Profile cover photo
Profile photo
Twobo Technologies
20 followers -
Helping others securely adopt cloud computing, mobile, and social through integrated identity solutions
Helping others securely adopt cloud computing, mobile, and social through integrated identity solutions

20 followers
About
Twobo Technologies's posts

Post has shared content
Put the pieces together to form a successful API strategy by following LEGO's example. Their plan began by consolidating identities into one system. That's usually the best place to begin building a Neo-security Platform.

Post has attachment
Photos from yesterday's BYOD event
Photo
Photo
Events
2 Photos - View album

Post has attachment
A presentation explaining how to transform your organization into a platform and how APIs relate to mega trends confronting businesses today like mobile, cloud computing, and BYOD.

Post has attachment
Excellent, excellent example of how APIs, social, digital identity and imagination can be combined in innovative ways. A must watch!

Post has attachment
The annual, regional Nordic APIs event: two full days in Stockholm with parallel tracks with presentations from local and international API experts.

Post has attachment
The first Nordic APIs event: a free half-day in Stockholm with a handful of presentations from API experts about trends, security, coping w/ the fragmented device landscape, and some lessons learned by Sveriges Radio (Radio Sweden) from their open API project.

Post has attachment
The importance of API security and knowing who's invoking an API in order to secure devices that staff are bringing into the workplace, by +Travis Spencer: http://www.mashup.se/blogg/importance-of-apis-in-solving-byod on +Mashup.se  #BYOD  

Post has attachment
Identity is a central consideration to mobile app deployment, says Gunnar Peterson: http://mobappsectriathlon.blogspot.se/2012/08/identity-is-center-stage-in-mobile.html When rolling out a mobile app, API security, mobile device security, and enterprise security are the 3 high-level considerations that must be addressed. In the middle of these is knowing who someone is. Only after knowing this can you determine what a mobile user is allowed to do w/ that app. This critically important question puts identity in the center of the stage.

Post has attachment
When McAfee asked 153 Swedish CIOs and IT managers about their views on BYOD, 60% said it was strategically important to their business; over half  thought it was something their companies should be investing in.

Post has attachment
A teacher's take on BYOD: +Danielle Filas describes some of the benefits that she and her students have gained by adopting a BYOD policy in their school:

1. State of the art devices allow students to access all sorts of learning tools
2. New student-owned devices work great w/ cloud services
3. Because BYOD introduces a plethora of student-owned devices, teachers end up facilitating learning and achieving common goals rather than simply dumping info on the pupils
4. Teachers' lack of answers to device-specific questions is "a chance to model creative problem solving"
5. Using disparate hardware and software of students' choosing prepares them for a workplace wherein the devices and apps they'll use have yet to be invented
6. Lower costs for schools
7. Reduced carbon footprint by cutting out psychical textbooks rather than trees

She also says that "some [school] districts continue to deny students the use of digital tools as part of the learning process, [but] the trend has shifted. Common Core standards [used in the US] reflect this movement, too, encouraging the use of technology to enhance in-depth learning."

BYOD isn't w/out issues and rolling it out takes careful consideration, she warns. One area that administrators need to think carefully about is how to protect their networks from the security threats posed by malware running on students' machines. "Because colleges and universities lack control over students' devices," Gartner says in their IT predictions for 2013, they need to "focus on protecting their networks by enforcing policies that govern network access....In the BYOD era, security professionals will need to diligently monitor vulnerability announcements and security incidents involving mobile devices and respond appropriately with policy updates" (http://www.gartner.com/it/page.jsp?id=2211115).
Wait while more posts are being loaded