Helping clients manage their technology for over 30 years.

Where technology consulting services can help

Technology Consulting Services by Quest

In my last post, I advised that a technology consulting services provider should offer a range of capabilities that encompasses integrated managed services, cloud services, and assessments as well as an extensive professional services portfolio emphasizing technology customization and solid technical staffing.

Such technology consulting depth means your provider can help you in many ways, including:
Continue reading

Are you lingering too long in your IT legacy?

Technology Ecosystem by Quest

For a long time, the most effective way for an organization to benefit from the power of IT required committing to a single vendor’s technology ecosystem.

You bought or leased the designated hardware on which you ran the designated software and, perhaps, a compatible service or two. But when you inevitably bumped into the limits of your chosen technology ecosystem, you faced a stark choice:

Either give up on that capability you were hoping to implement in the manner that would serve your business best — or alter the way your business operated in order to “sort of” get at least some of what you needed from the technology ecosystem in which you’d already invested plenty.

Typically, technology customization stayed out of reach and businesses were cornered into the second option, forced to adapt to the technology tools available rather than the other way around. Certainly, the ecosystem vendors didn’t mind, as customer lock-in proved extremely profitable.
Continue reading

Application security: As apps proliferate, so do vulnerabilities

Application Security by Quest

These days, two-thirds of all applications rely on open-source components. While open source has many virtues, it also has a key vice: once an open source component is integrated into an application, that app inherits any vulnerabilities it contains.

Further, whenever that application is referenced by other software, the inheritance of the initial vulnerability persists. The 2014 Heartbleed bug occurred in this way, and some version of this issue is likely to keep happening because most vendors don’t list all the third-party components their software relies on.
Continue reading

What you need for successful customized app development

Customized App Development by Quest

These days, a successful app saves time and enables quick and easy access to its features. It’s available anywhere and at any time with relevant contextual experiences. It allows your customer to control the interaction and offers both flawless uptime and minimal power use.

And perhaps most critically, a successful app fits both your business and your customers like a glove — something that requires app customization.

As I delineated in my last post, the payoffs can — and should — be substantial. Customized mobile apps in particular lower costs, improve employee productivity, and significantly strengthen your relationship with your customers.

Planning a digital strategy for a volatile future

Digital Strategy for a Volatile Future by Quest

As I noted in my last post, new information technologies are likely to impact your business sooner than you’d like, so remaining reactive and focused on only the short-term has never been more dangerous.

You need to generate a forward-looking digital strategy to keep your enterprise competitive. If you find this easier said than done, you’re not alone — only about a quarter of businesses have a coherent digital strategy.

Yet without the IT planning that produces an effective digital strategy, you face a real possibility of surprise technological disruption in your industry and to your enterprise.
Continue reading

Disruptive technologies:
Coming soon to an industry sector near you

Disruptive Technologies by Quest

Anyone familiar with Uber or Airbnb will agree that well-deployed disruptive technologies can be dramatic and industry-upending. Even so, if your business earns its living far from such events, you may think you have years yet before needing to deal with “anything like that.”

You might want to think again, however. This season’s analyst predictions about 2016* stand out for their warnings about the reach and speed of disruptive technologies.
Continue reading

IT professional services:
Help figuring out what you need to heed

IT Professional Services by Quest

Across most enterprises — even the very small — information technology is changing how business is done. Ignoring or rejecting these technologies merely puts your organization behind the competitive eight-ball.

But knowing which technologies to pay attention to — and when — depends on such factors as the economic sector in which your business operates, financial constraints, your appetite for risk, your thirst for opportunity, and a whole lot more. Add up all these factors and the resulting mix is entirely unique. Now you have to figure out the impact those large waves of technological change will have.
Continue reading

Staying competitive with tech customization:
Here’s what you need to know

Competitive with Technology Customization by Quest

There’s no question that information technology is changing the way everybody does business. I see this up-close daily as we help customers streamline IT operations as well as create and deploy innovative new digital capabilities.

What I’ve noticed of late is the buzz about customized development of software and platforms. This is certainly understandable: more than 70% of companies complain they can’t find the perfect system.
Continue reading

Help with IT staffing:
When walking the walk really matters

IT-Information Technology Staffing Solutions from Quest

In my last post, I noted some recent research about the shortage of skilled IT talent and the challenges this poses to any organization trying to keep its information technology capabilities competitive.

Topping the list of skills companies struggle to acquire these days are those related to ‘big data’ — such as data scientist, data specialist and data architect — as well as information security and Java-related skills.
Continue reading