In a world where there are limited resources for implementing and maintaining controls, we need some mechanism to determine where to spend our time and effort. Fortunately for us, smart people have already thought about, and come up with, a way to do just that: the Risk/Threat Assessment.| Angle of Attack
One key strategy we’ve implemented as part of our broader technological transformation is a monorepository architecture for new applications and libraries.| Angle of Attack
This is post is about FlightAware’s shift away from TCL and the journey we took to get there.| Angle of Attack
Most of the posts on the Angle of Attack blog look to the past, but this post takes a different approach, as it speaks more to what FlightAware will do rather than what it has done. It will give readers some insight into how significant technical decisions are made at FlightAware.| Angle of Attack
This is the first in a series of posts about growing the future leaders of FlightAware.| Angle of Attack