Our Blog

Follow our Blog to keep you updated with technology, business trends and important insights.

Four short links: 20 May 2020

The Paradox of Source Code Secrecy — In a world of privatized decisionmaking, the largely consistent move towards closed code in software sectors, has a number of deleterious results for…


Drawing the coronavirus

What does the coronavirus look like? Rebekah Frumkin for The Paris Review highlights various illustrations and renderings, focusing on why each looks the way it does: The disease that has…


Rivers know this

“Rivers know this: there is no hurry. We shall get there some day.” Tags: patience Source: Data


Document worth reading: “The Internet of Things: a Survey and Outlook”

The recent history has witnessed disruptive advances in disciplines related to information and communication technologies that have laid a rich technological ecosystem for the growth and maturity of latent paradigms…


Florida data manager fired over transparency of Covid-19 data

Rebekah Jones, GIS manager for the Florida Department of Health, was fired a couple of weeks ago, apparently for making the state’s Covid-19 data more accessible and transparent. Florida Today…


Cloud Adoption in 2020

To continue learning and to get ahead with your career, check out O’Reilly Learning with a free trial.  Live online training, videos, books, certification prep, and more, from O’Reilly and our partner…


Announcing Refresh Summary for Premium Capacity Admins

Refresh Summaries Announcement Source: PowerBI


Branching Patterns: Future Branch

Future Branch: A single branch used for changes that are too invasive to be handled with other approaches. more… Source: martinfowler


Preparing for a threat modeling session

Jim explains how to prepare for a threat modeling session. There are three key questions to focus on: what are you building, what can go wrong, and what are you…


Four short links: 19 May 2020

This Service Helps Malware Authors Fix Flaws in their Code (Krebs on Security) — Of course the Bad Guys(tm) are going to want security audits. Of course! “We can examine…