Our Solutions
-
Justdial – Indian Local search app flaw in API exposes 156 million users account information
A flaw in the Indian Local search app flaw in API exposes 156 million users account information. The compromised information includes user personal details such as names, phone numbers, and email addresses. The hackers were also able to access the financial details which include balance and transactions of an account through the company’s payment service – […]
-
Open Source DeepNude App removed by GitHub
Open Source DeepNude App removed by GitHub and other platforms, the app uses AI to digitally undress pictures of women to create fake nudes. Though the developers of the app have already shut down the project, there are other alternative apps showing up. GitHub has shut down the project and based on the DeepNude algorithm […]
-
Robotic Process Automation (RPA) is having a moment
RPA is a somewhat new term to describe using intelligent technology (i.e. bots) to emulate human interactions and automate business processes. RPA isn’t new, but it’s a fast-growing area of tech along with AI, particularly now with companies making leaps into digital transformation due to the pandemic. While a few companies took an early lead […]
-
Design Thinking Process & models
As I wrote in my last post, Design Thinking is methodology as a way to innovate and it has different models from different organizations and schools. First of all, I can not confirm that one framework is better than another. It matters how it is used and facilitated. Some time ago, I had presented Design Thinking to […]
-
Why are AS/400 systems still in use?
Three decades is a very long time in the world of technology, but 1988 was still an important year. The first well-known computer virus was created, an IP connection connecting Europe and North America was established, and the idea of a World Wide Web was discussed for the first time by Tim Berners-Lee. Another significant […]
-
Attackers Turn to Small-Scale DDoS Attacks to Avoid Detection
Distributed Denial of Service (DDoS) attacks are different from many of the cyber threats that an organization commonly faces – many types of attacks are designed to either steal sensitive information or cause permanent damage. The physical impact of a DDoS attack, on the other hand, is temporary. Once the attack ceases, then the business […]
-
AngularJS to Angular app migration Steps
The development of web apps consists of many structured steps that lead to the final result. One of the main steps is choosing a suitable framework. In this article, we will talk about AngularJS and its latest version Angular. What is the difference between these two versions and how one can replace another one? If […]
