Helping clients manage their technology for over 30 years.

What you need for successful customized app development

Customized App Development by Quest

These days, a successful app saves time and enables quick and easy access to its features. It’s available anywhere and at any time with relevant contextual experiences. It allows your customer to control the interaction and offers both flawless uptime and minimal power use.

And perhaps most critically, a successful app fits both your business and your customers like a glove — something that requires app customization.

As I delineated in my last post, the payoffs can — and should — be substantial. Customized mobile apps in particular lower costs, improve employee productivity, and significantly strengthen your relationship with your customers.

5 Capabilities That Your Wireless Network Needs Now

wireless network management

We can’t afford to ignore the myriad of mobile devices and apps currently saturating our attention and wireless connections.

In my last post, I laid out some of the industry’s eye-popping numbers. This time, I’m offering up just one graphic (from Cisco’s recent Global Mobile Data Traffic Forecast Update) showing why you must upgrade your network infrastructure. Pronto. Continue reading

Your Wireless Network: Signs That the Tail has Begun to Wag the Dog

network management - wireless networks have become the primary network

In many companies, the wireless capability added on to their enterprise network a few years ago has become some employees’ primary network.

It’s a development that signals just how quickly mobile devices are proliferating the workplace. The so-called “consumerization of business” changes the way we work — and our data networks have to keep up.

This transformation has been in the works for a while. In 2011, market analyst firm Gartner predicted 80% of corporate wireless network technologies would be obsolete by 2015. Gartner may well be right, given the findings of more recent research. Continue reading

Are you buying a service — or an illusion?

Handshake in gray

Imagine discovering that for the last 12 months none of your company data had been backed up at your designated co-lo.

Worse, you only found this out because your corporate site has suffered a catastrophic failure. All your data has been lost — and you have no way to retrieve it.

You’re outraged, of course, and you want answers. How could your co-lo provider fail to back up your data? What about your provider’s vaunted disaster recovery service? Who is responsible for allowing this to happen?  Continue reading

Apps, Apps Everywhere — But How Secure Are Yours

Did you know that your applications are the most vulnerable part of your IT operations?

iPhone with lock to symbolize Cloud Security. Cloud in background

These days, problems with apps — many of them web-based apps — account for the majority of information security breaches. Over the last year or so, and going forward, application-level attacks have emerged as the preferred vector for gaining access to sensitive (and valuable) data. What’s more, the threats are becoming increasingly acute as complex web apps, as well as mobile apps, play ever greater roles in our business and personal activities.

App vulnerabilities for sale — cheap at the price? Continue reading

A Glimpse of What’s on the 2014 Tech Horizon …

Four dice showing 2013. Last die is rotating from 3 to 4 for 2014

As 2013 comes to a close, it’s time to look ahead, and a good place to start is Gartner’s top ten strategic technology trends for 2014, which point to an accelerating velocity of change that we ignore at our peril:

Continue reading

Application vulnerabilities: Closer than you think

graph showing application vulnerabilities. small version has no labels.

Consider: Last year, according to Verizon, 54% of data breaches began as attacks on web applications, and for years one type of attack — SQL injection — has been the means by which 83% of stolen records were extracted. Meanwhile, says Gartner, 25% of all DDOS attacks this year will be application-based, and an increasing portion of these attacks may actually be diversions in which the bad guys use remotely accessible malware to target user accounts (for personal data or, in the case of financial institutions, for money).
Continue reading

Virtualization, cloud services make a new network/app management world

laptops surrounding a world globe

In my last post, I pointed out that today’s speedy, low-cost connectivity is impacting network and application management. This time I’ll concentrate on the other significant trend changing network and application management: Virtualization and cloud services.

Today’s datacenter environments are not only quickly becoming hyper-connected, most have also undergone at least some degree of virtualization and use of cloud services. The combination results in new kinds of business applications and, ultimately, a new kind of network infrastructure that exhibits…

  • Greater traffic volume, notably storage traffic
  • A shift in traffic flows from top-down/bottom-up to peer-to-peer, server-to-server, and virtual machine-to-virtual machine (now as much as 80% by some estimates)
  • Increasing amounts of synchronization and replication data across the network
  • A flatter network hierarchy

Continue reading

Fast, cheap connectivity opens up network/application management options

3 smart phones

As 2013 begins, I notice plenty of commentary about mobile devices but less talk about the implications of mobility and other current events on business network and application monitoring and management requirements.

I see two key trends impacting network and application monitoring and management in the coming year: Fast, cheap connectivity and virtualization/cloud services. In this post, I’ll focus on the first of those — connectivity, which is most apparent in the current push toward (you guessed it) mobility.

Chicken or egg: Mobility ↔ connectivity
These days, your employees’ desktop functions are shifting to increasingly powerful mobile devices. At the same time, cloud services make the connectivity of those devices pretty much ubiquitous. So the value of much of your traditional infrastructure diminishes because it costs too much, is too complex, takes up too much space — and, too often, it doesn’t get the job done anymore.

Continue reading

How safe are your apps?

Key icon to represent security

A recent report by Forrester Consulting suggests your web applications may be far more vulnerable than you think. According to Forrester, 51% of the 240 North American and European companies surveyed experienced at least one application security incident since the beginning of 2011. And 18% of those suffered losses of at least $500,000. For 8% of those surveyed, losses topped $1 million.

Continue reading