The State of Application Experience [AX] 2019 Report from Kemp has highlighted some interesting points on how the move to cloud is changing the way applications are delivered. Moving to…
Maurice McMullin

Maurice McMullin
Maurice McMullin is a Principal Product Marketing Manager in Kemp with too many years of experience in the development and marketing of networking and security products. He has worked in organizations of all sizes ranging from two person startups through to multinationals in roles as varied as programmer and CTO.
-
Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple…
-
Introduction The benefits of cloud enablement are well understood, but that doesn’t mean that business leaders decide to immediately migrate all applications to the cloud. Cloud technology brings new technical…
-
= Introduction Organizations are increasingly dependent on their customer facing applications making the performance and resilience of these applications of paramount importance. Downtime and slow response times are not acceptable…
-
Injection attack remains at the A1 position on the latest 2017 OWASP Top 10 list of most prevalent security threats for web-based applications. It is straightforward to exploit on systems…
-
The way applications are developed and delivered is rapidly changing. The adoption of Agile methodology, DevOps practices, and multi-cloud hybrid platform delivery means that the load balancing infrastructure practices of…
-
Back in 1965, Intel co-founder Gordon E. Moore predicted that computing power would double every year. In the 52 years since Moore shared his theory, computing power has indeed grown…
-
A10 – Underprotected APIs is one of two new additions to the OWASP Top 10 list of threats to web applications. The other new addition is A7 – Insufficient Attack…
-
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are significant and exciting developments in the field of computer networking. They are great individually, but when deployed together with automation…
-
The highly anticipated announcement of Microsoft Windows Server 2016 is now generally available and firmly re-establishes Microsoft’s commitment to the hybrid cloud for enterprises and a strong reality check. Moving…
-
WordPress is very popular and can be used to deliver your blogging requirements at the official WordPress site, via an install on your own servers, or even on public Cloud…
-
If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via…
-
Surveys of CIO’s show an acceptance that Hybrid Cloud computing will be the preferred choice for infrastructure and application deployments in the future. Surprisingly the surveys are also showing that…
-
Very few web application projects are delivered using software completely written from scratch. Rather the modern application development model relies on frameworks, modules and components from various sources that are…
Introduction The original concept of load-balancing and application delivery was uncomplicated. In the old architecture, a physical appliance deployed on site served as the central point to all the applications…
As IT systems have grown more complex over the last few decades, solutions have been developed to help Operations staff monitor infrastructure to help keep it running. These solutions range…
[box type=”bio”]The final OWASP Top Ten for 2017 can be found here: [/box] The top 10 list of threats compiled and published by the Open Web Application Security Project (OWASP) have been…
Although technologies like the Cloud and virtualization seem to garner a lot of attention, a significant number of organizations continue to find meaningful value by using bare metal servers to…
Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident…
Email is an essential business enabler in most organizations. Emails are also considered as legal transactions just like any other document created and circulated by a company. It is therefore…