Work & Skills
I believe form and function go hand-in-hand when it comes to coding. No matter what service you need, I have the skills and ability to take care of your specific request. Contact me to find out more about what I can offer you.
“No one in the brief history of computing has ever written a piece of perfect software. It’s unlikely that you’ll be the first.”
“All software you write will be tested—if not by you and your team, then by the eventual users—so you might as well plan on testing it thoroughly.”
“One hundred years from now, our engineering may seem as archaic as the techniques used by medieval cathedral builders seem to today’s civil engineers, while our craftsmanship will still be honored.”
“We can be proud of our abilities, but we must own up to our shortcomings, our ignorances and our mistakes.”
“There is no such thing as a best solution, be it a tool, a language, or an operating system. There can only be systems that are more appropriate in a particular set of circumstances.”
“Great software today is often preferable to perfect software tomorrow. If you give your users something to play with early, their feedback will often lead you to a better eventual solution.”
“Developers who don’t actively think about their code are programming by coincidence—the code might work, but there’s no particular reason why.”
“One broken window — a badly designed piece of code, a poor management decision that the team must live with for the duration of the project — is all it takes to start the decline. If you find yourself working on a project with quite a few broken windows, it’s all too easy to slip into the mindset of ‘All the rest of this code is crap, I’ll just follow suit.’”
“While software development is immune from almost all physical laws, entropy hits us hard.”
“In an abstract sense, an application is successful if it correctly implements its specifications. Unfortunately, this pays only abstract bills. In reality, the success of a project is measured by how well it meets the expectations of its users.”
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.
Full-Stack Web Developer
Designs, creates, tests, programs and updates applications for a particular device like mobile or web or a specific operating system. Application developers typically specialise in one area of development, like a mobile phone application. Also involved in performing regular updates on applications and releasing the latest update to the end-users.
A programming language is a computer language that is used by programmers (developers) to communicate with computers. It is a set of instructions written in any specific language ( C, C++, Java, Python) to perform a specific task.
A programming language is mainly used to develop desktop applications, websites, and mobile applications.
Database architecture in businesses and organizations involves the application of programming languages to design software. It mainly involves the design, implementation, development, and maintenance of the computer programs that store and manage data for businesses.
An operating system is a software programme required to manage and operate a computing device like smartphones, tablets, computers, super computers, web servers, cars, network towers, smartwatches, etc. It is the operating system that eliminates the need to know coding language to interact with computing devices.