Replace your large, complex, monolithic Win32 apps that still provide business value with multiple, single-purpose #mobile apps.
Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed #mobile apps.
Move your older, distributed broker technologies like CORBA, RMI, DCOM & RPC to REST APIs that communicate with any #mobile device, app, browser or endpoint.
Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite for #mobile.
It’s time to migrate the millions of Win32 and Web 1.0 apps that currently run global business to #mobile.
Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any #mobile device on any network.
In Onalytica’s 2016 analysis and ranking of individuals and brands in the Machine to Machine space, Rob was ranked a top 100 M2M influencer. #IoT
EMM solutions that deliver conditional access to desired services like email, storage and cloud services motivate BYOD #mobile users to enroll.
To prevent malicious apps from attacking corporate assets, get an EMM solution that disables #mobile app stores while blacklisting and whitelisting apps.
The perception that employee smartphones are a security liability is misplaced. They’re a #mobile, multi-factor authentication security asset.
To enforce #mobile data security policies directly, get an EMM solution with digital rights management to protect data where it flows & rests.
To enforce policies on individual #mobile apps, get an EMM solution with MAM capabilities to prevent data leaking from corporate to personal.
I’m thrilled to be included in this group of #technology influencers and luminaries like Werner Vogels, Steve Wozniak and Mark Russinovich.