It’s the data, stupid: Why mobility is not really about mobility but connectivity

(c)iStock.com/peterhowell

Editor's note: The author feels that given the political climate, it was reasonable to adopt James Carville's campaign management policies in reminiscence.

Mobility is not about mobility really – it’s about connectivity and data. Or in other words, why ‘app refactoring’ (which we define as remote desktop or screen scraping, or any other ‘agent in the cloud pretending to be the user clicking on things...

By Boaz Hecht, 17 October 2016, 0 comments. Categories: Applications, CIO, Data & Analytics, Development, Enterprise Mobility.

How zero code app development can accelerate your mobile transformation

(c)iStock.com/alphaspirit

When it comes to the rising tide of rapid application delivery platforms, it seems no two research analysts agree on precisely what defines low-code vs. RAD vs. BPM or other visual development tools. One thing is clear; there is a growing adoption of low-code strategies by businesses and IT departments that have found a way to deliver apps faster while spending less.

While some architects and developers were initially reluctant to adopt, these tools have proven to accelerate delivery...

By David Basil, 12 October 2016, 4 comments. Categories: Data & Analytics, Development, Enterprise Mobility, MBaaS, RMAD.

Life on Mars...or what needs to be done to get AI right

(c)iStock.com/gremlin

The past week has been one of particular announcements. Elon Musk unveiled his hotly anticipated plan to send humans to live – and die – on Mars, outlining plans for up to a million colonists living in a self-sustaining society, while Microsoft CEO Satya Nadella announced plans to add intelligence to core products like Office 365, Skype, and Dynamic. Unfortunately, both announcements left more questions than answers.

Life on Mars

Musk kept us in the dark about how his...

By Alex Gorbansky, 06 October 2016, 0 comments. Categories: App Platforms, CIO, Data & Analytics.

The top five pitfalls to avoid in your data protection strategy

Done correctly, data protection is a critical differentiator for your business. Done poorly, it can be costly, waste valuable staff time, and hold the organisation back from meeting key service level agreements.

This whitepaper from Veritas outlines five critical pitfalls to avoid when building a successful data protection strategy for your organisation.

By James Bourne, 15 September 2016, 0 comments. Categories: Data & Analytics, Security.

NIST report encourages “wider view” of mobile security ecosystem

(c)iStock.com/zeljkosantrac

The National Institute of Standards and Technology (NIST) has released a new resource which aims to help organisations protect their systems from mobile threats.

The paper, which is currently at a draft stage and is requesting feedback, lists potential threats in a variety of areas, from authentication to supply chains, physical access to payments, as well as network protocols and infrastructure.

“Mobile devices pose a unique set of threats, yet typical enterprise protections...

By James Bourne, 15 September 2016, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Four in 10 firms admit suffering crucial data loss from a mobile device

(c)iStock.com/Chunumunu

Four in 10 companies have suffered a loss of key corporate data from a mobile device, according to new research from industrial IT services provider NetEnrich.

The study, which polled 150 North America-based IT professionals, argues corporate IT is “hounded” by concerns over mobile security. More than half (54%) of respondents say getting employees to review the company’s policy on mobile devices is the most difficult part of managing employee use, while a similar...

By James Bourne, 14 September 2016, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Enterprise Mobility, Security.

IDC: Two in three enterprises expect to boost mobility spend - despite issues

(c)iStock.com/erhui1979

Two thirds of enterprises plan to increase their mobility spending in the coming year, according to the latest research from analyst house IDC.

The research firm’s latest survey, the 2016 Mobile Enterprise Devices, Security, Services and Solutions Survey which quizzed more than 700 US IT decision makers in companies with over 100 employees, also found that three quarters (74%) of organisations either have or plan to implement a CYOD (choose your own device) policy, citing the...

By James Bourne, 05 September 2016, 0 comments. Categories: Data & Analytics, Enterprise Mobility, Security.

If you're not tracking performance, don't bother with enterprise apps

(c)iStock.com/ktsimage

Are you tracking and testing the performance of mobile apps in your enterprise? If you aren’t, you shouldn’t even bother with apps.

Okay—so maybe that’s a little dramatic. But the main premise of the statement holds true: if you aren’t tracking the performance of your suite of mobile apps, you’ll never realise their full potential.

Time and time again, we’ve talked about

By App47, 05 September 2016, 0 comments. Categories: Applications, Data & Analytics, Enterprise Mobility.

Examining the escalating threat of DDoS attacks

DDoS attacks have evolved into sophisticated multi-vector attacks at the network and application layers that can deplete resources very quickly and generate major service outages. Any enterprise and government organisation is at risk from the escalating threat of DDoS attacks. Download the White Paper from A10 to learn:

  • The evolution of DDoS attacks: more massive, more sophisticated, more devastating
  • How volumetric attacks target bandwidth and network components
  • How application attacks have become more complex and sophisticated
  • The elements you should consider for an...

By James Bourne, 25 August 2016, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Validating DDoS threat protection: Ensuring your solution works in real-world conditions

Multi-vector DDoS attacks are overwhelming traditional security solutions and as a result, existing DDoS defense strategies must be re-evaluated. New DDoS solutions require horsepower and capabilities to deal with the volume and complexity of simultaneous attacks.


Download this whitepaper, Validating DDoS Threat Protection, to learn:

  • Classification of DDoS attack types
  • An approach on how to effectively mitigate DDoS Attacks
  • The importance of Performance Validation to ensure predictable operations
  • How IXIA validated high performance by A10’s TPS DDoS mitigation...

By James Bourne, 25 August 2016, 0 comments. Categories: Data & Analytics, Data Loss, Security.