App refactoring News
August 15, 2017
Azure Stack will be ready in September. But given the product's complexity, early customers might think about working with a service provider.
February 09, 2016
Refactoring, virtualization and other enterprise application delivery methods have a tough hill to climb in the age of Web and native mobile apps.
February 09, 2016
Wearable devices have generated a lot of hype, but they still aren't ready for the enterprise. The reason: These devices still need better apps to make them valuable for business users. The cover story in this issue of Modern Mobility explores the state of enterprise wearables, assesses potential use cases and looks at the security challenges that still remain.
In a brand new column this month, analyst Maribel Lopez explains why IT shops need to take business objectives into account when planning mobile initiatives. Device Spotlight features Microsoft's foray into the laptop market with the Surface Book, and our Trending article digs into the latest on biometric authentication. And in this month's Q&A, end-user computing expert Matt Kosht explains why virtual mobile infrastructure and application refactoring are still niche technologies.
July 27, 2015
BriForum 2015 included its usual focus on VDI, but the virtualization community is searching for ways to deal with mobility, too. Several vendors showcased advancements in app refactoring and virtual mobile infrastructure.
App refactoring Get Started
Bring yourself up to speed with our introductory content
Throughout the movie Mean Girls, resident gossip Gretchen Wieners tries to make the word “fetch” catch on as a substitute for something great or cool. For instance, you might say, “That jacket is ... Continue Reading
In software development, technical debt is a metaphor equating Extreme Programming’s incremental, get-something-started approach with the easy acquisition of money through fast loans. Like monetary debt, technical debt must be repaid. Continue Reading
Evaluate App refactoring Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When it comes to mobile app development and deployment, options abound. Consider these five different approaches and evaluate how they serve users' needs. Continue Reading
Citrix HDX is a group of remote display technologies, rather than a single protocol, and IT can get a better handle on its XenApp and XenDesktop deployments by taking a look under the hood. Continue Reading
Applications are the engine that makes mobility run. This chapter covers the different approaches to bringing enterprise software functionality to smartphones and tablets. Options include in-house development, third-party apps, virtualization and application refactoring. Organizations must ensure that internally developed apps are consistent. Third-party and off-the-shelf apps offer flexibility and economies of scale, but they shouldn't require much customization, or the time and money saved is lost. Mobile application management (MAM) is often included with enterprise mobility management tools, but it can also be found as a standalone utility. A mobile security strategy and MAM should account for device loss, malware, and separation of personal and enterprise apps and data. Threats are constantly evolving. IT should also know mobile security best practices such as app containerization, dual persona and controls over document sharing. Continue Reading
Manage App refactoring
Learn to apply best practices and optimize your operations.
DaaS has a lot of practical uses, but using it to deliver Windows applications to mobile devices is not one of them. Combine a DaaS tool with app refactoring, and now you're talking. Continue Reading
Problem Solve App refactoring Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Many app-refactoring tools have catches: They either don't work on Web apps or they need source code access. But with a new product from startup PowWow, you can deliver Windows and Web applications to devices without access to the source code. Continue Reading