Aug 28, 2023
Where technologies rise and fall, Java has emerged as a stalwart that stands the test of time....
read moreAug 07, 2023
Python web development has emerged as a clear favorite among software developers worldwide....
read moreAug 01, 2023
Continuous integration and continuous deployment (CI/CD) have become indispensable practices in the world of DevOps services, ensuring swift and dependable delivery of software updates. ...
read moreAug 26, 2021
The world is in a race to make lives easier. Promising a good experience comes with the added baggage of promising quality. ...
read moreJul 09, 2021
The democratization of the internet has enabled and empowered people and businesses to access the required information from anywhere at any time. ...
read moreJan 18, 2021
The COVID-19 pandemic has accelerated the digital transformation of organizations, and ISVs must rise to the occasion by upgrading their technologies and building better solutions. ...
read moreMar 05, 2019
In my previous post, I spoke about DevOps in 2019, and the surge that is expected in DevOps practices across the Software Development LifeCycle (SDLC). From here on, we will be taking different DevOps tools and environments which are expected to contribute the most towards the DevOps tool market in 2019.Servers are moving faster...
read moreJan 21, 2019
Improving the Software Development Lifecycle (SDLC) from design through development and production is essential for better applications and even better team performance. DevOps is a software engineering practice to improve the SDLC process from design through the development process to production support that unifies Software De...
read moreDec 03, 2018
Entity Framework is an open source object relational model framework for the applications built on .NET. It facilitates the developers to work with data without looking into underlying database tables and columns where the data is stored. With Entity Framework in place, developers can now create and maintain data-oriented applic...
read moreApr 24, 2017
Digital or Digitalization is an umbrella term for the services using digital technologies, mainly on the Internet, but also including mobile phones, display advertising, and any other digital medium.This is going to be a series of posts on digital mortgage, in the attempt to discuss and give a clear picture of what is the digita...
read moreMar 02, 2017
Updating an app on Play store is something which is a routine task if you wish to optimize the app and increase usability for the users. When we try to publish an update for an existing app to play store we SHOULD use the existing key store file which we used while initially publishing the app on play store.While trying to achie...
read moreFeb 09, 2017
Don’t you not like it one bit when users think that your application is sluggish? And you know that, you really cannot do anything about it, because it is interacting with third party services, tools, vendors, and is just doing way too many tasks and some of them really complex.If you think, the user need not wait for the job to...
read moreJan 22, 2016
Auto deployment is extremely useful when installations need to be carried out at multiple locations in a quick and effective manner.One of our customers, one of the major ISVs in Behavioral health with over a hundred client installations, were handling many such installations manually. The process in place used deployment via r...
read moreMar 04, 2015
We have all worked on scenarios where we grant system object access to certain users based on the parameter, provided by them. Sometimes, the user just changes the parameter passed as input intelligently, and she gets access to some restricted documents or db data.For example, you should not be able to see your manager’s review ...
read moreFeb 20, 2015
As a part of this security series, I had posted previously about SQL injection, and how this simple concept can manifest itself into a major security concern. This blog post will focus on validation of input and output in a web application.In web-application it has been noticed that we validate the input most of the time. This ...
read moreJan 27, 2015
In my previous blog, I focused on the security issues associated with broken authentication and session management concerns. Here I shall focus on the security and the vulnerability quotient of an application.I will discuss about the threats and their possible solutions. I will also mention few tools that aid the hacker in outs...
read moreDec 19, 2014
This blog post showcases the need for protecting user’s password, the password habits that the application should enforce to the end user, and the practices that a developer should follow to secure a user’s information, especially the session information. This blog will also focus on aspects of session management.Some key ...
read more