The article presents an example of "Security Misconfiguration" vulnerability that was found on Infosys career website. It could be noted…
The article aims to describe how data is managed at LinkedIn.com, the most popular professional social networking site. Please shout…
The article lists down reasons why one would want to use tools such as Splunk which primarily analyses logs (server,…
The article lists down the details around different programming playgrounds that could be used by developers to learn while playing…
As I looked around some of the artificial intelligence (AI) related acquisitions in last few years, I got convinced, at…
The article (first in the series) aims to present some tricky interview Java questions that could help you score high…
The article presents an analysis on what's trending in the world of artificial intelligence thereby providing food for thought for…
The article relates software quality characteristics defined by ISO 25010 standard (SQUARE) with code quality and, recommends on what could…
The article presents a comprehensive list of online developer academies that provide FREE courses (90% of cases) on different topics…
Well, for those innocent souls, I must make it clear that the title of this article has no intentions to…