sôft'wâr'

Bits and pieces from the world of software development

September 21, 2017

Domain Primitives - the key to creating secure code

›
This article is an excerpt of topics discussed in the book Secure by Design that I'm currently writing together with Dan Bergh-Johnsson...
May 9, 2017

Entities and Security: identity matters

›
This article is an excerpt of topics discussed in the book Secure by Design that I'm currently writing together with Dan Bergh-Johnsson...
January 17, 2017

New Book: Secure by Design - now in early access program

›
The blog posts have been sparse but I've still been writing a lot lately. After years of thoughts, discussions, and trying out ide...
June 26, 2015

Continuous Delivery and Conway's Law

›
The challenges of continuous delivery Continuous Delivery is more and more becoming a mainstream practice in how to create and deliver so...
1 comment:
March 25, 2015

Custom accessors with IntelliJ's new code generation features

›
The problem with getters If you know your Java history, you will also be familiar with the naming conventions for accessors and mutators tha...
April 17, 2014

Clean code - why it matters

›
Well designed and thought through code is something every software professional should take seriously as it is an enabler for so many import...
June 11, 2013

MapReduce made simple with Akka

›
As you probably already know, Akka  can make your life a lot easier when it comes to things like concurrency and scalability. A very typical...
February 12, 2013

Java-based configuration in Spring - An introduction

›
If you have not started using Java-based configuration in your Spring projects you really should take a look at it since it is a very valuab...
›
Home
View web version
Powered by Blogger.