Excellence in Software Engineering
Blog

We share our
expertise.

 

Home | Blog

Enabling Innovation on Legacy Systems

Enabling Innovation on Legacy Systems

Let’s continue to talk about our blog series “Remote Teams in an Era of Agile”.  What I have mentioned in my previous blog post was “Technical Excellence and Agility”. Today, I would like to continue with the time zone challenge within international teams working across different time zones.

Legacy Software Problems and Maintenance

Legacy Software Problems and Maintenance

A legacy system can be defined as outdated computing software and/or hardware that is still in use. Most legacy systems or setups exist due to some reasons such as long-term ongoing projects, support contracts, the difficulty of replacing modern ones due to cost or any kind of limitations.

App Store Optimization (ASO)

App Store Optimization (ASO)

App Store Optimization on the basis means increasing organic downloads and improving app visibility within the app stores. The optimization is basically done by changing the app’s metadata like app name, title, icons, descriptions and screenshots. These metadata differ from each other in many ways, however, the ultimate goal remains the same.

Secure Coding

Secure Coding

It is hard to withstand ever-expanding attacks with old coding habits. Many attacks on corporate applications come from inside the network, thus rendering such protection mechanisms as firewalls useless. It has become imperative that the application is capable of protecting itself. All security issues are rooted in the code itself. The starting point of the secure coding concept is based on the idea of avoiding security errors in the first place instead of fixing them. So, what should be done to gain secure coding skills?

Why Built-Operate-Transfer (BOT)?

Why Built-Operate-Transfer (BOT)?

“ In the last months we have received some BOT demands from some large enterprises especially from Europe and we had several negotiations with them. Below we want to share with our followers our impressions regarding the concerns, feelings and the alternative searches of any CEO of any enterprise in case of expanding their production into other countries.”

Common Criteria provides a wealth of information about IT security

Common Criteria provides a wealth of information about IT security

Setting up a multilingual full functional support team in a short timeframe is not easy. It requires well-planned transition and efficient team selection process. There are more incompetent support advocates compared to excellent ones and also transition process planning requires unique experience and has lots of technical and business risks to overcome.

How we set up a multilingual full functional support team in a short timeframe – while transferring years long operation

How we set up a multilingual full functional support team in a short timeframe – while transferring years long operation

Setting up a multilingual full functional support team in a short timeframe is not easy. It requires well-planned transition and efficient team selection process. There are more incompetent support advocates compared to excellent ones and also transition process planning requires unique experience and has lots of technical and business risks to overcome.

Technical Excellence and Agility

Technical Excellence and Agility

We have already started talking about the challenges of distributed agile teams in our previous blog post “Remote Teams in an Era of Agile”. Now, we continue with another topic which is essential to succeed in an era of agile software development.

Running with Clogs in the Space

Running with Clogs in the Space

Nearly almost all organizations, even which use agile practices, get in a tizzy with legacy applications. As the time went by, based on outmoded architecture, those ones have been expected to do things beyond for what they were originally designed decades ago.

Redefining Perfection with Secure Software Development Approach

Redefining Perfection with Secure Software Development Approach

Making software security a focal point in the process of designing, developing and delivering software applications is crucial for the ultimate success of these applications. Developing party needs to create trust in the user regarding the protection of critical assets and operational reliability. Therefore, software security becomes a fundamental requirement of software applications. Many companies started to meet software security requirements in accordance with the secure software development framework it has developed, which consists of a rule set defined within the software and security teams. This rule set are defined taking into account various international standards and industry best practices.

A Couple of Tips For Software Quality

A Couple of Tips For Software Quality

Mediocre-quality software is available anywhere and everywhere. We have all encountered it using our desktops, smart phones, running applications from the cloud, and suffered various amounts of pain both as user and developer. Dealing with software, I had done my share of losing and causing loss, and I had done it my way.

Navigation