by cschroed | Oct 31, 2013 | BYOD Security
The conversation about Bring Your Own Device has been sputtering along for a couple years now, essentially degenerating into the vanilla sentiment that you need to pay attention to what mobile devices employees bring to work, and how they use them to access sensitive...
by cschroed | Oct 25, 2013 | Mobile Application Deployment
Last week, I talked about my mission at MobileCon: I had three minutes to make the case for MAM in a room full of savvy venture capitalists. Getting right to the point, I tried to get right to the point. And I learned that in such a compressed timeframe, there’s...
by cschroed | Oct 16, 2013 | Mobile Application Management
You probably remember the Pythagorean theorem from high-school geometry. If A = B and B = C, then A = C. It’s a tasty bit of mathematical logic that can work beautifully when establishing connections in all kinds of situations. Mobile application management is a...
by cschroed | Oct 10, 2013 | Enterprise Mobility
Looking forward to this year’s MobileCon in San Jose, especially because it appears like it’s going to follow through on the strong enterprise mobility focus promised in years past. With respect to communications,an industry so often cited as being on the...
by cschroed | Oct 2, 2013 | Mobile Application Management
Recently, I attended a conference hosted by a major player in enterprise mobile communications. Typical of these gatherings, it was an energetic, eager crowd. Lots of optimism about the industry, discussion of innovation, and the near-constant buzz about the devices...