Replace your large, complex, monolithic Win32 apps that still provide business value with multiple, single-purpose mobile apps. I was involved in the architecture and development of some really large systems for some of the world’s largest companies. The user interfaces for all these systems had hundreds of screens. People with various job functions, from multiple departments, looking for different outcomes might all use the same app. These massive systems tried to be all things to everyone. Employees working in multiple departments found themselves using the same giant app despite never interacting with similar screens or workflows to perform their jobs. Expensive, time-consuming training was always required. Mobile doesn’t work this way.

close

Replace your large, complex, monolithic Win32 apps that still provide business value with multiple, single-purpose mobile apps. I was involved in the architecture and development of some really large systems for some of the world’s largest companies. The user interfaces for all these systems had hundreds of screens. People with various job functions, from multiple departments, looking for different outcomes might all use the same app. These massive systems tried to be all things to everyone. Employees working in multiple departments found themselves using the same giant app despite never interacting with similar screens or workflows to perform their jobs. Expensive, time-consuming training was always required. Mobile doesn’t work this way.

Read more

Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed mobile apps. Hope I didn’t leave out your favorite development tools from the 90s. The Mac stagnated, OS/2 didn’t capture market share and the inexpensive, developer-friendly Windows platform benefited. Companies all over the world deployed Windows 3.1 and then Windows 95 and NT. Easy to use, drag and drop development tools meant you didn’t have to have a computer science degree to build powerful apps. Desktop apps of varying quality spread like wildfire. Apps back then could manipulate the operating system, talk directly to other apps and perform all kinds of insecure, destabilizing

close

Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed mobile apps. Hope I didn’t leave out your favorite development tools from the 90s. The Mac stagnated, OS/2 didn’t capture market share and the inexpensive, developer-friendly Windows platform benefited. Companies all over the world deployed Windows 3.1 and then Windows 95 and NT. Easy to use, drag and drop development tools meant you didn’t have to have a computer science degree to build powerful apps. Desktop apps of varying quality spread like wildfire. Apps back then could manipulate the operating system, talk directly to other apps and perform all kinds of insecure, destabilizing

Read more

Move your older, distributed broker technologies like CORBA, RMI, DCOM & RPC to REST APIs that communicate with any device, app, browser or endpoint. A lot of the bigger companies built large, complex, distributed systems that relied on a variety of technologies to make them work. For example, code in an app makes local function calls in order to get things done. In distributed systems that spanned multiple servers, data centers and geographies, the notion of software in one system calling a function in a system somewhere else was referred to as a remote procedure call (RPC). This was a transformative technology but making it work wasn’t trivial. The Object Management

close

Move your older, distributed broker technologies like CORBA, RMI, DCOM & RPC to REST APIs that communicate with any device, app, browser or endpoint. A lot of the bigger companies built large, complex, distributed systems that relied on a variety of technologies to make them work. For example, code in an app makes local function calls in order to get things done. In distributed systems that spanned multiple servers, data centers and geographies, the notion of software in one system calling a function in a system somewhere else was referred to as a remote procedure call (RPC). This was a transformative technology but making it work wasn’t trivial. The Object Management

Read more

Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite. I get it. Migrating all those apps to mobile seems like eating the proverbial elephant. They cost a lot of money to build, the highly-skilled developers needed to rewrite the code are harder to find than ever, the code isn’t commented and there aren’t any docs. This often leads to IT decision makers putting off these projects, perhaps until it’s not their problem anymore. So why do it? For starters, your employees will be significantly more productive running your apps on the mobile devices they actually use.

close

Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite. I get it. Migrating all those apps to mobile seems like eating the proverbial elephant. They cost a lot of money to build, the highly-skilled developers needed to rewrite the code are harder to find than ever, the code isn’t commented and there aren’t any docs. This often leads to IT decision makers putting off these projects, perhaps until it’s not their problem anymore. So why do it? For starters, your employees will be significantly more productive running your apps on the mobile devices they actually use.

Read more

It’s time to migrate the millions of Win32 and Web 1.0 apps that currently run global business to mobile. Global businesses are run primarily by Windows applications built in the 90s. While apps were created for DOS, the Apple II, OS/2, Sun Workstations, Win16, NeXT, SGI and the Mac in the 80s and early 90s, most were migrated after Windows NT/95 arrived. Y2K taught us COBOL on mainframes are still around. The larger mega-trend stemmed from low-cost PCs coupled to a graphical operating system working with minimal RAM and slow processors. Combined with drag and drop GUI development tools, a perfect storm took over the world of business. The resulting Win32

close

It’s time to migrate the millions of Win32 and Web 1.0 apps that currently run global business to mobile. Global businesses are run primarily by Windows applications built in the 90s. While apps were created for DOS, the Apple II, OS/2, Sun Workstations, Win16, NeXT, SGI and the Mac in the 80s and early 90s, most were migrated after Windows NT/95 arrived. Y2K taught us COBOL on mainframes are still around. The larger mega-trend stemmed from low-cost PCs coupled to a graphical operating system working with minimal RAM and slow processors. Combined with drag and drop GUI development tools, a perfect storm took over the world of business. The resulting Win32

Read more

Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any device on any network. Most of you are well-versed at entering user names and passwords to access social media and banking sites from your desktop browser. Based on the identity you provide; you’re given access to those sites. Some of you in the corporate world might know what it means to join your computer to a Domain. Your company has you do this so you only have to enter your credentials once, while getting access to multiple servers. This is called single sign-on (SSO) and it uses a directory service. With people moving

close

Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any device on any network. Most of you are well-versed at entering user names and passwords to access social media and banking sites from your desktop browser. Based on the identity you provide; you’re given access to those sites. Some of you in the corporate world might know what it means to join your computer to a Domain. Your company has you do this so you only have to enter your credentials once, while getting access to multiple servers. This is called single sign-on (SSO) and it uses a directory service. With people moving

Read more

In Onalytica’s 2016 analysis and ranking of individuals and brands in the Machine to Machine space, Rob was ranked a top 100 M2M influencer. For those of you who are unfamiliar with the term, Machine to Machine (M2M) refers to the direct communication between devices using a variety of communications channels, including wired and wireless. Many of you will think this is the same or similar to the Internet of Things and you wouldn’t necessarily be wrong. I started my career in the M2M space connecting unintelligent vending machines to primitive wireless networks to derive value from remotely monitoring them. Needless to say, a lot has changed since then.        

close

In Onalytica’s 2016 analysis and ranking of individuals and brands in the Machine to Machine space, Rob was ranked a top 100 M2M influencer. For those of you who are unfamiliar with the term, Machine to Machine (M2M) refers to the direct communication between devices using a variety of communications channels, including wired and wireless. Many of you will think this is the same or similar to the Internet of Things and you wouldn’t necessarily be wrong. I started my career in the M2M space connecting unintelligent vending machines to primitive wireless networks to derive value from remotely monitoring them. Needless to say, a lot has changed since then.        

Read more

Posted in M2M

EMM solutions that deliver conditional access to desired services like email, storage and cloud services motivate BYOD users to enroll. Let’s face it, your BYOD employees aren’t too thrilled about installing an EMM app, agent or container on their device. It feels like an intrusion on one of your most personal possessions and breeds mistrust. That said, the BYOD world is all about gives and gets. Unless your company enforces a corporate-liable policy and buys every employee a smartphone, a compromise must be made to ensure the security of corporate data. This is where the use of the carrot comes into play. While the BYOD trend was initially about allowing employees

close

EMM solutions that deliver conditional access to desired services like email, storage and cloud services motivate BYOD users to enroll. Let’s face it, your BYOD employees aren’t too thrilled about installing an EMM app, agent or container on their device. It feels like an intrusion on one of your most personal possessions and breeds mistrust. That said, the BYOD world is all about gives and gets. Unless your company enforces a corporate-liable policy and buys every employee a smartphone, a compromise must be made to ensure the security of corporate data. This is where the use of the carrot comes into play. While the BYOD trend was initially about allowing employees

Read more

To prevent malicious apps from attacking corporate assets, get an EMM solution that disables app stores while blacklisting and whitelisting apps. Despite what you’re thinking, malicious apps may be one of the biggest threats your mobile enterprise will face. You might believe that device encryption, the use of a PIN to logon and utilizing a VPN to connect to your corporate network means your safe. You’re not. Within the security envelope your device has created, a rogue app could still drive a truck through your VPN tunnel and attack internal assets. Users routinely download apps without paying attention to the list of permissions and capabilities the app is asking for. They

close

To prevent malicious apps from attacking corporate assets, get an EMM solution that disables app stores while blacklisting and whitelisting apps. Despite what you’re thinking, malicious apps may be one of the biggest threats your mobile enterprise will face. You might believe that device encryption, the use of a PIN to logon and utilizing a VPN to connect to your corporate network means your safe. You’re not. Within the security envelope your device has created, a rogue app could still drive a truck through your VPN tunnel and attack internal assets. Users routinely download apps without paying attention to the list of permissions and capabilities the app is asking for. They

Read more

The perception that employee smartphones are a security liability is misplaced. They’re a multi-factor authentication security asset. It’s clear the things we’ve done in the past to stay secure are no longer sufficient. The pervasive use of usernames and passwords to authenticate with every kind of system on the planet is breaking down. Passwords aren’t strong enough and no one can remember them all. Some companies require something called two factor authentication in order to access their computer systems. This dramatically increases security because you’re required to have something like a smartcard and know something like a PIN in order to gain access. The downside is that everyone has to have

close

The perception that employee smartphones are a security liability is misplaced. They’re a multi-factor authentication security asset. It’s clear the things we’ve done in the past to stay secure are no longer sufficient. The pervasive use of usernames and passwords to authenticate with every kind of system on the planet is breaking down. Passwords aren’t strong enough and no one can remember them all. Some companies require something called two factor authentication in order to access their computer systems. This dramatically increases security because you’re required to have something like a smartcard and know something like a PIN in order to gain access. The downside is that everyone has to have

Read more

To enforce data security policies directly, get an EMM solution with digital rights management to protect data where it flows & rests. So far, our EMM journey to secure corporate data has dealt with the issue by broadly securing the entire device via MDM or more narrowly securing the apps that deliver the data using various MAM techniques. The application of security can get narrower still. The use of digital rights management (DRM) allows IT departments to apply policies directly to documents keeping data secure no matter where it flows or resides. Sometimes DRM is clumped-in with the broader mobile content management (MCM) component of EMM. This security applied directly to

close

To enforce data security policies directly, get an EMM solution with digital rights management to protect data where it flows & rests. So far, our EMM journey to secure corporate data has dealt with the issue by broadly securing the entire device via MDM or more narrowly securing the apps that deliver the data using various MAM techniques. The application of security can get narrower still. The use of digital rights management (DRM) allows IT departments to apply policies directly to documents keeping data secure no matter where it flows or resides. Sometimes DRM is clumped-in with the broader mobile content management (MCM) component of EMM. This security applied directly to

Read more

To enforce policies on individual mobile apps, get an EMM solution with MAM capabilities to prevent data leaking from corporate to personal. Mobile App Management (MAM) allows IT departments to protect corporate data without having to manage the whole device like you would with MDM. Since apps are the delivery mechanism of business data to employees, the thinking is, if you can lock down the apps, you can lock down the data. You may not need MDM anymore. The BYOD phenomenon has IT departments concerned about the co-mingling of personal and business apps and data. EMM and mobile operating system vendors have tackled this data loss prevention (DLP) problem with variety

close

To enforce policies on individual mobile apps, get an EMM solution with MAM capabilities to prevent data leaking from corporate to personal. Mobile App Management (MAM) allows IT departments to protect corporate data without having to manage the whole device like you would with MDM. Since apps are the delivery mechanism of business data to employees, the thinking is, if you can lock down the apps, you can lock down the data. You may not need MDM anymore. The BYOD phenomenon has IT departments concerned about the co-mingling of personal and business apps and data. EMM and mobile operating system vendors have tackled this data loss prevention (DLP) problem with variety

Read more

I’m thrilled to be included in this group of technology influencers and luminaries like Werner Vogels, Steve Wozniak and Mark Russinovich. To become one of those technology influencers, it’s taken a lot of years of hands-on experience building mobile, cloud and Internet of Things solutions combined with writing books, speaking at conferences around the world, blogging, tweeting and mentoring. Check it out at: https://apollotarget.com/the-top-15-industry-analysts-usa/ Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany Sign Up for my Newsletter and get a FREE Chapter of “Mobile Strategies for Business!”

close

I’m thrilled to be included in this group of technology influencers and luminaries like Werner Vogels, Steve Wozniak and Mark Russinovich. To become one of those technology influencers, it’s taken a lot of years of hands-on experience building mobile, cloud and Internet of Things solutions combined with writing books, speaking at conferences around the world, blogging, tweeting and mentoring. Check it out at: https://apollotarget.com/the-top-15-industry-analysts-usa/ Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany Sign Up for my Newsletter and get a FREE Chapter of “Mobile Strategies for Business!”

Read more

Posted in Tech

Kevin Benedict from Cognizant’s Center for the Future of Work interviews Rob Tiffany on where Digital Transformation is taking the business world. Kevin drills into the current unrealized upside with digital transformation efforts and Rob takes a deep dive on Machine Learning, the Cloud, Agile development, Mobile and the Internet of Things. Learn more from Kevin at The Center for the Future of Work    Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany Sign Up for my Newsletter and get a FREE Chapter of “Mobile Strategies for Business!”

close

Kevin Benedict from Cognizant’s Center for the Future of Work interviews Rob Tiffany on where Digital Transformation is taking the business world. Kevin drills into the current unrealized upside with digital transformation efforts and Rob takes a deep dive on Machine Learning, the Cloud, Agile development, Mobile and the Internet of Things. Learn more from Kevin at The Center for the Future of Work    Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany Sign Up for my Newsletter and get a FREE Chapter of “Mobile Strategies for Business!”

Read more

When you’re ready to deploy apps or provision Wi-Fi, certificates, VPN or email to mobile devices, get an EMM solution to provide MDM. With the basics of device-level security and policy enforcement covered by Exchange ActiveSync, you’re ready to take the next step in providing value to your employees. Extending access to PIM, delivering apps to devices and provisioning functionality over the air was the reason the earliest mobile device management (MDM) packages were built. I should know since I co-founded the first cloud-based MDM company back in 2003. The space has broadened significantly and is now referred to as enterprise mobility management (EMM) with an evolving set of features. The

close

When you’re ready to deploy apps or provision Wi-Fi, certificates, VPN or email to mobile devices, get an EMM solution to provide MDM. With the basics of device-level security and policy enforcement covered by Exchange ActiveSync, you’re ready to take the next step in providing value to your employees. Extending access to PIM, delivering apps to devices and provisioning functionality over the air was the reason the earliest mobile device management (MDM) packages were built. I should know since I co-founded the first cloud-based MDM company back in 2003. The space has broadened significantly and is now referred to as enterprise mobility management (EMM) with an evolving set of features. The

Read more

If you don’t have an Enterprise Mobility Management solution, start with Exchange Active Sync to enforce device policies and security. Baby steps. While you might not say Microsoft Exchange Server in the same breath as enterprise mobility management, this product has managed more devices than any other system over the last decade. Since most enterprises already use Active Directory for identity coupled with Exchange Server on-premises or via Office 365 in the cloud for email, calendar and contacts, this is a simple way to get started. A protocol called Exchange ActiveSync (EAS) that dates back to the Pocket PC and is used by virtually every mobile operating system to allow the

close

If you don’t have an Enterprise Mobility Management solution, start with Exchange Active Sync to enforce device policies and security. Baby steps. While you might not say Microsoft Exchange Server in the same breath as enterprise mobility management, this product has managed more devices than any other system over the last decade. Since most enterprises already use Active Directory for identity coupled with Exchange Server on-premises or via Office 365 in the cloud for email, calendar and contacts, this is a simple way to get started. A protocol called Exchange ActiveSync (EAS) that dates back to the Pocket PC and is used by virtually every mobile operating system to allow the

Read more