When to Rebuild a Software from Scratch?
Software development influencer Joel Spolsky specifically forbade rebuilding software from scratch. He called doing so, “the single worst strategic mistake that any software company can make.” That blunder’s disastrousness is evidenced by several historical...
Cash in On Video Games with NVIDIA
Value investors can cash in on video games with NVIDIA Corp (NASDAQ: NVDA). In fact, NVIDIA allows gamers to take advantage of a classic value investing strategy. The strategy is to buy the companies...
Agile Management: The Good, The Bad, and the Downright Ugly
Companies are constantly reinventing themselves to gain or maintain competitive advantage and market share. This is nothing new. What is new is the increasing use of the term Agile in business management to describe fast-paced companies...
Best Coding Languages to Learn in 2019
During my years as an undergrad, I skipped many night-outs to pick up Java hoping it would one day help me get ahead in my career. Years later, when it’s finally time to cash...
Which is More Promising: Data Science or Software Engineering?
About a month back, while I was sitting at a café and working on developing a website for a client, I found this woman sitting at a table near me, observing what I was...
Meet Raspberry Pi – A revolutionary Computing device
Gone are the days when computers used to be bulky, expensive & difficult to operate. As technology progressed, the machines became smaller, smarter & cheaper - So cheap that you can get a Raspberry...
A Team Should Build the Most Impactful Parts of Its Software
Publicly available solutions are ubiquitous. These products can fill a team’s need so well that it is tempted to build its software from a mélange of packages sown together. A mishmash of libraries is...
Know all about the blockchain-powered Brave browser & Google Fi
Back in August, I wrote about the arrival of blockchain-powered phones in the DLT ecosystem. The pioneer phone FINNEY by SIRIN Labs was launched last month while the other one, HTC Exodus 1 got released...
3 Ways to Protect Against Man-In-The-Middle Attacks
A man-in-the-middle attack is one where both the client and the server are victims. The attacker sits virtually between both parties and intercepts communications between the two. Therefore, all information passed from one end...
A Code of Ethics Does Little to Correct the Issues with Today’s Software
Malicious software stories fill many publications. Bleeping Computer is practically an active record of malware and security holes. Bulletins such as The Daily WTF are a constant reminder of the general bugginess of applications. The...
What is SaaS & why do the Tech investors love this model
Investors love to put their money in reputable businesses which have a sustainable model of business in the long run with a history of being profitable. SaaS (Software as a Service) model certainly falls...
The enigma of the ‘DARK WEB’
Every day trillions of bytes of data gets generated online & on cellular devices around the world. What most of us don't know is that this is just scratching the surface of the enormous...
Tech Tackles the Mess in HR
Technology is making it easier to streamline messy, time-consuming human resources processes, which affects HR teams as well as other organizations within the company. Ryan Higginson-Scott can speak to the fallout – which is mostly good....
Infographics Digest Vol. 9 – Cyber Security: Fighting an Evolving threat
Stay in touch: Twitter | StockTwits | LinkedIn | Telegram| Tradealike
Infographic: Dangers of the Internet of Things
For the 62% on US adults who own at least one connected device, it’s an easy call to say that IoT is the future of connectivity. From Alexa to Smart TVs, almost all IoT...
The Most Common Vulnerability Of All
Rethinking Email for Privacy and Security Most of the people I know in the world of cybersecurity rightly focus on deeply entrenched matters: server virtualization and containerization, software sandboxing, and helping to train employees to avoid...
How to Not Be Creepy While Using Employee Data in Workforce Management
Tech companies (ab)using personal data is today’s 1984. And while Facebook is at the forefront of our outrage, a growing industry in the HR Tech space is also experiencing challenges overcoming the creepiness factor...
An Introduction to Hadoop for Noobs
The client-server model transformed the data industry because it helped break apart overloaded systems, however, client-server models of the 1980s wouldn’t be able to handle the processing required for big data. Along Comes Google. https://www.youtube.com/watch?v=h2LzEvPU4jY As...
5 Things Every Developer Must Know about Intellectual Property Rights
Anyone involved in software development today must have a keen understanding of the ins and outs of intellectual property rights, including copyright laws and patent development. But the area is so vast that it...