White Papers & Articles

Explore our ideas, development experience and industry knowledge

Mobile Hacking Exposed: Security Secrets & Solutions

Magic Matrix Of Software Service Provider Integration

Whenever launching a new software project, one of the first decisions every executive has to make is to choose the right software service provider and to define its integration strategy. This is always a difficult decision coupled with multiple challenges.

In this paper we go over the primary criteria executives should consider when defining the level of service provider integration to the project and business. The paper is to serve companies evaluating software development services, executives striving to standardize provider collaboration processes, and project teams engaged in the service provider selection.

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

Mobile Hacking Exposed: Security Secrets & Solutions

There is a lot of uncertainty with regards to viruses on mobile phones and tablets. Malicious software for mobile devices expands in different forms from stealing your credit card details to extorting money for not publishing your photos or location history to public sources. In line with that, numerous famous antivirus companies release multiple products for mobile security. Let’s try to get at the heart of the matter and see the real state of things.

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

GIS and Ukraine

GIS solutions have affected the world from GPS navigation and monitoring, to government management and education. Some of the very first GIS principles and systems date back to 1980’s Ukraine, and the country continues to deliver innovative geospatial solutions. In this article, originally published in June 2014 issue of Geoconnexion …

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

Big data is here – what can you actually do with it?

Big data is everywhere, but how are companies actually using it? Whether you want it to or not, the tech world is transitioning into a data-driven age. With these changes new technologies are taking hold, and companies are finding new and exciting ways to implement ideas and bring innovation to their businesses. This presentation brings forth the most transformative and pressing ideas for managing big data. It explores how technology transforms business and how data is helping drive the change. The focus is on real-life examples of how companies are implementing location-based services, Internet of Things, and omni-channel systems technologies and what benefits these technologies are bringing.

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

Software Engineering without Borders and Boundaries

What does it take to create an effective global software engineering team? From making the decision to create a remote team to the issues of effective management, this presentation highlights the challenges and best practices of creating a remote software engineering team. The case study based presentation draws on direct …

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

Outsourcing in the Midmarket: Reasons, challenges and best practices

In this piece, originally published by the National Outsourcing Association in the Outsourcing Yearbook 2016, Boris Kontsevoi discusses the reasons behind the growing number of midmarket companies who are beginning to outsource. He also points out their biggest challenges and differences with larger corporations. Finally, he presents best practices for midmarket players who are considering outsourcing some of their activities.

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

How to build a product your customers will love [Worksheet]

Understand the feautres your customers want to see in your application, software product or service. Build only the features that bring you and your customers value. That’s no easy task for sure, but Kano analysis (and this worksheet) will help.

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

Startup Technology Checklist

Startups must get their technology right, but they also need to remain flexible. For many (especially non-technical startups), finding a tech partner is the ideal solution. Every startup needs to have a plan for its technology strategy – and this checklist will help you get it right.

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

Building Efficient Distributed Teams with a Nearshore Partner

Building distributed teams is often a necessity in today’s globalized economy. When a company faces talent shortage, tough deadlines, and need for cost optimization, distributed teams are the best option to achieve all of the objectives. While it is often the best choice, managing distributed teams can be its own challenge. Here’s how to manage potential risks and ensure successful results.

Read More »
Mobile Hacking Exposed: Security Secrets & Solutions

The Ultimate Guide to Measuring Software Quality

Without quality management, your product might cost you more than you anticipated. That is why understanding and measuring software quality is one of the most vital parts of software development. Learn how to measure quality to get better software, help you work with remote teams, and write measurable SLAs that are based on achievements of real metrics.

Read More »
Load more