Software Development

Software Architecture

ContentUsing Sqlite In A C# ApplicationSo Why Is Vertical Slice Architecture Better Than Onion Architecture?Onion Architecture Is InterestingWere An Architecture Firm With A Passion For CostConfiguring The ServicesWhen To Apply Onion Architecture? The underlying principle here is separation of concerns, and DDD isn't somehow exempt from that. Now, these business rules are also pure functions with immutable data. They can use the concepts inside the domain model. In this article I am approaching this task in layered, onion and ports...

Read more...

What Is Innovation? Introduction And Definition For Practitioners

ContentBringing New Products To MarketWhat Is The Innovation Process?Radical Innovation ExamplesTypes Of Innovation StrategyProduct Development Strategy Definition Shortly after the launch, the product was taken off the shelves by the FDA due to the glorification of an illegal drug and the high caffeine content. An innovation must differentiate itself from the competition and be distinguished by at least one unique feature. This differentiating feature should be highly relevant for the user and should be able to be maintained in the...

Read more...

What Is Web Application Architecture? Components, Models, And Types

ContentRuby On Rails Web Application DevelopmentServerless ArchitectureWeb Application Architecture Best Practices And TrendsApp Design 101: 8 Mistakes You Should Never Make Instead of loading new pages from the server each time a user takes action, SPAs permit a more dynamic user interaction by providing updated content to the current web page. This architecture is all about the Cloud, and not performed on-premises. Serverless is basically a method of computing where the demanded resources are made available as they are needed...

Read more...

Trello For Personal Use

AWS Network ACL and Security Groups are used to restrict access to Trello’s systems as appropriate to their role. Active monitoring of these security rules is in place with alerting mechanisms in place for any changes to the configuration. trelo Public access is restricted to port 443 and 80 on the network load balancers for public traffic. Atlassian's Workplace Technology team protects our wireless networks by utilizing WPA2-AES authentication and PEAP-EAP-MSCHAPv2 encryption. A centralized configuration system is used for the...

Read more...