Blog Image

3 React Concepts Which Can Be Forgotten

1038
React has evolved over the years and some concepts were replaced by better ones. 1. Using classes Every time we wanted to use state or take advantage of lifecycle methods we had to compose a Javascript class...
Blog Image

Data Structures — Array

2092
Now, We will start talking about Array as the simplest data structure that we can deal with. Array is used to store similar type data. We need array in cases we have a large number of...
Blog Image

Will Quantum Computers Enable Us to Defy the Laws of Physics?

8965
Computers are used to solve problems, and the type of problems they solve depends on their algorithms and hardware as well as their capabilities and limitations. Imagine what would happen if you could lift...
Self-Driving Technology

Self-Driving Technology: Is Software Evolving Fast Enough to Make It Foolproof?

1561
Technology is rapidly evolving due to inventions like 3D printing to virtual reality. One of the most interesting routes it’s taking, however, is toward self-driving cars. The automobiles we use every day to get...
Blog Image

When to Rebuild a Software from Scratch?

2609
Software development influencer Joel Spolsky specifically forbade rebuilding software from scratch. He called doing so, “the single worst strategic mistake that any software company can make.” That blunder’s disastrousness is evidenced by several historical...
Blog Image

Agile Management: The Good, The Bad, and the Downright Ugly

8695
Companies are constantly reinventing themselves to gain or maintain competitive advantage and market share. This is nothing new. What is new is the increasing use of the term Agile in business management to describe fast-paced companies...
Blog Image

A Programmer’s Guide to Creating an Eclectic Bookshelf

3717
Every developer should have a bookshelf. The possible set of texts in his cabinet are myriad, but not every collection gives a programmer a variety of tools. With an eclectic set of weapons, a...
Blog Image

Best Coding Languages to Learn in 2019

15314
During my years as an undergrad, I skipped many night-outs to pick up Java hoping it would one day help me get ahead in my career. Years later, when it’s finally time to cash...
Blog Image

AI & Creativity: BigGAN as a creative engine

3869
Truly, the year 2018 can be seen as the beginning of the creativity heyday made with/by Artificial Intelligence. Sure, the whole story begun earlier, Google Deep Dream was already a continuation of human attempts to use a machine for...
Blog Image

8 Skills You Need to Become a Data Scientist

7928
  Numbers do not scare you? There is nothing more satisfying than a beautiful excel sheet? You speak several languages, but only in code? Then it might be time for you to explore how to become...
Blog Image

Application of Real Time Locating Systems (RTLS)

2021
Monitoring Labour and Productivity through A.I. What is RTLS? RTLS can determine the location of a medium in real time, monitor and analyse movement in a designated location, and carry voice and data communications. It has great potential on...
Blog Image

Which is More Promising: Data Science or Software Engineering?

20930
About a month back, while I was sitting at a café and working on developing a website for a client, I found this woman sitting at a table near me, observing what I was...
Blog Image

Meet Raspberry Pi – A revolutionary Computing device

1985
Gone are the days when computers used to be bulky, expensive & difficult to operate. As technology progressed, the machines became smaller, smarter & cheaper - So cheap that you can get a Raspberry...
Blog Image

Hey Siri, Tell Me What You Will Do Next

2077
“Siri, what does the future hold for you?” “Would you like me to search the internet for that?” Don’t worry, soon Siri should be able to answer this directly. That’s because the digital world is evolving...
Blog Image

A Team Should Build the Most Impactful Parts of Its Software

1675
Publicly available solutions are ubiquitous. These products can fill a team’s need so well that it is tempted to build its software from a mélange of packages sown together.  A mishmash of libraries is...
Blog Image

3 Ways to Protect Against Man-In-The-Middle Attacks

6304
A man-in-the-middle attack is one where both the client and the server are victims. The attacker sits virtually between both parties and intercepts communications between the two. Therefore, all information passed from one end...