Mobile World Congress 2013 Takeaways

FiraGranVia

Mobile World Congress has wrapped up and most of us are back home after spending four days at Fira Gran Via in Barcelona. Between delivering presentations, walking miles of expo halls, and participating in dozens of meetings, the event is both exciting and tiring.  This conference used to be the sole domain of mobile operators, wireless equipment … Read more Mobile World Congress 2013 Takeaways

5 Steps to Containerize your Enterprise Mobile Apps

Containerize your Apps

Just in case you haven’t noticed lately, the BYOD Juggernaut appears to be stumbling in the security department.  It’s time to get your mobile enterprise house in order and containerize your apps to create islands of security on potentially insecure mobile devices.   We’ve seen buggy mobile operating system updates that allow users to bypass lock screens, … Read more 5 Steps to Containerize your Enterprise Mobile Apps

Human Table Scan

VB Grid

HTS (Human Table Scan) Definition:  When an employee has to manually search an entire list or grid of data because the mobile app doesn’t provide any filtering or search capabilities. You’re probably thinking the advent of the ‘magnifying glass’ icon put an end to the unproductive process of visually scanning and endlessly scrolling unfiltered lists of data in your mobile … Read more Human Table Scan

Human Extract, Transform, and Load

HETL (Human Extract, Transform, and Load) Definition:  When an employee in the field captures data with a pen or pencil & paper, drives back to the office at the end of the workday, and manually transcribes the data into a back-end computer system. You’re probably thinking this is an antiquated phenomenon that disappeared decades ago with the advent of … Read more Human Extract, Transform, and Load

The Meek Shall in Inherit the Smartphone World

Like the PC’s domination over Macs in decades past, low-cost devices for the masses will win the global smartphone war.  It won’t even be close. Most of the world population has to buy their device first, without the luxury of carrier subsidies.  This means devices with a lower hardware and software BOM cost will have the … Read more The Meek Shall in Inherit the Smartphone World

Building your BYOD Baseline: Trust

Smartphones

Let’s talk about trust. So far, my BYOD guidance has been to give your employees a lot of value without allowing their devices to access your internal corporate network.  Frankly, the ability to trust any mobile device inside the firewall is a hard sell for security folks.  The closest I’ve ever seen was encrypted Windows Mobile … Read more Building your BYOD Baseline: Trust

Bring your own Device (BYOD) Baby Steps

The Matrix

As someone who spends a lot of time talking to CIOs about the Consumerization of IT (CoIT) and mobile, I get asked a lot about BYOD strategies. I also recognize that you’re likely to get a different strategy from every person you ask.  To quickly recap how we got here over the last several years, the rise of … Read more Bring your own Device (BYOD) Baby Steps