Unravelling the Tapestry of Legacy Code: A Series on Safely …
Embark on a transformative journey with us as we explore the art of working with legacy code, unravelling its layers, and …
Read this blog article hereLast Post: 2024-03-21
Embark on a transformative journey with us as we explore the art of working with legacy code, unravelling its layers, and …
Read this blog article hereHow do you choose between C# and .NET, Python, or Go when starting a new project? This article will help you.
Read this blog article hereWant to be productive when studying something? These tips will set you up for success.
Read this blog article hereYou have lots of downloads for your show, yet no one is engaging with it. But why? And what are some ways to boost engagement?
Read this blog article hereHow does AI fit into our podcast mastering process, and how does that help our clients? Find out in this blog post.
Read this blog article hereWhat do microwave ready meals, courage, vulnerability, and Theodore Roosevelt have in common? Impostor Syndrome.
Read this blog article hereComplexity, failure, and vulnerability where the focus of 2023’s CPD. In this blog post Jamie discusses 10 of the best books …
Read this blog article hereEmpathy is one of the most important skills in any industry, and we need to do better in the software development, cybersecurity, …
Read this blog article hereJamie attended Leeds Cyber Security Conference, and wanted to write about his key take aways at this event and why you should …
Read this blog article here