Authentication and authorization are cornerstones of application security. Authentication... more »
n Part 1, we looked at thoughts on the first 10 things engineers should stop saying in... more »
A insightful blog showcasing the process of exporting Bonitasoft BPM reports to Microsoft... more »
I enjoyed watching your interview with Charlie Rose last month where you said “you’re not our... more »
Differences between available options for mobile application development.