Mitigating risk and optimization is critical in project management. It is necessary to have a plan to control the unknowns. How do you control the unknowns? Yes, they are difficult the control in the beginning, but this process can be improved with time and data. First of all, there are known unknowns and unknown unknowns.… Read More Managing the unknown unknowns
Networking is important. The world stressed this enough throughout my life. But is it really? Networking is useless without a specialty. What will they remember you by? Why should they talk to you again? How can they help you when you offer no services? You need a specialty. Something people can remember you by, something valuable… Read More Be prepared for the opportunity
I use this term often. What I mean is a large-scale project that is difficult for a single person to grasp every aspect of it. It requires the interaction of many architects to fully grasp the implementation and impact of changes. I personally use the word enterprise-grade interchangeably.
When a Require JS module returns a value but is returning undefined when injected, there may be errors without any errors shown in the console. 1. Check for circular dependencies 2. Check for dependencies that are missing from the undefined module 3. Check the shim to see if any AMD modules are included (they shouldn’t be in… Read More Require JS Module Returns undefined
In my mind, software development is very simple. A developer is most efficient when they can work independently without requiring external input. For maximum work output, tasks should be separated and distributed to developers that match the skillset. Minimal communication is required, and the worker continuously adapts to become more efficient. However, there are several… Read More Maximizing Efficiency and Work Output in Software Projects
Originally posted on Gigaom:
Facebook provided more details on Friday how it attempts to protect the account information and passwords of its users whose private information unwittingly ends up on file-sharing websites that hackers typically frequent. To keep itself informed of what stolen account information may be lurking on the web, the social network’s security…