI (Mobile Web Initiative), “The Mobile Web Initiative's goal is to make browsing the Web from mobile devices a reality,W3C and mobile industry leaders are working together to improve Web content production and access for mobile users and the greater Web.”


The carrier networks are very slow and when it comes to accessing improperly designed mobile website, the users are getting impatient waiting for sites to load. Most of the sites, that are technologically capable of sensing when they are being loaded by a mobile browser, claim to deliver web site content optimized for mobile use however are not formatted properly for small screen.


The users are well adapted to Windows environment and find it difficult accessing mobile web which allows only one page to be displayed at a time, and pages can only be viewed in the sequence they were originally accessed. Though the use of mobile device in future is promising, the limitation of human eye sight, hand size and device screen size will make user to prefer desktop over mobile phone for select category of operations.


Knowing the screen size may help to optimize the content, however it is best to keep the shape and style to minimal and linear as possible knowing the fact that mobile world contains craziest screen variations. The mobile sites flooded with advertisement slow down the page loading and also fill up screen unnecessarily making website sub-standard.


The lack of consistency across multiple browsers is another pain area and testing mobile web site on devices has become a nightmare, with more than 40 plus mobile browser available in the market.



High end phones Vs low end phones

Low end phones have several limitations, including screen resolution and limited XHTML rendering capability of browser. If the majority of your target audience lies in this category it is advised to develop the mobile web site using WML(Wireless Markup Language).


On the other hand the high end phones (including Smartphone and PDA’s) have ability to run the website that is comparable to one you might run on desktop IE browser.


This may inspire the business to come up with one web that means making, as far as is reasonable, the same information and services available to users irrespective of device they are using. This may fail to deliver in providing optimized experience to mobile user. While device may be capable of rendering full, traditional web page design, sending them the normal version is not a best practice as content has to go over carrier network, which is much slower.


Creating a separate domain for mobile users is advised even though the user agent detection would provide us to detect if the user is using a mobile device or a desktop browser. The advantage of this is that the user browsing with high end device would be provided with option of using the traditional web site or mobile web site.


Design Considerations for Mobile Web

In early days only way to access mobile web site was through WAP browser which used to support WML as primary markup language. WML was based on card-and-deck metaphor. This card-based metaphor means all user interactions are split into cards and navigation occurs between cards within a deck. The WML is still used by legacy systems that are supporting low end phones. The WAP gateway enables connecting of mobile devices to web servers.


With advancement of mobile technologies, most built in browsers these days support XHTML-MP (Mobile Profile), the standard designed specifically for mobile devices. cHTML is another standard developed by Japanese mobile manufacturers to support DoCoMo’s i-Mode phones.


XHTML-MP consist fewer elements (Structure ,Texts ,Hypertext ,List ,Forms ,Basic Tables ,Image ,Object Metainformation ,Scripting ,Style Sheet ,Style Attribute ,Link ,Base) and also tighter restriction to enable device browser to handle the web content. Practically all the devices sold today support XHTML. The doctype for XHTML-MP site would begin like


You can visit site like http://flickr.com/mob or http://mobile.fandango.com and can look at XHTML-MP coding.


User experience is next important thing and developer should provide easy navigation by providing necessary links to go to top of the page, home page and link to skip the menu and go directly to the content. The long text on mobile website can be painful experience as user will have to do lot of vertical and horizontal scrolling. CSS can be effectively used to knock off certain text. Use of declaration like .handheldHide {display :none} in handheld stylesheet is enough to filter the content.


Use of few images that too of smaller size is preferred that too in JPEG or GIF format that have high compression ratio. PNG images can be further compressed using OptiPNG tool.


Even though some of browsers support Javascript (IE, NetFront, OPenWave) to some degree, use of it should be restricted as debugging of Javascript is difficult.



Tools and Resources

In order to know the shortcomings of different browsers for different standards one can make use of some of the resources mentioned herein.


To test the support of your browser to XHTML and CSS styling you can access http://cameronmoll.com/articles/mobile/mkp/ . The “advanced” page of this site even tests the support of Javascript by browser.


To determine how your device interprets handheld stylesheet you can visit http://htmldog.com/test/handheld.html url from your device.


One can test their own mobile web site to see if it is ready for mobile user on emulator provided at http://mtld.mobi/emulator.php. This site can also be used by developer in checking and validating their markup language.


Different mobile browsers, their capability and on how do they handle real web pages is well explained at http://www.howtocreate.co.uk/operaStuff/devices/. The site concludes with best browser, which has low resource usage and small footprint, that is Opera.



The browser capabilities have improved much over the past years and almost all of them have a good support for XHTML. However for optimized experience for mobile user’s one need to design the mobile specific site. To support low end phones one will have to provide both versions of website viz. XHTML-MP and WML. Concept of having one site to force-feed the same content as that displayed on the traditional site without considering different needs and requirements of mobile device could lead to disaster.

Wednesday, June 18, 2008

The Star Thrower Story

The Star Thrower Story
- by Joel Barker
There's a story I would like to share with you. It was inspired by the writing of Loren Eiseley. Eiseley was a very special person because he combined the best of two cultures. He was a scientist and a poet. And from those two perspectives he wrote insightfully and beautifully about the world and our role in it.

Once upon a time, there was a wise man, much like Eiseley himself, who used to go to the ocean to do his writing. He had a habit of walking on the beach before he began his work. One day he was walking along the shore. As he looked down the beach, he saw a human figure moving like a dancer. He smiled to himself to think of someone who would dance to the day. So he began to walk faster to catch up.

As he got closer, he saw that it was a young man and the young man wasn't dancing, but instead he was reaching down to the shore, picking up something and very gently throwing it into the ocean.As he got closer, he called out, "Good morning! What are you doing?" The young man paused, looked up and replied "Throwing starfish into the ocean."

"I guess I should have asked, Why are you throwing starfish into the ocean?"

"The sun is up and the tide is going out. And if I don't throw them in they'll die."

"But young man, don't you realize that there are miles and miles of beach and starfish all along it. You can't possibly make a difference!"

The young man listened politely. Then bent down, picked up another starfish and threw it into the sea, past the breaking waves. "It made a difference for that one!"

His response surprised the man. He was upset. He didn't know how to reply. So instead, he turned away and walked back to the cottage to begin his writings.

All day long as he wrote, the image of the young man haunted him. He tried to ignore it, but the vision persisted. Finally, late in the afternoon he realized that he the scientist, he the poet, had missed out on the essential nature of the young man's actions. Because he realized that what the young man was doing was choosing not to be an observer in the universe and make a difference. He was embarrassed.

That night he went to bed troubled. When the morning came he awoke knowing that he had to do something. So he got up, put on his clothes, went to the beach and found the young man. And with him he spent the rest of the morning throwing starfish into the ocean. You see, what that young man's actions represent is something that is special in each and everyone of us. We have all been gifted with the ability to make a difference. And if we can, like that young man, become aware of that gift, we gain through the strength of our vision the power to shape the future.And that is your challenge.

And that is my challenge. We must each find our starfish. And if we throw our stars wisely and well, it will propel our Organization along, in our journey to excellence………..

Friday, May 9, 2008

Mobile Location Based Advertising and Marketing showing up

by Purushottam Darshankar
The use of advert and marketing based on user preference and location is already here and is considered to be one of the most promising mobile business opportunities. “Mobile Advertising” can be defined as any promotional or advertisement material pushed on to mobile phone. “Mobile Marketing” can be defined as any use of the mobile channel for delivery of marketing communications. Mobile Marketing is often used to broadly encompass everything from mobile advertising to promotion of mobile related content such as mobile personalization and entertainment items like ring tones, graphics, games etc.

There are couple of reasons why many experts consider Mobile Advertising as an encouraging branch of mobile business. The first and far most being the high penetration rate of mobile phones. People carry their mobile device along most of the day so mobile advertisement can reach target audience almost anytime, anywhere as against ads in newspaper or commercials on television can reach people only in certain situation and within certain time span. More importantly, each marketing message is private to that audience. This means that advertiser can take risks with their messages that are simply not possible in mass-market communication.

The technology required for location based advertising is now available as subscribers are increasingly using LBS applications on their handset such as mapping and navigation solution. Spread of mobile advertising and marketing has created an exciting revenue opportunity and this exponential growth is expected to reach to $13 billion by 2011.(Source: eMarketer , Jan 2007). The mobile advertising eco system which involves advertiser, content provider, carrier and consumer needs to be fostered so that everyone in the value chain benefits relative to their contribution. As we have seen time and time again, if the ecosystem is healthy, segment thrives otherwise it is relegated to slow growth or the interest dissipates altogether. There needs to be a good balance of power between the stakeholders. As a result the mobile advertising is at its infancy in India and is mostly into SMS advertising, but things are changing at rapid pace and are moving towards MMS and WAP push campaigns.

The mobile ecosystem keeps shifting as activities performed by stakeholders are changing with emergence of new ways of advertising. Currently, the mobile advertising chain consists of main segments - advertisers/campaign Sponsors (like American Express, P&G, GE, Toyota, etc.),marketing agencies ( like Ogilvy, Universal, Carat, Mindshare, etc.), enablers( like ThirdScreenMedia, Admob, MobiTV, Enpocket, Rhythm NewMedia, Medio, ActionEngine, ScreenTonic, Google, Yahoo, Tellme, MSN, Infospace, etc.), content provider( like CNN, Disney, Yahoo, YouTube, ESPN, Mixxer, Intercasting, etc.), aggregators( like mBlox, Infospace, WSC, etc.), carriers( like Sprint Nextel, NTT DoCoMo, Vodafone, Verizon, Cingular, Virgin, Clearwire, etc.) and consumers like you and me.

Different forms of location based advertising are available that varies from simple SMS based advertising to branded mobile web site. The mobile web offers variety of banner ads with links to take users to different mobile sites. The common short codes and SMS are currently driving the mobile advertising which could be effectively used for Text-to-win campaigns, product promotion, subscription, coupons, polls, surveys, donations etc.

The other form of mobile marketing is on–package marketing, the imprinting of short codes and keywords directly on packaged goods. Consumers text these keywords to short codes to receive rebates, enter contests or simply interact with the brand. SMS messages have had a successful history of generating high response rates. Simply include a keyword and short code on your product’s package, and consumers’ SMS messages will pour in. Timing of campaign with a well publicized event or holiday will see exceptional results.

Mobile coupons are the cool, new alternative to clipping and collecting the traditional variety. Sent directly to opted–in phones, mobile coupons provide both the consumer and the brand overwhelming convenience. With mobile coupons, brands are able to target consumers by individual preferences and locations, thus producing a greater return on investment. And unlike direct mail, mobile coupon campaigns can be created, implemented and dispatched within an hour, reducing the usual production time and costs. One great use of mobile coupons is to promote store openings. Advertise your short code and keyword on local billboards, radio shows and television stations and then watch as new customers rush with cell phones in hand to redeem their mobile coupons. Couple this with SMS messages containing store locations, new product or service information or even employment opportunities, and you will have a steady stream of business.

Incorporating the mobile advertising without degrading the usability of service is key factor for its success. Most of the subscribers do not want to pay for this service unless they see some value in the message they are going to receive. Getting the permission before sending someone a mobile message is a legal requirement in Europe/US and even in India. The user preferences are important so that marketing offer can be carefully targeted to its audience, bringing in better profits. Also, location information feed from the carrier operator helps advertiser to deliver location based promotions to target audience at right time enhancing the response rates.
Many on-device applications enable subscribers to make personalized request for information. A server-side advertising insertion engine can be used to return advertisements that key off specific words, categories, or location to give context and relevance to the messages being presented to the subscriber. The countries like Japan are exploring advanced methods to build user specific probability model to predict his or her behavior and deliver the right contents. User preferences based on customer profile that capture everything from age and gender to web-surfing habits and social networks aided with their current location is the differentiator that separates mobile advertising from other traditional media and advertisers, operators and manufacturers can all get involved to provide profitable LBA services.