blog

Data Modelling with MongoDB

At first, if you are coming from the world of SQL these concepts may seem a bit foreign and contrary to your existing  ‘best-practices’. Specifically when designing a data model …

NSA Hack Tools Exploited

NSA hack tools are being exploited by several groups who are demanding ransom payment in crypto currency. This is just the latest in a recent string of events which have …