Facebook App ID is missing!

Internet of Things Predictions for 2017

Hyperspace

When it comes to IoT predictions, 2017 will see solutions solving business pain points jump to hyperspace as VC funding dries up for many platform plays. As we move into 2017, the marketplace will start to separate the “build it and they will come” crowd from IoT solutions that add

Continue Reading

Mobile Apps Must be their own Fortress to Withstand Attacks from Hackers

Fort Knox

A mobile app must be its own fortress and never assume platforms are encrypted, authenticated, use VPN or require a PIN for security. I guess developers can’t count on anything these days. How you deal with security is what separates consumer app developers from enterprise app developers. The best apps

Continue Reading

Delivering Apps to Mobile Devices via Remote Pixel Projection is a Terrible Idea

San Antonio

The use of remote pixel projection technology to view Win32 apps on mobile devices should be considered nothing more than an interim workaround. What’s the fastest way to move Win32 desktop apps to mobile devices? Don’t feel bad if you chose a remote desktop or screen sharing technology to project

Continue Reading

It’s Time to Dump your 1990s App Authentication

Orlando

Migrate Win32 applications secured by client/server database logins to mobile apps that use OAuth & enterprise cloud directories for authentication instead. Do you know Scott Tiger? Are you familiar with SA and no password? If so, you probably worked with client/server database security mechanisms from companies like Oracle, Microsoft, IBM and

Continue Reading

12 Steps to Stop the Next IoT Attack in its Tracks

IoT Attack

The recent distributed denial-of-service (DDoS) IoT attack against DNS is a wake up call to how fragile the Internet can be. The IoT attack against Domain Name Servers from a botnet of thousands of devices means it’s way past time to take IoT security seriously. The bad actors around the

Continue Reading

Keep your Mobile Data Safe when Apps Talk to Each Other

Miami

Convert Win32 applications using local interprocess communications (IPC) to mobile apps that securely send data to each other via contracts. In the 90s, platforms and programming languages allowed developers to call functions that were increasingly farther away from the calling code. Calling into subroutines gave way to instantiating classes to call

Continue Reading

Reduce Corporate Risk by Updating your Win32 Apps to Run on Secure Sandboxed Platforms

Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed mobile apps. Hope I didn’t leave out your favorite development tools from the 90s. The Mac stagnated, OS/2 didn’t capture market share and the inexpensive, developer-friendly Windows platform benefited. Companies all over

Continue Reading

Reduce Business Risk by Migrating your Legacy Software to Modern, Secure Platforms and Programming Languages

St Louis

Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite. I get it. Migrating all those apps to mobile seems like eating the proverbial elephant. They cost a lot of money to build, the highly-skilled developers

Continue Reading

Improve Employee Productivity at your Company by Implementing a Hybrid Identity Strategy

Detroit

Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any device on any network. Most of you are well-versed at entering user names and passwords to access social media and banking sites from your desktop browser. Based on the identity you provide;

Continue Reading

Site Footer