• The “Designer” Vocabulary

    Design

    The “Designer” Vocabulary

    October 22, 2014 | by Jatin Shah

    GO TO POST
  • Beyond ‘Bhaiyo and Beheno’  – 12 GrowthHacking Lessons From Narendra Modi’s #ModiAtMadison Speech

    Others

    Beyond ‘Bhaiyo and Beheno’ – 12 GrowthHac...

    September 30, 2014 | by Sunny Neogi

    GO TO POST
  • Best Code I Ever Shipped: Devaraj S

    Code

    Best Code I Ever Shipped: Devaraj S

    October 24, 2014 | by Abhilash Kumar

    Devaraj started developing Apps for Android even before Google started allowing publisher accounts to publish apps in India. This talented developer draws inspiration from his ‘positive’ fear of...

    Read more >>
  • Building Mobile Web Apps the Right Way: Tips and Techniques

    Others

    Building Mobile Web Apps the Right Way: Tips and Techniques

    October 20, 2014 | by Vedhamanikandan M

    Mobile as a Platform We've all got a mobile device these days - whether it’s a smartphone like the iPhone or a touchscreen tablet like the iPad - and most of us in the industry will use many different...

    Read more >>
  • How To Mix Finance And Fun? This Guy Can Tell You!

    Culture

    How To Mix Finance And Fun? This Guy Can Tell You!

    October 16, 2014 | by Sachin Katekar

    This finance wiz hails from Kerala, grew up in Kolkata and has worked in Mumbai; but Bangalore is his number 1 choice to live in, thanks to the great weather, opportunities and freedom that the city...

    Read more >>
  • Glimpse with ASP.NET

    Design

    Glimpse with ASP.NET

    October 15, 2014 | by Santhosh Lakkanna

    The moment I say Glimpse with asp.net, .Net developers might start thinking that I am talking about some features of Asp.net. But I am actually talking about “Glimpse” - an open source tool that helps...

    Read more >>
  • Bash Code Injection Vulnerability via Specially Crafted Environment Variables

    Code

    Bash Code Injection Vulnerability via Specially Crafted Environment Variables

    October 14, 2014 | by Sharad Kumar Chhetri

    Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271 (aka Shellshock ), CVE-2014-7169). This is one the most vulenerable bug we have seen in Linux at current time....

    Read more >>
  • When Worlds Collide, What Happens To Them?

    Data

    When Worlds Collide, What Happens To Them?

    October 13, 2014 | by Manpreet Singh Alag

    Every now and then, we, the people in IT, keep hearing stuff about the next big thing or the latest buzzword. Be it Analytics, Big Data, Cloud or more recently the Internet of Things (IoT). Every year or...

    Read more >>
  • “Take time to discover yourself” – Brant Williams’ advice to his 25 year old self

    Culture

    “Take time to discover yourself” – Brant Williams’ advice to his 25 year old self

    October 10, 2014 | by Sachin Katekar

    “You know you’re turning 25 when the thing you most look forward to is the drop in your car insurance” – Unknown Quite true, right? As people grow older, they realize that some of the most...

    Read more >>

Privacy Statement | Terms Of Use Copyright 2014 Aditi Technologies