Let me tell you a joke. It's not a very funny, I'm afraid, but such were the jokes of the Liquidators, the soldiers and volunteers tasked with the cleanup of the Chernobyl Disaster.
I once read that writing clear specifications for software was a good idea and that not having them would be like not having architectural blueprints for a building project. And blueprints don't make buildings, right?
But what if they could?
Whenever I hear someone say that "government should be run like a business," my first reaction is "do...
The roles of big data and machine intelligence are becoming increasingly visible in our day-to-day lives. That doesn't necessarily mean that tomorrow we'll all be...
Automation isn't always meant to make us less productive, it's merely a way of being more efficient and effective with our code and projects.
I'll let you all in on a secret. The big tech companies don't keep their websites perpetually available because of magic. These companies are able to serve their users on the web so consistently because of a few specific strategies.
Is the password system really broken? In reality, the problem with passwords today is largely due to how they're managed by applications.
Companies like Intel, Google, Samsung, Microsoft, General Electric, Cisco, AT&T; and IBM, which are already taking an active role in Internet of Things development, will soon be placing a greater emphasis on risk-mitigation with these products - and developers who can deliver on security, in addition to performance and UX, are likely to be a step ahead of the competition.
For developers, when there is often one chance for success, this idea of first impressions is critical.
The modern day coder looks less and less like computer programmers of the past -- by way of cloud-based platforms and more accessible Learn to Code courses, we're seeing a democratization of coding, leading to a range of new stakeholders involved in the creation of innovative technologies.
"Law of Murphy for devops: if thing can able go wrong, is mean is already wrong but you not have Nagios alert of it yet."
Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost anywhere. But unfortunately, wireless connectivity has also brought convenience to hackers, giving them the opportunity to capture all data we type into our connected computers and devices through the air.
Insecure code continues to be a major cause of data breaches today. So why are so many talented developers writing "bad code"?
The next time you're in a coffee shop, don't overlook that 70-year-old sitting in the corner reading Dickens, Hemmingway, or maybe even a copy of The Transhumanist Wager. That senior citizen with their years of wisdom and experience might soon be fair game for a love interest.
It's not hard to demonize Facebook for their actions, but this problem is the same with every major company on the Internet today. The current relationship between consumers and Internet companies is unsustainable.
You can now pre-order Amazon's new Fire Phone at the online retailer's website. Except I wouldn't. Not yet, anyway.
What is the soul of software engineering as a discipline? That is, who is it that the software engineer can esteem? It's on this difficultly that Francis Spufford's Backroom Boys: The Secret Return of the British Boffin ultimately runs aground.
Clinical analytics can quantify everything from patient outcomes to readmissions and emergency department visits, to wait times and utilization of high-cost services. This new level of insight and transparency is good for both clinical outcomes and for business.