What determines whether a training session is successful or not? To this question most people will answer that it depends on whether the trainer has the…
Nowadays, a component of almost every IT system is its security architecture. It should develop from the beginning of the system's design and form an…
Earlier this year, Salesforce, a popular SaaS CRM solution provider, released a report titled. "[State of IT 2016](https://www.salesforce.com/form/pdf/2016-state-of-it.jsp)."…
In this article I would like to look at one of the key issues determining successful training, namely "the objectives of training". It would seem: a cliché,…
The success of a training project depends on a number of factors, including a well-conducted analysis of the group's needs, the identification of individual…
In 10 years of experience with the Drools business rules engine, based on both my own projects and the experience of clients for whom I have provided…
Poland's IT industry is developing remarkably rapidly, and as a result, companies and institutions are intensively looking for new employees and specialists.…
The IT labor market poses a huge challenge for companies. Endless recruitment difficulties, as a consequence of the oversupply of programmer jobs, make…
After a long break, we are back to (we hope) regularly communicating what's interesting at Sages, in the form of a blog. During these few years of existence,…
Most high-level programming languages provide structures that implement associative arrays, otherwise known as dictionaries. These structures allow storing…
Probably every person interested in computer networks and their security has come across a buffer overflow attack. The idea of how it works is also familiar…
Modern relational database systems, including those with open source code, allow the creation of very complex SQL queries. By placing subqueries in SELECT,…