Category: Application Development, BYOD, Information Security, Mobile Application Development
Methods Companies Use to Protect Themselves from Security Breaches
telliant@USANov 08, 2012
IT Departments shoulder the responsibility of keeping their company’s technology resources safe, free of viruses and attacks by hackers....
Outsourcing Application Maintenance – Key Evaluation Criteria
telliant@USAOct 31, 2012
Organizations may choose to outsource the maintenance of IT applications to service providers for a variety of reasons including deriving...
Cloud Integration Lessons from the D.O.D. and their Plan to Proceed!
telliant@USAOct 22, 2012
The National Security Administration did some serious spending on securing their infrastructure with regards to mobile use. They...
Avoiding Common Mistakes When Outsourcing Software Development
telliant@USAOct 21, 2012
Some software development companies decide on outsourcing without paying adequate attention to the roadmap that helps them reach their...
What’s New In .NET Framework 4.5?… by Gaston Hiller.
telliant@USAOct 19, 2012
Many interesting features came with the release of Visual Studio 2012 including the newest .NET Framework and global improvements...
Challenges to Overcome in Software Product Development
telliant@USAOct 19, 2012
Project Managers are confronted with several constraints in all projects they deliver. These constraints include: Scope (Deliverables),...