Facebook App ID is missing!
FiraGranVia

Mobile World Congress 2013 Takeaways

Mobile World Congress has wrapped up and most of us are back home after spending four days at Fira Gran Via in Barcelona. Between delivering presentations, walking miles of expo halls, and participating in dozens of meetings, the event is both

Containerize your Apps

5 Steps to Containerize your Enterprise Mobile Apps

Just in case you haven’t noticed lately, the BYOD Juggernaut appears to be stumbling in the security department.  It’s time to get your mobile enterprise house in order and containerize your apps to create islands of security on potentially insecure mobile devices.

VB Grid

Human Table Scan

HTS (Human Table Scan) Definition:  When an employee has to manually search an entire list or grid of data because the mobile app doesn’t provide any filtering or search capabilities. You’re probably thinking the advent of the ‘magnifying glass’ icon put an end to

Human Extract, Transform, and Load

HETL (Human Extract, Transform, and Load) Definition:  When an employee in the field captures data with a pen or pencil & paper, drives back to the office at the end of the workday, and manually transcribes the data into a back-end computer

The Meek Shall in Inherit the Smartphone World

Like the PC’s domination over Macs in decades past, low-cost devices for the masses will win the global smartphone war.  It won’t even be close. Most of the world population has to buy their device first, without the luxury of

Smartphones

Building your BYOD Baseline: Trust

Let’s talk about trust. So far, my BYOD guidance has been to give your employees a lot of value without allowing their devices to access your internal corporate network.  Frankly, the ability to trust any mobile device inside the firewall

The Matrix

Bring your own Device (BYOD) Baby Steps

As someone who spends a lot of time talking to CIOs about the Consumerization of IT (CoIT) and mobile, I get asked a lot about BYOD strategies. I also recognize that you’re likely to get a different strategy from every