How to deal with legacy systems/solution

In this article we will dissect the different components involved in a solution, that will help us identify the lifelines tied to the solution, enebaling us to produce smaller chunks of workload and work in an agile manner. 

Read more

 

Life cycle of the OS

By Alexandru Mircea Pastiu

Technical debt and life cycle of the OS

Each company launches a software and they support it on different operating systems, but as times goes by, the different operating systems reach their end of life and then the software has to be moved to new operating systems.

While you can still run your software on an unsupported operating system, the problem will arrive once you no longer receive patches for different vulnerabilities that will be exploited.

 Legacy systems

 By Rolland Varga

How to deal with legacy systems/solution

Chances are that at some point, regardless of situation, a solution will either be upgraded, changed, decommissioned or a migration will occur.

In this article we will dissect the different components involved in a solution, that will help us identify the lifelines tied to the solution, enabling us to produce smaller chunks of workload and work in an agile manner. 

                                                                                                                                                                                                                                                                                                                                                   

 

 

 

 

 

                                                 

Save money and time?

By Ioana Duda

Chat bot, automatic dispatch and FAQ recommendation, process mining, automatic anonymization of sensitive data, prediction and prevention of incidents, RPA. You name it, we either build it inhouse or sell it.

 

 

Visma's Bug Bounty

By Ioana Piroska

Our company’s nearly one million customers trust us to deliver secure products and services, from payroll and bookkeeping to document sharing and software management.

With such sensitive customer information at play, it’s vital that no vulnerabilities get missed, which is what led Visma to invite hackers to help them secure their digital assets.

Typed fake REST APIs 

By Adrian Fâciu

Whenever you start working on a new project, you might need to consume an API. But that API might not be written yet, or you don’t want to hit the real thing while developing the app.

In this post we’re going to have a look at using JSON Server and faker.js to create a fake REST API. You can use it for local development, testing or any other related tasks.