
Snap, Crackle, POPI
The Protection of Personal Information Act (POPIA) goes live on 1 July 2021. It places a huge burden on all organisations — from the one-person accountant firm to the big banks.
The Protection of Personal Information Act (POPIA) goes live on 1 July 2021. It places a huge burden on all organisations — from the one-person accountant firm to the big banks.
In 2017, the Saturday Night Live show produced a hilarious advert for a fake device called Alexa Silver. It’s a version of the Amazon Echo, intended for the elderly. I only saw the video recently, but it was funny enough to watch a few times. My parents, aged 88 and 93, live
We’ve looked at many topics over the past few weeks. It’s easy to delay taking action by focusing on the concepts. And with so much information, it can be difficult to know where to start. So today I am giving you a list of four things that you can –
Aspect-Oriented programming, or AOP, is a term you may have heard but not yet understood. In the first of a 3-part series, we look at the basic concepts and terminology.
Tom deMarco and Timothy Lister wrote a superb book called “Peopleware: Productive Projects and Teams”. It’s a book that has had a profound influence on software management. It is a book you must read, and read again. The premise is clear: the real issues in software development are human, not technical.
I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So far we’ve looked at SAST, DAST and IASP.
This is the 3rd and last article in the series about inversion of control and dependency injection. I look at IoC types, injection vs lookup, and the benefits of dependency injection.
The DBE planned robotics curriculum On 26 Feb 2021, ITWeb reported that the Department of Basic Education will pilot its coding and robotics curriculum in schools this year. I don’t have a child at school, but I still have concerns about this.
I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So far we’ve looked at Static Application Security
In this article we look at how to implement dependency injection in code. Dependency injection has 3 common implementation mechanisms.
Stay home. Stay safe. Stay informed. Find information at www.sacoronavirus.co.za
Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)
Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.
If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com