Introduction to the concept A cached repository is a design pattern to enhance application performance by storing data in a fast-access memory area known as a cache. This reduces the number of database accesses, thereby improving response times and the application’s scalability. A repository abstracts data access and provides uniform interfaces for CRUD operations […]
Recently, Artificial Intelligence (AI) has been gaining popularity at breakneck speed. OpenAI’s ChatGPT was a breakthrough in Artificial Intelligence, and the enthusiasm was huge. ChatGPT triggered a trend towards AI applications that many companies followed. You read and hear about AI everywhere. Videos and images of celebrities performing strange dance moves appear, or you hear interviews and […]
Before getting to the last part of our series of cybersecurity I encourage You to discover previous one: part 1 part 2 part 3 In this concluding article, we cover the following crucial points: 💡 Application Security & 💡 Data Security. Application Security Application security is a very extensive topic; a whole book could be […]
In the first part of article we share 4 case studies on how lack of quality assurance can lead to financial consequences. In this article we prepared even more interesting examples to learn from. DIA’s automated baggage system (1995) – monthly maintenance cost of $1 million is bigger than manual tug and trolley […]
In this previous two articles about IT infrastructure in depth: part 1 part 2 we talked about IT infrastructure security concerning physical security and network perimeter security. This time we are going to peel another layer of our cybersecurity onion and talk about internal network and host security. Internal Network Security Internal network security […]
Intro – what is article about and what not? Are you working in a highly automated and technology-dependent industry? Or perhaps you’re looking to take the first steps towards digitizing your production facilities? In either scenario, you’ve likely considered the impact of software quality on the success of your proposed solutions. The essential role […]
Introduction to Clean Architecture What is Clean Architecture? Clean Architecture, proposed by Robert C. Martin or “Uncle Bob,” is an architectural pattern for software projects aimed at keeping the code clean, modular, and independent of external influences. It isolates the business logic of the application from external details such as user interfaces, […]
Welcome back to our discussion about Emotional Intelligence. What started as a single article idea has now expanded into a three-part series, and yet, it feels like we’ve only scratched the surface. In our previous conversation, “Emotional Intelligence: The Inner Work – Part 2,” we looked at the internal components of EI: self-awareness, self-regulation, […]
Remember our journey into the realm of Emotional Intelligence (EI) in “Emotional Intelligence: Navigating Emotions – Part 1”? We discovered how emotions, once overlooked, have evolved into essential forces shaping both our personal and professional lives. We explored Goleman’s EQ theory and identified five important parts of EI: self-awareness, self-management, self-motivation, empathy, and social […]
In the previous article, we discussed IT infrastructure security in the outer layers of our security onion: policies, procedures and awareness. This time we are going to go deeper and talk about the next layers which are: physical and network perimeter security. Physical Security Physical security is a critical aspect of defending your digital […]