Stop the menace of Android rooting malware attacks with RASP
Monday, September 25, 2017 by Frederik Mennes
One of the key security issues facing organizations that support Android devices is the risk of rooting malware. A number of malware families on the Android mobile OS attempt to obtain root access once installed because the elevated privileges gained come in handy to perform malicious activities.
What you need to know about Tordow v2.0 and Pegasus
Why you should add voice and intelligence to your apps
Friday, May 19, 2017 by Richard Harris
SoundHound Inc. is a voice-enabled AI and conversational intelligence provider that has turned sound (voice, music, and more) into understanding and actionable meaning, enabling humans to interact with the things around them in the same way we interact with each other: by speaking naturally to mobile phones, cars, TVs, music speakers, and every other part of the emergin...
Why you should ditch traditional business software analysis
Tuesday, December 20, 2016 by Richard Harris
Competition between software companies is a fierce battle waged not with weapons, but with scalable, intuitive, and efficient solutions that can most effect their customer’s lives. The importance of a well coordinated and strategic approach to how you choose to execute your solution is perhaps one of the most fundamental necessities required to succeed in markets.That’s...
Why Privileged Identity Management is Critical for Secure IT Outsourcing
Thursday, January 21, 2016 by Richard Harris
We visited with David McNeely, VP of Product Strategy at Centrify, to talk about why secure privileged identity management is critical as more of today’s businesses are outsourcing IT functions and relying on vendors to troubleshoot systems and applications. Centrify recently released a new privileged identity management solution supporting federated privileg...
Why 2015 will be the year of Microsoft
Tuesday, January 20, 2015 by Ravi Bhatt
Over the past decade, Microsoft has developed a reputation for being slow and out of touch. They come up with a cool idea ahead of anyone else but let others get to market faster or execute better (the iPad, Google Docs, etc. ). Things weren’t always so bad for Microsoft. In the 90s, the company built a gigantic business by using smart tactics. Microsof...
What are the Most Sought After Coding Skills for Developers
Wednesday, May 28, 2014 by Richard Harris
Dice.com, a tech job site, suggests that employers want software developers who’re experts in well-established technologies such as Java, .NET, C++, and HTML. Researched from hiring manager postings looking for developers on the Dice site from January 1 – April 15, the most sought-after skills and qualifications are provided in this top 40 list:1. Java/J2EE2. ...
Stanford offers free course in developing iOS 7 apps for iPhone and iPad
Wednesday, November 6, 2013 by Richard Harris
Anyone looking to get some free schooling from Stanford, here you go! They are offering a free course on iOS programming for iPhone and iPad over iOS7. The instructor is Paul Hegarty who also teaches "Coding Together: Apps for iPhone and iPad, Coding Together: Developing Apps for iPhone and iPad, and Developing iOS 7 Apps for iPhone and iPad.It's available over iTu...
List of Completely Free Programming Books
Thursday, September 26, 2013 by Richard Harris
Developers and programmers alike need resources, and if you are looking for a free way to dive into programming, I've got the source for you. Head on over to stackoverflow and check out this growing list of books online or offline that you can use to either get started with or sharpen your app development mastery.
Everything from C# essentials...
97 Things Every Programmer Should Know
Monday, March 25, 2013 by Richard Harris
Programming is more of an art than a skill anymore. Between learning multiple languages and platforms it can be dizzying. I came across a list of "97 things a programmer should know" and I find it quite useful because each item on the list is from a different author and offers a different perspective on each topic.Though this is in no way intended to be a "end all" auth...