GS1 Connect 2017

Why Attend GS1 Connect 2017?

With spring in the air, it is time to start finalizing plans to ensure your attendance at the most important annual GDSN community gathering, GS1 Connect 2017. The focus of this event is for industry leaders to learn how to better meet today’s business challenges and position their organizations to unlock tomorrow’s opportunities. Over this three-day …

Continue reading
Why GDSN Matters

Why GDSN Standards Matter

In 2004, GS1 launched the Global Data Synchronization Network (GDSN) to provide a common language and set of documents to improve the exchange of product information between trading partners. The goal was to reduce the number of individual connections used to exchange master data. To achieve this vision, standards had to be developed and agreed …

Continue reading
Low-code Development

Low-code Development: How Low Should We Go?

(The original article was posted on LinkedIn Pulse.) We are taught in life to set the bar high. But in the rush to accelerate digital transformation, is there a risk that we are aiming too low with our aspirations for next-generation software development? For all the talk of Shadow IT and Citizen Developers, IT pros …

Continue reading
Product Information Revolution in UK Healthcare: Part 3

Product Information Revolution in UK Healthcare: Part 3

The European Union and the Electronic Patient Record (EPR) It may seem that the EU interferes in our day-to-day lives, stories of bananas having to be straight, light ale having to change its name and ambulances having to be painted yellow to comply with EU legislation are vaguely amusing (and all, incidentally, untrue).  The hand …

Continue reading
Check point featured

12-Point Mobile Application and Data Security Checklist

In today’s ‘always on’ environment, both consumers and employees seek quick and immediate access to information when they want, wherever their location may be. According to recent report by Chief Marketer, mobile marketing budgets have increased in the last 12 months for 31% of survey respondents. While the trend of accessing critical business information on …

Continue reading
Metaphor of planet digitizing. Tablet PC Computer with Digital Screen over Earth.

Part 3: Putting Mobile Applications & Data Security In Perspective

This week concludes my series on Mobile Applications & Data Security. I’ll leave you with tactics on how to secure application access to data and provide insight on how to secure communication between a mobile device and server. Ready? Let’s dive in. One of the challenges when building mobile applications is to make sure users …

Continue reading
Mobile application security can be broken down into three main categories

Part 2: Putting Mobile Applications & Data Security In Perspective

Did you know approximately 30% of mobile users save their password in the notes apps on the phone? And  264 mobile thefts were reported every day in 2012? These are just a few statistics I highlighted last week in my Putting Mobile Applications and Data Security In Perspective post. We’ll continue our discussion on mobile security …

Continue reading
Empower your sales force with mobile apps

Part 1: Putting Mobile Applications & Data Security in Perspective

Today, many organizations are rushing to build mobile applications and mobile websites to gain a competitive advantage within their industry. The rate and speed at which applications are being pushed into the marketplace is phenomenal and is only increasing with the explosion of mobile devices. Over the next few weeks we’ll explore  why traditional businesses …

Continue reading
Secure Data

Protect Your Customers’ PII (Personally Identifiable Information)

Personally Identifiable Information (PII) is the sensitive information that can be used to uniquely identify the flesh and blood people that are our staff, partners, vendors — and especially our customers. Some examples include: name, birth date, address, government issued ID numbers, email, credit card, bank account, user ID and password. As technology evolves, biometric data and …

Continue reading