OWASP Security Misconfiguration Example – Infosys Career Website

12 years ago

The article presents an example of "Security Misconfiguration" vulnerability that was found on Infosys career website. It could be noted…

Data Architecture Lessons from LinkedIn.com Data Handling Mechanisms

12 years ago

The article aims to describe how data is managed at LinkedIn.com, the most popular professional social networking site.  Please shout…

Reasons Why You Need Log Management Tools like SPLUNK

12 years ago

The article lists down reasons why one would want to use tools such as Splunk which primarily analyses logs (server,…

Developers Playgrounds to Play & Learn

12 years ago

The article lists down the details around different programming playgrounds that could be used by developers to learn while playing…

Artificial Intelligence – Where to Put Your Time & Money

12 years ago

As I looked around some of the artificial intelligence (AI) related acquisitions in last few years, I got convinced, at…

Java Interview Questions (Part 1) – Rookies Series

12 years ago

The article (first in the series) aims to present some tricky interview Java questions that could help you score high…

Can Artificial Intelligence be the Next Big Bet for Developers?

12 years ago

The article presents an analysis on what's trending in the world of artificial intelligence thereby providing food for thought for…

What’s Needed to Get Your Code Quality Match ISO Standard 25010

12 years ago

The article relates software quality characteristics defined by ISO 25010 standard (SQUARE) with code quality and, recommends on what could…

9 Online Developer Academies for Regular & Consistent Learning

12 years ago

The article presents a comprehensive list of online developer academies that provide FREE courses (90% of cases) on different topics…

Why Facebook’s Hack May Fail to Fly With PHP Developers?

12 years ago

Well, for those innocent souls, I must make it clear that the title of this article has no intentions to…