AZ Disruptors Provides Funding For Startups
If you're a tech startup company, don't miss this opportunity for funding. In exchange for 10% of your startup, AZ Disruptors will give you cash, a place to work, and mentors to help guide you.
Read The Article »3 Methods for Goal Setting
Although many people consider agile to be an approach to software development, agile methodologies can be applied to many different business processes, as well as personal goal setting.
Read The Article »Presentation: The Jekyll Static Site Generator
Curtis gave a short presentation on the Jekyll static site generator for Ruby at the Dec 2011 Ruby AZ meetup. He discussed the benefits, usage and even a few gotchas found along the way.
Read The Article »Gathering Requirements Through Story Workshops
We use a technique called a story workshop to gather project requirements. Find out more about how we use this technique to provide value to our clients.
Read The Article »Developer Ignite Phoenix: Real World Cryptography
Hear our (video) take on cryptography in the real world as voiced by Chandler at the first Developer Ignite in Phoenix. You might be surprised at what you learn.
Read The Article »Desert Code Camp Followup
We presented in two separate tracks at Desert Code Camp in Phoenix to a great turnout. You can checkout the slides here.
Read The Article »Desert Code Camp
Desert Code Camp is a locally organized event for developers to present on topics they're interested in. This year, we gave two presentations.
Read The Article »2009-04-30: Recap of Phoenix OpenCoffee Club
A recap of the first Phoenix OpenCoffee Club held at Fair Trade in downtown Phoenix. Find out what was discussed, pitched and what the next plans are for OpenCoffee.
Read The Article »Optimizing hardware costs for Amazon EC2
Wondering what hardware you should provision for your application hosted in the cloud with Amazon EC2? We've got you covered with this handy optimal cost calculator.
Read The Article »Disposable proxy for secure coffee shop browsing
Have you ever used an unsecured wireless connection at a coffeeshop? Find out how you're putting your data at risk and the steps you can take to protect yourself.
Read The Article »