Cost and Schedule both are inextricable part of Project Management, especially in case of medium to large scale projects. We focus on project management basics, as well as a wonderful tried and tested method called Earned value management (EVM).
Hyperledger Fabric is a decentralized private blockchain platform. Typically, we use the provided Fabric Client SDK to interact with the Fabric network. If we want the communication between these two to be secure, we can use the TLS (Transport Layer Security) protocol.
In our first blog, we learned how to program an Arduino board and call the API to know how much coffee we have, in real-time. In this blog, we will focus on API and mobile integration, so you can access this data on your phone!
For this layer, I used Node.js. We need few dependencies in order to achieve the desired functionality. Update the dependencies in your package.json as shown below:
Once updated, run
I have used a simple service to get the value from…
Digital products designed and developed today often miss an important factor: ‘Designing for differently-abled people’. The United Nation’s 2030 Sustainable Development Agenda focuses on important aspects of accessibility.
These include respecting, protecting, & promoting equality, achieving full and productive employment for people with disabilities.
Accessibility is about creating designs and products which cater to a wide pool of people irrespective of the physical or visual impairments they may experience. Such limitations can be brought about by vision impairment, colour-blindness, hearing loss, cognitive, physical or hand tremors, or poor eye-sight due to old age etc.
When we talk about creating digital…
Geofencing — ‘Geo’ is a prefix derived from the Greek word that means “earth” and the suffix ‘fencing’ means “an imaginary border”. Geofencing is basically a location-based service that enables us to detect and monitor when a vehicle or a person enters, exits, crosses, or bypasses a precise geographical area delimited by a virtual perimeter by generating instant alerts. These alerts are referred to as Geo notifications.
Geofencing uses GPS, RFID, or other location-tracking technology to define geographical boundaries. Users can define a circular or polygonal fence based on the business needs. To create a circular fence around a particular…
Broken authentication is a widely used term reflecting a combination of vulnerabilities related to authentication and flawed implementations of session management functionalities. It lets threat agents exploit weaknesses in session and credentials management implementations.
It is the second most prevalent and impactful vulnerability as per the OWASP “Top 10” list.
To leverage AWS services in their projects, developers generally use AWS-SDK or AWS CLI. For these, an admin creates an IAM user with programmatic access. He then shares access to these credentials with the developer. These credentials consist of an access key and a secret key ID. As a developer at DLT Labs, we use these credentials to sign API requests. By doing so, AWS can verify the user’s identity in API calls.
Anyone having our credentials would have the same level of access to the AWS resources that we have.
Credential’s management and its security have always been a…
Business requirements are those capabilities that help a business transform from its present-day state to a desired future state.
One of the reasons businesses successfully achieve their set objective is related very closely to how well that business’s needs are decomposed from high-level requirements to smaller specific requirements.
Why is this important?
This is important because, in a successful business, a project’s success is directly influenced by identifying what are the exact needs to design an appropriate solution, and how these needs can be met by developing specific requirements. On the other hand, assumptions, and constraints in turn influence requirements.
Last month marked the one year anniversary of our launch of DL Freight and we’ve been celebrating the platform’s journey and accomplishments. Even though it feels amazing to have reached this milestone, it’s not the final destination for us, only the end of a chapter in an ongoing journey.
We believe it’s important to regularly monitor performance, get user feedback, keep tabs on industry trends and make refinements along the way. This ensures the platform continues running smoothly, adapting and expanding without interruption and reflecting user and industry needs.
This is also why so soon after its first anniversary, we’re…
The most important part of any company is its assets and keeping track of them appropriately is an essential part of operations. There are many benefits of doing this. Some of these include conducting scheduled maintenance effectively, ensuring compliance, and automating inventory management, to name a few.
Using a complete asset tracking system — comprising of tracking technologies and their supplementary software — is much more efficient than having to manually track items using a spreadsheet. It lets businesses accurately track their assets while reducing the risk of human error.
Physical assets can be tracked using different technologies. Before we…