Skip to main content
Jun 17, 2011

Reflecting Apperian's week during Apple's WWDC'11

I hardly had a chance to catch my breath coming back from Apple's WWDC before the B's took it away again by winning the Cup for the first time since I was 2 years old. WWDC 2011 was Apperian's third and by all accounts most successful conference in our companies brief history. The one thing I told our team was that we need to be "firing on all cylinders" during the WWDC in terms of presence, customer touches, partnership expansion, and most importantly the Apperian enterprise iOS developer community.

The team overachieved by delivering over 30 individual customer briefings, 500+ enterprise focused developers from top companies joined us for our community launch party, and a 40 person VIP dinner with our Apple friends, customers, partners and analysts where our customers got up, plugged in their iPads, and demonstrated how they have rolled out dozens of Apps to thousands of their employees in days not weeks or months - and all with minimal IT support. In my 2.5 years building Apperian - those 30 minutes - seeing the passion, energy, and excitement from our customers who presented our software was the proudest moment in my life at Apperian.

A HUGE thank you goes out to everyone on the Apperian team, our customers, partners, and advisors that are quickly making Apperian one of the most successful companies in this crazy new world of enterprise mobility.

Picture by Noe Ruiz

For more pictures from Apperian's events during the week in San Francisco go to Apperian, Inc. - Photos|Facebook

Apperian

More from the Blog
Jun 26, 2019

The Mobile App Vulnerability Epidemic and Its Impact on Global Business

There is a widespread mobile app vulnerability epidemic unfolding and it’s impacting organizations across industries around t ...
Read more
Apr 16, 2019

Vulnerability Epidemic in Financial Mobile Apps - Episode 7 [Video]

What should we do?
Read more
Apr 15, 2019

Vulnerability Epidemic in Financial Mobile Apps - Episode 6 [Video]

Pros & cons of app security approaches
Read more