Posts

Showing posts with the label PHP

Imposter Syndrome In Software Developers: Am I A Fake Developer?

Image
Have you heard Imposter Syndrome before ?? Yes  or  No  whatever your answer is…if you are a developer we are going to make you remember something which you might have experienced in your job… How did you feel when you see a bunch of requirements in the job description as a developer?  You saw the list of various technology like  (AngularJs, Agile methodology, Git, Python, Javascript, SASS, Build tools (Grunt, Gulp, NPM Scripts), flux, React…)  using some strong heavy words kickass developer, energetic developer, evaluating new programs, strong fundamentals, analytical mind, innovator and a lot like that. You may have felt like  “I don’t fit in this job role” You get completely lost when you are asked to work on a new project or maybe you are asked to write a new feature where you don’t know half of the technology your other coworkers are talking about. How did you feel (especially as a junior developer) when you were given a code written by oth...

Know your programming language and what its best suited for.

Image
As open source projects  continue to thrive  with increasing momentum, even large corporations like Google, Microsoft, and Facebook are adopting such projects of their own. Contrary to the direct opposition faced by pioneers of early open source projects, today most open source developers are hailed in high regards within the community. Thanks to the smart implementation of most popular programming languages, open source development has turned the tide on its favor. The open source ecosystem has become massive, thanks to the ongoing contribution of loyal community members. Long gone the days when big corporations used to incorporate personalized computer programming languages and techniques to curate their proprietary projects. Today, most commercial applications are being fueled by more than one opensource technologies. And as the  scope of opensource projects  continues to increase, we’re seeing a lot of experimentation aimed at breaking the traditional boundar...

Why Unemployed Software developers are a cyber security threat?

Image
Software exists to make things we want to repeat -- in the exact same manner, time after time -- easy to access. When I press the “W” key, I expect a bunch of pixels to be placed on the screen in the shape of a W. I want this response to occur every time. Letters are then organized into words, then into sentences and then Microsoft Word. All highly stable, repeatable methods that are tried and true, wrapped in a user interface (UI) that makes it easy to access every repeatable routine. Even the way in which change is made is very slow, thoroughly tested and primarily focused on stability over the speed of change. It is all well and good to enable blue text, but it would be terrible if pressing the keys for a blue W outputted a Z. None of these aspects describe anything in cybersecurity. Cybersecurity is warfare, strike and counterstrike. It's chaotic and continuously changing. Products = Stable, repeatable methods Enterprise = Optimized, stable operations Cy...