Helping clients manage their technology for over 30 years.

Securing your app dev: a cloud + 6 tips

Cloud Application Development

In my last post, I focused on the extent to which today’s cloud app development centers on mobility, IoT (the Internet of Things), and the backend integration of it all.

While you were reading, you may have noticed that I didn’t mention cloud app security. That’s because I believe cloud app security —particularly the security of web, mobility, and IoT apps — deserves its own discussion.
Continue reading

When app dev reaches the clouds: are you ready?

In many ways, application development in 2015 has left the building. I mean that figuratively of course, because these days, much of app dev is focused on cloud-based applications — and much of cloud application development has shifted offsite. Continue reading

Is your network management ready for the hyperconnectivity juggernaut?

Connectivity strength signal

As I noted in my last post, increases in both computing devices and IP traffic volumes put new demands on enterprise networks — and alters what’s required to manage those networks effectively. This juggernaut of hyperconnectivity is already underway:

  • By 2018, the average person will have five network-connected devices and networks will host four times more data traffic than they do now
  • By 2019, global per capita Internet traffic will stand at 37 gigabytes, up from 15.5 GB per capita last year

Continue reading

Get ready for the zettabyte networking era

Traffic light icon

Many new technologies hold promise for your business —mobile devices, cloud computing, virtualization, big data, the Internet of Things — but they also pose challenges to your enterprise network’s performance and your ability to conduct effective network performance monitoring.

Often this is because many enterprise networks are based on outmoded models that result in performance bottlenecks as network traffic increases. Continue reading

It’s 2015. How Should You Cloud?

Cloud Computing Solutions

Cloud computing is now pretty much everywhere — including in smaller enterprises, some 37% of which have already adopted cloud computing. This year U.S. small and midsized businesses are expected to boost what they spend on cloud computing by 28%.

Still, in 2015 cloud computing remains a work in progress, and at Quest we get lots of questions from customers about how to cloud.
Continue reading

How app dev puts business at risk — and what to do about it

In a recent survey, 43% of IT decision makers rated mobility — which is to say, mobile-friendly apps or sites — as the top business functionality or process that’s critical for applications. These days, the line between the web and mobility has blurred to the point of invisibility.

Trouble is, successfully achieving secure mobile application development and web application development is hard for a significant majority of organizations.
Continue reading

[Slideshow] 4 reasons why Windows Server 2003 End of Life matters

  • Windows Server 2003 end of life

Continue reading

New app dev challenges in 2015 — Are you ready?

mobile app development challenges

Regardless of the sector in which your business operates or its size, conducting mobile and web application development has never been more important – because it’s never had more of a competitive impact.

It’s not without challenges, however. That’s because application development software technologies and IT environments change quickly, and app dev itself has never been more complex. Keeping up is tough and getting tougher.
Continue reading

Application Security Scanning Can Save Your Business

Magnifying glass photograph

Web and mobile applications are everywhere, often working 24×7. They handle login pages, shopping carts, webmail, support and product request forms, content management systems, and much more.

These apps perform in numerous client-side browser and operating system environments, and can be deployed quickly, just about anywhere, and at little or no cost. Although they may be developed in-house, many are acquired from third parties. More than 90% of enterprises use third-party offerings in their mobile BYOD efforts, according to Gartner. Continue reading