Tag:

Security

The Year Ahead in the Industrial IoT

In 2016, we saw breathless growth in the industrial IoT market with a bewildering mix of solutions confronting the industrial operator. Head on over to Peggy Smedley’s Connected World where I’ll give you my predictions for the IIoT market in 2017 to help you plan for the new year. Topics I cover include: IoT security …
Read more

Internet of Things Predictions for 2017

When it comes to IoT predictions, 2017 will see solutions solving business pain points jump to hyperspace as VC funding dries up for many platform plays. As we move into 2017, the marketplace will start to separate the “build it and they will come” crowd from IoT solutions that add compelling business value. When it …
Read more

Mobile Apps Must be their own Fortress to Withstand Attacks from Hackers

A mobile app must be its own fortress and never assume platforms are encrypted, authenticated, use VPN or require a PIN for security. I guess developers can’t count on anything these days. How you deal with security is what separates consumer app developers from enterprise app developers. The best apps assume an insecure, unencrypted and …
Read more

Delivering Apps to Mobile Devices via Remote Pixel Projection is a Terrible Idea

The use of remote pixel projection technology to view Win32 apps on mobile devices should be considered nothing more than an interim workaround. What’s the fastest way to move Win32 desktop apps to mobile devices? Don’t feel bad if you chose a remote desktop or screen sharing technology to project PC desktops to smartphones or …
Read more

It’s Time to Dump your 1990s App Authentication

Migrate Win32 applications secured by client/server database logins to mobile apps that use OAuth & enterprise cloud directories for authentication instead. Do you know Scott Tiger? Are you familiar with SA and no password? If so, you probably worked with client/server database security mechanisms from companies like Oracle, Microsoft, IBM and others. Anyone who’s built client/server, …
Read more

12 Steps to Stop the Next IoT Attack in its Tracks

The recent distributed denial-of-service (DDoS) IoT attack against DNS is a wake up call to how fragile the Internet can be. The IoT attack against Domain Name Servers from a botnet of thousands of devices means it’s way past time to take IoT security seriously. The bad actors around the world who previously used PCs, …
Read more

Keep your Mobile Data Safe when Apps Talk to Each Other

Convert Win32 applications using local interprocess communications (IPC) to mobile apps that securely send data to each other via contracts. In the 90s, platforms and programming languages allowed developers to call functions that were increasingly farther away from the calling code. Calling into subroutines gave way to instantiating classes to call functions. Calling exported functions in …
Read more

Reduce Corporate Risk by Updating your Win32 Apps to Run on Secure Sandboxed Platforms

Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed mobile apps. Hope I didn’t leave out your favorite development tools from the 90s. The Mac stagnated, OS/2 didn’t capture market share and the inexpensive, developer-friendly Windows platform benefited. Companies all over the world deployed Windows 3.1 …
Read more

Reduce Business Risk by Migrating your Legacy Software to Modern, Secure Platforms and Programming Languages

Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite. I get it. Migrating all those apps to mobile seems like eating the proverbial elephant. They cost a lot of money to build, the highly-skilled developers needed to rewrite the code …
Read more