With spring in the air, it is time to start finalizing plans to ensure your attendance at the most important annual GDSN community gathering, GS1 Connect 2017. The focus of this event is for industry leaders to learn how to better meet today’s business challenges and position their organizations to unlock tomorrow’s opportunities. Over this three-day … …
Continue readingWhy GDSN Standards Matter
In 2004, GS1 launched the Global Data Synchronization Network (GDSN) to provide a common language and set of documents to improve the exchange of product information between trading partners. The goal was to reduce the number of individual connections used to exchange master data. To achieve this vision, standards had to be developed and agreed … …
Continue readingLow-code Development: How Low Should We Go?
(The original article was posted on LinkedIn Pulse.) We are taught in life to set the bar high. But in the rush to accelerate digital transformation, is there a risk that we are aiming too low with our aspirations for next-generation software development? For all the talk of Shadow IT and Citizen Developers, IT pros … …
Continue readingCongratulations to 1WorldSync™ Power of 1 Awards Recipients, Announced at GS1 Connect
GS1 Connect 2016 launched with the 1WorldSync Power of 1 Awards, recognizing industry leaders for their transformational contributions to the market and community. LANSA would like extend special congratulations to The Procter & Gamble Company, The JM Smucker Company and ACH Food Companies, Inc. for receiving this award. In addition to their industry-leading direction, the … …
Continue readingProduct Information Revolution in UK Healthcare: Part 3
The European Union and the Electronic Patient Record (EPR) It may seem that the EU interferes in our day-to-day lives, stories of bananas having to be straight, light ale having to change its name and ambulances having to be painted yellow to comply with EU legislation are vaguely amusing (and all, incidentally, untrue). The hand … …
Continue reading12-Point Mobile Application and Data Security Checklist
In today’s ‘always on’ environment, both consumers and employees seek quick and immediate access to information when they want, wherever their location may be. According to recent report by Chief Marketer, mobile marketing budgets have increased in the last 12 months for 31% of survey respondents. While the trend of accessing critical business information on … …
Continue readingPart 3: Putting Mobile Applications & Data Security In Perspective
This week concludes my series on Mobile Applications & Data Security. I’ll leave you with tactics on how to secure application access to data and provide insight on how to secure communication between a mobile device and server. Ready? Let’s dive in. One of the challenges when building mobile applications is to make sure users … …
Continue readingPart 2: Putting Mobile Applications & Data Security In Perspective
Did you know approximately 30% of mobile users save their password in the notes apps on the phone? And 264 mobile thefts were reported every day in 2012? These are just a few statistics I highlighted last week in my Putting Mobile Applications and Data Security In Perspective post. We’ll continue our discussion on mobile security … …
Continue readingPart 1: Putting Mobile Applications & Data Security in Perspective
Today, many organizations are rushing to build mobile applications and mobile websites to gain a competitive advantage within their industry. The rate and speed at which applications are being pushed into the marketplace is phenomenal and is only increasing with the explosion of mobile devices. Over the next few weeks we’ll explore why traditional businesses … …
Continue readingProtect Your Customers’ PII (Personally Identifiable Information)
Personally Identifiable Information (PII) is the sensitive information that can be used to uniquely identify the flesh and blood people that are our staff, partners, vendors — and especially our customers. Some examples include: name, birth date, address, government issued ID numbers, email, credit card, bank account, user ID and password. As technology evolves, biometric data and … …
Continue reading