Analysis of conventional SDMs, their drawbacks and the current approaches Conventional approaches for software development divide the projects into different sequential phases. In the Waterfall […]
Category: General
Comparative Analysis of RDBMs and No-Sql databases
The purpose of this article is to provide a comparisson of relational and non-relational databases in terms of performance, scalability, availability, expressiveness, consistency, manageability, integrability […]
Cybercrime!!
You could be thinking that the only worry about hackers is stealing your credit card information. However, there are far more concerns than the basic […]
IoT Challenges using Agile Framework
The security aspect of IoT is one of the biggest concerns and challenges for IT professionals. The data that the devices store and share can […]
Reviewing KMS Vendors
I got an opportunity to review a few knowledge management(KM), Vendors. As we know, KM helps to identify the existing in-house resources and optimal methods […]
Requirements Gathering Techniques strengths
Scrum and other Agile frameworks treat requirements differently than other methodologies. In traditional software development methodologies, requirements are defined up front, and they are not […]
Software Patents and Rights
It was always a very controversial and confusing subject when debating about software patents because it is something abstract, not tangible and virtual. To provide […]
Cyber Security Design in Global Setting
One of the most critical tasks within the IT department is to establish a cybersecurity strategy and have policies that mitigate the risks of cyber […]
Trends in Computing
Blockchain appeared in the computer science industry in 2008 in the form of Bitcoin, the most popular cryptocurrency. This technology is based on three concepts: […]
Social Media & Privacy
Social media websites provide disclosures of personal information and how this information is collected and used by these websites. They are an online platform for […]