Orphaned applications are a significant driver of shadow IT and a major headache for asset and identity management. We all ...
Legacy applications are one of the most difficult issues to face within IT. A rip-and-replace approach is expensive, difficult to cost-justify and tends to interrupt business. Meanwhile, the legacy ...
We previously reported on a broad range of issues that can be caused by using the System Migration function to move from a PowerPC-based Mac OS X system to an Intel-based Mac OS X system [see articles ...
The server-side architecture of an application can have a significant impact on how well the application performs. I’ve seen examples where an application server had to make queries against a database ...
The latest cybersecurity guidance from the White House shines a spotlight on application security—more specifically, on the burden of responsibility for insecure software. At this point, the National ...
Cloud-based applications have revolutionized the way we do business: they make doing business more convenient for customers and more efficient for companies. Yet, cloud-based service applications may ...
Many costly AI application failures stem not from the models themselves but from common architectural and strategic mistakes -- including using AI without a clear purpose, choosing oversized models, ...
The endless catalog of IT failure rests on a foundation of poor judgment, inadequate communication across business groups and information silos, and conflicting agendas. Most of my blogging discusses ...