Business Guide to Leveraging Mobility

Business Guide to Leveraging Mobility

77% CEO’s surveyed by Accenture in 2014 have mobility in their top 5 priorities with over a third actively participating in the development of mobile strategy. For the enterprise, mobile means quicker wins at lower cost with more options. Frustrations with internal IT performance can be resolved by using alternative suppliers leaving internal IT supply out of the loop entirely, which may or may not be a viable long term approach.

Flying boots, drop ins and rush to support

Flying boots, drop ins and rush to support

As enterprises are confronted with rapid digitisation in a consumer oriented technology environment, many of the industrial strength support and change management processes are simply too slow to cope with regular fast app updates, annual major OS upgrades and constant platform changes. Just as organisations moved to Agile project management processes for project delivery, businesses need to either introduce agile support processes that favour ‘help yourself’ as well as fully assisted support. Carte blanche app mobilisation via VDI (Virtual Desktop Infrastructure) is typically a poor user experience and responsive design can create more issues than it solves if the supporting architecture and training isn’t in place.

Apples shows strength in buyer behavior

Apples shows strength in buyer behavior

iOS is really the only platform retailers should care about when it comes to engaging existing and potential buyers according to analysis undertaken by Winners and Losers on Black Friday sales last year. Conversion metrics are higher and average purchases are bigger when a client purchases using an Apple device. This is not good news for Samsung or Google who are trying to vertically integrate their offerings but lag behind Apple who has a consistent message, strong horizontal integration and a leveragable ecosystem.

Apps for Warm Bodies

Apps for Warm Bodies

I am a big advocate of writing apps for real living users… requirements gathering is way easier when you don’t have someone trying to gnaw your face off… not to say that real live users won’t attempt to eat you alive, it does happen. So to avoid creating and deploying apps that go straight to zombie-ville (see previous article) there are some general principles that will convert ‘walking dead’ users into shiny happy productive people that kick a**e

Mo-Laboration and Your Best Bee Game

Mo-Laboration and Your Best Bee Game

Like bee hives, organisations that communicate and collaborate well are more successful than other organisations. This is particularly true where knowledge is the primary ingredient for driving success. For the majority of advanced economies, knowledge based work is the primary activity, whereas manufacturing and production based work, which is more labour intensive, has moved to emerging economies where the cost of labor is lower.

Zombie Apps for the Walking Dead – How To Guide

Zombie Apps for the Walking Dead – How To Guide

 The focus of EADS2005 is on architecture and integration in a pre-cloud API world where screen real estate was not coveted. Unfortunately, what once worked for mainframe desktop applications, has become the source of mass (business case) destruction.

So to help you create your own army of rotting, semi-animated zombie apps, we have created this useful ‘How To Guide’ to unleash your latest zombie apps on the corridors of all those walking dead users who are just groaning for some ‘fresh meat’. Or you could just avoid the following steps and make really awesome apps for the warm bodied!

Antivirus Application Requirements for Mobile Devices

Antivirus Application Requirements for Mobile Devices

Is Antivirus software for mobile devices just a con, or can it really protect against the scourge of virus and malware infestation? Which is the most secure of the mobile operating systems, and what are the biggest threats lurking online?

For years we’ve diligently installed, patched and updated Antivirus software on our PC’, spending time and money to ensure that we were protected from the dangers of virus and malware originating in the wilds of the internet. We didn’t start out this way, however, and there was a time when PC’s weren’t networked, and software came from a handful of companies that we knew by name and reputation.

Watch How Smart This Is.....

Watch How Smart This Is.....

Smartwatches…. puh-leeze! Enough already with the hype. There are certainly moments in the history of mankind when technology has progressed to a point where convergence results in a great leap forward. Often this new technology is the result a some bright spark assembling unrelated technologies, designed for completely different purposes and joining the dots from insights gained from their own personal experiences to produce the next transformative technology… sadly however, Smartwatches aren’t one of them.

Security Through Enablement, An Explanation

Security Through Enablement, An Explanation

Being a Mobility Solution Designer I am often asked about how MSC can help improve the security of an organisation with a focus on the mobile fleet.  Our standard answer runs the gamut of what any security conscious organisation would expect; a conversation about defence in depth for the mobile world and how we can enable that from many different aspects.  Defence here focuses on the actual asset worth protecting, the organisation's data, ranging from both malicious attackers to the accidental security breach of a person just trying to do their job.