Top Stories

In 2011, the top mobile apps deployed within enterprises were for email, field service, CRM sales and workflow. Will these apps be the most beneficial for your business? Only you and your team know that answer because every mobile journey is unique. In less than two minutes, most CIOs can describe three or more (different) mobile scenarios that could help their business be more productive, reduce costs, improve customer relationships or be more efficient. A bakery with national distribution wants to increase the number of deliveries each truck makes by receiving orders earlier in the day and pre-loading delivery trucks. A cleaning company wants to bill clients earlier in the cycle by collecting employees' daily onsite reports rather than monthly aggregated reports. A video production company needs to speed its responses to customers by streamlining the approval pro... (more)

Best Open Cloud for IoT Solution @ThingsExpo 2014

Cloud Expo Inc. has announced that the "Open Cloud for IoT Shoot-Out at @ThingsExpo New York " will take place at 14th Cloud Expo, being held June 10-12, 2014, at the Javits Center in New York City. Nominations for participating vendors will be accepted through Twitter at @ThingsExpo. @ThingsExpo Website The "Open Cloud Shoot-Out at @ThingsExpo New York," in which leading cloud providers are expected to participate, will be held live on stage at the event. The Shootout will provide the vendors with an opportunity to demonstrate the features and capabilities of their products, with a particular focus on interoperability, scalability, security, and reliability in terms of development, deployment, and management. During the shootout, the vendors will show their best examples of integrating their Open Cloud strategy with the Internet of Things (IoT). Cloud Expo 2014 C... (more)

Secure Networks

If you follow wireless technology, then you frequently read articles on the Web or in various trade magazines reporting the latest security holes found. This article will attempt to draw a border around the wireless security landscape by providing a discussion of various security technologies that have been designed and optimized to operate over local and cellular-based wireless networks. The support for security in mobile application platforms will be highlighted along with what technologies are available today for securing wireless networks; accompanying diagrams depicting different configurations are also included. Wireless Security Today Corporate IS organizations that have taken a wait-and-see approach to wireless network technology become even more hesitant when they learn of the holes present in the first releases of wireless security technologies such as WE... (more)

FedEx and Motorola Announce Completion of $150 Million Wireless Project More than 40,000 Bluetooth-enabled devices to be dep

(November 26, 2002) - Wireless Business & Technology staff met yesterday with representatives from FedEx and Motorola for an advance briefing on the announcement FedEx will make today regarding the new FedEx PowerPad, a $150 million project that took more than seven years to complete. The joint project between FedEx and Motorola was unique in its level of collaboration, and Motorola will now customize the technology for other companies. Designed specifically to enable couriers to improve customer service, the FedEx PowerPad is a Microsoft Windows-powered Pocket PC, designed to enhance customer service by providing 40,000 FedEx Express couriers with online, near real-time wireless access to the FedEx network. The FedEx PowerPad will replace the current handheld courier device, the FedEx Supertracker, which was introduced in 1986. The PowerPad boasts GPRS and Bluetooth... (more)

CMP Media Acquires MediaLive International's Technology Media Group

MANHASSET, N.Y. and SAN FRANCISCO, Jan. 11 /PRNewswire-FirstCall/ -- CMP Media today announced that it has acquired MediaLive International's Technology Media Group, including a premier portfolio of events, conferences and publications. This acquisition, the sixth in the past five months, further expands CMP Media's brand portfolio and its ability to provide access, insight and actionable programs that more closely connect technology sellers to buyers. MediaLive's brand portfolio includes 20 annual global events spanning emerging, accelerating and established technology markets. These include bellwether events such as Interop, VoiceCon, Next Generation Networks, as well as fast-growing, emerging events such as the Collaborative Technologies Conference, Mobile Business Expo and Web 2.0 (in partnership with O'Reilly Media.) These brands strengthen CMP's event portfol... (more)

Sybase iAnywhere Announces M-Business Anywhere 6.7

Sybase iAnywhere announced that it has expanded platform support within its Information Anywhere suite. Its Web standards-based mobile enterprise application enablement component, M-Business Anywhere, now supports Symbian, Windows Mobile 6 and Windows Vista desktop and tablet platforms, in addition to Windows Mobile 5, Win32 and Palm. The company also announced that its Mobile Inspection Toolkit, which is based on M-Business Anywhere, offers key new features, such as camera and GPS integration. “Sybase iAnywhere continues to be committed to supporting the widest range of mobile device platforms,” said Yadong Liu, Sr. Product Manager, Sybase iAnywhere. “We are excited that our new release will help application developers ease the challenge of building solutions for mixed device environments.” “Sybase iAnywhere’s support of open Web... (more)

Boingo Wireless Awarded First Patent

Boingo Wireless, the world’s largest Wi-Fi network, announces that the United States Patent and Trademark Office has issued the company patent No. 7,483,984, covering the method and apparatus for accessing networks by a mobile device. The patent advances the company’s client technology for detection, association and logging into wireless networks, on any device. The methods covered by the patent include accessing wireless carrier networks by mobile computing devices, where a client software application hosted by the device accesses carrier networks using wireless access points. For example, when a computer – or netbook, smartphone or any other Wi-Fi-enabled device – is in a location where there are multiple signals, the patented technology looks at each signal and alerts the user which signal will work, showing the signal as an understandable name and ID for the use... (more)

Mobile Enterprise Application Platforms, SAP and Marketing

SAP Business One on Ulitzer Yesterday I was reading Gartner's Magic Quadrant for Mobile Enterprise Application Platforms. It was interesting to me that one of the points Gartner considers before including a MEAP vendor in their report is marketing. They consider the following: Success at marketing (I am guessing it is measured by sales?) Market awareness (name recognition within a target market) Marketing strategy (if Gartner is convinced you have a good strategy) Your ability to recruit a good partner ecosystem and support it through marketing Think about it. You invest millions of dollars and tens of thousands of man/woman hours into your products, middleware, synchronization technologies, SAP integration methodologies, databases, device management dashboards, rapid application development environments and multi-channel support for dozens of mobile devices, but th... (more)

SAP Mobility Challenge, Part 6

Would you use Linkedin if you had to make a phone call and ask each person individually if they were using Linkedin before connecting to them? What if you had to manually program each connection yourself according to the mobile operating system and version each friend or contact was using? What if the programming was different for every mobile device? What if you had to re-program the connection every time a friend changed smartphones or upgraded their OS? The system would quickly cease to be a benefit and start being a big burden wouldn't it? The value of Linkedin is that it automates and standardizes most processes and connection related issues. Everyone connects in standardized ways and uses pre-built processes to manage all of their connections, security, settings, etc. It is easy to view all of your contacts and manage these contacts from one screen. Enterprise... (more)

Machine-to-Machine (M2M) Opportunity for Mobile Operators

I had the opportunity to present and sit on a panel at the Connected World Conference in Chicago last week, and I thought I’d summarize some of the key discussion points from these sessions. That Machine-to-Machine (M2M) is gaining ever increasing mindshare and market size is indisputable. Some recent market data: the Cisco Visual Networking Index (VNI) (http://www.cisco.com/go/vni) forecasts that there will be over 5 billion personal devices connected to mobile networks by 2014 – and potentially billions of M2M-capable nodes. ABI Research forecasts nearly 200m deployed M2M devices by 2014, and operators’ own forecasts are much more aggressive, numbering over a billion in the same timeframe! And Berg Insight projects the share for M2M of total mobile subscriptions to grow from 1.4% in 2009 to 3.1% in 2014, with the U.S. having the highest M2M penetration at 4.3% of ... (more)

Galaxy Tab Injunction Ordered Reconsidered

The Federal Circuit Court of Appeals Friday sent the temporary injunction on the Samsung Galaxy Tab 10.1 back to the district court that issued it for reconsideration. The jury that awarded Apple over a billion dollars in damages for infringement didn't find that Samsung infringed the D'889 design patent the injunction was based on despite both the Federal Circuit and the district court's assessments. Samsung wants the injunction lifted and went to the appeals court. Apple wants the Tab part of the jury verdict overturned and Samsung hit with a permanent injunction. The Galaxy Tab 10.1 is old but Apple wants the permanent injunction to keep other Samsung iPad look-a-likes out of the market. A decision on its motion won't be made until after a December 6 hearing. District Court Judge Lucy Koh now finds herself in the unenviable position of having to assess Apple c... (more)

CloudEXPO Stories
92% of enterprises are using the public cloud today. As a result, simply being in the cloud is no longer enough to remain competitive. The benefit of reduced costs has normalized while the market forces are demanding more innovation at faster release cycles. Enter Cloud Native! Cloud Native enables a microservices driven architecture. The shift from monolithic to microservices yields a lot of benefits - but if not done right - can quickly outweigh the benefits. The effort required in monitoring, tracing, circuit breakers, routing, load balancing, etc. for thousands of microservices can become overwhelming. This talk will address strategies to run & manage microservices from 0 to 60 using Istio and other tools in a cloud native world.
It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. That means serverless is also changing the way we leverage public clouds. Truth-be-told, many enterprise IT shops were so happy to get out of the management of physical servers within a data center that many limitations of the existing public IaaS clouds were forgiven. However, now that we've lived a few years with public IaaS clouds, developers and CloudOps pros are giving a huge thumbs down to the constant monitoring of servers, provisioned or not, that's required to support the workloads.
In very short order, the term "Blockchain" has lost an incredible amount of meaning. With too many jumping on the bandwagon, the market is inundated with projects and use cases that miss the real potential of the technology. We have to begin removing Blockchain from the conversation and ground ourselves in the motivating principles of the technology itself; whether it is consumer privacy, data ownership, trust or even participation in the global economy, the world is faced with serious problems that this technology could ultimately help us in at least partially solving. But if we do not unpack what is real and what is not, we can lose sight of the potential.
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addresses many of the challenges faced by developers and operators as monolithic applications transition towards a distributed microservice architecture. A tracing tool like Jaeger analyzes what's happening as a transaction moves through a distributed system. Monitoring software like Prometheus captures time-series events for real-time alerting and other uses. Grafeas and Kritis provide security polic...