Excellence in Software Engineering
The Existence of the Desk Phones

The Existence of the Desk Phones

Although the worldwide spread of smartphones and UC applications raise some question marks about the future of desk phones, it is certain that this negative change will not occur overnight, and desk phones will continue to a long way ahead, despite some challenges.

Mobile Development

Mobile Development

First mobile phones were invented in the 1940s by the engineers working at AT&T. They looked quite different from the mobile phones we are using today and mostly used for public service communications. It took another 70 years for a revolution to occur in mobile phones.

World Environment Day

World Environment Day

As ICterra, when we have started our journey with the mission of “Excellence in Software Engineering”, we have decided that the satisfaction of all our stakeholders would be our highest priority and embraced the “environment” as one of our stakeholders.

Enabling Innovation on Legacy Systems

Enabling Innovation on Legacy Systems

Let’s continue to talk about our blog series “Remote Teams in an Era of Agile”.  What I have mentioned in my previous blog post was “Technical Excellence and Agility”. Today, I would like to continue with the time zone challenge within international teams working across different time zones.

How to Overcome Time Zone Challenge in Remote Teams

How to Overcome Time Zone Challenge in Remote Teams

Let’s continue to talk about our blog series “Remote Teams in an Era of Agile”.  What I have mentioned in my previous blog post was “Technical Excellence and Agility”. Today, I would like to continue with the time zone challenge within international teams working across different time zones.

Legacy Software Problems and Maintenance

Legacy Software Problems and Maintenance

A legacy system can be defined as outdated computing software and/or hardware that is still in use. Most legacy systems or setups exist due to some reasons such as long-term ongoing projects, support contracts, the difficulty of replacing modern ones due to cost or any kind of limitations.

App Store Optimization (ASO)

App Store Optimization (ASO)

App Store Optimization on the basis means increasing organic downloads and improving app visibility within the app stores. The optimization is basically done by changing the app’s metadata like app name, title, icons, descriptions and screenshots. These metadata differ from each other in many ways, however, the ultimate goal remains the same.

Secure Coding

Secure Coding

It is hard to withstand ever-expanding attacks with old coding habits. Many attacks on corporate applications come from inside the network, thus rendering such protection mechanisms as firewalls useless. It has become imperative that the application is capable of protecting itself. All security issues are rooted in the code itself. The starting point of the secure coding concept is based on the idea of avoiding security errors in the first place instead of fixing them. So, what should be done to gain secure coding skills?

Why Built-Operate-Transfer (BOT)?

Why Built-Operate-Transfer (BOT)?

“ In the last months we have received some BOT demands from some large enterprises especially from Europe and we had several negotiations with them. Below we want to share with our followers our impressions regarding the concerns, feelings and the alternative searches of any CEO of any enterprise in case of expanding their production into other countries.”

Common Criteria provides a wealth of information about IT security

Common Criteria provides a wealth of information about IT security

Setting up a multilingual full functional support team in a short timeframe is not easy. It requires well-planned transition and efficient team selection process. There are more incompetent support advocates compared to excellent ones and also transition process planning requires unique experience and has lots of technical and business risks to overcome.

Navigation