DISCLAIMER: The article is in no way an intention of bragging about my development capabilities. The intention is only to…
One of the key aspects of secured application development practice is Security code review. Security code review, as like normal…
I am sure many of us at some point of time in our career come across this argument from meeting…
Have you come across those heated email exchanges between customer stakeholders (manager, architect, tech lead, senior engineer etc) and stakeholders…
Have you come across a class file (object-oriented programming languages) which spanned across 3000 lines of code or more? Or,…
Are you one of those project stakeholders/trainers who have been assigned the task to make the fresher developers become billable,…
One of the key concern that freshers' developers, mostly under probation period, have been found to have is biased behavior…
As application in PHP can be written in object oriented manner, most of the code smells found in the world…
What is road to becoming a technical architect is a tricky topic, many wants to know. Especially, this is of…
Today, I happened to take an interview of a 9 years experienced guy in java technologies working as a senior…
If you have been wondering on steps required to kick-start semantic web/linked data initiative within your team or organization, following…
If you have an Agile SCRUM based development center that consists of multiple SCRUM teams to working on different features…
I have been working/reviewing a cloud application where data security has been shown as top security concerns for most of…
Before going into the SCRUM team composition in relation with application security, it can be worth while knowing what are…
Following are top 5 areas to consider while setting up secured application development practices: Security Training: The developers have to…
Did you come across any project requirements to implement an expert system? In another words, did you come across the…