Posted on by Axel Buerkle

A recent report by OpenSignal revealed that there are 18,796 distinct Android devices in use. This data was gathered directly from users who installed the company’s app. Even though device fragmentation is not a new phenomenon in the Android world, the sheer number of devices is impressive (up from 11,868 devices counted last year). OpenSignal’s data might not reveal the full picture, but it is fairly representative of the Android ecosystem and clearly illustrates what mobile application developers have to …

Continue reading →

Posted in Development Best Practices, Mobility, Test Driven Development, Tools | Leave a comment

Posted on by Steve Levinson

This blog post is a culmination of dozens – no, hundreds – of discussions with clients, partners, and above all else, my awesome colleagues about the magic behind successful consulting. While some of these topics apply primarily to the art of security consulting, many of them transcend industry boundaries and apply to life in general. They are not presented in any particular order as some musings will resonate differently with each reader. There’s no sheet music. The beauty of the …

Continue reading →

Posted in Professional Effectiveness, Security | Leave a comment

Posted on by Jackie Patterson

On a recent project interview with a client of Online’s, I was asked about knowledge management. I had to admit that I knew nothing. The first thing I did after the interview was look it up. I am now writing this for others, so they too can be enlightened on the subject of knowledge management. Knowledge management, when in action, is about capturing, organizing, sharing, and creating knowledge. It can be part of a business, HR, or IT strategy in …

Continue reading →

Posted in Knowledge Management | 1 Comment

Posted on by Maartje Kasdorp

Have you ever had that sinking feeling when you found out that your credit card had been compromised – or your identity had been stolen? Count yourself lucky if you have not experienced this as data breaches and malicious attacks to the applications that we use are no longer an exception as we see in the news almost every day. If you need a bit more convincing about how much the security threats have become a reality in our world, …

Continue reading →

Posted in Development Best Practices, Security | 2 Comments

Posted on by Ian Gibbs

Interaction Design is one of the many facets of User Experience Design. The Encyclopedia of Interaction Design defines it as “shaping digital things for people’s use.” It’s a complex and wide ranging field that covers nearly all aspects of cognition, emotion, and behavior. It’s about designing for the entire interconnected system: the device, the interface, the context, the environment, and the people. According to the Interaction Design Association, Interaction Design “defines the structure and behavior of interactive systems.” Interaction designers …

Continue reading →

Posted in Design, Methodologies, Usability | Leave a comment

Posted on by Jerry Holcombe

To the casual observer, when I’m training for triathlons, it may look like I’m just hard at play. However, that is when I do a lot of my deepest thinking and churning of thoughts. (What else are you gonna do with an hour staring at the bottom of a pool?!) One of my streams of thoughts was around some of the training activities I needed to do to prepare for my big triathlon this summer, and that many of the …

Continue reading →

Posted in Business Transformation | 1 Comment

Posted on by Ben Lucas

In my last post, I showed how you could use mocking frameworks and dependency injection to create unit tests for methods that query a database using Entity Framework. In this post, I will show how you can use the same techniques to test data access code that will insert, update or delete a record from the database. For the purposes of demonstrating this, we will continue to use the Exchange Rate example that has been used previously and implement code …

Continue reading →

Posted in Agile Development, Methodologies, Test Driven Development | 1 Comment

Posted on by James Adamson

The great thing about working with a passionate team of professionals is the inclination to share information, techniques, and tools – a cycle of constant improvement. I was recently in the middle of one of those discussions when it turned towards a particular application designed to capture notes. It wasn’t the first time I’d heard the praises about this particular application. I also remembered that it had finally been released on my platform of choice, Mac OS X. I popped …

Continue reading →

Posted in Security | Leave a comment