Blog
Articles
On our blog you will find both substantive articles and news. There will also be case studies described in detail. See the Articles category.
![](/static/13ea2530f14c3ae2cc4effa731475c9c/8b872/header_b07f8b60d3.webp)
Basic information protection services
30.08.2016
Nowadays, a component of almost every IT system is its security architecture. It should develop from the beginning of the system's design and form an…
![](/static/e5f52d27bcb1e8fd58ff6b0058545126/8b872/header_63e2b8643f.webp)
Enterprise Search in a Nutshell
22.08.2016
Earlier this year, Salesforce, a popular SaaS CRM solution provider, released a report titled. "[State of IT 2016](https://www.salesforce.com/form/pdf/2016-state-of-it.jsp)."…
![](/static/b6c89eb3c069bd7d72d3ead31864d4d5/8b872/header_744614cc84.webp)
Training objectives from the perspective of an IT training trainer
10.08.2016
In this article I would like to look at one of the key issues determining successful training, namely "the objectives of training". It would seem: a cliché,…
![](/static/59d5f00e6fef4b7e89a8ab2cdb163160/8b872/header_9fcf62fd5e.webp)
How do we prepare our trainers to conduct training?
25.07.2016
The success of a training project depends on a number of factors, including a well-conducted analysis of the group's needs, the identification of individual…
![](/static/dcb7d5bb0c9f491a563b4cdf07997bf3/8b872/header_a8f2fa6ebe.webp)
Drools - beyond Hello World
4.07.2016
In 10 years of experience with the Drools business rules engine, based on both my own projects and the experience of clients for whom I have provided…
![](/static/30d79f248491cf6f3f7863f1afa7e6cd/8b872/header_6ac67f31aa.webp)
Implementation and use of multiwords in the Scala language
19.12.2010
Most high-level programming languages provide structures that implement associative arrays, otherwise known as dictionaries. These structures allow storing…
![](/static/b3ad1fe70630b06070e2fff0619f94bd/8b872/header_6074eb1c0a.webp)
Buffer Overflow Error... in detail
11.07.2010
Probably every person interested in computer networks and their security has come across a buffer overflow attack. The idea of how it works is also familiar…
![](/static/8a8a876b4e96ac4dedb30678931ba5ca/8b872/header_8ea1adf84d.webp)
Query optimization with subqueries
2.03.2010
Modern relational database systems, including those with open source code, allow the creation of very complex SQL queries. By placing subqueries in SELECT,…