Is REST The Biggest Game Changer Of All?

Is REST The Biggest Game Changer Of All?

Within the computer industry it is sacrilege to call a technology to be a game changer. The game changers are claimed everyday but seldom live more than a couple of years. Some game changers, have been true to their name and have fundamentally changed the IT industry. This include...

READ MORE
6 Use Cases When Cloud Is Not Needed

6 Use Cases When Cloud Is Not Needed

The shift to the cloud has brought about several solutions that make doing business easier. Whether it be cost savings, added flexibility or ease of use, companies are offloading workflows to the cloud and maintaining a competitive advantage. It would not be an exaggeration to remark...

READ MORE
A Checklist For Non-Tech Founders When Dealing With A Technology Partner

A Checklist For Non-Tech Founders When Dealing With A Technology Partner

In the technical world, non-technical founders risk being seen as unqualified especially when dealing with matters related to technology. While there are many success stories of tech founders ( Google. Facebook, Amazon), there are also other companies which have succeeded without techie...

READ MORE
What is RPA?

What is RPA?

The global robotic process automation (RPA) market is expected to reach $22 billion by 2025, according to a new Forrester report. Let’s look at how the technical and business aspects of RPA which makes it the new dominant technology in town and strictly stay away from ethical...

READ MORE
The Next Generation User Experience Today

The Next Generation User Experience Today

The computer user interface has perhaps been the most frustrating aspect of technology adoption since the dawn of the computer age. Humans had to adapt to using a computer. Operators have moved from punch cards to keyboards, and mouse and finally arrived at a touch interface…

READ MORE
Security Risks to Watch Out For in Your Web Application

Security Risks to Watch Out For in Your Web Application

This article deals with top known vulnerabilities that exists in systems. These are regularly published as OWASP (https://www.owasp.org) top 10. This article does not claim to be an original research work but essentially discusses the known top vulnerabilities from a programmer point of view…

READ MORE
Postulates to Artificial Intelligence

Postulates to Artificial Intelligence

This article forms an introductory discussion towards the upcoming concept of Artificial intelligence. This article is not a discussion aimed towards various tools, techniques and available technologies towards AI but defining what intelligence is and how one could identify artificial...

READ MORE
An Overview of Containers

An Overview of Containers

We are living in a world driven by computer technology, expanding at an unprecedented rate! We are witnessing the ideas and concepts, old and new, from labs and theory, making their way into mainstream computing…

READ MORE
DNA For Storage and Archival of Data

DNA For Storage and Archival of Data

This will be one of those million years into the future kind of article and something I hope to be part of a larger series talking about uncharted horizons, those technologies that are in the inception phase or sitting in someone’s lab.

READ MORE