Dave Lane

About Dave Lane

This author has not yet filled in any details.
So far Dave Lane has created 13 blog entries.
12 04, 2016

Theory of Constraints: What To Change To?

By |2018-10-01T13:38:16+00:00April 12th, 2016|Culture|

Metova uses the Theory of Constraints in daily decision making. As such, we want Metovians to have a working knowledge of tools that will help them find and alleviate the constraint. This series of blog posts follows along with a class our CTO, Dave Lane, is teaching at our Franklin, TN office. If you missed [...]

7 04, 2016

Theory of Constraints: 5 Focusing Steps

By |2018-09-27T14:27:54+00:00April 7th, 2016|Culture|

Five Focusing Steps1. Identify the ConstraintIn order to increase the throughput of the system, you must alleviate the current bottleneck — the thing currently limiting you from attaining your goal. A common failure in identifying the constraint is the discovery of future assumed constraints. Remember that alleviating a constraint will result in the emergence of [...]

29 03, 2016

Theory of Constraints: Introduction

By |2018-09-27T14:22:51+00:00March 29th, 2016|Culture|

Here at Metova, we aim to teach the people we hire to find autonomy, mastery, and purpose. We have found one of the most important abilities to obtain this is problem solving. Critically thinking and evaluating your situation is useful in all areas of your life. At work, it helps us stay highly aligned and [...]

3 09, 2015

Emerging Opportunities in Mobile Security

By |2018-10-01T21:08:13+00:00September 3rd, 2015|Coding & Development, Security, Tech News|

As our society increasingly uses mobile devices for financial transactions, information sharing, and social interactions, mobile devices will become an increasingly attractive target to cyber criminals. Metova’s CTO, Dave Lane, has identified three opportunities to safeguard your users’ information that should be taken into consideration when building a mobile application. […]

27 08, 2015

Top Four Mobile Security Threats

By |2018-09-27T14:12:25+00:00August 27th, 2015|Apple/iOS, Coding & Development, Security, Tech News|

As mobile devices increase in usage and popularity, hackers have been looking for more ways to exploit them. People are using their devices in all aspects of their daily lives and are willing to share and store sensitive personal information in order to do so. Because there there is more information available for exploitation, hackers [...]

20 08, 2015

Attack on Mobile Security

By |2018-10-23T21:05:34+00:00August 20th, 2015|Security, Tech News|

Security best practices are constantly evolving to tackle the latest threats. Mobile devices such as smartphones and tablets are becoming the most commonly used general computing devices across the world. This growth has resulted in previously unimaginable levels of access to information. As mobile devices become more prominent in our daily lives, the opportunity to [...]

14 05, 2015

How to Understand Your Users Through Effective Logging

By |2018-10-01T18:24:35+00:00May 14th, 2015|Coding & Development|

It’s easy to understand why your mobile application users are frustrated with crashes and known bugs. However, it is less easy to understand why users are frustrated with the app when it doesn’t crash. Many things can go wrong in your application flow: business logic may be improperly implemented, and users may enter unexpected input [...]

Load More Posts