Blog Image

When to Rebuild a Software from Scratch?

2607
Software development influencer Joel Spolsky specifically forbade rebuilding software from scratch. He called doing so, “the single worst strategic mistake that any software company can make.” That blunder’s disastrousness is evidenced by several historical...
Video Games

Cash in On Video Games with NVIDIA

4052
Value investors can cash in on video games with NVIDIA Corp (NASDAQ: NVDA). In fact, NVIDIA allows gamers to take advantage of a classic value investing strategy. The strategy is to buy the companies...
Blog Image

Agile Management: The Good, The Bad, and the Downright Ugly

8690
Companies are constantly reinventing themselves to gain or maintain competitive advantage and market share. This is nothing new. What is new is the increasing use of the term Agile in business management to describe fast-paced companies...
Blog Image

Best Coding Languages to Learn in 2019

15311
During my years as an undergrad, I skipped many night-outs to pick up Java hoping it would one day help me get ahead in my career. Years later, when it’s finally time to cash...
Blog Image

Which is More Promising: Data Science or Software Engineering?

20927
About a month back, while I was sitting at a café and working on developing a website for a client, I found this woman sitting at a table near me, observing what I was...
Blog Image

Meet Raspberry Pi – A revolutionary Computing device

1984
Gone are the days when computers used to be bulky, expensive & difficult to operate. As technology progressed, the machines became smaller, smarter & cheaper - So cheap that you can get a Raspberry...
Blog Image

A Team Should Build the Most Impactful Parts of Its Software

1675
Publicly available solutions are ubiquitous. These products can fill a team’s need so well that it is tempted to build its software from a mélange of packages sown together.  A mishmash of libraries is...
Blog Image

Know all about the blockchain-powered Brave browser & Google Fi

3130
Back in August, I wrote about the arrival of blockchain-powered phones in the DLT ecosystem. The pioneer phone FINNEY by SIRIN Labs was launched last month while the other one, HTC Exodus 1 got released...
Blog Image

3 Ways to Protect Against Man-In-The-Middle Attacks

6304
A man-in-the-middle attack is one where both the client and the server are victims. The attacker sits virtually between both parties and intercepts communications between the two. Therefore, all information passed from one end...
Blog Image

A Code of Ethics Does Little to Correct the Issues with Today’s Software

1433
Malicious software stories fill many publications. Bleeping Computer is practically an active record of malware and security holes. Bulletins such as The Daily WTF are a constant reminder of the general bugginess of applications.  The...
Blog Image

What is SaaS & why do the Tech investors love this model

2215
Investors love to put their money in reputable businesses which have a sustainable model of business in the long run with a history of being profitable. SaaS (Software as a Service) model certainly falls...
Blog Image

The enigma of the ‘DARK WEB’

4594
Every day trillions of bytes of data gets generated online & on cellular devices around the world. What most of us don't know is that this is just scratching the surface of the enormous...
Blog Image

Tech Tackles the Mess in HR

2592
Technology is making it easier to streamline messy, time-consuming human resources processes, which affects HR teams as well as other organizations within the company. Ryan Higginson-Scott can speak to the fallout – which is mostly good....
Blog Image

Infographics Digest Vol. 9 – Cyber Security: Fighting an Evolving threat

1381
Stay in touch: Twitter | StockTwits | LinkedIn | Telegram| Tradealike
Blog Image

Infographic: Dangers of the Internet of Things

2430
For the 62% on US adults who own at least one connected device, it’s an easy call to say that IoT is the future of connectivity. From Alexa to Smart TVs, almost all IoT...
Blog Image

The Most Common Vulnerability Of All

7252
Rethinking Email for Privacy and Security Most of the people I know in the world of cybersecurity rightly focus on deeply entrenched matters: server virtualization and containerization, software sandboxing, and helping to train employees to avoid...
Blog Image

How to Not Be Creepy While Using Employee Data in Workforce Management

2802
Tech companies (ab)using personal data is today’s 1984. And while Facebook is at the forefront of our outrage, a growing industry in the HR Tech space is also experiencing challenges overcoming the creepiness factor...
Blog Image

An Introduction to Hadoop for Noobs

3685
The client-server model transformed the data industry because it helped break apart overloaded systems, however, client-server models of the 1980s wouldn’t be able to handle the processing required for big data. Along Comes Google.  https://www.youtube.com/watch?v=h2LzEvPU4jY As...
Blog Image

5 Things Every Developer Must Know about Intellectual Property Rights

4169
Anyone involved in software development today must have a keen understanding of the ins and outs of intellectual property rights, including copyright laws and patent development. But the area is so vast that it...