The Seven Laws of Mobile Enterprise Applications – LAW 3: MOBILE APPLICATIONS MUST BE DEVICE INDEPENDENT

Device operating systems, features, and formats continue to proliferate as handhelds take on increasingly specialized functions. For example, despite the proliferation of smartphones and tablets, media-optimized devices often provide the poorest email solutions, and entertainment-optimized devices are often the heaviest and have the weakest battery life. This problem is compounded in business settings where CIOs are notoriously reluctant, and often unable, to commit to a single device model company-wide.

Law 3 addresses this: mobile […]

The Seven Laws of Mobile Enterprise Applications – LAW 2: MOBILE APPLICATIONS MUST BE ROLE BASED AND USER CONFIGURABLE

Over the years, enterprise software applications, including IT service management systems, have become bloated with unnecessary features and now invariably follow the 90-10 rule: 90 percent of users rely on 10 percent of the features. This unfortunate reality has had limited impact on PC application usage because it is relatively easy for users to ignore the 90 percent of an application they don’t need. Mobile applications, however, don’t work that way. In fact, if an […]

The Seven Laws of Mobile Enterprise Applications – LAW 1: MOBILE APPLICATIONS MUST BE PRESENCE AWARE

Unlike the simple, flat, tethered PC experience, mobile devices are always at your side and participate, actively or passively, in all your activities. They are always connected to the Internet, store vital details about you, including your schedule and personal network, and have surprising amounts of idle computing power. Mobile devices become smarter than PCs when that information is used in the context of where you are and what you’re doing. For example, by understanding […]

RJR Presents End Point Security at the 2011 Minnesota Government IT Symposium

The State of Minnesota Government 2011 IT Symposium, a two-day event held on December 7th and 8th, 2011, at the Saint Paul RiverCentre, provides up-to-date information, education and resources on the latest developments in IT trends, technologies, applications, products and services.

Damian Flannery, Senior Account Executive at RJR Innovations, presented End Point Security (link) which covered:

  • Why an organization needs End Point Security
  • Components of End Point Security Solutions
  • How End Point Security […]

2012 Security Predictions

According to Help Net Security, these are the influential security trends to watch in 2012. What do you think?

1. The human perimeter

Expectation: further examples of the socially engineered email attacks combined with zero day exploits as perpetrated against RSA and its client base, Operation Aurora and Google Gmail.

Prevention: Frequent staff training and refresher courses are vital. Security processes may be perceived to be hampering working practices so ensure procedures are tailored to […]