Helping clients manage their technology for over 30 years.

And now for the how of developing web and mobile apps

mobile application development icons

As I pointed out in my last entry, the ability to field web and mobile applications is quickly becoming a business necessity for even small enterprises.

If you’re lacking the substantial developer expertise needed to accomplish that — and most smaller and midsize organizations are — than your best option is to search out an accomplished web/mobile app development services provider.

Continue reading

The why and how of developing web and mobile apps — first, the why (and just a teeny bit of how)

Need for Developing Mobile and Web Based Apps

The numbers are more than impressive: 4.8 billion mobile handsets currently in use — and 19% of those are smartphones, up 2% from just last year.

Then there’s the Internet, which now claims some 2.2 billion users, 1.3 billion of whom access it via some sort of personal computer (desktop, laptop, ultrabook, netbook, tablet).

Continue reading

Are the applications you use endangering your business? A look at the solution

Application security scan

Hackers have many ways to exploit even the smallest vulnerabilities in your application environment and too often you’re compromised even before you grasp that there’s a problem.

Fortunately, it doesn’t have to be this way. The solution is an application security scan conducted by a services provider adept at dealing with issues related to application development, support — and, of course, security.

Continue reading

Are the applications you use endangering your business? A look at the problem

application security

With all the security your IT operations (should) have, you’d think this question would be moot — but it isn’t. The applications your business and your employees rely on could be time-bombs poised to destroy your ability to function.

That’s because the vast majority of applications used in business today are connected to the Internet, often in a variety of ways.

Continue reading

A closer look at application support services — part 2 of 2

Time to evaluate your App Development services provider

Besides application security testing — which I’ll be taking a closer look at next time — I want to focus now on three capabilities that can make all the difference when it comes to getting the most from an application support services provider:

  1. Database performance and stability monitoring
  2. Beta and test environment architecture, and
  3. Documentation solutions

Continue reading

Better ways to meet application development challenges

Application Development Chart illustrating Production, Development, Testing.
 Application development projects can be difficult to manage while ensuring milestones and retaining hard-won ROI.

But it doesn’t have to be that way. An experienced, competent application development service provider can handle the details with a flexible development strategy that begins with discovery, carries you through concept/design, development and testing/quality assurance, and completes the effort with production/launch and maintenance/support.

Continue reading

Prosperity in 2012: Best-performing organizations use cloud computing

I recently came across a cloud computing benefit/risk study conducted in the first half of 2011 by the IT Policy Compliance Group (ITPCG). It shows that best-performing organizations (which see higher profits and suffer fewer business disruptions and less data loss) use cloud computing significantly more than poor-performing organizations.

More than two-thirds of best performers use cloud computing — about half opting for private clouds, while 25% use hybrid clouds and another 25% use public clouds. By contrast, only 9% of worst performers use cloud computing.

Continue reading

Quest CTO Mike Dillon to speak at Global Conference on Disaster Management

Our Chief Technology Officer, Mike Dillon, will be part of the all-day Global Conference on Disaster Management on November 10 at the Marriott Union Square Hotel in San Francisco.

Mike will discuss how cloud/managed services providers can make all the difference when it comes to protecting and preserving the information and digital applications on which your business depends.

Continue reading

Essential SLA Elements #5: Protecting your data from the goblins

A service-level agreement works best when it’s the result of a collaborative effort between you and a service provider you can trust. This kind of trusted collaboration will uncover the most cost-effective ways your provider’s IT capabilities can be put to work for your business.

Part of that trust involves the fifth and last Essential SLA Element on my list: Procedures for the safe and prompt return of your data upon service termination.

Continue reading