Archives

Category Archive for: "Blog"
Home / Blog
By
In Blog Posted

Speaking at UTN: Computers Insecurity. Thinking like a Hacker.

Next Saturday 13 I will be speaking once again about Computers Security at Argentine National Technological University in Buenos Aires. The National Technological University (Spanish: Universidad Tecnológica Nacional, UTN) is a country-wide national university in Argentina, and it’s considered among the top engineering schools in the country, so It is a great honour to be […]
Read More
In Blog Posted

KidoZen Hosts First Wireless Innovation Council Meeting of 2015

The KidoZen team is proud to host the first Wireless Innovation Council (W.I.C.) session of the year at our Miami headquarters this week. W.I.C. was founded in 2012 by Mobiquity, a mobility professional services firm and KidoZen partner, who chairs the organization. The Council’s objective is to bring strategic decision makers from cross-functional industries together […]
Read More
In Blog, Resources Posted

April Webinar – Transitioning from Service Oriented to Mobile Oriented Architectures

As the enterprise mobile space continues to evolve, organizations are getting more strategic in enabling mobile-first infrastructures that can sustain the growing number of mobile solutions in the enterprise. Many organizations presume their investments in Service Oriented Architectures (SOA) can be leveraged to provide the correct backend infrastructure required by mobile solutions. However, they quickly […]
Read More
In Blog Posted

Xamarin Unit Testing Ecosystem

Unit Testing is one of the best things that a Software Developer can master when working on a development platform. Test Driven Development (TDD) has become one of the most powerful practices in Agile development. Xamarin allows you to build iOS, Android and Windows Phone applications in C#, leveraging the .NET framework and reusing a […]
Read More
By
In Blog Posted

FREAK Attack: 90’s NSA actions boomerang

Back in early 90’s in the US was illegal to export strong crypto code. Sending crypto code overseas was considered something similar to export weapons. At that time the NSA and the US government banned people from selling software to other countries unless the code used involved encryption keys no longer than 512 bits. The […]
Read More
page 1 of 21