Status Excessu D

My friend, Johnny, recently returned form a business trip and had some insights about work and his use of mobile platforms. He found that even though he brought both his laptop and iPad that he could really have made do with just the latter.

Where was my laptop? It sat in a safe in my room all week long. The dreaded BatPhone call from Commissioner Gordon never came. To be honest, my iPad is capable of accessing work via VPN. I could have easily survived all week long with my work laptop sitting back home.

I’ve had my iPad for over a year and three months after I started using it I found that I no longer used my MacBook. Oh, I still needed a computer for heavy work. I spent as much time on my iMac as I did before getting the iPad but the laptop … it now sits under the TV doing work as a media server. I found that my iPad was the perfect mobility solution for me. I’ve used to compose blog posts, do presentations, and take meeting notes. It is the ultimate productivity tool for the lightweight “managerial” task that I’m employed to do.

Johnny' problem.

The problem is corporate IT would probably have had kittens if they knew I was accessing work in this manner.

I’m part of that “corporate IT” group. While my employer has embraced mobility — they even appointed someone to a new Director of Mobility positions — they’ve done it in a command and control type scenario. While I understand the need for securing the companies assets, I’m constantly at odds with the approach. It’s stifling innovation and creativity and it needs to change.

Currently information security is focused on securing infrastructure. Firewalls attempt to lock out the bad guys and keep the good guys from leaving the fort. Intrusion Detection Systems raise the alarm when there is an attempt to breach the walls or something behaves in an odd way. The rules and the environment are constantly changing and the alarms are always going off. Exceptions have to be made for trusted “partners”. Application access controls ensure authorized access to systems. Anti-virus to make sure malicious code doesn’t penetrate through the least defensible position in the scheme. It’s all wrong.

Yes, these tools protect the network and systems and end points. They also make it very difficult to get any work done. The reason for all the draconian rules around the iPad and other mobility devices is because IT won’t invest in the tools and process for protecting that which is most valuable — the data. In 2009, I wrote a white paper for upper management suggesting that we investigate technologies and process for using Enterprise Rights Management. I don’t know that it will be perfect, nor cheaper, nor easier to implement but I do know that it opens up a world of platform agnostic computing.

People stock their devices with books, movies, music, news, you name it. Some devices store things locally. Some devices store things locally that were synced from something that is remote. Some devices access things stored remotely. Mind you, “remotely” could mean across the world, across the country or even across your living room. In all cases, it has to be stored somewhere. That is a lot of data and it isn’t being accessed in a single manner that is easily quantified. If that isn’t big enough, data is expected to grow EXPONENTIALLY in the coming years. Consumers will be expecting to access it all from anywhere AND everywhere.

The blog post was titled after the song by artist Armin van Buuren & Gaia which was in my iTunes trance playlist while listening to my Grado SR60i headphones.

Tango

When Apple released the iPhone 4 last summer they added a front facing camera and updated iOS with a new application called FaceTime. FaceTime allows two people with iPhone 4 to video chat. The feature is very popular with parents who travel a lot. They can use FaceTime to stay in touch with the kids or other loved one.  The Apple commercial even shows proud new parents sharing their good news with far away relatives.  Apple later released a FaceTime app for Mac OS X making iPhone 4 to Mac video conversations easy.

However, FaceTime does have two flaws that limits its utility. It works only while the user is connected to Wi-Fi and is available only on Apple devices. It does not work over the 3G cellular network. Most hotels and airports have some sort of Wi-Fi but being tethered to Wi-Fi does limit FaceTime's usefulness.  This is a problem I've encountered with most other video chat applications in the past.  The application was either only available on one type or phone or was limited to being used on a Wi-Fi network.

Tango is free app for iPhone 4 and Android that hopes to address those problems.  Tango is a video chat app that works similarly to FaceTime but allows calls to be made over Wi-Fi or the 3G (or 4G) cellular network.   It does not need a phone with a front facing camera but things work better if you can see the person with whom you are talking. Setup is easy. From within the app, create an account with the Tango service using your phone number.  Tango can also scan your phone book and find which of your contacts already use the service. You can invite your other friends to sign-up as well so you have more people to chat with. Both parties must have the app installed and be registered to use the service. Once registered making a call is simple. Tap the icon for the user you wish to call and Tango initiates the connection. You can use your iPhone 4 speakers or plug-in a set of headphones for more privacy. Once the call is initiated you can tap the video button to enable a video chat.  Tango can use push notifications to alert you to incoming calls while you phone is busy doing other task.

Tango's video and audio quality is not as good as FaceTime but Tango but is a lot more useful than FaceTime. I can video chat from anywhere with my wife via iPhone 4 or with my buddy on his Droid X.