Jennifer Pike

Jennifer Pike
Posted by Jennifer Pike
November 9, 2016

Metova: A Great Place to Work

We want to be the best place you’ve ever worked. Metova was founded by a  developer who wanted to build a company where he would like to work. While we have gone through several changes over the years, providing a good place to work is still of utmost importance. We listen to our developers and strive to create an environment where they enjoy coming into work every day.

Read More
Jennifer Pike
Posted by Jennifer Pike
November 7, 2016

UX Testing: More Isn't Always Better

More isn’t always better. When it comes to UX testing, 5 is the golden number of testers to aim for according to Invision, a popular UX testing and prototyping tool and the Nielsen Norman Group, a consultant in the UX field.  

Read More
Jennifer Pike
Posted by Jennifer Pike
October 31, 2016

How to Promote Your Application

Congratulations on the release of your application! It looks great, is easy to use, and functions as intended. It’s not time to rest yet! It can be easy to forget that application development is an ongoing process. Now you need to promote your application and get users. Here are some tips to get your fan base started.

Read More
Jennifer Pike
Posted by Jennifer Pike
October 12, 2016

CyberCENTS Sponsors ITEN Cyber Competition

The ITEN Wired conference in Pensacola Beach, Florida begins today. We are proud that our sister company, CyberCENTS, is sponsoring the Cyber competition.  They are also providing CENTS®  (Cyber Operations Enhanced Network and Training Simulators) as the infrastructure for some of the events. The competition will consist of Cyber Defense, Cyber Offense, and Capture the Flag.

Read More
Jennifer Pike
Posted by Jennifer Pike
October 3, 2016

Cybersecurity- Computer Forensics

What is Computer Forensics?

Electronic devices are extremely commonplace. As time goes on, more and more people not only have a device, but use multiple ones daily. People use them to enhance their social life with apps like Twitter, Facebook, or eHarmony. They keep schedules, communication, and other important data on them. Add to that all of the information that applications and companies like Google collect, and you could learn a ton about a person you’d never met just by accessing the information on their device. Collecting information from a device for use in a court of law is the purpose of computer forensics.

Read More
Jennifer Pike
Posted by Jennifer Pike
September 21, 2016

Decrypting Cryptography

I was particularly excited to write about cryptanalysis this month because I was fascinated with secret messages, spys, and the like when I was young. Encyclopedia Brown, Nancy Drew, lemon juice ink, pig latin, secret codes… I loved it all. With computers’ ability to solve equations at mind blowing speeds, software encryption goes beyond just replacing letters with numbers to create a code- way, way beyond.  

Read More
Jennifer Pike
Posted by Jennifer Pike
September 13, 2016

New Features in iOS 10

Today's the day. Apple is releasing iOS 10. Here are a handful of new features  you can look forward to!

Read More
Jennifer Pike
Posted by Jennifer Pike
September 6, 2016

App Store Improvements- Will It Affect Your iOS App?

Starting tomorrow - Wednesday September 7th, Apple will begin reviewing iOS apps in the App Store. They will be looking for ones that may have passed under the radar as technology improves and the App Store rules have changed. Apple says they will be reviewing apps in every category of the App Store.

Read More
Jennifer Pike
Posted by Jennifer Pike
September 5, 2016

System Administrators, the Protectors of Networks

If you’ve kept up with our last few blogs on security, you know there are multiple ways your system can be compromised. You will also know that as technology improves, so do hackers’ abilities. New software, hardware, and best practices are coming out all of the time to thwart attacks. It’s a large amount of information to keep up with. This is where system admins come in.

Read More
Jennifer Pike
Posted by Jennifer Pike
August 17, 2016

Network Sniffing

What is network sniffing? Information is sent across networks in groups called packets. Network sniffers then intercept these packets in order to find information about a network.

Chess, the Force, and Duct tape all have a dark side and a light side. Network sniffing is no different and can be used in both ethical and illegal ways. Developers often check the network in order to confirm the information they are sending is being received accurately and that there aren’t any problems. If there are, examining the network can help with troubleshooting and fixing. Illegal usage can span from simple information gathering to pretending to be a valid site or service to masquerading as a user.

Read More
Jennifer Pike
Posted by Jennifer Pike
August 8, 2016

Reverse Engineering In Software

What is Reverse Engineering?

It is human nature to be curious about the world and how things work and then how to manipulate them. Imagine a growing baby. “What’s this thing attached to my body? Oh, an arm! I can move it! Hey, that shiny object sure looks interesting. Maybe I can use this arm thing to get it closer. There we go, now to just pick it up and taste it...”

Read More
Jennifer Pike
Posted by Jennifer Pike
August 1, 2016

Design: The Key to Making Your Content Pop

There are so very many details that go into every piece of media you consume. As I write the copy for this article, I know that the words aren’t the sum of your impression of this blog. What you read may be what you remember the most, but subconsciously there is much more going on to affect your impression that you may not even realize. Working with and around the design team at Metova has given me new insights into what makes an article actually look the part.

Read More
We use cookies to give you the best experience.