mrc's Cup of Joe Blog

Join us in exploring the world of modern development, evolving technologies, and the art of future-proof software

Education

What is event-triggered messaging?

EducationToday, let’s explain another important term in the world of web application development: event-triggered messaging. What is it, why is it important, and how does it help your company? Let me explain.

Event-triggered messaging is a web application feature that involves automated email or sms messages sent on a pre-determined schedule, or based on application events. Messages can be triggered by any event, from customer interactions to changes in data and everything in between.

5 signs that Shadow IT lurks in your company

EducationA growing trend, “Shadow IT” is a term used to describe IT systems and solutions built and/or used inside organizations without the approval of the IT department. This could include anything from employees emailing spreadsheets back and forth to entire departments licensing third-party, cloud solutions behind IT’s back.

While the usage varies, one thing is certain: Shadow IT is growing.

photo credit: PublicDomainPictures via pixabay cc
photo credit: PublicDomainPictures via pixabay cc

Why does this happen? Why are employees bypassing the IT department with greater frequency? While this article explains a few reasons why Shadow IT happens, it usually boils down to a simple problem: The demand for IT solutions outweighs the supply. When that happens, employees seek out their own solutions.

Now, why is this a problem? Since Shadow IT usually happens on the sneak, IT departments don’t know where (or how much) it’s happening. This means they can’t monitor the spread of company data, and therefore–cannot secure any data involved in Shadow IT. What risks does this create? Steven Lowe, Founder/CEO of Innovator, LLC, sums it up nicely below:

“There are two risks from shadow IT:
1. Critical company information floating around outside of managed channels risks data inaccuracy, loss, and leaks. ‘Home-grown’ data systems may produce data that is inaccurate, lacking integration with IT reference data sources. Sometimes this may not matter, but sometimes it might. Mis-sending an email with the company payroll data attached as an unprotected spreadsheet may be a big deal, and it may not. It all depends on the data and the organization.

2. Critical company information being shared only within a closed group risks missed opportunities and omissions. Data (and software) that IT doesn’t know about cannot be used to enhance organizational knowledge and processes. If IT doesn’t know the data exists, they can’t take advantage of it, and the company may miss strategic opportunities.”

All that being said, here’s the big question: How can businesses know whether or not they even have a Shadow IT problem, considering it’s practiced on the sneak? What signs and signals should IT leaders watch for to identify business users and departments practicing Shadow IT? While I’m sure there are more, I’ve rounded up 5 of the biggest signs that Shadow IT is alive and well in your company.

5 (more) new realities IT must learn to accept

EducationEvery new tech trend comes with varying levels of acceptance among IT departments. When the web first rolled around, some recognized its value and jumped on board. Others sat back and waited. I’ve noticed similar responses to the recent major trends, like mobile and cloud computing.

Now, I’m not going to sit here and tell you which trends to adopt and which to ignore. After all, every company has different needs.

However, I’d like to take a step beyond the recent trends, and focus instead on the new “realities” brought about by these trends. What’s the difference between a trend and a reality? While you can choose whether or not to adopt a trend, realities aren’t up for debate. They’re happening, whether you like it or not. You can’t sit back and see what others are doing. You must adapt.

So, what are these new realities? While this isn’t an exhaustive list, here are 5 realities to which IT departments must adapt:

7 principles of modern web development

EducationWhat makes a “productive developer?”

That question came up in a recent article, and I think it’s worth exploring. Generally speaking, productivity correlates directly with speed. With developers, however, it’s different. Speed doesn’t necessarily equal productivity.

photo credit: Dmitry Baranovskiy via photopin cc
photo credit: Dmitry Baranovskiy via photopin cc

For instance, suppose a developer completes a project in half the time expected. Is that developer productive? It depends. Does the application meet the specs? Is it usable? Is it secure? Will it scale up with the company? Will it adapt to future needs? I could go on.

As you see, the term “productive developer” isn’t clear cut. A “fast” developer that creates complex, unmaintainable applications isn’t productive. Quite the opposite, in fact. I’d argue that a “productive developer” is one who builds applications the right way, in the most efficient manner possible. In other words, productivity = speed + quality.

The next logical question: What makes a “quality” application? Is it one that delivers on the specifications? I believe it goes far beyond that. A quality application is one that’s built for both the present and the future. It adapts to changing technology, solves the user’s long-term needs, grows with the business, and is easily maintainable.

So, how can developers build quality applications? It starts with an understanding of modern web development principles. These principles will help developers create successful applications–those that meet their user’s present and future needs, and adapt to the ever-changing tech trends. While this isn’t a comprehensive list by any means, here are 7 important principles of modern web application development:

What is a ranking report (or “top N” report)?

EducationToday, let’s explain an important type of web report that could be a useful addition to any company’s reporting repertoire: the ranking report (also known as “the top N report”). What is it, why is it important, and how does it help your company? Let me explain.

The ranking (or top N) report creates variable rankings, across multiple dimensions, while specifying various selection criteria at run-time. In short, it lets you rank any aspect of your data from best to worst, or vice-versa. It lets users choose from a number of different criteria at run-time, and then instantly run a top/bottom ranking report complete with a graph.

9 huge enterprise mobile trends of 2014

EducationOver the past couple of years, we’ve seen the business world slowly adapt to the rise of mobile devices. Some businesses have jumped in with both feet, while others have moved more cautiously. I believe we’ll see the pace quicken dramatically this year, as more businesses rush to jump on board.

Why will 2014 be a big year for mobile in the business world? We’ve reached a point where businesses can’t afford to ignore the trend any longer. What do I mean? Here are a few examples:

  • Mobile browser usage share recently hit 20%. That means one out of every 5 customers, employees, or prospects that visit a site does so on a mobile browser.
  • The percentage of employees using their own devices for work-related tasks has grown exponentially. I’ve seen studies that put this number anywhere from 50-70%, but I’d wager the actual numbers far exceed those estimations.
  • Mobile is becoming the foundation for new technological advances. For instance, the rise of trends like the “internet of things” and wearable technology revolve around mobile devices.

I believe this will be an exciting and eventful year for mobile in the business world. We’ll see mobile do everything from improve business efficiency to completely revolutionize industries. So, where is mobile headed this year from a business perspective? Here are 9 of the biggest enterprise mobile trends to watch in 2014:

What are multi-tenant applications?

EducationToday, let’s explain an important term in the world of application development: multi-tenancy. What is it, why is it important, and how does it help your company? Let me explain.

The concept of multi-tenancy revolves around a single instance of a software application that serves different users/customers (also called “tenants”). In a multi-tenant application, different users access the same application, but see different data.

7 critical security tips for modern web development

EducationModern developers are caught between a rock and a hard place. On one hand, businesses are requiring faster application delivery from their development staff. As software plays an increasingly important role in the modern business, developers regularly face impossible deadlines.

On the other hand, web application development is becoming more complex. For instance, as outlined in this article, modern developers must create applications that adapt to any device, port to any platform, integrate with other services, and withstand increasingly sophisticated attacks. Whew!

The big problem: With these changing requirements and growing demands for faster development, developers struggle to keep up. Certain development aspects are bound to fall through the cracks.

As it turns out, that is exactly what’s happening…with security. Despite the growing importance of proper security, many developers aren’t following basic security principles. How bad is it? According to this study from last year, 99% of applications have one or more serious vulnerabilities.

Today, let’s examine this problem. While I know we can’t address every security mistake developers make, we can highlight the most important principles. What basic security guidelines should every modern web developer follow? How can you protect your web applications from being easy targets for an attack? While the list could be much larger, I’ve rounded up 7 of the most important security tips every developer must follow, and listed them below:

9 most common Business Intelligence misconceptions

EducationGartner recently predicted that Business Intelligence (BI) and Analytics will remain a top focus for CIOs through 2017. As the benefits of a data-driven decision-making process become more evident, we’ll see most businesses adopt a BI strategy in one form or another over the next few years.

The only problem: Many businesses still don’t quite understand BI. They have a general idea, but the concept remains clouded in misconceptions. These misconceptions keep many businesses from adopting BI, or from taking full advantage of its potential.

Today, I’d like to address these misconceptions, and explain why they’re false. So, what are the biggest areas of confusion surrounding BI? While the list could be much larger, here are 9 of the most common BI misconceptions:

Whatever the future holds, we’re ready for it. Here’s why…

EducationWhat’s the next big tech trend? How will the web change in 5 years? Who knows? Sure, people like to speculate and make bold predictions. But, they don’t know what the future holds. I don’t know what the future holds. Neither do you.

One thing I do know: Whatever the future holds, we’re ready for it.

How am I so sure?