Helping clients manage their technology for over 30 years.

Cloud Computing best practice: Understand available Cloud capabilities

Various cloud icons - cloud in center surrounded by monitors, laptops, etc

I’ve posted before about Cloud computing best practices, and I’m doing it again now (and for the next several posts) for a couple of reasons:

  1. Cloud computing continues to (quickly) evolve, and while some Cloud best practices stay more or less constant, others must be adapted to keep pace,
  2. Cloud success depends on adhering to best practices — so there’s no such thing as talking too much about them or the order in which they should be applied.

Continue reading

What is the role of security in application development?

Unlock the Keys to Application Development

The majority of developers are not security experts, and secure coding is historically not identified as a priority. Oftentimes, the arduous task of vulnerability identification and remediation cannot be successfully addressed by limited IT security resources.

Look for an app development services provider who offers a time-saving solution for all types of security testing — outsourced, individual, and enterprise-wide analysis — and for all types of users, including application developers, build managers, Quality Assurance (QA) teams, penetration testers, security auditors, and senior management.

Continue reading