Following are some of the links in the areas of APIs and mobile that I found interesting while reading: How…
Well, there have been lot of discussions around security issues with Obamacare website, healthcare.gov which has become talk of the…
Today, if I am tasked to lay down the architecture for web application, I would no longer be blindly choosing…
[adsenseyu2] Many a project I worked upon, did not have a clear stated set of requirements related to auditing. Interestingly,…
[adsenseyu2] In my experience, I have found that almost 95% of application developers lack application security skills and at times,…
[adsenseyu2] Before we go and discuss the PHP coding tips and techniques to avoid Cross-site scripting (XSS) attacks, lets try…
Given the nature SCRUM, two quality characteristics that takes back seat and considered as implicit are performance and security. I…
Following are some of tips & techniques for doing code migration of your C++ application to C#: Conversion using Tool:…
One of the concerns that takes the back burner while setting up the agile SCRUM teams is application security. One…
Today, on Sunday, I had to visit the school in which my elder one is studying in class III. She…
In the initial years of application development, I have found several junior or mid-level developers show up blank faces when…
Following are some of the primary architectural components of an ecommerce system: Functional Customer Profile Catalogs Pricing Shopping Cart Checkout…
When starting the career of application developer in IT with one or more programming languages, one thing which is kept…
Following are some of the migration challenges from ATG 9.x to ATG 10.x: The migration can be achieved by executing…
Most of the small to mid-size companies are competing in the common technologies space such as Java/JEE, .NET and open…
Following are some of the things you may not want to write in the log file or write in masked…