Skip to content

Archived CEO Blogs

Where technology consulting services can help

In my last post, I advised that a technology consulting services provider should offer a range of capabilities that encompasses integrated managed services , cloud services , and assessments as well as an extensive professional services portfolio emphasizing technology customization and solid technical staffing .

Such technology consulting depth means your provider can help you in many ways, including:

Tim Burke

Are you lingering too long in your IT legacy?

For a long time, the most effective way for an organization to benefit from the power of IT required committing to a single vendor’s technology ecosystem.

You bought or leased the designated hardware on which you ran the designated software and, perhaps, a compatible service or two. But when you inevitably bumped into the limits of your chosen technology ecosystem, you faced a stark choice:

Either give up on that capability you were hoping to implement in the manner that would serve your business best — or alter the way your business operated in order to “sort of” get at least some of what you needed from the technology ecosystem in which you’d already invested plenty.

Typically, technology customization stayed out of reach and businesses were cornered into the second option, forced to adapt to the technology tools available rather than the other way around. Certainly, the ecosystem vendors didn’t mind, as customer lock-in proved extremely profitable.

Tim Burke

What Kind of Cloud Customer Are You?

When clients contemplating a move to the cloud ask for advice, we tell them to start by being realistic about what cloud computing actually offers. Yes, the cloud frees budgets from constant investment in infrastructure, reducing CapEx expenditure. But the cloud is a technology, not a solution that will automatically deliver benefits like faster time-to-market or streamlined methods or a fix for personnel or process issues within your enterprise. Next, we advocate a know thyself approach. You’ll get the most

Tim Burke

Application security: As apps proliferate, so do vulnerabilities

These days, two-thirds of all applications rely on open-source components. While open source has many virtues, it also has a key vice: once an open source component is integrated into an application, that app inherits any vulnerabilities it contains.

Further, whenever that application is referenced by other software, the inheritance of the initial vulnerability persists. The 2014 Heartbleed bug occurred in this way, and some version of this issue is likely to keep happening because most vendors don’t list all the third-party components their software relies on.

Tim Burke

Data security: 6 steps to take right now

Ensuring data security can be tough, since attacks and breaches and plain old mistakes have so many sources. Often the real cause of a technology risk is deeply buried. Consider this example :

Tim Burke

What you need for successful customized app development

These days, a successful app saves time and enables quick and easy access to its features. It’s available anywhere and at any time with relevant contextual experiences. It allows your customer to control the interaction and offers both flawless uptime and minimal power use.

And perhaps most critically, a successful app fits both your business and your customers like a glove — something that requires app customization.

As I delineated in my last post , the payoffs can — and should — be substantial. Customized mobile apps in particular lower costs, improve employee productivity, and significantly strengthen your relationship with your customers.

Tim Burke

Contact Quest Today  ˄
close slider