Blog
Articles
On our blog you will find both substantive articles and news. There will also be case studies described in detail. See the Articles category.
Surprising situations during training
9.12.2016
Anything can happen during training. Nevertheless, the trainer should not assume in advance that it will be something unpleasant and stressful. Most of…
Message authentication
8.11.2016
In a previous post on integrity, there was the problem of checking whether a message came from the original source. In other words, whether it was sent…
Shorten, or integrity in practice
4.10.2016
Integrity (integrity) service is one of the four basic services of information protection. It performs the function of ensuring that the processed information…
Application architecture on the Android platform
26.09.2016
Why does architecture matter? An application's architecture defines its individual components, the functions they perform, and the relationships between…
Basic information protection services
30.08.2016
Nowadays, a component of almost every IT system is its security architecture. It should develop from the beginning of the system's design and form an…
Enterprise Search in a Nutshell
22.08.2016
Earlier this year, Salesforce, a popular SaaS CRM solution provider, released a report titled. "[State of IT 2016](https://www.salesforce.com/form/pdf/2016-state-of-it.jsp)."…
Training objectives from the perspective of an IT training trainer
10.08.2016
In this article I would like to look at one of the key issues determining successful training, namely "the objectives of training". It would seem: a cliché,…
How do we prepare our trainers to conduct training?
25.07.2016
The success of a training project depends on a number of factors, including a well-conducted analysis of the group's needs, the identification of individual…
Drools - beyond Hello World
4.07.2016
In 10 years of experience with the Drools business rules engine, based on both my own projects and the experience of clients for whom I have provided…
Implementation and use of multiwords in the Scala language
19.12.2010
Most high-level programming languages provide structures that implement associative arrays, otherwise known as dictionaries. These structures allow storing…
Buffer Overflow Error... in detail
11.07.2010
Probably every person interested in computer networks and their security has come across a buffer overflow attack. The idea of how it works is also familiar…
Query optimization with subqueries
2.03.2010
Modern relational database systems, including those with open source code, allow the creation of very complex SQL queries. By placing subqueries in SELECT,…